luat_network_adapter.c 63 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764
  1. #include "luat_base.h"
  2. #include "luat_mem.h"
  3. #include "luat_crypto.h"
  4. #include "luat_rtos.h"
  5. #ifdef LUAT_USE_NETWORK
  6. #include "luat_rtos.h"
  7. #include "platform_def.h"
  8. #include "ctype.h"
  9. #include "luat_network_adapter.h"
  10. #ifndef LWIP_NUM_SOCKETS
  11. #define LWIP_NUM_SOCKETS 8
  12. #endif
  13. typedef struct
  14. {
  15. #ifdef LUAT_USE_LWIP
  16. network_ctrl_t lwip_ctrl_table[LWIP_NUM_SOCKETS];
  17. // HANDLE network_mutex;
  18. #endif
  19. int last_adapter_index;
  20. int default_adapter_index;
  21. llist_head dns_cache_head;
  22. #ifdef LUAT_USE_LWIP
  23. uint8_t lwip_ctrl_busy[LWIP_NUM_SOCKETS];
  24. #endif
  25. uint8_t is_init;
  26. }network_info_t;
  27. typedef struct
  28. {
  29. network_adapter_info *opt;
  30. void *user_data;
  31. uint8_t *ctrl_busy;
  32. network_ctrl_t *ctrl_table;
  33. uint16_t port;
  34. }network_adapter_t;
  35. static network_adapter_t prv_adapter_table[NW_ADAPTER_QTY];
  36. static network_info_t prv_network = {
  37. .last_adapter_index = -1,
  38. .default_adapter_index = -1,
  39. .is_init = 0,
  40. };
  41. static const char *prv_network_event_id_string[] =
  42. {
  43. "适配器复位",
  44. "LINK状态变更",
  45. "超时",
  46. "DNS结果",
  47. "发送成功",
  48. "有新的数据",
  49. "接收缓存满了",
  50. "断开成功",
  51. "对端关闭",
  52. "连接成功",
  53. "连接异常",
  54. "开始监听",
  55. "新的客户端来了",
  56. "唤醒",
  57. "未知",
  58. };
  59. static const char *prv_network_ctrl_state_string[] =
  60. {
  61. "硬件离线",
  62. "离线",
  63. "等待DNS",
  64. "正在连接",
  65. "正在TLS握手",
  66. "在线",
  67. "在监听",
  68. "正在离线",
  69. "未知"
  70. };
  71. static const char *prv_network_ctrl_wait_state_string[] =
  72. {
  73. "无等待",
  74. "等待硬件上线",
  75. "等待连接完成",
  76. "等待发送完成",
  77. "等待离线完成",
  78. "等待任意网络变化",
  79. "未知",
  80. };
  81. static const char *prv_network_ctrl_callback_event_string[] =
  82. {
  83. "硬件状态回调",
  84. "连接状态回调",
  85. "离线状态回调",
  86. "发送状态回调",
  87. "任意网络变化回调",
  88. };
  89. const char *network_ctrl_event_id_string(uint32_t event)
  90. {
  91. if (event > EV_NW_END || event < EV_NW_RESET)
  92. {
  93. return prv_network_event_id_string[EV_NW_END - EV_NW_RESET];
  94. }
  95. return prv_network_event_id_string[event - EV_NW_RESET];
  96. }
  97. const char *network_ctrl_state_string(uint8_t state)
  98. {
  99. if (state > NW_STATE_DISCONNECTING)
  100. {
  101. return prv_network_ctrl_state_string[NW_STATE_DISCONNECTING + 1];
  102. }
  103. return prv_network_ctrl_state_string[state];
  104. }
  105. const char *network_ctrl_wait_state_string(uint8_t state)
  106. {
  107. if (state > NW_WAIT_EVENT)
  108. {
  109. return prv_network_ctrl_wait_state_string[NW_WAIT_EVENT + 1];
  110. }
  111. return prv_network_ctrl_wait_state_string[state];
  112. }
  113. const char *network_ctrl_callback_event_string(uint32_t event)
  114. {
  115. if (event > EV_NW_RESULT_EVENT || event < EV_NW_RESULT_LINK)
  116. {
  117. return prv_network_ctrl_callback_event_string[event - EV_NW_RESULT_EVENT + 1];
  118. }
  119. return prv_network_ctrl_callback_event_string[event - EV_NW_RESULT_EVENT];
  120. }
  121. network_adapter_info* network_adapter_fetch(int id, void** userdata) {
  122. if (id >= 0 && id < NW_ADAPTER_QTY) {
  123. if (prv_adapter_table[id].opt) {
  124. *userdata = prv_adapter_table[id].user_data;
  125. return prv_adapter_table[id].opt;
  126. }
  127. }
  128. return NULL;
  129. }
  130. #ifdef LUAT_USE_LWIP
  131. #include "../lwip/port/net_lwip.h"
  132. #else
  133. #include "dhcp_def.h"
  134. #endif
  135. extern void DBG_Printf(const char* format, ...);
  136. extern void DBG_HexPrintf(void *Data, unsigned int len);
  137. //#define DBG(x,y...) DBG_Printf("%s %d:"x"\r\n", __FUNCTION__,__LINE__,##y)
  138. //#define DBG_ERR(x,y...) DBG_Printf("%s %d:"x"\r\n", __FUNCTION__,__LINE__,##y)
  139. static int tls_random( void *p_rng,
  140. unsigned char *output, size_t output_len );
  141. #define __NW_DEBUG_ENABLE__
  142. #ifdef __NW_DEBUG_ENABLE__
  143. #ifdef LUAT_LOG_NO_NEWLINE
  144. #define DBG(x,...) do {if (ctrl->is_debug) {DBG_Printf("%s %d:"x, __FUNCTION__,__LINE__,##__VA_ARGS__);}} while(0)
  145. #define DBG_ERR(x,...) DBG_Printf("%s %d:"x, __FUNCTION__,__LINE__,##__VA_ARGS__)
  146. #else
  147. #define DBG(x,...) do {if (ctrl->is_debug) {DBG_Printf("%s %d:"x"\r\n", __FUNCTION__,__LINE__,##__VA_ARGS__);}} while(0)
  148. #define DBG_ERR(x,...) DBG_Printf("%s %d:"x"\r\n", __FUNCTION__,__LINE__,##__VA_ARGS__)
  149. #endif
  150. #else
  151. #define DBG(x,...)
  152. #define DBG_ERR(x,...)
