luat_network_adapter.c 65 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806
  1. #include "luat_base.h"
  2. #include "luat_mem.h"
  3. #include "luat_crypto.h"
  4. #include "luat_rtos.h"
  5. #ifdef LUAT_USE_NETWORK
  6. #include "luat_rtos.h"
  7. #include "platform_def.h"
  8. #include "ctype.h"
  9. #include "luat_network_adapter.h"
  10. #ifndef LWIP_NUM_SOCKETS
  11. #define LWIP_NUM_SOCKETS 8
  12. #endif
  13. typedef struct
  14. {
  15. #ifdef LUAT_USE_LWIP
  16. network_ctrl_t lwip_ctrl_table[LWIP_NUM_SOCKETS];
  17. // HANDLE network_mutex;
  18. #endif
  19. int last_adapter_index;
  20. int default_adapter_index;
  21. llist_head dns_cache_head;
  22. #ifdef LUAT_USE_LWIP
  23. uint8_t lwip_ctrl_busy[LWIP_NUM_SOCKETS];
  24. #endif
  25. uint8_t is_init;
  26. }network_info_t;
  27. typedef struct
  28. {
  29. network_adapter_info *opt;
  30. void *user_data;
  31. uint8_t *ctrl_busy;
  32. network_ctrl_t *ctrl_table;
  33. uint16_t port;
  34. }network_adapter_t;
  35. static network_adapter_t prv_adapter_table[NW_ADAPTER_QTY];
  36. static network_info_t prv_network;
  37. static const char *prv_network_event_id_string[] =
  38. {
  39. "适配器复位",
  40. "LINK状态变更",
  41. "超时",
  42. "DNS结果",
  43. "发送成功",
  44. "有新的数据",
  45. "接收缓存满了",
  46. "断开成功",
  47. "对端关闭",
  48. "连接成功",
  49. "连接异常",
  50. "开始监听",
  51. "新的客户端来了",
  52. "唤醒",
  53. "未知",
  54. };
  55. static const char *prv_network_ctrl_state_string[] =
  56. {
  57. "硬件离线",
  58. "离线",
  59. "等待DNS",
  60. "正在连接",
  61. "正在TLS握手",
  62. "在线",
  63. "在监听",
  64. "正在离线",
  65. "未知"
  66. };
  67. static const char *prv_network_ctrl_wait_state_string[] =
  68. {
  69. "无等待",
  70. "等待硬件上线",
  71. "等待连接完成",
  72. "等待发送完成",
  73. "等待离线完成",
  74. "等待任意网络变化",
  75. "未知",
  76. };
  77. static const char *prv_network_ctrl_callback_event_string[] =
  78. {
  79. "硬件状态回调",
  80. "连接状态回调",
  81. "离线状态回调",
  82. "发送状态回调",
  83. "任意网络变化回调",
  84. };
  85. const char *network_ctrl_event_id_string(uint32_t event)
  86. {
  87. if (event > EV_NW_END || event < EV_NW_RESET)
  88. {
  89. return prv_network_event_id_string[EV_NW_END - EV_NW_RESET];
  90. }
  91. return prv_network_event_id_string[event - EV_NW_RESET];
  92. }
  93. const char *network_ctrl_state_string(uint8_t state)
  94. {
  95. if (state > NW_STATE_DISCONNECTING)
  96. {
  97. return prv_network_ctrl_state_string[NW_STATE_DISCONNECTING + 1];
  98. }
  99. return prv_network_ctrl_state_string[state];
  100. }
  101. const char *network_ctrl_wait_state_string(uint8_t state)
  102. {
  103. if (state > NW_WAIT_EVENT)
  104. {
  105. return prv_network_ctrl_wait_state_string[NW_WAIT_EVENT + 1];
  106. }
  107. return prv_network_ctrl_wait_state_string[state];
  108. }
  109. const char *network_ctrl_callback_event_string(uint32_t event)
  110. {
  111. if (event > EV_NW_RESULT_EVENT || event < EV_NW_RESULT_LINK)
  112. {
  113. return prv_network_ctrl_callback_event_string[event - EV_NW_RESULT_EVENT + 1];
  114. }
  115. return prv_network_ctrl_callback_event_string[event - EV_NW_RESULT_EVENT];
  116. }
  117. network_adapter_info* network_adapter_fetch(int id, void** userdata) {
  118. if (id >= 0 && id < NW_ADAPTER_QTY) {
  119. if (prv_adapter_table[id].opt) {
  120. *userdata = prv_adapter_table[id].user_data;
  121. return prv_adapter_table[id].opt;
  122. }
  123. }
  124. return NULL;
  125. }
  126. #ifdef LUAT_USE_LWIP
  127. #include "../lwip/port/net_lwip.h"
  128. #else
  129. #include "dhcp_def.h"
  130. #endif
  131. extern void DBG_Printf(const char* format, ...);
  132. extern void DBG_HexPrintf(void *Data, unsigned int len);
  133. //#define DBG(x,y...) DBG_Printf("%s %d:"x"\r\n", __FUNCTION__,__LINE__,##y)
  134. //#define DBG_ERR(x,y...) DBG_Printf("%s %d:"x"\r\n", __FUNCTION__,__LINE__,##y)
  135. static int tls_random( void *p_rng,
  136. unsigned char *output, size_t output_len );
  137. #define __NW_DEBUG_ENABLE__
  138. #ifdef __NW_DEBUG_ENABLE__
  139. #ifdef LUAT_LOG_NO_NEWLINE
  140. #define DBG(x,...) do {if (ctrl->is_debug) {DBG_Printf("%s %d:"x, __FUNCTION__,__LINE__,##__VA_ARGS__);}} while(0)
  141. #define DBG_ERR(x,...) DBG_Printf("%s %d:"x, __FUNCTION__,__LINE__,##__VA_ARGS__)
  142. #else
  143. #define DBG(x,...) do {if (ctrl->is_debug) {DBG_Printf("%s %d:"x"\r\n", __FUNCTION__,__LINE__,##__VA_ARGS__);}} while(0)
  144. #define DBG_ERR(x,...) DBG_Printf("%s %d:"x"\r\n", __FUNCTION__,__LINE__,##__VA_ARGS__)
  145. #endif
  146. #else
  147. #define DBG(x,...)
  148. #define DBG_ERR(x,...)
  149. #endif
  150. #define NW_LOCK platform_lock_mutex(ctrl->mutex)
  151. #define NW_UNLOCK platform_unlock_mutex(ctrl->mutex)
  152. #define SOL_SOCKET 0xfff /* options for socket level */
  153. #define SO_REUSEADDR 0x0004 /* Allow local address reuse */
  154. #define SO_KEEPALIVE 0x0008 /* keep connections alive */
  155. #define IPPROTO_ICMP 1
  156. #define IPPROTO_TCP 6
  157. #define TCP_NODELAY 0x01 /* don't delay send to coalesce packets */
  158. #define TCP_KEEPALIVE 0x02 /* send KEEPALIVE probes when idle for pcb->keep_idle milliseconds */
  159. #define TCP_KEEPIDLE 0x03 /* set pcb->keep_idle - Same as TCP_KEEPALIVE, but use seconds for get/setsockopt */
  160. #define TCP_KEEPINTVL 0x04 /* set pcb->keep_intvl - Use seconds for get/setsockopt */
  161. #define TCP_KEEPCNT 0x05 /* set pcb->keep_cnt - Use number of probes sent for get/setsockopt */
  162. static uint8_t network_check_ip_same(luat_ip_addr_t *ip1, luat_ip_addr_t *ip2)
  163. {
  164. #ifdef LUAT_USE_LWIP
  165. #if defined ENABLE_PSIF
  166. return ip_addr_cmp(ip1, ip2);
  167. #else
  168. #if LWIP_IPV6
  169. return ip_addr_cmp_zoneless(ip1, ip2);
  170. #else
  171. return ip_addr_cmp(ip1, ip2);
  172. #endif
  173. #endif
  174. #else
  175. if (ip1->is_ipv6 != ip2->is_ipv6)
  176. {
  177. return 0;
  178. }
  179. if (ip1->is_ipv6)
  180. {
  181. return !memcmp(ip1->ipv6_u8_addr, ip2->ipv6_u8_addr, 16);
  182. }
  183. else
  184. {
  185. return (ip1->ipv4 == ip2->ipv4);
  186. }
  187. #endif
  188. }
  189. static int network_base_tx(network_ctrl_t *ctrl, const uint8_t *data, uint32_t len, int flags, luat_ip_addr_t *remote_ip, uint16_t remote_port)
  190. {
  191. int result = -1;
  192. if (ctrl->is_tcp)
  193. {
  194. result = network_socket_send(ctrl, data, len, flags, NULL, 0);
  195. }
  196. else
  197. {
  198. if (remote_ip)
  199. {
  200. result = network_socket_send(ctrl, data, len, flags, remote_ip, remote_port);
  201. }
  202. else
  203. {
  204. result = network_socket_send(ctrl, data, len, flags, ctrl->online_ip, ctrl->remote_port);
  205. }
  206. }
  207. if (result >= 0)
  208. {
  209. ctrl->tx_size += len;
  210. }
  211. else
  212. {
  213. ctrl->need_close = 1;
  214. }
  215. return result;
  216. }
  217. static LUAT_RT_RET_TYPE tls_shorttimeout(LUAT_RT_CB_PARAM)
  218. {
  219. network_ctrl_t *ctrl = (network_ctrl_t *)param;
  220. if (!ctrl->tls_mode)
  221. {
  222. platform_stop_timer(ctrl->tls_long_timer);
  223. return LUAT_RT_RET;
  224. }
  225. if (0 == ctrl->tls_timer_state)
  226. {
  227. ctrl->tls_timer_state = 1;
  228. }
  229. return LUAT_RT_RET;
  230. }
  231. #ifdef LUAT_USE_TLS
  232. static LUAT_RT_RET_TYPE tls_longtimeout(LUAT_RT_CB_PARAM)
  233. {
  234. network_ctrl_t *ctrl = (network_ctrl_t *)param;
  235. platform_stop_timer(ctrl->tls_short_timer);
  236. if (!ctrl->tls_mode)
  237. {
  238. return LUAT_RT_RET;
  239. }
  240. ctrl->tls_timer_state = 2;
  241. return LUAT_RT_RET;
  242. }
  243. static void tls_settimer( void *data, uint32_t int_ms, uint32_t fin_ms )
  244. {
  245. network_ctrl_t *ctrl = (network_ctrl_t *)data;
  246. if (!ctrl->tls_mode)
  247. {
  248. return;
  249. }
  250. if (!fin_ms)
  251. {
  252. platform_stop_timer(ctrl->tls_short_timer);
  253. platform_stop_timer(ctrl->tls_long_timer);
  254. ctrl->tls_timer_state = -1;
  255. return ;
  256. }
  257. platform_start_timer(ctrl->tls_short_timer, int_ms, 0);
  258. platform_start_timer(ctrl->tls_long_timer, fin_ms, 0);
  259. ctrl->tls_timer_state = 0;
  260. }
  261. static int tls_gettimer( void *data )
  262. {
  263. network_ctrl_t *ctrl = (network_ctrl_t *)data;
  264. if (!ctrl->tls_mode)
  265. {
  266. return -ERROR_PARAM_INVALID;
  267. }
  268. #if MBEDTLS_VERSION_NUMBER >= 0x03000000
  269. if(!mbedtls_ssl_is_handshake_over(ctrl->ssl))
  270. #else
  271. if (ctrl->ssl->state != MBEDTLS_SSL_HANDSHAKE_OVER)
  272. #endif
  273. {
  274. return ctrl->tls_timer_state;
  275. }
  276. else
  277. {
  278. return 0;
  279. }
  280. }
  281. static void tls_dbg(void *data, int level,
  282. const char *file, int line,
  283. const char *str)
  284. {
  285. (void)data;(void)level;DBG_Printf("%s %d:%s", file, line, str);
  286. }
  287. static int tls_send(void *ctx, const unsigned char *buf, size_t len )
  288. {
  289. network_ctrl_t *ctrl = (network_ctrl_t *)ctx;
  290. if (!ctrl->tls_mode)
  291. {
  292. return -ERROR_PERMISSION_DENIED;
  293. }
  294. if (network_base_tx(ctrl, buf, len, 0, NULL, 0) != len)
  295. {
  296. return -0x004E;
  297. }
  298. else
  299. {
  300. return len;
  301. }
  302. }
  303. #endif
  304. static int tls_recv(void *ctx, unsigned char *buf, size_t len )
  305. {
  306. #ifdef LUAT_USE_TLS
  307. network_ctrl_t *ctrl = (network_ctrl_t *)ctx;
  308. luat_ip_addr_t remote_ip;
  309. uint16_t remote_port;
  310. int result = -1;
  311. if (!ctrl->tls_mode)
  312. {
  313. return -1;
  314. }
  315. TLS_RECV:
  316. result = network_socket_receive(ctrl, buf, len, 0, &remote_ip, &remote_port);
  317. if (result < 0)
  318. {
  319. return -0x004C;
  320. }
  321. if (result > 0)
  322. {
  323. if (!ctrl->is_tcp)
  324. {
  325. if ((remote_port == ctrl->remote_port) && network_check_ip_same(&remote_ip, ctrl->online_ip))
  326. {
  327. goto TLS_RECV;
  328. }
  329. }
  330. return result;
  331. }
  332. return MBEDTLS_ERR_SSL_WANT_READ;
  333. #else