  153. #endif
  154. #define NW_LOCK platform_lock_mutex(ctrl->mutex)
  155. #define NW_UNLOCK platform_unlock_mutex(ctrl->mutex)
  156. #define SOL_SOCKET 0xfff /* options for socket level */
  157. #define SO_REUSEADDR 0x0004 /* Allow local address reuse */
  158. #define SO_KEEPALIVE 0x0008 /* keep connections alive */
  159. #define IPPROTO_ICMP 1
  160. #define IPPROTO_TCP 6
  161. #define TCP_NODELAY 0x01 /* don't delay send to coalesce packets */
  162. #define TCP_KEEPALIVE 0x02 /* send KEEPALIVE probes when idle for pcb->keep_idle milliseconds */
  163. #define TCP_KEEPIDLE 0x03 /* set pcb->keep_idle - Same as TCP_KEEPALIVE, but use seconds for get/setsockopt */
  164. #define TCP_KEEPINTVL 0x04 /* set pcb->keep_intvl - Use seconds for get/setsockopt */
  165. #define TCP_KEEPCNT 0x05 /* set pcb->keep_cnt - Use number of probes sent for get/setsockopt */
  166. static uint8_t network_check_ip_same(luat_ip_addr_t *ip1, luat_ip_addr_t *ip2)
  167. {
  168. #ifdef LUAT_USE_LWIP
  169. #if defined ENABLE_PSIF
  170. return ip_addr_cmp(ip1, ip2);
  171. #else
  172. #if LWIP_IPV6
  173. return ip_addr_cmp_zoneless(ip1, ip2);
  174. #else
  175. return ip_addr_cmp(ip1, ip2);
  176. #endif
  177. #endif
  178. #else
  179. if (ip1->is_ipv6 != ip2->is_ipv6)
  180. {
  181. return 0;
  182. }
  183. if (ip1->is_ipv6)
  184. {
  185. return !memcmp(ip1->ipv6_u8_addr, ip2->ipv6_u8_addr, 16);
  186. }
  187. else
  188. {
  189. return (ip1->ipv4 == ip2->ipv4);
  190. }
  191. #endif
  192. }
  193. static int network_base_tx(network_ctrl_t *ctrl, const uint8_t *data, uint32_t len, int flags, luat_ip_addr_t *remote_ip, uint16_t remote_port)
  194. {
  195. int result = -1;
  196. if (ctrl->is_tcp)
  197. {
  198. result = network_socket_send(ctrl, data, len, flags, NULL, 0);
  199. }
  200. else
  201. {
  202. if (remote_ip)
  203. {
  204. result = network_socket_send(ctrl, data, len, flags, remote_ip, remote_port);
  205. }
  206. else
  207. {
  208. result = network_socket_send(ctrl, data, len, flags, ctrl->online_ip, ctrl->remote_port);
  209. }
  210. }
  211. if (result >= 0)
  212. {
  213. ctrl->tx_size += len;
  214. }
  215. else
  216. {
  217. ctrl->need_close = 1;
  218. }
  219. return result;
  220. }
  221. static LUAT_RT_RET_TYPE tls_shorttimeout(LUAT_RT_CB_PARAM)
  222. {
  223. network_ctrl_t *ctrl = (network_ctrl_t *)param;
  224. if (!ctrl->tls_mode)
  225. {
  226. platform_stop_timer(ctrl->tls_long_timer);
  227. return LUAT_RT_RET;
  228. }
  229. if (0 == ctrl->tls_timer_state)
  230. {
  231. ctrl->tls_timer_state = 1;
  232. }
  233. return LUAT_RT_RET;
  234. }
  235. #ifdef LUAT_USE_TLS
  236. static LUAT_RT_RET_TYPE tls_longtimeout(LUAT_RT_CB_PARAM)
  237. {
  238. network_ctrl_t *ctrl = (network_ctrl_t *)param;
  239. platform_stop_timer(ctrl->tls_short_timer);
  240. if (!ctrl->tls_mode)
  241. {
  242. return LUAT_RT_RET;
  243. }
  244. ctrl->tls_timer_state = 2;
  245. return LUAT_RT_RET;
  246. }
  247. static void tls_settimer( void *data, uint32_t int_ms, uint32_t fin_ms )
  248. {
  249. network_ctrl_t *ctrl = (network_ctrl_t *)data;
  250. if (!ctrl->tls_mode)
  251. {
  252. return;
  253. }
  254. if (!fin_ms)
  255. {
  256. platform_stop_timer(ctrl->tls_short_timer);
  257. platform_stop_timer(ctrl->tls_long_timer);
  258. ctrl->tls_timer_state = -1;
  259. return ;
  260. }
  261. platform_start_timer(ctrl->tls_short_timer, int_ms, 0);
  262. platform_start_timer(ctrl->tls_long_timer, fin_ms, 0);
  263. ctrl->tls_timer_state = 0;
  264. }
  265. static int tls_gettimer( void *data )
  266. {
  267. network_ctrl_t *ctrl = (network_ctrl_t *)data;
  268. if (!ctrl->tls_mode)
  269. {
  270. return -ERROR_PARAM_INVALID;
  271. }
  272. #if MBEDTLS_VERSION_NUMBER >= 0x03000000
  273. if(!mbedtls_ssl_is_handshake_over(ctrl->ssl))
  274. #else
  275. if (ctrl->ssl->state != MBEDTLS_SSL_HANDSHAKE_OVER)
  276. #endif
  277. {
  278. return ctrl->tls_timer_state;
  279. }
  280. else
  281. {
  282. return 0;
  283. }
  284. }
  285. static void tls_dbg(void *data, int level,
  286. const char *file, int line,
  287. const char *str)
  288. {
  289. (void)data;(void)level;DBG_Printf("%s %d:%s", file, line, str);
  290. }
  291. static int tls_send(void *ctx, const unsigned char *buf, size_t len )
  292. {
  293. network_ctrl_t *ctrl = (network_ctrl_t *)ctx;
  294. if (!ctrl->tls_mode)
  295. {
  296. return -ERROR_PERMISSION_DENIED;
  297. }
  298. if (network_base_tx(ctrl, buf, len, 0, NULL, 0) != len)
  299. {
  300. return -0x004E;
  301. }
  302. else
  303. {
  304. return len;
  305. }
  306. }
  307. #endif
  308. static int tls_recv(void *ctx, unsigned char *buf, size_t len )
  309. {
  310. #ifdef LUAT_USE_TLS
  311. network_ctrl_t *ctrl = (network_ctrl_t *)ctx;
  312. luat_ip_addr_t remote_ip;
  313. uint16_t remote_port;
  314. int result = -1;
  315. if (!ctrl->tls_mode)
  316. {
  317. return -1;
  318. }
  319. TLS_RECV:
  320. result = network_socket_receive(ctrl, buf, len, 0, &remote_ip, &remote_port);
  321. if (result < 0)
  322. {
  323. return -0x004C;
  324. }
  325. if (result > 0)
  326. {
  327. if (!ctrl->is_tcp)
  328. {
  329. if ((remote_port == ctrl->remote_port) && network_check_ip_same(&remote_ip, ctrl->online_ip))
  330. {
  331. goto TLS_RECV;
  332. }
  333. }
  334. return result;
  335. }
  336. return MBEDTLS_ERR_SSL_WANT_READ;
  337. #else
  338. return -1;
  339. #endif
  340. }