  334. return -1;
  335. #endif
  336. }
  337. static int network_get_host_by_name(network_ctrl_t *ctrl)
  338. {
  339. #ifdef LUAT_USE_LWIP
  340. network_set_ip_invaild(&ctrl->remote_ip);
  341. if (ipaddr_aton(ctrl->domain_name, &ctrl->remote_ip))
  342. {
  343. return 0;
  344. }
  345. network_set_ip_invaild(&ctrl->remote_ip);
  346. return -1;
  347. #else
  348. ctrl->remote_ip.is_ipv6 = 0xff;
  349. if (network_string_is_ipv4(ctrl->domain_name, ctrl->domain_name_len))
  350. {
  351. ctrl->remote_ip.is_ipv6 = 0;
  352. ctrl->remote_ip.ipv4 = network_string_to_ipv4(ctrl->domain_name, ctrl->domain_name_len);
  353. }
  354. else
  355. {
  356. char *name = zalloc(ctrl->domain_name_len + 1);
  357. memcpy(name, ctrl->domain_name, ctrl->domain_name_len);
  358. network_string_to_ipv6(name, &ctrl->remote_ip);
  359. free(name);
  360. }
  361. if (ctrl->remote_ip.is_ipv6 != 0xff)
  362. {
  363. return 0;
  364. }
  365. else
  366. {
  367. return -1;
  368. }
  369. #endif
  370. }
  371. static void network_update_dns_cache(network_ctrl_t *ctrl)
  372. {
  373. }
  374. static void network_get_dns_cache(network_ctrl_t *ctrl)
  375. {
  376. }
  377. static int network_base_connect(network_ctrl_t *ctrl, luat_ip_addr_t *remote_ip)
  378. {
  379. #ifdef LUAT_USE_LWIP
  380. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  381. if (ctrl->socket_id >= 0)
  382. {
  383. #ifdef LUAT_USE_TLS
  384. if (ctrl->tls_mode)
  385. {
  386. mbedtls_ssl_free(ctrl->ssl);
  387. }
  388. #endif
  389. if (network_socket_close(ctrl))
  390. {
  391. network_clean_invaild_socket(ctrl->adapter_index);
  392. network_socket_force_close(ctrl);
  393. }
  394. ctrl->need_close = 0;
  395. ctrl->socket_id = -1;
  396. }
  397. if (remote_ip)
  398. {
  399. if (network_create_socket(ctrl, network_ip_is_ipv6(remote_ip)) < 0)
  400. {
  401. network_clean_invaild_socket(ctrl->adapter_index);
  402. if (network_create_socket(ctrl, network_ip_is_ipv6(remote_ip)) < 0)
  403. {
  404. return -1;
  405. }
  406. }
  407. if (adapter->opt->is_posix)
  408. {
  409. volatile uint32_t val;
  410. val = ctrl->tcp_keep_alive;
  411. network_setsockopt(ctrl, SOL_SOCKET, SO_KEEPALIVE, (void *)&val, sizeof(val));
  412. if (ctrl->tcp_keep_alive)
  413. {
  414. val = ctrl->tcp_keep_idle;
  415. network_setsockopt(ctrl, IPPROTO_TCP, TCP_KEEPIDLE, (void*)&val, sizeof(val));
  416. val = ctrl->tcp_keep_interval;
  417. network_setsockopt(ctrl, IPPROTO_TCP, TCP_KEEPINTVL, (void *)&val, sizeof(val));
  418. val = ctrl->tcp_keep_cnt;
  419. network_setsockopt(ctrl, IPPROTO_TCP, TCP_KEEPCNT, (void *)&val, sizeof(val));
  420. }
  421. }
  422. else
  423. {
  424. network_user_cmd(ctrl, NW_CMD_AUTO_HEART_TIME, ctrl->tcp_keep_idle);
  425. }
  426. return network_socket_connect(ctrl, remote_ip);
  427. }
  428. else
  429. {
  430. if (network_create_socket(ctrl, 0) < 0)
  431. {
  432. network_clean_invaild_socket(ctrl->adapter_index);
  433. if (network_create_socket(ctrl, 0) < 0)
  434. {
  435. return -1;
  436. }
  437. }
  438. return network_socket_listen(ctrl);
  439. }
  440. #else
  441. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  442. if (ctrl->socket_id >= 0)
  443. {
  444. network_force_close_socket(ctrl);
  445. }
  446. if (remote_ip)
  447. {
  448. if (network_create_socket(ctrl, remote_ip->is_ipv6) < 0)
  449. {
  450. network_clean_invaild_socket(ctrl->adapter_index);
  451. if (network_create_socket(ctrl, remote_ip->is_ipv6) < 0)
  452. {
  453. return -1;
  454. }
  455. }
  456. if (adapter->opt->is_posix)
  457. {
  458. network_setsockopt(ctrl, SOL_SOCKET, SO_KEEPALIVE, (void *)&ctrl->tcp_keep_alive, sizeof(ctrl->tcp_keep_alive));
  459. if (ctrl->tcp_keep_alive)
  460. {
  461. network_setsockopt(ctrl, IPPROTO_TCP, TCP_KEEPIDLE, (void*)&ctrl->tcp_keep_idle, sizeof(ctrl->tcp_keep_idle));
  462. network_setsockopt(ctrl, IPPROTO_TCP, TCP_KEEPINTVL, (void *)&ctrl->tcp_keep_interval, sizeof(ctrl->tcp_keep_interval));
  463. network_setsockopt(ctrl, IPPROTO_TCP, TCP_KEEPCNT, (void *)&ctrl->tcp_keep_cnt, sizeof(ctrl->tcp_keep_cnt));
  464. }
  465. }
  466. else
  467. {
  468. network_user_cmd(ctrl, NW_CMD_AUTO_HEART_TIME, ctrl->tcp_keep_idle);
  469. }
  470. return network_socket_connect(ctrl, remote_ip);
  471. }
  472. else
  473. {
  474. luat_ip_addr_t local_ip, net_mask, gate_way;
  475. network_get_local_ip_info(ctrl, &local_ip, &net_mask, &gate_way);
  476. if (network_create_socket(ctrl, local_ip.is_ipv6) < 0)
  477. {
  478. network_clean_invaild_socket(ctrl->adapter_index);
  479. if (network_create_socket(ctrl, local_ip.is_ipv6) < 0)
  480. {
  481. return -1;
  482. }
  483. }
  484. return network_socket_listen(ctrl);
  485. }
  486. #endif
  487. }
  488. static int network_prepare_connect(network_ctrl_t *ctrl)
  489. {
  490. if (network_ip_is_vaild(&ctrl->remote_ip))
  491. {
  492. ;
  493. }
  494. else if (ctrl->domain_name)
  495. {
  496. if (network_get_host_by_name(ctrl))
  497. {
  498. if (network_dns(ctrl))
  499. {
  500. network_socket_force_close(ctrl);
  501. return -1;
  502. }
  503. ctrl->state = NW_STATE_WAIT_DNS;
  504. return 0;
  505. }
  506. }
  507. else
  508. {
  509. return -1;
  510. }
  511. if (network_base_connect(ctrl, &ctrl->remote_ip))
  512. {
  513. network_socket_force_close(ctrl);
  514. return -1;
  515. }
  516. ctrl->state = NW_STATE_CONNECTING;
  517. return 0;
  518. }
  519. static int network_state_link_off(network_ctrl_t *ctrl, OS_EVENT *event, network_adapter_t *adapter)
  520. {
  521. if (EV_NW_STATE == event->ID)
  522. {
  523. if (event->Param2)
  524. {
  525. ctrl->state = NW_STATE_OFF_LINE;
  526. if (NW_WAIT_LINK_UP == ctrl->wait_target_state)
  527. {
  528. return 0;
  529. }
  530. else if (NW_WAIT_ON_LINE == ctrl->wait_target_state)
  531. {
  532. if (ctrl->is_server_mode)
  533. {
  534. if (network_base_connect(ctrl, NULL))
  535. {
  536. return -1;
  537. }
  538. ctrl->state = NW_STATE_CONNECTING;
  539. }
  540. else
  541. {
  542. if (network_prepare_connect(ctrl))
  543. {
  544. return -1;
  545. }
  546. }
  547. return 1;
  548. }
  549. }
  550. }
  551. return 1;
  552. }
  553. static int network_state_off_line(network_ctrl_t *ctrl, OS_EVENT *event, network_adapter_t *adapter)
  554. {
  555. return 1;
  556. }
  557. static int network_state_wait_dns(network_ctrl_t *ctrl, OS_EVENT *event, network_adapter_t *adapter)
  558. {
  559. if ((ctrl->need_close) || ctrl->wait_target_state != NW_WAIT_ON_LINE) return -1;
  560. switch(event->ID)
  561. {
  562. case EV_NW_RESET:
  563. case EV_NW_SOCKET_ERROR:
  564. return -1;
  565. case EV_NW_STATE:
  566. if (!event->Param2)
  567. {
  568. return -1;
  569. }
  570. break;
  571. case EV_NW_DNS_RESULT:
  572. if (event->Param1)
  573. {
  574. //更新dns cache
  575. ctrl->dns_ip = event->Param2;
  576. ctrl->dns_ip_nums = event->Param1;
  577. #ifdef LUAT_USE_LWIP
  578. for(int i = 0; i < ctrl->dns_ip_nums; i++)
  579. {
  580. DBG("dns ip%d, ttl %u, %s", i, ctrl->dns_ip[i].ttl_end, ipaddr_ntoa(&ctrl->dns_ip[i].ip));
  581. }
  582. #endif
  583. network_update_dns_cache(ctrl);
  584. }
  585. else
  586. {
  587. ctrl->dns_ip_nums = 0;
  588. network_get_dns_cache(ctrl);
  589. if (!ctrl->dns_ip_nums)
  590. {
  591. return -1;
  592. }
  593. }
  594. if (!ctrl->remote_port)
  595. {
  596. ctrl->state = NW_STATE_OFF_LINE;
  597. return 0;
  598. }
  599. ctrl->dns_ip_cnt = 0;
  600. if (network_base_connect(ctrl, &ctrl->dns_ip[ctrl->dns_ip_cnt].ip))
  601. {
  602. network_socket_force_close(ctrl);
  603. return -1;
  604. }
  605. else
  606. {
  607. ctrl->state = NW_STATE_CONNECTING;
  608. return 1;
  609. }
  610. default:
  611. return 1;
  612. }
  613. return -1;
  614. }
  615. static int network_state_connecting(network_ctrl_t *ctrl, OS_EVENT *event, network_adapter_t *adapter)
  616. {
  617. if ((ctrl->need_close) || (ctrl->wait_target_state != NW_WAIT_ON_LINE)) return -1;
  618. switch(event->ID)
  619. {
  620. case EV_NW_RESET:
  621. return -1;
  622. case EV_NW_SOCKET_ERROR:
  623. case EV_NW_SOCKET_REMOTE_CLOSE:
  624. case EV_NW_SOCKET_CLOSE_OK:
  625. if (network_ip_is_vaild(&ctrl->remote_ip))
  626. {
  627. return -1;
  628. }
  629. DBG("dns ip %d no connect!,%d", ctrl->dns_ip_cnt, ctrl->dns_ip_nums);
  630. ctrl->dns_ip_cnt++;
  631. if (ctrl->dns_ip_cnt >= ctrl->dns_ip_nums)
  632. {
  633. DBG("all ip try connect failed");
  634. return -1;
  635. }
  636. if (network_base_connect(ctrl, &ctrl->dns_ip[ctrl->dns_ip_cnt].ip))
  637. {
  638. network_socket_force_close(ctrl);
  639. return -1;
  640. }
  641. else
  642. {
  643. ctrl->state = NW_STATE_CONNECTING;
  644. return 1;
  645. }
  646. break;
  647. case EV_NW_STATE:
  648. if (!event->Param2)
  649. {
  650. return -1;
  651. }
  652. break;
  653. case EV_NW_SOCKET_LISTEN:
  654. if (ctrl->is_server_mode)
  655. {
  656. ctrl->state = NW_STATE_LISTEN;
  657. return 1;
  658. }
  659. break;
  660. case EV_NW_SOCKET_CONNECT_OK:
  661. #ifdef LUAT_USE_TLS
  662. if (ctrl->tls_mode)
  663. {
  664. mbedtls_ssl_free(ctrl->ssl);
  665. memset(ctrl->ssl, 0, sizeof(mbedtls_ssl_context));
  666. mbedtls_ssl_setup(ctrl->ssl, ctrl->config);
  667. // ctrl->ssl->f_set_timer = tls_settimer;
  668. // ctrl->ssl->f_get_timer = tls_gettimer;
  669. // ctrl->ssl->p_timer = ctrl;
  670. mbedtls_ssl_set_timer_cb(ctrl->ssl, ctrl, tls_settimer, tls_gettimer);
  671. // ctrl->ssl->p_bio = ctrl;
  672. // ctrl->ssl->f_send = tls_send;
  673. // ctrl->ssl->f_recv = tls_recv;
  674. mbedtls_ssl_set_bio(ctrl->ssl, ctrl, tls_send, tls_recv, NULL);
  675. // add by wendal
  676. // cloudflare的https需要设置hostname才能访问
  677. if (ctrl->domain_name_len > 0 && ctrl->domain_name_len < 256) {
  678. char host[257] = {0};
  679. memcpy(host, ctrl->domain_name, ctrl->domain_name_len);
  680. mbedtls_ssl_set_hostname(ctrl->ssl, host);
  681. //LLOGD("CALL mbedtls_ssl_set_hostname(%s)", host);