  341. static int network_get_host_by_name(network_ctrl_t *ctrl)
  342. {
  343. #ifdef LUAT_USE_LWIP
  344. network_set_ip_invaild(&ctrl->remote_ip);
  345. if (ipaddr_aton(ctrl->domain_name, &ctrl->remote_ip))
  346. {
  347. return 0;
  348. }
  349. network_set_ip_invaild(&ctrl->remote_ip);
  350. return -1;
  351. #else
  352. ctrl->remote_ip.is_ipv6 = 0xff;
  353. if (network_string_is_ipv4(ctrl->domain_name, ctrl->domain_name_len))
  354. {
  355. ctrl->remote_ip.is_ipv6 = 0;
  356. ctrl->remote_ip.ipv4 = network_string_to_ipv4(ctrl->domain_name, ctrl->domain_name_len);
  357. }
  358. else
  359. {
  360. char *name = zalloc(ctrl->domain_name_len + 1);
  361. memcpy(name, ctrl->domain_name, ctrl->domain_name_len);
  362. network_string_to_ipv6(name, &ctrl->remote_ip);
  363. free(name);
  364. }
  365. if (ctrl->remote_ip.is_ipv6 != 0xff)
  366. {
  367. return 0;
  368. }
  369. else
  370. {
  371. return -1;
  372. }
  373. #endif
  374. }
  375. static void network_update_dns_cache(network_ctrl_t *ctrl)
  376. {
  377. }
  378. static void network_get_dns_cache(network_ctrl_t *ctrl)
  379. {
  380. }
  381. static int network_base_connect(network_ctrl_t *ctrl, luat_ip_addr_t *remote_ip)
  382. {
  383. #ifdef LUAT_USE_LWIP
  384. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  385. if (ctrl->socket_id >= 0)
  386. {
  387. #ifdef LUAT_USE_TLS
  388. if (ctrl->tls_mode)
  389. {
  390. mbedtls_ssl_free(ctrl->ssl);
  391. }
  392. #endif
  393. if (network_socket_close(ctrl))
  394. {
  395. network_clean_invaild_socket(ctrl->adapter_index);
  396. network_socket_force_close(ctrl);
  397. }
  398. ctrl->need_close = 0;
  399. ctrl->socket_id = -1;
  400. }
  401. if (remote_ip)
  402. {
  403. if (network_create_soceket(ctrl, network_ip_is_ipv6(remote_ip)) < 0)
  404. {
  405. network_clean_invaild_socket(ctrl->adapter_index);
  406. if (network_create_soceket(ctrl, network_ip_is_ipv6(remote_ip)) < 0)
  407. {
  408. return -1;
  409. }
  410. }
  411. if (adapter->opt->is_posix)
  412. {
  413. volatile uint32_t val;
  414. val = ctrl->tcp_keep_alive;
  415. network_setsockopt(ctrl, SOL_SOCKET, SO_KEEPALIVE, (void *)&val, sizeof(val));
  416. if (ctrl->tcp_keep_alive)
  417. {
  418. val = ctrl->tcp_keep_idle;
  419. network_setsockopt(ctrl, IPPROTO_TCP, TCP_KEEPIDLE, (void*)&val, sizeof(val));
  420. val = ctrl->tcp_keep_interval;
  421. network_setsockopt(ctrl, IPPROTO_TCP, TCP_KEEPINTVL, (void *)&val, sizeof(val));
  422. val = ctrl->tcp_keep_cnt;
  423. network_setsockopt(ctrl, IPPROTO_TCP, TCP_KEEPCNT, (void *)&val, sizeof(val));
  424. }
  425. }
  426. else
  427. {
  428. network_user_cmd(ctrl, NW_CMD_AUTO_HEART_TIME, ctrl->tcp_keep_idle);
  429. }
  430. return network_socket_connect(ctrl, remote_ip);
  431. }
  432. else
  433. {
  434. if (network_create_soceket(ctrl, 0) < 0)
  435. {
  436. network_clean_invaild_socket(ctrl->adapter_index);
  437. if (network_create_soceket(ctrl, 0) < 0)
  438. {
  439. return -1;
  440. }
  441. }
  442. return network_socket_listen(ctrl);
  443. }
  444. #else
  445. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  446. if (ctrl->socket_id >= 0)
  447. {
  448. network_force_close_socket(ctrl);
  449. }
  450. if (remote_ip)
  451. {
  452. if (network_create_soceket(ctrl, remote_ip->is_ipv6) < 0)
  453. {
  454. network_clean_invaild_socket(ctrl->adapter_index);
  455. if (network_create_soceket(ctrl, remote_ip->is_ipv6) < 0)
  456. {
  457. return -1;
  458. }
  459. }
  460. if (adapter->opt->is_posix)
  461. {
  462. network_setsockopt(ctrl, SOL_SOCKET, SO_KEEPALIVE, (void *)&ctrl->tcp_keep_alive, sizeof(ctrl->tcp_keep_alive));
  463. if (ctrl->tcp_keep_alive)
  464. {
  465. network_setsockopt(ctrl, IPPROTO_TCP, TCP_KEEPIDLE, (void*)&ctrl->tcp_keep_idle, sizeof(ctrl->tcp_keep_idle));
  466. network_setsockopt(ctrl, IPPROTO_TCP, TCP_KEEPINTVL, (void *)&ctrl->tcp_keep_interval, sizeof(ctrl->tcp_keep_interval));
  467. network_setsockopt(ctrl, IPPROTO_TCP, TCP_KEEPCNT, (void *)&ctrl->tcp_keep_cnt, sizeof(ctrl->tcp_keep_cnt));
  468. }
  469. }
  470. else
  471. {
  472. network_user_cmd(ctrl, NW_CMD_AUTO_HEART_TIME, ctrl->tcp_keep_idle);
  473. }
  474. return network_socket_connect(ctrl, remote_ip);
  475. }
  476. else
  477. {
  478. luat_ip_addr_t local_ip, net_mask, gate_way;
  479. network_get_local_ip_info(ctrl, &local_ip, &net_mask, &gate_way);
  480. if (network_create_soceket(ctrl, local_ip.is_ipv6) < 0)
  481. {
  482. network_clean_invaild_socket(ctrl->adapter_index);
  483. if (network_create_soceket(ctrl, local_ip.is_ipv6) < 0)
  484. {
  485. return -1;
  486. }
  487. }
  488. return network_socket_listen(ctrl);
  489. }
  490. #endif
  491. }
  492. static int network_prepare_connect(network_ctrl_t *ctrl)
  493. {
  494. if (network_ip_is_vaild(&ctrl->remote_ip))
  495. {
  496. ;
  497. }
  498. else if (ctrl->domain_name)
  499. {
  500. if (network_get_host_by_name(ctrl))
  501. {
  502. if (network_dns(ctrl))
  503. {
  504. network_socket_force_close(ctrl);
  505. return -1;
  506. }
  507. ctrl->state = NW_STATE_WAIT_DNS;
  508. return 0;
  509. }
  510. }
  511. else
  512. {
  513. return -1;
  514. }
  515. if (network_base_connect(ctrl, &ctrl->remote_ip))
  516. {
  517. network_socket_force_close(ctrl);
  518. return -1;
  519. }
  520. ctrl->state = NW_STATE_CONNECTING;
  521. return 0;
  522. }
  523. static int network_state_link_off(network_ctrl_t *ctrl, OS_EVENT *event, network_adapter_t *adapter)
  524. {
  525. if (EV_NW_STATE == event->ID)
  526. {
  527. if (event->Param2)
  528. {
  529. ctrl->state = NW_STATE_OFF_LINE;
  530. if (NW_WAIT_LINK_UP == ctrl->wait_target_state)
  531. {
  532. return 0;
  533. }
  534. else if (NW_WAIT_ON_LINE == ctrl->wait_target_state)
  535. {
  536. if (ctrl->is_server_mode)
  537. {
  538. if (network_base_connect(ctrl, NULL))
  539. {
  540. return -1;
  541. }
  542. ctrl->state = NW_STATE_CONNECTING;
  543. }
  544. else
  545. {
  546. if (network_prepare_connect(ctrl))
  547. {
  548. return -1;
  549. }
  550. }
  551. return 1;
  552. }
  553. }
  554. }
  555. return 1;
  556. }
  557. static int network_state_off_line(network_ctrl_t *ctrl, OS_EVENT *event, network_adapter_t *adapter)
  558. {
  559. return 1;
  560. }
  561. static int network_state_wait_dns(network_ctrl_t *ctrl, OS_EVENT *event, network_adapter_t *adapter)
  562. {
  563. if ((ctrl->need_close) || ctrl->wait_target_state != NW_WAIT_ON_LINE) return -1;
  564. switch(event->ID)
  565. {
  566. case EV_NW_RESET:
  567. case EV_NW_SOCKET_ERROR:
  568. return -1;
  569. case EV_NW_STATE:
  570. if (!event->Param2)
  571. {
  572. return -1;
  573. }
  574. break;
  575. case EV_NW_DNS_RESULT:
  576. if (event->Param1)
  577. {
  578. //更新dns cache
  579. ctrl->dns_ip = event->Param2;
  580. ctrl->dns_ip_nums = event->Param1;
  581. #ifdef LUAT_USE_LWIP
  582. for(int i = 0; i < ctrl->dns_ip_nums; i++)
  583. {
  584. DBG("dns ip%d, ttl %u, %s", i, ctrl->dns_ip[i].ttl_end, ipaddr_ntoa(&ctrl->dns_ip[i].ip));
  585. }
  586. #endif
  587. network_update_dns_cache(ctrl);
  588. }
  589. else
  590. {
  591. ctrl->dns_ip_nums = 0;
  592. network_get_dns_cache(ctrl);
  593. if (!ctrl->dns_ip_nums)
  594. {
  595. return -1;
  596. }
  597. }
  598. if (!ctrl->remote_port)
  599. {
  600. ctrl->state = NW_STATE_OFF_LINE;
  601. return 0;
  602. }
  603. ctrl->dns_ip_cnt = 0;
  604. if (network_base_connect(ctrl, &ctrl->dns_ip[ctrl->dns_ip_cnt].ip))
  605. {
  606. network_socket_force_close(ctrl);
  607. return -1;
  608. }
  609. else
  610. {
  611. ctrl->state = NW_STATE_CONNECTING;
  612. return 1;
  613. }
  614. default:
  615. return 1;
  616. }
  617. return -1;
  618. }
  619. static int network_state_connecting(network_ctrl_t *ctrl, OS_EVENT *event, network_adapter_t *adapter)
  620. {
  621. if ((ctrl->need_close) || (ctrl->wait_target_state != NW_WAIT_ON_LINE)) return -1;
  622. switch(event->ID)
  623. {
  624. case EV_NW_RESET:
  625. return -1;
  626. case EV_NW_SOCKET_ERROR:
  627. case EV_NW_SOCKET_REMOTE_CLOSE:
  628. case EV_NW_SOCKET_CLOSE_OK:
  629. if (network_ip_is_vaild(&ctrl->remote_ip))
  630. {
  631. return -1;
  632. }
  633. DBG("dns ip %d no connect!,%d", ctrl->dns_ip_cnt, ctrl->dns_ip_nums);
  634. ctrl->dns_ip_cnt++;
  635. if (ctrl->dns_ip_cnt >= ctrl->dns_ip_nums)
  636. {
  637. DBG("all ip try connect failed");
  638. return -1;
  639. }
  640. if (network_base_connect(ctrl, &ctrl->dns_ip[ctrl->dns_ip_cnt].ip))
  641. {
  642. network_socket_force_close(ctrl);
  643. return -1;
  644. }
  645. else
  646. {
  647. ctrl->state = NW_STATE_CONNECTING;
  648. return 1;
  649. }
  650. break;
  651. case EV_NW_STATE:
  652. if (!event->Param2)
  653. {
  654. return -1;
  655. }
  656. break;
  657. case EV_NW_SOCKET_LISTEN:
  658. if (ctrl->is_server_mode)
  659. {
  660. ctrl->state = NW_STATE_LISTEN;
  661. return 1;
  662. }
  663. break;
  664. case EV_NW_SOCKET_CONNECT_OK:
  665. #ifdef LUAT_USE_TLS
  666. if (ctrl->tls_mode)
  667. {
  668. mbedtls_ssl_free(ctrl->ssl);
  669. memset(ctrl->ssl, 0, sizeof(mbedtls_ssl_context));
  670. mbedtls_ssl_setup(ctrl->ssl, ctrl->config);
  671. // ctrl->ssl->f_set_timer = tls_settimer;
  672. // ctrl->ssl->f_get_timer = tls_gettimer;
  673. // ctrl->ssl->p_timer = ctrl;
  674. mbedtls_ssl_set_timer_cb(ctrl->ssl, ctrl, tls_settimer, tls_gettimer);
  675. // ctrl->ssl->p_bio = ctrl;
  676. // ctrl->ssl->f_send = tls_send;
  677. // ctrl->ssl->f_recv = tls_recv;
  678. mbedtls_ssl_set_bio(ctrl->ssl, ctrl, tls_send, tls_recv, NULL);
  679. // add by wendal
  680. // cloudflare的https需要设置hostname才能访问
  681. if (ctrl->domain_name_len > 0 && ctrl->domain_name_len < 256) {
  682. char host[257] = {0};
  683. memcpy(host, ctrl->domain_name, ctrl->domain_name_len);
  684. mbedtls_ssl_set_hostname(ctrl->ssl, host);
  685. //LLOGD("CALL mbedtls_ssl_set_hostname(%s)", host);
  686. }
  687. else {
  688. //LLOGD("skip mbedtls_ssl_set_hostname");
  689. }
  690. ctrl->state = NW_STATE_SHAKEHAND;
  691. do
  692. {
  693. int result = mbedtls_ssl_handshake_step( ctrl->ssl );
  694. switch(result)
  695. {
  696. case MBEDTLS_ERR_SSL_WANT_READ:
  697. return 1;
  698. case 0:
  699. break;
  700. default:
  701. #if MBEDTLS_VERSION_NUMBER >= 0x03000000
  702. #else
  703. DBG_ERR("0x%x, %d", -result, ctrl->ssl->state);
  704. #endif
  705. return -1;
  706. }
  707. #if MBEDTLS_VERSION_NUMBER >= 0x03000000
  708. }while(!mbedtls_ssl_is_handshake_over(ctrl->ssl));
  709. #else
  710. }while(ctrl->ssl->state != MBEDTLS_SSL_HANDSHAKE_OVER);
  711. #endif
  712. return 0;
  713. }
  714. else
  715. #endif
  716. {
  717. ctrl->state = NW_STATE_ONLINE;
  718. return 0;
  719. }
  720. default:
  721. return 1;
  722. }
  723. return -1;
  724. }
  725. static int network_state_shakehand(network_ctrl_t *ctrl, OS_EVENT *event, network_adapter_t *adapter)