  682. }
  683. else {
  684. //LLOGD("skip mbedtls_ssl_set_hostname");
  685. }
  686. ctrl->state = NW_STATE_SHAKEHAND;
  687. do
  688. {
  689. int result = mbedtls_ssl_handshake_step( ctrl->ssl );
  690. switch(result)
  691. {
  692. case MBEDTLS_ERR_SSL_WANT_READ:
  693. return 1;
  694. case 0:
  695. break;
  696. default:
  697. #if MBEDTLS_VERSION_NUMBER >= 0x03000000
  698. #else
  699. DBG_ERR("0x%x, %d", -result, ctrl->ssl->state);
  700. #endif
  701. return -1;
  702. }
  703. #if MBEDTLS_VERSION_NUMBER >= 0x03000000
  704. }while(!mbedtls_ssl_is_handshake_over(ctrl->ssl));
  705. #else
  706. }while(ctrl->ssl->state != MBEDTLS_SSL_HANDSHAKE_OVER);
  707. #endif
  708. return 0;
  709. }
  710. else
  711. #endif
  712. {
  713. ctrl->state = NW_STATE_ONLINE;
  714. return 0;
  715. }
  716. default:
  717. return 1;
  718. }
  719. return -1;
  720. }
  721. static int network_state_shakehand(network_ctrl_t *ctrl, OS_EVENT *event, network_adapter_t *adapter)
  722. {
  723. if ((ctrl->need_close) || ((ctrl->wait_target_state != NW_WAIT_ON_LINE) && (ctrl->wait_target_state != NW_WAIT_TX_OK))) return -1;
  724. switch(event->ID)
  725. {
  726. case EV_NW_RESET:
  727. case EV_NW_SOCKET_ERROR:
  728. case EV_NW_SOCKET_REMOTE_CLOSE:
  729. case EV_NW_SOCKET_CLOSE_OK:
  730. ctrl->need_close = 1;
  731. return -1;
  732. case EV_NW_STATE:
  733. if (!event->Param2)
  734. {
  735. ctrl->need_close = 1;
  736. return -1;
  737. }
  738. break;
  739. case EV_NW_SOCKET_TX_OK:
  740. ctrl->ack_size += event->Param2;
  741. break;
  742. #ifdef LUAT_USE_TLS
  743. case EV_NW_SOCKET_RX_NEW:
  744. do
  745. {
  746. int result = mbedtls_ssl_handshake_step( ctrl->ssl );
  747. switch(result)
  748. {
  749. case MBEDTLS_ERR_SSL_WANT_READ:
  750. return 1;
  751. case 0:
  752. break;
  753. default:
  754. #if MBEDTLS_VERSION_NUMBER >= 0x03000000
  755. DBG_ERR("0x%x", -result);
  756. #else
  757. DBG_ERR("0x%x, %d", -result, ctrl->ssl->state);
  758. #endif
  759. ctrl->need_close = 1;
  760. return -1;
  761. }
  762. #if MBEDTLS_VERSION_NUMBER >= 0x03000000
  763. }while(!mbedtls_ssl_is_handshake_over(ctrl->ssl));
  764. #else
  765. }while(ctrl->ssl->state != MBEDTLS_SSL_HANDSHAKE_OVER);
  766. #endif
  767. ctrl->state = NW_STATE_ONLINE;
  768. if (NW_WAIT_TX_OK == ctrl->wait_target_state)
  769. {
  770. if (!ctrl->cache_data)
  771. {
  772. ctrl->need_close = 1;
  773. return -1;
  774. }
  775. int result = mbedtls_ssl_write(ctrl->ssl, ctrl->cache_data, ctrl->cache_len);
  776. free(ctrl->cache_data);
  777. ctrl->cache_data = NULL;
  778. ctrl->cache_len = 0;
  779. if (result < 0)
  780. {
  781. DBG("%08x", -result);
  782. ctrl->need_close = 1;
  783. return -1;
  784. }
  785. return 1;
  786. }
  787. return 0;
  788. #endif
  789. case EV_NW_SOCKET_CONNECT_OK:
  790. DBG_ERR("!");
  791. return 1;
  792. default:
  793. return 1;
  794. }
  795. return 1;
  796. }
  797. static int network_state_on_line(network_ctrl_t *ctrl, OS_EVENT *event, network_adapter_t *adapter)
  798. {
  799. if ((ctrl->need_close) || NW_WAIT_OFF_LINE == ctrl->wait_target_state)
  800. {
  801. return -1;
  802. }
  803. switch(event->ID)
  804. {
  805. case EV_NW_RESET:
  806. case EV_NW_SOCKET_ERROR:
  807. case EV_NW_SOCKET_REMOTE_CLOSE:
  808. case EV_NW_SOCKET_CLOSE_OK:
  809. ctrl->need_close = 1;
  810. return -1;
  811. case EV_NW_STATE:
  812. if (!event->Param2)
  813. {
  814. ctrl->need_close = 1;
  815. return -1;
  816. }
  817. break;
  818. case EV_NW_SOCKET_TX_OK:
  819. ctrl->ack_size += event->Param2;
  820. if (NW_WAIT_TX_OK == ctrl->wait_target_state)
  821. {
  822. if (ctrl->ack_size == ctrl->tx_size)
  823. {
  824. #ifdef LUAT_USE_LWIP
  825. if (ctrl->is_tcp)
  826. {
  827. if (ctrl->adapter_index < NW_ADAPTER_INDEX_LWIP_NETIF_QTY)
  828. {
  829. // 如果 适配器自带check_ack函数, 那就直接调用, 不需要再调用全局的
  830. if (prv_adapter_table[ctrl->adapter_index].opt->check_ack) {
  831. return prv_adapter_table[ctrl->adapter_index].opt->check_ack(ctrl->adapter_index, ctrl->socket_id);
  832. }
  833. // TODO 待全部bsp都增加check_ack函数后, 就不再需要下面的调用了
  834. return net_lwip_check_all_ack(ctrl->socket_id);
  835. }
  836. else
  837. {
  838. return 0;
  839. }
  840. }
  841. return 0;
  842. #else
  843. return 0;
  844. #endif
  845. }
  846. }
  847. break;
  848. case EV_NW_SOCKET_RX_NEW:
  849. #ifdef LUAT_USE_TLS
  850. #if MBEDTLS_VERSION_NUMBER >= 0x03000000
  851. if (ctrl->tls_mode && !mbedtls_ssl_is_handshake_over(ctrl->ssl))
  852. #else
  853. if (ctrl->tls_mode && (ctrl->ssl->state != MBEDTLS_SSL_HANDSHAKE_OVER))
  854. #endif
  855. {
  856. DBG("rehandshaking");
  857. do
  858. {
  859. int result = mbedtls_ssl_handshake_step( ctrl->ssl );
  860. switch(result)
  861. {
  862. case MBEDTLS_ERR_SSL_WANT_READ:
  863. return 1;
  864. case 0:
  865. break;
  866. default:
  867. #if MBEDTLS_VERSION_NUMBER >= 0x03000000
  868. DBG_ERR("0x%x", -result);
  869. #else
  870. DBG_ERR("0x%x, %d", -result, ctrl->ssl->state);
  871. #endif
  872. ctrl->need_close = 1;
  873. return -1;
  874. }
  875. #if MBEDTLS_VERSION_NUMBER >= 0x03000000
  876. }while(!mbedtls_ssl_is_handshake_over(ctrl->ssl));
  877. #else
  878. }while(ctrl->ssl->state != MBEDTLS_SSL_HANDSHAKE_OVER);
  879. #endif
  880. }
  881. #endif
  882. ctrl->new_rx_flag = 1;
  883. if (NW_WAIT_TX_OK != ctrl->wait_target_state)
  884. {
  885. return 0;
  886. }
  887. break;
  888. default:
  889. return 1;
  890. }
  891. return 1;
  892. }
  893. static int network_state_listen(network_ctrl_t *ctrl, OS_EVENT *event, network_adapter_t *adapter)
  894. {
  895. if ((ctrl->need_close) || NW_WAIT_OFF_LINE == ctrl->wait_target_state)
  896. {
  897. return -1;
  898. }
  899. switch(event->ID)
  900. {
  901. case EV_NW_RESET:
  902. case EV_NW_SOCKET_ERROR:
  903. case EV_NW_SOCKET_REMOTE_CLOSE:
  904. case EV_NW_SOCKET_CLOSE_OK:
  905. ctrl->need_close = 1;
  906. return -1;
  907. case EV_NW_STATE:
  908. if (!event->Param2)
  909. {
  910. ctrl->need_close = 1;
  911. return -1;
  912. }
  913. break;
  914. case EV_NW_SOCKET_NEW_CONNECT:
  915. case EV_NW_SOCKET_CONNECT_OK:
  916. ctrl->state = NW_STATE_ONLINE;
  917. return 0;
  918. default:
  919. return 1;
  920. }
  921. return 1;
  922. }
  923. static int network_state_disconnecting(network_ctrl_t *ctrl, OS_EVENT *event, network_adapter_t *adapter)
  924. {
  925. if (ctrl->wait_target_state != NW_WAIT_OFF_LINE)
  926. {
  927. return -1;
  928. }
  929. switch(event->ID)
  930. {
  931. case EV_NW_RESET:
  932. case EV_NW_SOCKET_ERROR:
  933. case EV_NW_SOCKET_REMOTE_CLOSE:
  934. case EV_NW_SOCKET_CLOSE_OK:
  935. network_force_close_socket(ctrl);
  936. ctrl->state = NW_STATE_OFF_LINE;
  937. ctrl->socket_id = -1;
  938. return 0;
  939. case EV_NW_STATE:
  940. if (!event->Param2)
  941. {
  942. return -1;
  943. }
  944. else
  945. {
  946. network_force_close_socket(ctrl);
  947. ctrl->state = NW_STATE_OFF_LINE;
  948. ctrl->socket_id = -1;
  949. }
  950. break;
  951. default:
  952. return 1;
  953. }
  954. return -1;
  955. }
  956. typedef int (*network_state_fun)(network_ctrl_t *ctrl, OS_EVENT *event, network_adapter_t *adapter);
  957. static network_state_fun network_state_fun_list[]=
  958. {
  959. network_state_link_off,
  960. network_state_off_line,
  961. network_state_wait_dns,
  962. network_state_connecting,
  963. network_state_shakehand,
  964. network_state_on_line,
  965. network_state_listen,
  966. network_state_disconnecting,
  967. };
  968. static void network_default_statemachine(network_ctrl_t *ctrl, OS_EVENT *event, network_adapter_t *adapter)
  969. {
  970. int result = -1;
  971. uint8_t close_flag = 0;
  972. NW_LOCK;
  973. if (ctrl->state > NW_STATE_DISCONNECTING)
  974. {
  975. ctrl->state = NW_STATE_LINK_OFF;
  976. event->Param1 = -1;
  977. network_force_close_socket(ctrl);
  978. event->ID = ctrl->wait_target_state + EV_NW_RESULT_BASE;
  979. }
  980. else
  981. {
  982. if ((NW_STATE_DISCONNECTING == ctrl->state) && (NW_WAIT_OFF_LINE == ctrl->wait_target_state))
  983. {
  984. close_flag = 1;
  985. }
  986. result = network_state_fun_list[ctrl->state](ctrl, event, adapter);
  987. if (result > 0)
  988. {
  989. NW_UNLOCK;
  990. if (ctrl->new_rx_flag && ctrl->user_callback)
  991. {
  992. event->ID = NW_WAIT_EVENT + EV_NW_RESULT_BASE;
  993. event->Param1 = 0;
  994. ctrl->user_callback(event, ctrl->user_data);
  995. }
  996. return ;
  997. }
  998. if (close_flag && (NW_WAIT_NONE == ctrl->wait_target_state))
  999. {
  1000. event->ID = EV_NW_RESULT_CLOSE;
  1001. }
  1002. else
  1003. {
  1004. event->ID = (ctrl->wait_target_state?ctrl->wait_target_state:NW_WAIT_EVENT) + EV_NW_RESULT_BASE;
  1005. }
  1006. event->Param1 = result;
  1007. }
  1008. if ((ctrl->state != NW_STATE_LISTEN) || (result < 0))
  1009. {
  1010. ctrl->wait_target_state = NW_WAIT_NONE;
  1011. }
  1012. NW_UNLOCK;
  1013. if (ctrl->task_handle)
  1014. {
  1015. platform_send_event(ctrl->task_handle, event->ID, event->Param1, event->Param2, event->Param3);
  1016. }
  1017. else if (ctrl->user_callback)
  1018. {
  1019. ctrl->user_callback(event, ctrl->user_data);
  1020. }
  1021. }
  1022. static int32_t network_default_socket_callback(void *data, void *param)
  1023. {
  1024. OS_EVENT *event = (OS_EVENT *)data;
  1025. OS_EVENT temp_event;
  1026. luat_network_cb_param_t *cb_param = (luat_network_cb_param_t *)param;
  1027. network_adapter_t *adapter =(network_adapter_t *)(cb_param->param);
  1028. int i;
  1029. network_ctrl_t *ctrl = (network_ctrl_t *)event->Param3;
  1030. if (event->ID > EV_NW_TIMEOUT)
  1031. {
  1032. if (ctrl && ((event->ID == EV_NW_DNS_RESULT) || (ctrl->tag == cb_param->tag)))
  1033. {
  1034. if ((event->ID == EV_NW_DNS_RESULT) && (ctrl->wait_target_state != NW_WAIT_ON_LINE))
  1035. {
  1036. DBG("socket event:0x%x(%s),wait:%d(%s)", event->ID, network_ctrl_event_id_string(event->ID), ctrl->wait_target_state, network_ctrl_wait_state_string(ctrl->wait_target_state));
  1037. return 0;
  1038. }
  1039. if (ctrl->auto_mode)
  1040. {
  1041. DBG("before process socket %d,event:0x%x(%s),state:%d(%s),wait:%d(%s)", ctrl->socket_id, event->ID, network_ctrl_event_id_string(event->ID),
  1042. ctrl->state, network_ctrl_state_string(ctrl->state),
  1043. ctrl->wait_target_state, network_ctrl_wait_state_string(ctrl->wait_target_state));
  1044. network_default_statemachine(ctrl, event, adapter);
  1045. DBG("after process socket %d,state:%d(%s),wait:%d(%s)", ctrl->socket_id, ctrl->state, network_ctrl_state_string(ctrl->state),ctrl->wait_target_state, network_ctrl_wait_state_string(ctrl->wait_target_state));
  1046. }
  1047. else if (ctrl->task_handle)
  1048. {
  1049. platform_send_event(ctrl->task_handle, event->ID, event->Param1, event->Param2, event->Param3);
  1050. }
  1051. else if (ctrl->user_callback)
  1052. {
  1053. ctrl->user_callback(event, ctrl->user_data);
  1054. }
  1055. }
  1056. else
  1057. {
  1058. DBG_ERR("cb ctrl invaild %x %08X", ctrl, event->ID);
  1059. // 下面这行的打印在部分平台会有问题
  1060. // 原因是ctrl可能已经被释放, 再次访问会导致coredump
  1061. //DBG_HexPrintf(&ctrl->tag, 8);
  1062. DBG_HexPrintf(&cb_param->tag, 8);
  1063. }
  1064. }
  1065. else
  1066. {
  1067. for (i = 0; i < adapter->opt->max_socket_num; i++)
  1068. {
  1069. temp_event = *event;
  1070. if (adapter->ctrl_busy[i])
  1071. {
  1072. ctrl = &adapter->ctrl_table[i];
  1073. if (ctrl->adapter_index == (uint8_t)(event->Param3))
  1074. {
  1075. if (ctrl->auto_mode)
  1076. {
  1077. DBG("before process socket %d,event:0x%x(%s),state:%d(%s),wait:%d(%s)", ctrl->socket_id, event->ID, network_ctrl_event_id_string(event->ID),
  1078. ctrl->state, network_ctrl_state_string(ctrl->state),
  1079. ctrl->wait_target_state, network_ctrl_wait_state_string(ctrl->wait_target_state));
  1080. network_default_statemachine(ctrl, &temp_event, adapter);
  1081. DBG("after process socket %d,state:%d(%s),wait:%d(%s)", ctrl->socket_id, ctrl->state, network_ctrl_state_string(ctrl->state), ctrl->wait_target_state, network_ctrl_wait_state_string(ctrl->wait_target_state));
  1082. }
  1083. else if (ctrl->task_handle)
  1084. {
  1085. platform_send_event(ctrl->task_handle, event->ID, event->Param1, event->Param2, event->Param3);
  1086. }
  1087. else if (ctrl->user_callback)
  1088. {
  1089. ctrl->user_callback(&temp_event, ctrl->user_data);
  1090. }
  1091. }
  1092. }
  1093. }
  1094. }
  1095. return 0;
  1096. }
  1097. static LUAT_RT_RET_TYPE network_default_timer_callback(LUAT_RT_CB_PARAM)
  1098. {
  1099. platform_send_event(param, EV_NW_TIMEOUT, 0, 0, 0);
  1100. return LUAT_RT_RET;
  1101. }
  1102. #ifndef LUAT_USE_LWIP
  1103. uint8_t network_string_is_ipv4(const char *string, uint32_t len)
  1104. {
  1105. int i;
  1106. for(i = 0; i < len; i++)
  1107. {
  1108. if (!isdigit((int)string[i]) && (string[i] != '.'))
  1109. {
  1110. return 0;
  1111. }
  1112. }
  1113. return 1;
  1114. }
  1115. uint32_t network_string_to_ipv4(const char *string, uint32_t len)
  1116. {
  1117. int i;
  1118. int8_t Buf[4][4];
  1119. CmdParam CP;
  1120. PV_Union uIP;
  1121. char temp[32];
  1122. memset(Buf, 0, sizeof(Buf));
  1123. CP.param_max_len = 4;
  1124. CP.param_max_num = 4;
  1125. CP.param_num = 0;
  1126. CP.param_str = (int8_t *)Buf;
  1127. memcpy(temp, string, len);
  1128. temp[len] = 0;
  1129. CmdParseParam((int8_t*)temp, &CP, '.');
  1130. for(i = 0; i < 4; i++)
  1131. {
  1132. uIP.u8[i] = strtol((char *)Buf[i], NULL, 10);
  1133. }
  1134. // DBG("%d.%d.%d.%d", uIP.u8[0], uIP.u8[1], uIP.u8[2], uIP.u8[3]);
  1135. return uIP.u32;
  1136. }
  1137. #define SWAP(x) ((((x) & (uint32_t)0x000000ffUL) << 24) | \
  1138. (((x) & (uint32_t)0x0000ff00UL) << 8) | \
  1139. (((x) & (uint32_t)0x00ff0000UL) >> 8) | \
  1140. (((x) & (uint32_t)0xff000000UL) >> 24))
  1141. int network_string_to_ipv6(const char *string, luat_ip_addr_t *ip_addr)
  1142. {
  1143. uint32_t addr_index, zero_blocks, current_block_index, current_block_value;
  1144. const char *s;
  1145. ip_addr->is_ipv6 = 0xff;
  1146. /* Count the number of colons, to count the number of blocks in a "::" sequence
  1147. zero_blocks may be 1 even if there are no :: sequences */
  1148. zero_blocks = 8;
  1149. for (s = string; *s != 0; s++) {
  1150. if (*s == ':') {
  1151. zero_blocks--;
  1152. } else if (!isxdigit((int)*s)) {
  1153. break;
  1154. }
  1155. }
  1156. /* parse each block */
  1157. addr_index = 0;
  1158. current_block_index = 0;
  1159. current_block_value = 0;
  1160. for (s = string; *s != 0; s++) {
  1161. if (*s == ':') {
  1162. if (current_block_index & 0x1) {
  1163. ip_addr->ipv6_u32_addr[addr_index++] |= current_block_value;
  1164. }
  1165. else {
  1166. ip_addr->ipv6_u32_addr[addr_index] = current_block_value << 16;
  1167. }
  1168. current_block_index++;
  1169. current_block_value = 0;
  1170. if (current_block_index > 7) {
  1171. /* address too long! */
  1172. return 0;
  1173. }
  1174. if (s[1] == ':') {
  1175. if (s[2] == ':') {
  1176. /* invalid format: three successive colons */
  1177. return 0;
  1178. }
  1179. s++;
  1180. /* "::" found, set zeros */
  1181. while (zero_blocks > 0) {
  1182. zero_blocks--;
  1183. if (current_block_index & 0x1) {
  1184. addr_index++;
  1185. } else {
  1186. ip_addr->ipv6_u32_addr[addr_index] = 0;
  1187. }
  1188. current_block_index++;
  1189. if (current_block_index > 7) {
  1190. /* address too long! */
  1191. return 0;
  1192. }
  1193. }
  1194. }
  1195. } else if (isxdigit((int)*s)) {
  1196. /* add current digit */
  1197. current_block_value = (current_block_value << 4) +
  1198. (isxdigit((int)*s) ? (uint32_t)(*s - '0') :
  1199. (uint32_t)(10 + (isxdigit((int)*s) ? *s - 'a' : *s - 'A')));
  1200. } else {
  1201. /* unexpected digit, space? CRLF? */
  1202. break;
  1203. }
  1204. }
  1205. if (current_block_index & 0x1) {
  1206. ip_addr->ipv6_u32_addr[addr_index++] |= current_block_value;
  1207. }
  1208. else {
  1209. ip_addr->ipv6_u32_addr[addr_index] = current_block_value << 16;
  1210. }
  1211. /* convert to network byte order. */
  1212. for (addr_index = 0; addr_index < 4; addr_index++) {
  1213. ip_addr->ipv6_u32_addr[addr_index] = SWAP(ip_addr->ipv6_u32_addr[addr_index]);
  1214. }
  1215. if (current_block_index != 7) {
  1216. return 0;
  1217. }
  1218. ip_addr->is_ipv6 = 1;
  1219. return 1;
  1220. }
  1221. #endif
  1222. int network_get_last_register_adapter(void)
  1223. {
  1224. if (!prv_network.is_init) return -1;
  1225. if (prv_network.default_adapter_index != -1) return prv_network.default_adapter_index;
  1226. return prv_network.last_adapter_index;
  1227. }
  1228. void network_register_set_default(uint8_t adapter_index)
  1229. {
  1230. prv_network.default_adapter_index = adapter_index;
  1231. }
  1232. int network_register_adapter(uint8_t adapter_index, network_adapter_info *info, void *user_data)
  1233. {
  1234. prv_adapter_table[adapter_index].opt = info;
  1235. prv_adapter_table[adapter_index].user_data = user_data;
  1236. info->socket_set_callback(network_default_socket_callback, &prv_adapter_table[adapter_index], user_data);
  1237. #ifdef LUAT_USE_LWIP
  1238. if (adapter_index < NW_ADAPTER_INDEX_HW_PS_DEVICE)
  1239. {
  1240. prv_adapter_table[adapter_index].ctrl_table = prv_network.lwip_ctrl_table;
  1241. prv_adapter_table[adapter_index].ctrl_busy = prv_network.lwip_ctrl_busy;
  1242. }
  1243. else
  1244. #endif
  1245. {
  1246. prv_adapter_table[adapter_index].ctrl_table = zalloc((info->max_socket_num) * sizeof(network_ctrl_t));
  1247. prv_adapter_table[adapter_index].ctrl_busy = zalloc(info->max_socket_num);
  1248. }
  1249. prv_adapter_table[adapter_index].port = 0;
  1250. if (!prv_network.is_init)
  1251. {
  1252. //prv_network.network_mutex = platform_create_mutex();
  1253. INIT_LLIST_HEAD(&prv_network.dns_cache_head);
  1254. prv_network.default_adapter_index = -1;
  1255. prv_network.last_adapter_index = -1;
  1256. prv_network.is_init = 1;
  1257. }
  1258. prv_network.last_adapter_index = adapter_index;
  1259. return 0;
  1260. }
  1261. void network_set_dns_server(uint8_t adapter_index, uint8_t server_index, luat_ip_addr_t *ip)
  1262. {
  1263. network_adapter_t *adapter = &prv_adapter_table[adapter_index];
  1264. adapter->opt->set_dns_server(server_index, ip, adapter->user_data);
  1265. }
  1266. /*
  1267. * 申请一个network_ctrl
  1268. */
  1269. network_ctrl_t *network_alloc_ctrl(uint8_t adapter_index)
  1270. {
  1271. int i;
  1272. network_ctrl_t *ctrl = NULL;
  1273. if (adapter_index >= NW_ADAPTER_QTY || prv_adapter_table[adapter_index].opt == NULL) {
  1274. DBG_ERR("adapter index %d is invalid!", adapter_index);
  1275. return NULL;
  1276. }
  1277. network_adapter_t *adapter = &prv_adapter_table[adapter_index];
  1278. OS_LOCK;
  1279. for (i = 0; i < adapter->opt->max_socket_num; i++)
  1280. {
  1281. if (!adapter->ctrl_busy[i])
  1282. {
  1283. adapter->ctrl_busy[i] = 1;
  1284. ctrl = &adapter->ctrl_table[i];
  1285. ctrl->adapter_index = adapter_index;
  1286. ctrl->local_port = 0;
  1287. ctrl->domain_ipv6 = 0;
  1288. break;
  1289. }
  1290. }
  1291. OS_UNLOCK;
  1292. if (i >= adapter->opt->max_socket_num) {DBG_ERR("adapter no more ctrl!");}
  1293. return ctrl;
  1294. }
  1295. /*
  1296. * 归还一个network_ctrl
  1297. */
  1298. void network_release_ctrl(network_ctrl_t *ctrl)
  1299. {
  1300. int i;
  1301. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1302. NW_UNLOCK;
  1303. OS_LOCK;
  1304. for (i = 0; i < adapter->opt->max_socket_num; i++)
  1305. {
  1306. if (&adapter->ctrl_table[i] == ctrl)
  1307. {
  1308. network_deinit_tls(ctrl);
  1309. if (ctrl->timer)
  1310. {
  1311. platform_stop_timer(ctrl->timer);
  1312. platform_release_timer(ctrl->timer);
  1313. ctrl->timer = NULL;
  1314. }
  1315. if (ctrl->cache_data)