  726. {
  727. if ((ctrl->need_close) || ((ctrl->wait_target_state != NW_WAIT_ON_LINE) && (ctrl->wait_target_state != NW_WAIT_TX_OK))) return -1;
  728. switch(event->ID)
  729. {
  730. case EV_NW_RESET:
  731. case EV_NW_SOCKET_ERROR:
  732. case EV_NW_SOCKET_REMOTE_CLOSE:
  733. case EV_NW_SOCKET_CLOSE_OK:
  734. ctrl->need_close = 1;
  735. return -1;
  736. case EV_NW_STATE:
  737. if (!event->Param2)
  738. {
  739. ctrl->need_close = 1;
  740. return -1;
  741. }
  742. break;
  743. case EV_NW_SOCKET_TX_OK:
  744. ctrl->ack_size += event->Param2;
  745. break;
  746. #ifdef LUAT_USE_TLS
  747. case EV_NW_SOCKET_RX_NEW:
  748. do
  749. {
  750. int result = mbedtls_ssl_handshake_step( ctrl->ssl );
  751. switch(result)
  752. {
  753. case MBEDTLS_ERR_SSL_WANT_READ:
  754. return 1;
  755. case 0:
  756. break;
  757. default:
  758. #if MBEDTLS_VERSION_NUMBER >= 0x03000000
  759. DBG_ERR("0x%x", -result);
  760. #else
  761. DBG_ERR("0x%x, %d", -result, ctrl->ssl->state);
  762. #endif
  763. ctrl->need_close = 1;
  764. return -1;
  765. }
  766. #if MBEDTLS_VERSION_NUMBER >= 0x03000000
  767. }while(!mbedtls_ssl_is_handshake_over(ctrl->ssl));
  768. #else
  769. }while(ctrl->ssl->state != MBEDTLS_SSL_HANDSHAKE_OVER);
  770. #endif
  771. ctrl->state = NW_STATE_ONLINE;
  772. if (NW_WAIT_TX_OK == ctrl->wait_target_state)
  773. {
  774. if (!ctrl->cache_data)
  775. {
  776. ctrl->need_close = 1;
  777. return -1;
  778. }
  779. int result = mbedtls_ssl_write(ctrl->ssl, ctrl->cache_data, ctrl->cache_len);
  780. free(ctrl->cache_data);
  781. ctrl->cache_data = NULL;
  782. ctrl->cache_len = 0;
  783. if (result < 0)
  784. {
  785. DBG("%08x", -result);
  786. ctrl->need_close = 1;
  787. return -1;
  788. }
  789. return 1;
  790. }
  791. return 0;
  792. #endif
  793. case EV_NW_SOCKET_CONNECT_OK:
  794. DBG_ERR("!");
  795. return 1;
  796. default:
  797. return 1;
  798. }
  799. return 1;
  800. }
  801. static int network_state_on_line(network_ctrl_t *ctrl, OS_EVENT *event, network_adapter_t *adapter)
  802. {
  803. if ((ctrl->need_close) || NW_WAIT_OFF_LINE == ctrl->wait_target_state)
  804. {
  805. return -1;
  806. }
  807. switch(event->ID)
  808. {
  809. case EV_NW_RESET:
  810. case EV_NW_SOCKET_ERROR:
  811. case EV_NW_SOCKET_REMOTE_CLOSE:
  812. case EV_NW_SOCKET_CLOSE_OK:
  813. ctrl->need_close = 1;
  814. return -1;
  815. case EV_NW_STATE:
  816. if (!event->Param2)
  817. {
  818. ctrl->need_close = 1;
  819. return -1;
  820. }
  821. break;
  822. case EV_NW_SOCKET_TX_OK:
  823. ctrl->ack_size += event->Param2;
  824. if (NW_WAIT_TX_OK == ctrl->wait_target_state)
  825. {
  826. if (ctrl->ack_size == ctrl->tx_size)
  827. {
  828. #ifdef LUAT_USE_LWIP
  829. if (ctrl->is_tcp)
  830. {
  831. if (ctrl->adapter_index < NW_ADAPTER_INDEX_LWIP_NETIF_QTY)
  832. {
  833. return net_lwip_check_all_ack(ctrl->socket_id);
  834. }
  835. else
  836. {
  837. return 0;
  838. }
  839. }
  840. return 0;
  841. #else
  842. return 0;
  843. #endif
  844. }
  845. }
  846. break;
  847. case EV_NW_SOCKET_RX_NEW:
  848. #ifdef LUAT_USE_TLS
  849. #if MBEDTLS_VERSION_NUMBER >= 0x03000000
  850. if (ctrl->tls_mode && !mbedtls_ssl_is_handshake_over(ctrl->ssl))
  851. #else
  852. if (ctrl->tls_mode && (ctrl->ssl->state != MBEDTLS_SSL_HANDSHAKE_OVER))
  853. #endif
  854. {
  855. DBG("rehandshaking");
  856. do
  857. {
  858. int result = mbedtls_ssl_handshake_step( ctrl->ssl );
  859. switch(result)
  860. {
  861. case MBEDTLS_ERR_SSL_WANT_READ:
  862. return 1;
  863. case 0:
  864. break;
  865. default:
  866. #if MBEDTLS_VERSION_NUMBER >= 0x03000000
  867. DBG_ERR("0x%x", -result);
  868. #else
  869. DBG_ERR("0x%x, %d", -result, ctrl->ssl->state);
  870. #endif
  871. ctrl->need_close = 1;
  872. return -1;
  873. }
  874. #if MBEDTLS_VERSION_NUMBER >= 0x03000000
  875. }while(!mbedtls_ssl_is_handshake_over(ctrl->ssl));
  876. #else
  877. }while(ctrl->ssl->state != MBEDTLS_SSL_HANDSHAKE_OVER);
  878. #endif
  879. }
  880. #endif
  881. ctrl->new_rx_flag = 1;
  882. if (NW_WAIT_TX_OK != ctrl->wait_target_state)
  883. {
  884. return 0;
  885. }
  886. break;
  887. default:
  888. return 1;
  889. }
  890. return 1;
  891. }
  892. static int network_state_listen(network_ctrl_t *ctrl, OS_EVENT *event, network_adapter_t *adapter)
  893. {
  894. if ((ctrl->need_close) || NW_WAIT_OFF_LINE == ctrl->wait_target_state)
  895. {
  896. return -1;
  897. }
  898. switch(event->ID)
  899. {
  900. case EV_NW_RESET:
  901. case EV_NW_SOCKET_ERROR:
  902. case EV_NW_SOCKET_REMOTE_CLOSE:
  903. case EV_NW_SOCKET_CLOSE_OK:
  904. ctrl->need_close = 1;
  905. return -1;
  906. case EV_NW_STATE:
  907. if (!event->Param2)
  908. {
  909. ctrl->need_close = 1;
  910. return -1;
  911. }
  912. break;
  913. case EV_NW_SOCKET_NEW_CONNECT:
  914. case EV_NW_SOCKET_CONNECT_OK:
  915. ctrl->state = NW_STATE_ONLINE;
  916. return 0;
  917. default:
  918. return 1;
  919. }
  920. return 1;
  921. }
  922. static int network_state_disconnecting(network_ctrl_t *ctrl, OS_EVENT *event, network_adapter_t *adapter)
  923. {
  924. if (ctrl->wait_target_state != NW_WAIT_OFF_LINE)
  925. {
  926. return -1;
  927. }
  928. switch(event->ID)
  929. {
  930. case EV_NW_RESET:
  931. case EV_NW_SOCKET_ERROR:
  932. case EV_NW_SOCKET_REMOTE_CLOSE:
  933. case EV_NW_SOCKET_CLOSE_OK:
  934. network_force_close_socket(ctrl);
  935. ctrl->state = NW_STATE_OFF_LINE;
  936. ctrl->socket_id = -1;
  937. return 0;
  938. case EV_NW_STATE:
  939. if (!event->Param2)
  940. {
  941. return -1;
  942. }
  943. else
  944. {
  945. network_force_close_socket(ctrl);
  946. ctrl->state = NW_STATE_OFF_LINE;
  947. ctrl->socket_id = -1;
  948. }
  949. break;
  950. default:
  951. return 1;
  952. }
  953. return -1;
  954. }
  955. typedef int (*network_state_fun)(network_ctrl_t *ctrl, OS_EVENT *event, network_adapter_t *adapter);
  956. static network_state_fun network_state_fun_list[]=
  957. {
  958. network_state_link_off,
  959. network_state_off_line,
  960. network_state_wait_dns,
  961. network_state_connecting,
  962. network_state_shakehand,
  963. network_state_on_line,
  964. network_state_listen,
  965. network_state_disconnecting,
  966. };
  967. static void network_default_statemachine(network_ctrl_t *ctrl, OS_EVENT *event, network_adapter_t *adapter)
  968. {
  969. int result = -1;
  970. NW_LOCK;
  971. if (ctrl->state > NW_STATE_DISCONNECTING)
  972. {
  973. ctrl->state = NW_STATE_LINK_OFF;
  974. event->Param1 = -1;
  975. network_force_close_socket(ctrl);
  976. event->ID = ctrl->wait_target_state + EV_NW_RESULT_BASE;
  977. }
  978. else
  979. {
  980. result = network_state_fun_list[ctrl->state](ctrl, event, adapter);
  981. if (result > 0)
  982. {
  983. NW_UNLOCK;
  984. if (ctrl->new_rx_flag && ctrl->user_callback)
  985. {
  986. event->ID = NW_WAIT_EVENT + EV_NW_RESULT_BASE;
  987. event->Param1 = 0;
  988. ctrl->user_callback(event, ctrl->user_data);
  989. }
  990. return ;
  991. }
  992. event->ID = (ctrl->wait_target_state?ctrl->wait_target_state:NW_WAIT_EVENT) + EV_NW_RESULT_BASE;
  993. event->Param1 = result;
  994. }
  995. if ((ctrl->state != NW_STATE_LISTEN) || (result < 0))
  996. {
  997. ctrl->wait_target_state = NW_WAIT_NONE;
  998. }
  999. NW_UNLOCK;
  1000. if (ctrl->task_handle)
  1001. {
  1002. platform_send_event(ctrl->task_handle, event->ID, event->Param1, event->Param2, event->Param3);
  1003. }
  1004. else if (ctrl->user_callback)
  1005. {
  1006. ctrl->user_callback(event, ctrl->user_data);
  1007. }
  1008. }
  1009. static int32_t network_default_socket_callback(void *data, void *param)
  1010. {
  1011. OS_EVENT *event = (OS_EVENT *)data;
  1012. OS_EVENT temp_event;
  1013. luat_network_cb_param_t *cb_param = (luat_network_cb_param_t *)param;
  1014. network_adapter_t *adapter =(network_adapter_t *)(cb_param->param);
  1015. int i;
  1016. network_ctrl_t *ctrl = (network_ctrl_t *)event->Param3;
  1017. if (event->ID > EV_NW_TIMEOUT)
  1018. {
  1019. if (ctrl && ((ctrl->tag == cb_param->tag) || (event->ID == EV_NW_DNS_RESULT)))
  1020. {
  1021. if ((event->ID == EV_NW_DNS_RESULT) && (ctrl->wait_target_state != NW_WAIT_ON_LINE))
  1022. {
  1023. DBG("socket event:%s,wait:%s", network_ctrl_event_id_string(event->ID), network_ctrl_wait_state_string(ctrl->wait_target_state));
  1024. return 0;
  1025. }
  1026. if (ctrl->auto_mode)
  1027. {
  1028. DBG("socket %d,event:%s,state:%s,wait:%s", ctrl->socket_id, network_ctrl_event_id_string(event->ID),
  1029. network_ctrl_state_string(ctrl->state),
  1030. network_ctrl_wait_state_string(ctrl->wait_target_state));
  1031. network_default_statemachine(ctrl, event, adapter);
  1032. DBG("socket %d,state:%s,wait:%s", ctrl->socket_id, network_ctrl_state_string(ctrl->state),network_ctrl_wait_state_string(ctrl->wait_target_state));
  1033. }
  1034. else if (ctrl->task_handle)
  1035. {
  1036. platform_send_event(ctrl->task_handle, event->ID, event->Param1, event->Param2, event->Param3);
  1037. }
  1038. else if (ctrl->user_callback)
  1039. {
  1040. ctrl->user_callback(event, ctrl->user_data);
  1041. }
  1042. }
  1043. else
  1044. {
  1045. DBG_ERR("cb ctrl invaild %x %08X", ctrl, event->ID);
  1046. DBG_HexPrintf(&ctrl->tag, 8);
  1047. DBG_HexPrintf(&cb_param->tag, 8);
  1048. }
  1049. }
  1050. else
  1051. {
  1052. for (i = 0; i < adapter->opt->max_socket_num; i++)
  1053. {
  1054. temp_event = *event;
  1055. if (adapter->ctrl_busy[i])
  1056. {
  1057. ctrl = &adapter->ctrl_table[i];
  1058. if (ctrl->adapter_index == (uint8_t)(event->Param3))
  1059. {
  1060. if (ctrl->auto_mode)
  1061. {
  1062. DBG("socket %d,event:%s,state:%s,wait:%s", ctrl->socket_id, network_ctrl_event_id_string(event->ID),
  1063. network_ctrl_state_string(ctrl->state),
  1064. network_ctrl_wait_state_string(ctrl->wait_target_state));
  1065. network_default_statemachine(ctrl, &temp_event, adapter);
  1066. DBG("socket %d,event:%s,wait:%s", ctrl->socket_id, network_ctrl_state_string(ctrl->state), network_ctrl_wait_state_string(ctrl->wait_target_state));
  1067. }
  1068. else if (ctrl->task_handle)
  1069. {
  1070. platform_send_event(ctrl->task_handle, event->ID, event->Param1, event->Param2, event->Param3);
  1071. }
  1072. else if (ctrl->user_callback)
  1073. {
  1074. ctrl->user_callback(&temp_event, ctrl->user_data);
  1075. }
  1076. }
  1077. }
  1078. }
  1079. }
  1080. return 0;
  1081. }
  1082. static LUAT_RT_RET_TYPE network_default_timer_callback(LUAT_RT_CB_PARAM)
  1083. {
  1084. platform_send_event(param, EV_NW_TIMEOUT, 0, 0, 0);
  1085. return LUAT_RT_RET;
  1086. }
  1087. #ifndef LUAT_USE_LWIP
  1088. uint8_t network_string_is_ipv4(const char *string, uint32_t len)
  1089. {
  1090. int i;
  1091. for(i = 0; i < len; i++)
  1092. {
  1093. if (!isdigit((int)string[i]) && (string[i] != '.'))