  1316. {
  1317. free(ctrl->cache_data);
  1318. ctrl->cache_data = NULL;
  1319. }
  1320. if (ctrl->dns_ip)
  1321. {
  1322. free(ctrl->dns_ip);
  1323. ctrl->dns_ip = NULL;
  1324. }
  1325. if (ctrl->domain_name)
  1326. {
  1327. free(ctrl->domain_name);
  1328. ctrl->domain_name = NULL;
  1329. }
  1330. adapter->ctrl_busy[i] = 0;
  1331. platform_release_mutex(ctrl->mutex);
  1332. ctrl->mutex = NULL;
  1333. break;
  1334. }
  1335. }
  1336. OS_UNLOCK;
  1337. if (i >= adapter->opt->max_socket_num) {DBG_ERR("adapter index maybe error!, %d, %x", ctrl->adapter_index, ctrl);}
  1338. }
  1339. void network_init_ctrl(network_ctrl_t *ctrl, HANDLE task_handle, CBFuncEx_t callback, void *param)
  1340. {
  1341. uint8_t adapter_index = ctrl->adapter_index;
  1342. //network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1343. if (ctrl->dns_ip)
  1344. {
  1345. free(ctrl->dns_ip);
  1346. ctrl->dns_ip = NULL;
  1347. }
  1348. if (ctrl->cache_data)
  1349. {
  1350. free(ctrl->cache_data);
  1351. ctrl->cache_data = NULL;
  1352. }
  1353. if (ctrl->domain_name)
  1354. {
  1355. free(ctrl->domain_name);
  1356. ctrl->domain_name = NULL;
  1357. }
  1358. HANDLE sem = ctrl->mutex;
  1359. memset(ctrl, 0, sizeof(network_ctrl_t));
  1360. ctrl->adapter_index = adapter_index;
  1361. ctrl->task_handle = task_handle;
  1362. ctrl->user_callback = callback;
  1363. ctrl->user_data = param;
  1364. ctrl->socket_id = -1;
  1365. ctrl->socket_param = ctrl;
  1366. network_set_ip_invaild(&ctrl->remote_ip);
  1367. ctrl->mutex = sem;
  1368. if (task_handle)
  1369. {
  1370. ctrl->timer = platform_create_timer(network_default_timer_callback, task_handle, NULL);
  1371. }
  1372. if (!ctrl->mutex)
  1373. {
  1374. ctrl->mutex = platform_create_mutex();
  1375. }
  1376. }
  1377. void network_set_base_mode(network_ctrl_t *ctrl, uint8_t is_tcp, uint32_t tcp_timeout_ms, uint8_t keep_alive, uint32_t keep_idle, uint8_t keep_interval, uint8_t keep_cnt)
  1378. {
  1379. ctrl->is_tcp = is_tcp;
  1380. ctrl->tcp_keep_alive = keep_alive;
  1381. ctrl->tcp_keep_idle = keep_idle;
  1382. ctrl->tcp_keep_interval = keep_interval;
  1383. ctrl->tcp_keep_cnt = keep_cnt;
  1384. ctrl->tcp_timeout_ms = tcp_timeout_ms;
  1385. }
  1386. void network_set_debug_onoff(network_ctrl_t *ctrl, uint8_t on_off)
  1387. {
  1388. ctrl->is_debug = on_off;
  1389. }
  1390. void network_connect_ipv6_domain(network_ctrl_t *ctrl, uint8_t onoff)
  1391. {
  1392. ctrl->domain_ipv6 = onoff;
  1393. }
  1394. int network_set_local_port(network_ctrl_t *ctrl, uint16_t local_port)
  1395. {
  1396. int i;
  1397. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1398. if (local_port)
  1399. {
  1400. OS_LOCK;
  1401. for (i = 0; i < adapter->opt->max_socket_num; i++)
  1402. {
  1403. if (&adapter->ctrl_table[i] != ctrl)
  1404. {
  1405. if (adapter->ctrl_table[i].local_port == local_port)
  1406. {
  1407. OS_UNLOCK;
  1408. return -1;
  1409. }
  1410. }
  1411. }
  1412. ctrl->local_port = local_port;
  1413. OS_UNLOCK;
  1414. return 0;
  1415. }
  1416. else
  1417. {
  1418. ctrl->local_port = 0;
  1419. #if 0
  1420. if (ctrl->adapter_index < NW_ADAPTER_INDEX_LWIP_NETIF_QTY)
  1421. {
  1422. ctrl->local_port = 0;
  1423. return 0;
  1424. }
  1425. OS_LOCK;
  1426. adapter->port++;
  1427. if (adapter->port < 60000)
  1428. {
  1429. adapter->port = 60000;
  1430. }
  1431. ctrl->local_port = adapter->port;
  1432. OS_UNLOCK;
  1433. #endif
  1434. return 0;
  1435. }
  1436. }
  1437. int network_create_socket(network_ctrl_t *ctrl, uint8_t is_ipv6)
  1438. {
  1439. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1440. ctrl->socket_id = adapter->opt->create_soceket(ctrl->is_tcp, &ctrl->tag, ctrl->socket_param, is_ipv6, adapter->user_data);
  1441. if (ctrl->socket_id < 0)
  1442. {
  1443. ctrl->tag = 0;
  1444. return -1;
  1445. }
  1446. return 0;
  1447. }
  1448. int network_socket_connect(network_ctrl_t *ctrl, luat_ip_addr_t *remote_ip)
  1449. {
  1450. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1451. ctrl->is_server_mode = 0;
  1452. ctrl->online_ip = remote_ip;
  1453. uint16_t local_port = ctrl->local_port;
  1454. if (!local_port)
  1455. {
  1456. local_port = ctrl->adapter_index;
  1457. local_port *= 1000;
  1458. uint32_t offset = ctrl - adapter->ctrl_table;
  1459. if (offset >= sizeof(network_ctrl_t))
  1460. {
  1461. offset /= sizeof(network_ctrl_t);
  1462. }
  1463. if (offset >= adapter->opt->max_socket_num)
  1464. {
  1465. offset = adapter->opt->max_socket_num;
  1466. }
  1467. adapter->port++;
  1468. if (adapter->port >= 50)
  1469. {
  1470. adapter->port = 0;
  1471. }
  1472. local_port += 50000 + adapter->port + offset * 50;
  1473. DBG("network %d local port auto select %u",offset, local_port);
  1474. }
  1475. return adapter->opt->socket_connect(ctrl->socket_id, ctrl->tag, local_port, remote_ip, ctrl->remote_port, adapter->user_data);
  1476. }
  1477. int network_socket_listen(network_ctrl_t *ctrl)
  1478. {
  1479. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1480. ctrl->is_server_mode = 1;
  1481. return adapter->opt->socket_listen(ctrl->socket_id, ctrl->tag, ctrl->local_port, adapter->user_data);
  1482. }
  1483. uint8_t network_accept_enable(network_ctrl_t *ctrl)
  1484. {
  1485. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1486. return !(adapter->opt->no_accept);
  1487. }
  1488. //作为server接受一个client
  1489. //成功返回0,失败 < 0
  1490. int network_socket_accept(network_ctrl_t *ctrl, network_ctrl_t *accept_ctrl)
  1491. {
  1492. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1493. if (adapter->opt->no_accept)
  1494. {
  1495. // DBG("%x,%d,%llu,%x,%x,%x",adapter->opt->socket_accept, ctrl->socket_id, ctrl->tag, &ctrl->remote_ip, &ctrl->remote_port, adapter->user_data);
  1496. adapter->opt->socket_accept(ctrl->socket_id, ctrl->tag, &ctrl->remote_ip, &ctrl->remote_port, adapter->user_data);
  1497. return 0;
  1498. }
  1499. accept_ctrl->socket_id = adapter->opt->socket_accept(ctrl->socket_id, ctrl->tag, &accept_ctrl->remote_ip, &accept_ctrl->remote_port, adapter->user_data);
  1500. if (accept_ctrl->socket_id < 0)
  1501. {
  1502. return -1;
  1503. }
  1504. else
  1505. {
  1506. accept_ctrl->is_tcp = ctrl->is_tcp;
  1507. accept_ctrl->tcp_keep_alive = ctrl->tcp_keep_alive;
  1508. accept_ctrl->tcp_keep_idle = ctrl->tcp_keep_idle;
  1509. accept_ctrl->tcp_keep_interval = ctrl->tcp_keep_interval;
  1510. accept_ctrl->tcp_keep_cnt = ctrl->tcp_keep_cnt;
  1511. accept_ctrl->tcp_timeout_ms = ctrl->tcp_timeout_ms;
  1512. accept_ctrl->local_port = ctrl->local_port;
  1513. accept_ctrl->state = NW_STATE_ONLINE;
  1514. return 0;
  1515. }
  1516. }
  1517. //主动断开一个tcp连接,需要走完整个tcp流程,用户需要接收到close ok回调才能确认彻底断开
  1518. //成功返回0,失败 < 0
  1519. int network_socket_disconnect(network_ctrl_t *ctrl)
  1520. {
  1521. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1522. if (ctrl->socket_id >= 0)
  1523. {
  1524. return adapter->opt->socket_disconnect(ctrl->socket_id, ctrl->tag, adapter->user_data);
  1525. }
  1526. return 0;
  1527. }
  1528. //释放掉socket的控制权
  1529. //成功返回0,失败 < 0
  1530. int network_socket_close(network_ctrl_t *ctrl)
  1531. {
  1532. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1533. if (ctrl->socket_id >= 0)
  1534. {
  1535. return adapter->opt->socket_close(ctrl->socket_id, ctrl->tag, adapter->user_data);
  1536. }
  1537. return 0;
  1538. }
  1539. //强行释放掉socket的控制权
  1540. //成功返回0,失败 < 0
  1541. int network_socket_force_close(network_ctrl_t *ctrl)
  1542. {
  1543. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1544. if (ctrl->socket_id >= 0)
  1545. {
  1546. adapter->opt->socket_force_close(ctrl->socket_id, adapter->user_data);
  1547. }
  1548. ctrl->socket_id = -1;
  1549. return 0;
  1550. }
  1551. //tcp时,不需要remote_ip和remote_port,如果buf为NULL,则返回当前缓存区的数据量,当返回值小于len时说明已经读完了
  1552. //udp时,只返回1个block数据,需要多次读直到没有数据为止
  1553. //成功返回实际读取的值,失败 < 0
  1554. int network_socket_receive(network_ctrl_t *ctrl,uint8_t *buf, uint32_t len, int flags, luat_ip_addr_t *remote_ip, uint16_t *remote_port)
  1555. {
  1556. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1557. return adapter->opt->socket_receive(ctrl->socket_id, ctrl->tag, buf, len, flags, remote_ip, remote_port, adapter->user_data);
  1558. }
  1559. //tcp时,不需要remote_ip和remote_port
  1560. //成功返回0,失败 < 0
  1561. int network_socket_send(network_ctrl_t *ctrl,const uint8_t *buf, uint32_t len, int flags, luat_ip_addr_t *remote_ip, uint16_t remote_port)
  1562. {
  1563. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1564. return adapter->opt->socket_send(ctrl->socket_id, ctrl->tag, buf, len, flags, remote_ip, remote_port, adapter->user_data);
  1565. }
  1566. int network_getsockopt(network_ctrl_t *ctrl, int level, int optname, void *optval, uint32_t *optlen)
  1567. {
  1568. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1569. return adapter->opt->getsockopt(ctrl->socket_id, ctrl->tag, level, optname, optval, optlen, adapter->user_data);
  1570. }
  1571. int network_setsockopt(network_ctrl_t *ctrl, int level, int optname, const void *optval, uint32_t optlen)
  1572. {
  1573. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1574. return adapter->opt->setsockopt(ctrl->socket_id, ctrl->tag, level, optname, optval, optlen, adapter->user_data);
  1575. }
  1576. //非posix的socket,用这个根据实际硬件设置参数
  1577. int network_user_cmd(network_ctrl_t *ctrl, uint32_t cmd, uint32_t value)
  1578. {
  1579. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1580. return adapter->opt->user_cmd(ctrl->socket_id, ctrl->tag, cmd, value, adapter->user_data);
  1581. }
  1582. int network_dns(network_ctrl_t *ctrl)
  1583. {
  1584. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1585. if (ctrl->domain_ipv6)
  1586. {
  1587. return adapter->opt->dns_ipv6(ctrl->domain_name, ctrl->domain_name_len, ctrl, adapter->user_data);
  1588. }
  1589. else