  1094. {
  1095. return 0;
  1096. }
  1097. }
  1098. return 1;
  1099. }
  1100. uint32_t network_string_to_ipv4(const char *string, uint32_t len)
  1101. {
  1102. int i;
  1103. int8_t Buf[4][4];
  1104. CmdParam CP;
  1105. PV_Union uIP;
  1106. char temp[32];
  1107. memset(Buf, 0, sizeof(Buf));
  1108. CP.param_max_len = 4;
  1109. CP.param_max_num = 4;
  1110. CP.param_num = 0;
  1111. CP.param_str = (int8_t *)Buf;
  1112. memcpy(temp, string, len);
  1113. temp[len] = 0;
  1114. CmdParseParam((int8_t*)temp, &CP, '.');
  1115. for(i = 0; i < 4; i++)
  1116. {
  1117. uIP.u8[i] = strtol((char *)Buf[i], NULL, 10);
  1118. }
  1119. // DBG("%d.%d.%d.%d", uIP.u8[0], uIP.u8[1], uIP.u8[2], uIP.u8[3]);
  1120. return uIP.u32;
  1121. }
  1122. #define SWAP(x) ((((x) & (uint32_t)0x000000ffUL) << 24) | \
  1123. (((x) & (uint32_t)0x0000ff00UL) << 8) | \
  1124. (((x) & (uint32_t)0x00ff0000UL) >> 8) | \
  1125. (((x) & (uint32_t)0xff000000UL) >> 24))
  1126. int network_string_to_ipv6(const char *string, luat_ip_addr_t *ip_addr)
  1127. {
  1128. uint32_t addr_index, zero_blocks, current_block_index, current_block_value;
  1129. const char *s;
  1130. ip_addr->is_ipv6 = 0xff;
  1131. /* Count the number of colons, to count the number of blocks in a "::" sequence
  1132. zero_blocks may be 1 even if there are no :: sequences */
  1133. zero_blocks = 8;
  1134. for (s = string; *s != 0; s++) {
  1135. if (*s == ':') {
  1136. zero_blocks--;
  1137. } else if (!isxdigit((int)*s)) {
  1138. break;
  1139. }
  1140. }
  1141. /* parse each block */
  1142. addr_index = 0;
  1143. current_block_index = 0;
  1144. current_block_value = 0;
  1145. for (s = string; *s != 0; s++) {
  1146. if (*s == ':') {
  1147. if (current_block_index & 0x1) {
  1148. ip_addr->ipv6_u32_addr[addr_index++] |= current_block_value;
  1149. }
  1150. else {
  1151. ip_addr->ipv6_u32_addr[addr_index] = current_block_value << 16;
  1152. }
  1153. current_block_index++;
  1154. current_block_value = 0;
  1155. if (current_block_index > 7) {
  1156. /* address too long! */
  1157. return 0;
  1158. }
  1159. if (s[1] == ':') {
  1160. if (s[2] == ':') {
  1161. /* invalid format: three successive colons */
  1162. return 0;
  1163. }
  1164. s++;
  1165. /* "::" found, set zeros */
  1166. while (zero_blocks > 0) {
  1167. zero_blocks--;
  1168. if (current_block_index & 0x1) {
  1169. addr_index++;
  1170. } else {
  1171. ip_addr->ipv6_u32_addr[addr_index] = 0;
  1172. }
  1173. current_block_index++;
  1174. if (current_block_index > 7) {
  1175. /* address too long! */
  1176. return 0;
  1177. }
  1178. }
  1179. }
  1180. } else if (isxdigit((int)*s)) {
  1181. /* add current digit */
  1182. current_block_value = (current_block_value << 4) +
  1183. (isxdigit((int)*s) ? (uint32_t)(*s - '0') :
  1184. (uint32_t)(10 + (isxdigit((int)*s) ? *s - 'a' : *s - 'A')));
  1185. } else {
  1186. /* unexpected digit, space? CRLF? */
  1187. break;
  1188. }
  1189. }
  1190. if (current_block_index & 0x1) {
  1191. ip_addr->ipv6_u32_addr[addr_index++] |= current_block_value;
  1192. }
  1193. else {
  1194. ip_addr->ipv6_u32_addr[addr_index] = current_block_value << 16;
  1195. }
  1196. /* convert to network byte order. */
  1197. for (addr_index = 0; addr_index < 4; addr_index++) {
  1198. ip_addr->ipv6_u32_addr[addr_index] = SWAP(ip_addr->ipv6_u32_addr[addr_index]);
  1199. }
  1200. if (current_block_index != 7) {
  1201. return 0;
  1202. }
  1203. ip_addr->is_ipv6 = 1;
  1204. return 1;
  1205. }
  1206. #endif
  1207. int network_get_last_register_adapter(void)
  1208. {
  1209. if (prv_network.default_adapter_index != -1) return prv_network.default_adapter_index;
  1210. return prv_network.last_adapter_index;
  1211. }
  1212. void network_register_set_default(uint8_t adapter_index)
  1213. {
  1214. prv_network.default_adapter_index = adapter_index;
  1215. }
  1216. int network_register_adapter(uint8_t adapter_index, network_adapter_info *info, void *user_data)
  1217. {
  1218. prv_adapter_table[adapter_index].opt = info;
  1219. prv_adapter_table[adapter_index].user_data = user_data;
  1220. info->socket_set_callback(network_default_socket_callback, &prv_adapter_table[adapter_index], user_data);
  1221. #ifdef LUAT_USE_LWIP
  1222. if (adapter_index < NW_ADAPTER_INDEX_HW_PS_DEVICE)
  1223. {
  1224. prv_adapter_table[adapter_index].ctrl_table = prv_network.lwip_ctrl_table;
  1225. prv_adapter_table[adapter_index].ctrl_busy = prv_network.lwip_ctrl_busy;
  1226. }
  1227. else
  1228. #endif
  1229. {
  1230. prv_adapter_table[adapter_index].ctrl_table = zalloc((info->max_socket_num) * sizeof(network_ctrl_t));
  1231. prv_adapter_table[adapter_index].ctrl_busy = zalloc(info->max_socket_num);
  1232. }
  1233. prv_adapter_table[adapter_index].port = 60000;
  1234. if (!prv_network.is_init)
  1235. {
  1236. //prv_network.network_mutex = platform_create_mutex();
  1237. INIT_LLIST_HEAD(&prv_network.dns_cache_head);
  1238. prv_network.is_init = 0;
  1239. }
  1240. prv_network.last_adapter_index = adapter_index;
  1241. return 0;
  1242. }
  1243. void network_set_dns_server(uint8_t adapter_index, uint8_t server_index, luat_ip_addr_t *ip)
  1244. {
  1245. network_adapter_t *adapter = &prv_adapter_table[adapter_index];
  1246. adapter->opt->set_dns_server(server_index, ip, adapter->user_data);
  1247. }
  1248. /*
  1249. * 申请一个network_ctrl
  1250. */
  1251. network_ctrl_t *network_alloc_ctrl(uint8_t adapter_index)
  1252. {
  1253. int i;
  1254. network_ctrl_t *ctrl = NULL;
  1255. network_adapter_t *adapter = &prv_adapter_table[adapter_index];
  1256. OS_LOCK;
  1257. for (i = 0; i < adapter->opt->max_socket_num; i++)
  1258. {
  1259. if (!adapter->ctrl_busy[i])
  1260. {
  1261. adapter->ctrl_busy[i] = 1;
  1262. ctrl = &adapter->ctrl_table[i];
  1263. ctrl->adapter_index = adapter_index;
  1264. ctrl->domain_ipv6 = 0;
  1265. break;
  1266. }