  1590. {
  1591. return adapter->opt->dns(ctrl->domain_name, ctrl->domain_name_len, ctrl, adapter->user_data);
  1592. }
  1593. }
  1594. int network_set_mac(uint8_t adapter_index, uint8_t *mac)
  1595. {
  1596. network_adapter_t *adapter = &prv_adapter_table[adapter_index];
  1597. return adapter->opt->set_mac(mac, adapter->user_data);
  1598. }
  1599. int network_set_static_ip_info(uint8_t adapter_index, luat_ip_addr_t *ip, luat_ip_addr_t *submask, luat_ip_addr_t *gateway, luat_ip_addr_t *ipv6)
  1600. {
  1601. network_adapter_t *adapter = &prv_adapter_table[adapter_index];
  1602. return adapter->opt->set_static_ip(ip, submask, gateway, ipv6, adapter->user_data);
  1603. }
  1604. int network_get_local_ip_info(network_ctrl_t *ctrl, luat_ip_addr_t *ip, luat_ip_addr_t *submask, luat_ip_addr_t *gateway)
  1605. {
  1606. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1607. return adapter->opt->get_local_ip_info(ip, submask, gateway, adapter->user_data);
  1608. }
  1609. int network_get_full_local_ip_info(network_ctrl_t *ctrl, uint8_t index, luat_ip_addr_t *ip, luat_ip_addr_t *submask, luat_ip_addr_t *gateway, luat_ip_addr_t *ipv6)
  1610. {
  1611. network_adapter_t *adapter;
  1612. if (ctrl)
  1613. {
  1614. adapter = &prv_adapter_table[ctrl->adapter_index];
  1615. }
  1616. else
  1617. {
  1618. adapter = &prv_adapter_table[index];
  1619. }
  1620. return adapter->opt->get_full_ip_info(ip, submask, gateway, ipv6, adapter->user_data);
  1621. }
  1622. void network_force_close_socket(network_ctrl_t *ctrl)
  1623. {
  1624. #ifdef LUAT_USE_TLS
  1625. if (ctrl->tls_mode)
  1626. {
  1627. mbedtls_ssl_free(ctrl->ssl);
  1628. }
  1629. #endif
  1630. if (network_socket_close(ctrl))
  1631. {
  1632. network_clean_invaild_socket(ctrl->adapter_index);
  1633. network_socket_force_close(ctrl);
  1634. }
  1635. ctrl->need_close = 0;
  1636. ctrl->socket_id = -1;
  1637. ctrl->new_rx_flag = 0;
  1638. if (ctrl->dns_ip)
  1639. {
  1640. free(ctrl->dns_ip);
  1641. ctrl->dns_ip = NULL;
  1642. }
  1643. if (ctrl->domain_name)
  1644. {
  1645. free(ctrl->domain_name);
  1646. ctrl->domain_name = NULL;
  1647. }
  1648. ctrl->dns_ip_cnt = 0;
  1649. ctrl->dns_ip_nums = 0;
  1650. ctrl->wait_target_state = NW_WAIT_NONE;
  1651. }
  1652. void network_clean_invaild_socket(uint8_t adapter_index)
  1653. {
  1654. int i;
  1655. int *list;
  1656. network_adapter_t *adapter = &prv_adapter_table[adapter_index];
  1657. network_ctrl_t *ctrl;
  1658. list = malloc(adapter->opt->max_socket_num * sizeof(int));
  1659. OS_LOCK;
  1660. for (i = 0; i < adapter->opt->max_socket_num; i++)
  1661. {
  1662. ctrl = &adapter->ctrl_table[i];
  1663. if (!adapter->opt->socket_check(ctrl->socket_id, ctrl->tag, adapter->user_data))
  1664. {
  1665. list[i] = ctrl->socket_id;
  1666. }
  1667. else
  1668. {
  1669. ctrl->socket_id = -1;
  1670. list[i] = -1;
  1671. }
  1672. DBG("%d,%d", i, list[i]);
  1673. }
  1674. OS_UNLOCK;
  1675. adapter->opt->socket_clean(list, adapter->opt->max_socket_num, adapter->user_data);
  1676. free(list);
  1677. }
  1678. #ifdef LUAT_USE_TLS
  1679. static int tls_verify(void *ctx, mbedtls_x509_crt *crt, int Index, uint32_t *result)
  1680. {
  1681. network_ctrl_t *ctrl = (network_ctrl_t *)ctx;
  1682. DBG("%d, %08x", Index, *result);
  1683. return 0;
  1684. }
  1685. #endif
  1686. int network_set_psk_info(network_ctrl_t *ctrl,
  1687. const unsigned char *psk, size_t psk_len,
  1688. const unsigned char *psk_identity, size_t psk_identity_len)
  1689. {
  1690. #ifdef LUAT_USE_TLS
  1691. if (!ctrl->tls_mode)
  1692. {
  1693. return -ERROR_PERMISSION_DENIED;
  1694. }
  1695. // DBG("%.*s, %.*s", psk_len, psk, psk_identity_len, psk_identity);
  1696. int ret = mbedtls_ssl_conf_psk( ctrl->config,
  1697. psk, psk_len, psk_identity, psk_identity_len );
  1698. if (ret != 0)
  1699. {
  1700. DBG("0x%x", -ret);
  1701. return -ERROR_OPERATION_FAILED;
  1702. }
  1703. return ERROR_NONE;
  1704. #else
  1705. return -1;
  1706. #endif
  1707. }
  1708. int network_set_server_cert(network_ctrl_t *ctrl, const unsigned char *cert, size_t cert_len)
  1709. {
  1710. #ifdef LUAT_USE_TLS
  1711. int ret;
  1712. if (!ctrl->tls_mode)
  1713. {
  1714. return -ERROR_PERMISSION_DENIED;
  1715. }
  1716. ret = mbedtls_x509_crt_parse( ctrl->ca_cert, cert, cert_len);
  1717. if (ret != 0)
  1718. {
  1719. DBG("%08x", -ret);
  1720. return -ERROR_OPERATION_FAILED;
  1721. }
  1722. return ERROR_NONE;
  1723. #else
  1724. return -1;
  1725. #endif
  1726. }
  1727. int network_set_client_cert(network_ctrl_t *ctrl,
  1728. const unsigned char *cert, size_t certLen,
  1729. const unsigned char *key, size_t keylen,
  1730. const unsigned char *pwd, size_t pwdlen)
  1731. {
  1732. #ifdef LUAT_USE_TLS
  1733. int ret;
  1734. mbedtls_x509_crt *client_cert = NULL;
  1735. mbedtls_pk_context *pkey = NULL;
  1736. if (!ctrl->tls_mode)
  1737. {
  1738. return -ERROR_PERMISSION_DENIED;
  1739. }
  1740. client_cert = zalloc(sizeof(mbedtls_x509_crt));
  1741. pkey = zalloc(sizeof(mbedtls_pk_context));
  1742. if (!client_cert || !pkey)
  1743. {
  1744. goto ERROR_OUT;
  1745. }
  1746. ret = mbedtls_x509_crt_parse( client_cert, cert, certLen );
  1747. if (ret != 0)
  1748. {
  1749. DBG("%08x", -ret);
  1750. goto ERROR_OUT;
  1751. }
  1752. #if MBEDTLS_VERSION_NUMBER >= 0x03000000
  1753. ret = mbedtls_pk_parse_key( pkey, key, keylen, pwd, pwdlen , tls_random, NULL);
  1754. #else
  1755. ret = mbedtls_pk_parse_key( pkey, key, keylen, pwd, pwdlen );
  1756. #endif
  1757. if (ret != 0)
  1758. {
  1759. DBG("%08x", -ret);
  1760. goto ERROR_OUT;
  1761. }
  1762. ret = mbedtls_ssl_conf_own_cert( ctrl->config, client_cert, pkey );
  1763. if (ret != 0)
  1764. {
  1765. DBG("%08x", -ret);
  1766. goto ERROR_OUT;
  1767. }
  1768. return ERROR_NONE;
  1769. ERROR_OUT:
  1770. if (client_cert) free(client_cert);
  1771. if (pkey) free(pkey);
  1772. return -1;
  1773. #else
  1774. return -1;
  1775. #endif
  1776. }
  1777. int network_cert_verify_result(network_ctrl_t *ctrl)
  1778. {
  1779. #ifdef LUAT_USE_TLS
  1780. if (!ctrl->tls_mode)
  1781. {
  1782. return -1;
  1783. }
  1784. return mbedtls_ssl_get_verify_result(ctrl->ssl);
  1785. #else
  1786. return -1;
  1787. #endif
  1788. }
  1789. static int tls_random( void *p_rng,
  1790. unsigned char *output, size_t output_len )
  1791. {
  1792. platform_random((char*)output, output_len);
  1793. return 0;
  1794. }
  1795. int network_init_tls(network_ctrl_t *ctrl, int verify_mode)
  1796. {
  1797. if (!ctrl) return -1;
  1798. #ifdef LUAT_USE_TLS
  1799. ctrl->tls_mode = 1;
  1800. if (!ctrl->ssl)
  1801. {
  1802. ctrl->ssl = zalloc(sizeof(mbedtls_ssl_context));
  1803. ctrl->ca_cert = zalloc(sizeof(mbedtls_x509_crt));
  1804. ctrl->config = zalloc(sizeof(mbedtls_ssl_config));
  1805. mbedtls_ssl_config_defaults( ctrl->config, MBEDTLS_SSL_IS_CLIENT, ctrl->is_tcp?MBEDTLS_SSL_TRANSPORT_STREAM:MBEDTLS_SSL_TRANSPORT_DATAGRAM, MBEDTLS_SSL_PRESET_DEFAULT);
  1806. // ctrl->config->authmode = verify_mode;
  1807. mbedtls_ssl_conf_authmode(ctrl->config, verify_mode);
  1808. // ctrl->config->hs_timeout_min = 20000;
  1809. #if defined(MBEDTLS_SSL_PROTO_DTLS)
  1810. mbedtls_ssl_conf_handshake_timeout(ctrl->config, 2000, MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MAX);
  1811. #endif
  1812. // ctrl->config->f_rng = tls_random;
  1813. // ctrl->config->p_rng = NULL;
  1814. mbedtls_ssl_conf_rng(ctrl->config, tls_random, NULL);
  1815. // ctrl->config->f_dbg = tls_dbg;
  1816. // ctrl->config->p_dbg = NULL;
  1817. mbedtls_ssl_conf_dbg(ctrl->config, tls_dbg, NULL);
  1818. // ctrl->config->f_vrfy = tls_verify;
  1819. // ctrl->config->p_vrfy = ctrl;
  1820. mbedtls_ssl_conf_verify(ctrl->config, tls_verify, ctrl);
  1821. // ctrl->config->ca_chain = ctrl->ca_cert;
  1822. mbedtls_ssl_conf_ca_chain(ctrl->config, ctrl->ca_cert, NULL);
  1823. // ctrl->config->read_timeout = 20000;
  1824. mbedtls_ssl_conf_read_timeout(ctrl->config, 20000);
  1825. #ifdef MBEDTLS_SSL_RENEGOTIATION
  1826. mbedtls_ssl_conf_renegotiation(ctrl->config, MBEDTLS_SSL_RENEGOTIATION_ENABLED);
  1827. mbedtls_ssl_conf_legacy_renegotiation(ctrl->config, MBEDTLS_SSL_LEGACY_ALLOW_RENEGOTIATION);
  1828. #endif
  1829. ctrl->tls_long_timer = platform_create_timer(tls_longtimeout, ctrl, NULL);
  1830. ctrl->tls_short_timer = platform_create_timer(tls_shorttimeout, ctrl, NULL);
  1831. }
  1832. ctrl->tls_timer_state = -1;
  1833. return 0;
  1834. #else
  1835. DBG("NOT SUPPORT TLS");
  1836. return -1;
  1837. #endif
  1838. }
  1839. void network_deinit_tls(network_ctrl_t *ctrl)
  1840. {
  1841. if (!ctrl) return;
  1842. #ifdef LUAT_USE_TLS
  1843. if (ctrl->ssl)
  1844. {
  1845. mbedtls_ssl_free(ctrl->ssl);
  1846. free(ctrl->ssl);
  1847. ctrl->ssl = NULL;
  1848. }
  1849. if (ctrl->config)
  1850. {
  1851. mbedtls_ssl_config_free(ctrl->config);
  1852. free(ctrl->config);
  1853. ctrl->config = NULL;
  1854. }
  1855. if (ctrl->ca_cert)
  1856. {
  1857. mbedtls_x509_crt_free(ctrl->ca_cert);
  1858. free(ctrl->ca_cert);
  1859. ctrl->ca_cert = NULL;
  1860. }
  1861. ctrl->tls_mode = 0;
  1862. ctrl->tls_timer_state = -1;
  1863. if (ctrl->tls_short_timer)
  1864. {
  1865. platform_release_timer(ctrl->tls_short_timer);
  1866. ctrl->tls_short_timer = NULL;
  1867. }
  1868. if (ctrl->tls_long_timer)
  1869. {
  1870. platform_release_timer(ctrl->tls_long_timer);
  1871. ctrl->tls_long_timer = NULL;
  1872. }
  1873. #endif
  1874. }
  1875. int network_wait_link_up(network_ctrl_t *ctrl, uint32_t timeout_ms)
  1876. {
  1877. if (!ctrl) return -1;
  1878. NW_LOCK;
  1879. ctrl->auto_mode = 1;
  1880. // network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1881. if (network_check_ready(ctrl, 0))
  1882. {
  1883. ctrl->state = NW_STATE_OFF_LINE;
  1884. ctrl->wait_target_state = NW_WAIT_NONE;
  1885. NW_UNLOCK;
  1886. return 0;
  1887. }
  1888. ctrl->state = NW_STATE_LINK_OFF;
  1889. ctrl->wait_target_state = NW_WAIT_LINK_UP;
  1890. NW_UNLOCK;
  1891. if (!ctrl->task_handle || !timeout_ms)
  1892. {
  1893. return 1;
  1894. }
  1895. uint8_t finish = 0;
  1896. OS_EVENT event;
  1897. int result;
  1898. //DBG_INFO("%s wait for active!,%u,%x", Net->Tag, To * SYS_TICK, Net->hTask);
  1899. platform_start_timer(ctrl->timer, timeout_ms, 0);
  1900. while (!finish)
  1901. {
  1902. platform_wait_event(ctrl->task_handle, 0, &event, NULL, 0);
  1903. switch (event.ID)
  1904. {
  1905. case EV_NW_RESULT_LINK:
  1906. result = (int)event.Param1;
  1907. finish = 1;
  1908. break;
  1909. case EV_NW_TIMEOUT:
  1910. result = -1;
  1911. finish = 1;
  1912. break;
  1913. default:
  1914. if (ctrl->user_callback)
  1915. {
  1916. ctrl->user_callback((void *)&event, ctrl->user_data);
  1917. }
  1918. break;
  1919. }
  1920. }
  1921. platform_stop_timer(ctrl->timer);
  1922. return result;
  1923. }
  1924. /*
  1925. * 1.进行ready检测和等待ready
  1926. * 2.有remote_ip则开始连接服务器并等待连接结果
  1927. * 3.没有remote_ip则开始对url进行dns解析,解析完成后对所有ip进行尝试连接直到有个成功或者全部失败
  1928. * 4.如果是加密模式,还要走握手环节,等到握手环节完成后才能返回结果
  1929. * local_port如果为0则api内部自动生成一个
  1930. */
  1931. int network_connect(network_ctrl_t *ctrl, const char *domain_name, uint32_t domain_name_len, luat_ip_addr_t *remote_ip, uint16_t remote_port, uint32_t timeout_ms)
  1932. {
  1933. if (!ctrl) return -1;
  1934. if (ctrl->socket_id >= 0)
  1935. {
  1936. return -1;
  1937. }
  1938. NW_LOCK;
  1939. ctrl->is_server_mode = 0;
  1940. ctrl->tx_size = 0;
  1941. ctrl->ack_size = 0;
  1942. if (ctrl->dns_ip)
  1943. {
  1944. free(ctrl->dns_ip);
  1945. ctrl->dns_ip = NULL;
  1946. }
  1947. if (ctrl->cache_data)
  1948. {
  1949. free(ctrl->cache_data);
  1950. ctrl->cache_data = NULL;
  1951. }
  1952. ctrl->need_close = 0;
  1953. if (ctrl->domain_name)
  1954. {
  1955. free(ctrl->domain_name);
  1956. }
  1957. ctrl->domain_name = zalloc(domain_name_len + 1);
  1958. memcpy(ctrl->domain_name, domain_name, domain_name_len);
  1959. ctrl->domain_name_len = domain_name_len;
  1960. if (remote_ip)
  1961. {
  1962. ctrl->remote_ip = *remote_ip;
  1963. }
  1964. else
  1965. {
  1966. network_set_ip_invaild(&ctrl->remote_ip);
  1967. }
  1968. ctrl->auto_mode = 1;
  1969. ctrl->remote_port = remote_port;
  1970. //network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1971. ctrl->wait_target_state = NW_WAIT_ON_LINE;
  1972. if (!network_check_ready(ctrl, 0))
  1973. {
  1974. ctrl->state = NW_STATE_LINK_OFF;
  1975. goto NETWORK_CONNECT_WAIT;
  1976. }
  1977. if (network_prepare_connect(ctrl))
  1978. {
  1979. ctrl->state = NW_STATE_OFF_LINE;
  1980. ctrl->wait_target_state = NW_WAIT_NONE;
  1981. NW_UNLOCK;
  1982. return -1;
  1983. }
  1984. NETWORK_CONNECT_WAIT:
  1985. NW_UNLOCK;
  1986. if (!ctrl->task_handle || !timeout_ms)
  1987. {
  1988. return 1;
  1989. }
  1990. uint8_t finish = 0;
  1991. OS_EVENT event = {0};
  1992. int result;
  1993. //DBG_INFO("%s wait for active!,%u,%x", Net->Tag, To * SYS_TICK, Net->hTask);
  1994. platform_start_timer(ctrl->timer, timeout_ms, 0);
  1995. while (!finish)
  1996. {
  1997. platform_wait_event(ctrl->task_handle, 0, &event, NULL, 0);
  1998. switch (event.ID)
  1999. {
  2000. case EV_NW_RESULT_CONNECT:
  2001. result = (int)event.Param1;
  2002. finish = 1;
  2003. break;
  2004. case EV_NW_TIMEOUT:
  2005. result = -1;
  2006. finish = 1;
  2007. break;
  2008. default:
  2009. if (ctrl->user_callback)
  2010. {
  2011. ctrl->user_callback((void *)&event, ctrl->user_data);
  2012. }
  2013. break;
  2014. }
  2015. }
  2016. platform_stop_timer(ctrl->timer);
  2017. return result;
  2018. }
  2019. int network_listen(network_ctrl_t *ctrl, uint32_t timeout_ms)
  2020. {
  2021. if (!ctrl) return -1;
  2022. if (NW_STATE_LISTEN == ctrl->state)
  2023. {
  2024. DBG("socket %d is listen", ctrl->socket_id);
  2025. return 0;
  2026. }
  2027. if (ctrl->socket_id >= 0)
  2028. {
  2029. return -1;
  2030. }
  2031. NW_LOCK;
  2032. ctrl->is_server_mode = 1;
  2033. ctrl->auto_mode = 1;
  2034. ctrl->need_close = 0;
  2035. //network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  2036. ctrl->wait_target_state = NW_WAIT_ON_LINE;
  2037. if (!network_check_ready(ctrl, 0))
  2038. {
  2039. ctrl->state = NW_STATE_LINK_OFF;
  2040. goto NETWORK_LISTEN_WAIT;
  2041. }
  2042. if (network_base_connect(ctrl, NULL))
  2043. {
  2044. ctrl->state = NW_STATE_OFF_LINE;
  2045. ctrl->wait_target_state = NW_WAIT_NONE;
  2046. NW_UNLOCK;
  2047. return -1;
  2048. }
  2049. ctrl->state = NW_STATE_CONNECTING;
  2050. NETWORK_LISTEN_WAIT:
  2051. NW_UNLOCK;
  2052. if (!ctrl->task_handle || !timeout_ms)
  2053. {
  2054. return 1;
  2055. }
  2056. uint8_t finish = 0;
  2057. OS_EVENT event;
  2058. int result;
  2059. //DBG_INFO("%s wait for active!,%u,%x", Net->Tag, To * SYS_TICK, Net->hTask);
  2060. if (timeout_ms != 0xffffffff)
  2061. {
  2062. platform_start_timer(ctrl->timer, timeout_ms, 0);
  2063. }
  2064. while (!finish)
  2065. {
  2066. platform_wait_event(ctrl->task_handle, 0, &event, NULL, 0);
  2067. switch (event.ID)
  2068. {
  2069. case EV_NW_RESULT_CONNECT:
  2070. result = (int)event.Param1;
  2071. finish = 1;
  2072. break;
  2073. case EV_NW_TIMEOUT:
  2074. result = -1;
  2075. finish = 1;
  2076. break;
  2077. default:
  2078. if (ctrl->user_callback)
  2079. {
  2080. ctrl->user_callback((void *)&event, ctrl->user_data);
  2081. }
  2082. break;
  2083. }
  2084. }
  2085. if (timeout_ms != 0xffffffff)
  2086. {
  2087. platform_stop_timer(ctrl->timer);
  2088. }
  2089. return result;
  2090. }
  2091. int network_close(network_ctrl_t *ctrl, uint32_t timeout_ms)
  2092. {
  2093. if (!ctrl) return -1;
  2094. NW_LOCK;
  2095. if (ctrl->cache_data)
  2096. {
  2097. free(ctrl->cache_data);
  2098. ctrl->cache_data = NULL;
  2099. }
  2100. uint8_t old_state = ctrl->state;
  2101. ctrl->auto_mode = 1;
  2102. ctrl->need_close = 0;
  2103. ctrl->new_rx_flag = 0;
  2104. //network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  2105. #ifdef LUAT_USE_TLS
  2106. if (ctrl->tls_mode)
  2107. {
  2108. mbedtls_ssl_free(ctrl->ssl);
  2109. }
  2110. #endif
  2111. if (ctrl->socket_id < 0)
  2112. {
  2113. ctrl->state = NW_STATE_OFF_LINE;
  2114. ctrl->wait_target_state = NW_WAIT_NONE;
  2115. NW_UNLOCK;
  2116. return 0;
  2117. }
  2118. ctrl->state = NW_STATE_DISCONNECTING;
  2119. ctrl->wait_target_state = NW_WAIT_OFF_LINE;
  2120. if ((NW_STATE_ONLINE == old_state) && ctrl->is_tcp)
  2121. {
  2122. if (network_socket_disconnect(ctrl))
  2123. {
  2124. network_force_close_socket(ctrl);
  2125. ctrl->state = NW_STATE_OFF_LINE;
  2126. ctrl->wait_target_state = NW_WAIT_NONE;
  2127. NW_UNLOCK;
  2128. return 0;
  2129. }
  2130. }
  2131. else
  2132. {
  2133. network_force_close_socket(ctrl);
  2134. ctrl->state = NW_STATE_OFF_LINE;
  2135. ctrl->wait_target_state = NW_WAIT_NONE;
  2136. NW_UNLOCK;
  2137. return 0;
  2138. }
  2139. NW_UNLOCK;
  2140. if (!ctrl->task_handle || !timeout_ms)
  2141. {
  2142. return 1;
  2143. }
  2144. uint8_t finish = 0;
  2145. OS_EVENT event;
  2146. int result;
  2147. //DBG_INFO("%s wait for active!,%u,%x", Net->Tag, To * SYS_TICK, Net->hTask);
  2148. platform_start_timer(ctrl->timer, timeout_ms, 0);
  2149. while (!finish)
  2150. {
  2151. platform_wait_event(ctrl->task_handle, 0, &event, NULL, 0);
  2152. switch (event.ID)
  2153. {
  2154. case EV_NW_RESULT_CLOSE:
  2155. result = 0;
  2156. finish = 1;
  2157. break;
  2158. case EV_NW_TIMEOUT:
  2159. result = 0;
  2160. finish = 1;
  2161. break;
  2162. default:
  2163. if (ctrl->user_callback)
  2164. {
  2165. ctrl->user_callback((void *)&event, ctrl->user_data);
  2166. }
  2167. break;
  2168. }
  2169. }
  2170. platform_stop_timer(ctrl->timer);
  2171. network_socket_force_close(ctrl);
  2172. return result;
  2173. }
  2174. /*
  2175. * timeout_ms=0时,为非阻塞接口
  2176. */
  2177. int network_tx(network_ctrl_t *ctrl, const uint8_t *data, uint32_t len, int flags, luat_ip_addr_t *remote_ip, uint16_t remote_port, uint32_t *tx_len, uint32_t timeout_ms)
  2178. {
  2179. if (!ctrl) return -1;
  2180. if ((ctrl->need_close) || (ctrl->socket_id < 0) || (ctrl->state != NW_STATE_ONLINE))
  2181. {
  2182. return -1;
  2183. }
  2184. NW_LOCK;
  2185. int result;
  2186. ctrl->auto_mode = 1;
  2187. #ifdef LUAT_USE_TLS
  2188. if (ctrl->tls_mode)
  2189. {
  2190. if (ctrl->tls_need_reshakehand)
  2191. {
  2192. ctrl->tls_need_reshakehand = 0;
  2193. if (ctrl->cache_data)
  2194. {
  2195. free(ctrl->cache_data);
  2196. ctrl->cache_data = NULL;
  2197. }
  2198. ctrl->cache_data = malloc(len);
  2199. memcpy(ctrl->cache_data, data, len);
  2200. ctrl->cache_len = len;
  2201. mbedtls_ssl_session_reset(ctrl->ssl);
  2202. do
  2203. {
  2204. result = mbedtls_ssl_handshake_step( ctrl->ssl );
  2205. switch(result)
  2206. {
  2207. case MBEDTLS_ERR_SSL_WANT_READ:
  2208. ctrl->state = NW_STATE_SHAKEHAND;
  2209. goto NETWORK_TX_WAIT;
  2210. case 0:
  2211. break;
  2212. default:
  2213. #if MBEDTLS_VERSION_NUMBER >= 0x03000000
  2214. #else
  2215. DBG_ERR("0x%x, %d", -result, ctrl->ssl->state);
  2216. #endif
  2217. ctrl->need_close = 1;
  2218. NW_UNLOCK;
  2219. return -1;
  2220. }
  2221. #if MBEDTLS_VERSION_NUMBER >= 0x03000000
  2222. }while(!mbedtls_ssl_is_handshake_over(ctrl->ssl));
  2223. #else
  2224. }while(ctrl->ssl->state != MBEDTLS_SSL_HANDSHAKE_OVER);
  2225. #endif
  2226. }
  2227. uint32_t done = 0;
  2228. while(done < len)
  2229. {
  2230. result = mbedtls_ssl_write(ctrl->ssl, data + done, len - done);
  2231. if (result < 0)
  2232. {
  2233. DBG("%08x", -result);
  2234. ctrl->need_close = 1;
  2235. NW_UNLOCK;
  2236. return -1;
  2237. }
  2238. done += result;
  2239. }
  2240. if (tx_len)
  2241. *tx_len = done;
  2242. }
  2243. else
  2244. #endif
  2245. {
  2246. result = network_base_tx(ctrl, data, len, flags, remote_ip, remote_port);
  2247. if (result < 0)
  2248. {
  2249. ctrl->need_close = 1;
  2250. NW_UNLOCK;
  2251. return -1;
  2252. }
  2253. if (tx_len)
  2254. *tx_len = result;
  2255. if (!result && len)
  2256. {
  2257. NW_UNLOCK;
  2258. return 0;
  2259. }
  2260. }
  2261. #ifdef LUAT_USE_TLS
  2262. NETWORK_TX_WAIT:
  2263. #endif
  2264. ctrl->wait_target_state = NW_WAIT_TX_OK;
  2265. NW_UNLOCK;
  2266. if (!ctrl->task_handle || !timeout_ms)
  2267. {
  2268. return 1;
  2269. }
  2270. uint8_t finish = 0;
  2271. OS_EVENT event;
  2272. //DBG_INFO("%s wait for active!,%u,%x", Net->Tag, To * SYS_TICK, Net->hTask);
  2273. platform_start_timer(ctrl->timer, timeout_ms, 0);
  2274. while (!finish)
  2275. {
  2276. platform_wait_event(ctrl->task_handle, 0, &event, NULL, 0);
  2277. switch (event.ID)
  2278. {
  2279. case EV_NW_RESULT_TX:
  2280. result = (int)event.Param1;
  2281. finish = 1;
  2282. break;
  2283. case EV_NW_TIMEOUT:
  2284. result = -1;
  2285. finish = 1;
  2286. break;
  2287. default:
  2288. if (ctrl->user_callback)
  2289. {
  2290. ctrl->user_callback((void *)&event, ctrl->user_data);
  2291. }
  2292. break;
  2293. }
  2294. }
  2295. platform_stop_timer(ctrl->timer);
  2296. return result;
  2297. }
  2298. /*
  2299. * 实际读到的数据量在rx_len里,如果是UDP模式且为server时,需要看remote_ip和remote_port
  2300. */
  2301. int network_rx(network_ctrl_t *ctrl, uint8_t *data, uint32_t len, int flags, luat_ip_addr_t *remote_ip, uint16_t *remote_port, uint32_t *rx_len)
  2302. {
  2303. if (!ctrl) return -1;
  2304. if (((ctrl->need_close && !ctrl->new_rx_flag) || (ctrl->socket_id < 0) || (ctrl->state != NW_STATE_ONLINE)))
  2305. {
  2306. return -1;
  2307. }
  2308. NW_LOCK;
  2309. int result = -1;
  2310. ctrl->auto_mode = 1;
  2311. uint32_t read_len = 0;
  2312. uint8_t is_error = 0;
  2313. if (data)
  2314. {
  2315. ctrl->new_rx_flag = 0;
  2316. #ifdef LUAT_USE_TLS
  2317. if (ctrl->tls_mode)
  2318. {
  2319. do
  2320. {
  2321. result = mbedtls_ssl_read(ctrl->ssl, data + read_len, len - read_len);
  2322. if (result < 0 && (result != MBEDTLS_ERR_SSL_WANT_READ))
  2323. {
  2324. is_error = 1;
  2325. break;
  2326. }
  2327. else if (result > 0)
  2328. {
  2329. read_len += result;
  2330. if (read_len >= len)
  2331. {
  2332. break;
  2333. }
  2334. }
  2335. else
  2336. {
  2337. break;
  2338. }
  2339. }while(network_socket_receive(ctrl, NULL, len, flags, remote_ip, remote_port) > 0);
  2340. if ( !is_error )
  2341. {
  2342. result = read_len;
  2343. }
  2344. else
  2345. {
  2346. result = -1;
  2347. }
  2348. }
  2349. else
  2350. #endif
  2351. {
  2352. result = network_socket_receive(ctrl, data, len, flags, remote_ip, remote_port);
  2353. }
  2354. }
  2355. else
  2356. {
  2357. #ifdef LUAT_USE_TLS
  2358. if (ctrl->tls_mode)
  2359. {
  2360. read_len = 0;
  2361. do
  2362. {
  2363. result = mbedtls_ssl_read(ctrl->ssl, NULL, 0);
  2364. if ((result < 0) && (result != (MBEDTLS_ERR_SSL_WANT_READ)))
  2365. {
  2366. is_error = 1;
  2367. read_len = 0;
  2368. break;
  2369. }
  2370. else if (!result)
  2371. {
  2372. #if MBEDTLS_VERSION_NUMBER >= 0x03000000
  2373. read_len = ctrl->ssl->MBEDTLS_PRIVATE(in_msglen);
  2374. #else
  2375. read_len = ctrl->ssl->in_msglen;
  2376. #endif
  2377. break;
  2378. }
  2379. else if ((MBEDTLS_ERR_SSL_WANT_READ) == result)
  2380. {
  2381. read_len = 0;
  2382. ctrl->new_rx_flag = 0;
  2383. DBG("socket %d ssl data need more", ctrl->socket_id);
  2384. break;
  2385. }
  2386. }while(network_socket_receive(ctrl, NULL, len, flags, remote_ip, remote_port) > 0);
  2387. if ( !is_error )
  2388. {
  2389. result = read_len;
  2390. }
  2391. else
  2392. {
  2393. result = -1;
  2394. }
  2395. }
  2396. else
  2397. #endif
  2398. {
  2399. result = network_socket_receive(ctrl, data, len, flags, remote_ip, remote_port);
  2400. }
  2401. }
  2402. NW_UNLOCK;
  2403. if (result >= 0)
  2404. {
  2405. *rx_len = result;
  2406. return 0;
  2407. }
  2408. else
  2409. {
  2410. return -1;
  2411. }
  2412. }
  2413. int network_wait_event(network_ctrl_t *ctrl, OS_EVENT *out_event, uint32_t timeout_ms, uint8_t *is_timeout)
  2414. {
  2415. if (!ctrl) return -1;
  2416. if (ctrl->new_rx_flag)
  2417. {
  2418. ctrl->wait_target_state = NW_WAIT_EVENT;
  2419. if (out_event)
  2420. {
  2421. out_event->ID = 0;
  2422. }
  2423. return 0;
  2424. }
  2425. if ((ctrl->need_close) || (ctrl->socket_id < 0) || (ctrl->state != NW_STATE_ONLINE))
  2426. {
  2427. return -1;
  2428. }
  2429. NW_LOCK;
  2430. ctrl->auto_mode = 1;
  2431. ctrl->wait_target_state = NW_WAIT_EVENT;
  2432. NW_UNLOCK;
  2433. if (!ctrl->task_handle || !timeout_ms)
  2434. {
  2435. return 1;
  2436. }
  2437. *is_timeout = 0;
  2438. uint8_t finish = 0;
  2439. OS_EVENT event;
  2440. int result;
  2441. //DBG_INFO("%s wait for active!,%u,%x", Net->Tag, To * SYS_TICK, Net->hTask);
  2442. platform_start_timer(ctrl->timer, timeout_ms, 0);
  2443. while (!finish)
  2444. {
  2445. platform_wait_event(ctrl->task_handle, 0, &event, NULL, 0);
  2446. switch (event.ID)
  2447. {
  2448. case EV_NW_RESULT_EVENT:
  2449. result = (int)event.Param1;
  2450. if (result)
  2451. {
  2452. result = -1;
  2453. }
  2454. if (out_event)
  2455. {
  2456. out_event->ID = 0;
  2457. }
  2458. finish = 1;
  2459. break;
  2460. case EV_NW_TIMEOUT:
  2461. *is_timeout = 1;
  2462. result = 0;
  2463. finish = 1;
  2464. break;
  2465. case EV_NW_BREAK_WAIT:
  2466. if (out_event)
  2467. {
  2468. *out_event = event;
  2469. }
  2470. result = 0;
  2471. finish = 1;
  2472. break;
  2473. default:
  2474. if (out_event)
  2475. {
  2476. *out_event = event;
  2477. result = 0;
  2478. finish = 1;
  2479. break;
  2480. }
  2481. else if (ctrl->user_callback)
  2482. {
  2483. ctrl->user_callback((void *)&event, ctrl->user_data);
  2484. }
  2485. break;
  2486. }
  2487. }
  2488. platform_stop_timer(ctrl->timer);
  2489. return result;
  2490. }
  2491. int network_wait_rx(network_ctrl_t *ctrl, uint32_t timeout_ms, uint8_t *is_break, uint8_t *is_timeout)
  2492. {
  2493. if (!ctrl) return -1;
  2494. *is_timeout = 0;
  2495. *is_break = 0;
  2496. if (ctrl->new_rx_flag)
  2497. {
  2498. ctrl->wait_target_state = NW_WAIT_EVENT;
  2499. return 0;
  2500. }
  2501. if ((ctrl->need_close) || (ctrl->socket_id < 0) || (ctrl->state != NW_STATE_ONLINE))
  2502. {
  2503. return -1;
  2504. }
  2505. NW_LOCK;
  2506. ctrl->auto_mode = 1;
  2507. ctrl->wait_target_state = NW_WAIT_EVENT;
  2508. NW_UNLOCK;
  2509. uint8_t finish = 0;
  2510. OS_EVENT event;
  2511. int result;
  2512. //DBG_INFO("%s wait for active!,%u,%x", Net->Tag, To * SYS_TICK, Net->hTask);
  2513. if (timeout_ms)
  2514. {
  2515. platform_start_timer(ctrl->timer, timeout_ms, 0);
  2516. }
  2517. while (!finish)
  2518. {
  2519. platform_wait_event(ctrl->task_handle, 0, &event, NULL, 0);
  2520. switch (event.ID)
  2521. {
  2522. case EV_NW_RESULT_EVENT:
  2523. result = (int)event.Param1;
  2524. if (result)
  2525. {
  2526. result = -1;
  2527. finish = 1;
  2528. }
  2529. else if (ctrl->new_rx_flag)
  2530. {
  2531. result = 0;
  2532. finish = 1;
  2533. }
  2534. break;
  2535. case EV_NW_TIMEOUT:
  2536. *is_timeout = 1;
  2537. result = 0;
  2538. finish = 1;
  2539. break;
  2540. case EV_NW_BREAK_WAIT:
  2541. *is_break = 1;
  2542. result = 0;
  2543. finish = 1;
  2544. break;
  2545. default:
  2546. if (ctrl->user_callback)
  2547. {
  2548. ctrl->user_callback((void *)&event, ctrl->user_data);
  2549. }
  2550. break;
  2551. }
  2552. ctrl->wait_target_state = NW_WAIT_EVENT;
  2553. }
  2554. platform_stop_timer(ctrl->timer);
  2555. return result;
  2556. }
  2557. uint8_t network_check_ready(network_ctrl_t *ctrl, uint8_t adapter_index)
  2558. {
  2559. network_adapter_t *adapter;
  2560. if (ctrl)
  2561. {
  2562. adapter = &prv_adapter_table[ctrl->adapter_index];
  2563. }
  2564. else if (adapter_index < NW_ADAPTER_QTY)
  2565. {
  2566. adapter = &prv_adapter_table[adapter_index];
  2567. }
  2568. else
  2569. {
  2570. return 0;
  2571. }
  2572. if (adapter->opt)
  2573. {
  2574. return adapter->opt->check_ready(adapter->user_data);
  2575. }
  2576. else
  2577. {
  2578. return 0;
  2579. }
  2580. }
  2581. //将IP设置成无效状态
  2582. void network_set_ip_invaild(luat_ip_addr_t *ip)
  2583. {
  2584. #ifdef LUAT_USE_LWIP
  2585. #if LWIP_IPV6
  2586. ip->type = 0xff;
  2587. #else
  2588. ip->addr = 0;
  2589. #endif
  2590. #else
  2591. ip->is_ipv6 = 0xff;
  2592. #endif
  2593. }
  2594. //检测IP是不是无效的,无效返回0
  2595. uint8_t network_ip_is_vaild(luat_ip_addr_t *ip)
  2596. {
  2597. #ifdef LUAT_USE_LWIP
  2598. #if LWIP_IPV6
  2599. return (ip->type != 0xff);
  2600. #else
  2601. return (ip->addr != 0);
  2602. #endif
  2603. #else
  2604. return (ip->is_ipv6 != 0xff);
  2605. #endif
  2606. }
  2607. uint8_t network_ip_is_ipv6(luat_ip_addr_t *ip)
  2608. {
  2609. #ifdef LUAT_USE_LWIP
  2610. #if LWIP_IPV6
  2611. return (IPADDR_TYPE_V6 == ip->type);
  2612. #else
  2613. return 0;
  2614. #endif
  2615. #else
  2616. return (ip->is_ipv6 && (ip->is_ipv6 != 0xff));
  2617. #endif
  2618. }
  2619. //检测IP是不是有效的IPV4类型,不是返回0
  2620. uint8_t network_ip_is_vaild_ipv4(luat_ip_addr_t *ip)
  2621. {
  2622. #ifdef LUAT_USE_LWIP
  2623. #if LWIP_IPV6
  2624. return (IPADDR_TYPE_V4 == ip->type);
  2625. #else
  2626. return (ip->addr != 0);
  2627. #endif
  2628. #else
  2629. return !ip->is_ipv6;
  2630. #endif
  2631. }
  2632. void network_set_ip_ipv4(luat_ip_addr_t *ip, uint32_t ipv4)
  2633. {
  2634. #ifdef LUAT_USE_LWIP
  2635. #if LWIP_IPV6
  2636. ip->type = IPADDR_TYPE_V4;
  2637. ip->u_addr.ip4.addr = ipv4;
  2638. #else
  2639. ip->addr = ipv4;
  2640. #endif
  2641. #else
  2642. ip->is_ipv6 = 0;
  2643. ip->ipv4 = ipv4;
  2644. #endif
  2645. }
  2646. #endif