  1267. }
  1268. OS_UNLOCK;
  1269. if (i >= adapter->opt->max_socket_num) {DBG_ERR("adapter no more ctrl!");}
  1270. return ctrl;
  1271. }
  1272. /*
  1273. * 归还一个network_ctrl
  1274. */
  1275. void network_release_ctrl(network_ctrl_t *ctrl)
  1276. {
  1277. int i;
  1278. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1279. NW_UNLOCK;
  1280. OS_LOCK;
  1281. for (i = 0; i < adapter->opt->max_socket_num; i++)
  1282. {
  1283. if (&adapter->ctrl_table[i] == ctrl)
  1284. {
  1285. network_deinit_tls(ctrl);
  1286. if (ctrl->timer)
  1287. {
  1288. platform_stop_timer(ctrl->timer);
  1289. platform_release_timer(ctrl->timer);
  1290. ctrl->timer = NULL;
  1291. }
  1292. if (ctrl->cache_data)
  1293. {
  1294. free(ctrl->cache_data);
  1295. ctrl->cache_data = NULL;
  1296. }
  1297. if (ctrl->dns_ip)
  1298. {
  1299. free(ctrl->dns_ip);
  1300. ctrl->dns_ip = NULL;
  1301. }
  1302. if (ctrl->domain_name)
  1303. {
  1304. free(ctrl->domain_name);
  1305. ctrl->domain_name = NULL;
  1306. }
  1307. adapter->ctrl_busy[i] = 0;
  1308. platform_release_mutex(ctrl->mutex);
  1309. ctrl->mutex = NULL;
  1310. break;
  1311. }
  1312. }
  1313. OS_UNLOCK;
  1314. if (i >= adapter->opt->max_socket_num) {DBG_ERR("adapter index maybe error!, %d, %x", ctrl->adapter_index, ctrl);}
  1315. }
  1316. void network_init_ctrl(network_ctrl_t *ctrl, HANDLE task_handle, CBFuncEx_t callback, void *param)
  1317. {
  1318. uint8_t adapter_index = ctrl->adapter_index;
  1319. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1320. if (ctrl->dns_ip)
  1321. {
  1322. free(ctrl->dns_ip);
  1323. ctrl->dns_ip = NULL;
  1324. }
  1325. if (ctrl->cache_data)
  1326. {
  1327. free(ctrl->cache_data);
  1328. ctrl->cache_data = NULL;
  1329. }
  1330. if (ctrl->domain_name)
  1331. {
  1332. free(ctrl->domain_name);
  1333. ctrl->domain_name = NULL;
  1334. }
  1335. HANDLE sem = ctrl->mutex;
  1336. memset(ctrl, 0, sizeof(network_ctrl_t));
  1337. ctrl->adapter_index = adapter_index;
  1338. ctrl->task_handle = task_handle;
  1339. ctrl->user_callback = callback;
  1340. ctrl->user_data = param;
  1341. ctrl->socket_id = -1;
  1342. ctrl->socket_param = ctrl;
  1343. network_set_ip_invaild(&ctrl->remote_ip);
  1344. ctrl->mutex = sem;
  1345. if (task_handle)
  1346. {
  1347. ctrl->timer = platform_create_timer(network_default_timer_callback, task_handle, NULL);
  1348. }
  1349. if (!ctrl->mutex)
  1350. {
  1351. ctrl->mutex = platform_create_mutex();
  1352. }
  1353. }
  1354. void network_set_base_mode(network_ctrl_t *ctrl, uint8_t is_tcp, uint32_t tcp_timeout_ms, uint8_t keep_alive, uint32_t keep_idle, uint8_t keep_interval, uint8_t keep_cnt)
  1355. {
  1356. ctrl->is_tcp = is_tcp;
  1357. ctrl->tcp_keep_alive = keep_alive;
  1358. ctrl->tcp_keep_idle = keep_idle;
  1359. ctrl->tcp_keep_interval = keep_interval;
  1360. ctrl->tcp_keep_cnt = keep_cnt;
  1361. ctrl->tcp_timeout_ms = tcp_timeout_ms;
  1362. }
  1363. void network_connect_ipv6_domain(network_ctrl_t *ctrl, uint8_t onoff)
  1364. {
  1365. ctrl->domain_ipv6 = onoff;
  1366. }
  1367. int network_set_local_port(network_ctrl_t *ctrl, uint16_t local_port)
  1368. {
  1369. int i;
  1370. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1371. if (local_port)
  1372. {
  1373. OS_LOCK;
  1374. for (i = 0; i < adapter->opt->max_socket_num; i++)
  1375. {
  1376. if (&adapter->ctrl_table[i] != ctrl)
  1377. {
  1378. if (adapter->ctrl_table[i].local_port == local_port)
  1379. {
  1380. OS_UNLOCK;
  1381. return -1;
  1382. }
  1383. }
  1384. }
  1385. ctrl->local_port = local_port;
  1386. OS_UNLOCK;
  1387. return 0;
  1388. }
  1389. else
  1390. {
  1391. ctrl->local_port = 0;
  1392. #if 0
  1393. if (ctrl->adapter_index < NW_ADAPTER_INDEX_LWIP_NETIF_QTY)
  1394. {
  1395. ctrl->local_port = 0;
  1396. return 0;
  1397. }
  1398. OS_LOCK;
  1399. adapter->port++;
  1400. if (adapter->port < 60000)
  1401. {
  1402. adapter->port = 60000;
  1403. }
  1404. ctrl->local_port = adapter->port;
  1405. OS_UNLOCK;
  1406. #endif
  1407. return 0;
  1408. }
  1409. }
  1410. int network_create_soceket(network_ctrl_t *ctrl, uint8_t is_ipv6)
  1411. {
  1412. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1413. ctrl->socket_id = adapter->opt->create_soceket(ctrl->is_tcp, &ctrl->tag, ctrl->socket_param, is_ipv6, adapter->user_data);
  1414. if (ctrl->socket_id < 0)
  1415. {
  1416. ctrl->tag = 0;
  1417. return -1;
  1418. }
  1419. return 0;
  1420. }
  1421. int network_socket_connect(network_ctrl_t *ctrl, luat_ip_addr_t *remote_ip)
  1422. {
  1423. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1424. ctrl->is_server_mode = 0;
  1425. ctrl->online_ip = remote_ip;
  1426. uint16_t local_port = ctrl->local_port;
  1427. if (!local_port)
  1428. {
  1429. if (ctrl->adapter_index >= NW_ADAPTER_INDEX_HW_PS_DEVICE)
  1430. {
  1431. adapter->port += 100;
  1432. local_port = adapter->port;
  1433. if (adapter->port < 60000)
  1434. {
  1435. adapter->port = 60000;
  1436. }
  1437. if (local_port < 60000)
  1438. {
  1439. local_port = 60000;
  1440. }
  1441. local_port += ctrl->socket_id;
  1442. DBG("%d,%d,%d", ctrl->socket_id, local_port, adapter->port);
  1443. }
  1444. }
  1445. return adapter->opt->socket_connect(ctrl->socket_id, ctrl->tag, local_port, remote_ip, ctrl->remote_port, adapter->user_data);
  1446. }
  1447. int network_socket_listen(network_ctrl_t *ctrl)
  1448. {
  1449. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1450. ctrl->is_server_mode = 1;
  1451. return adapter->opt->socket_listen(ctrl->socket_id, ctrl->tag, ctrl->local_port, adapter->user_data);
  1452. }
  1453. uint8_t network_accept_enable(network_ctrl_t *ctrl)
  1454. {
  1455. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1456. return !(adapter->opt->no_accept);
  1457. }
  1458. //作为server接受一个client
  1459. //成功返回0,失败 < 0
  1460. int network_socket_accept(network_ctrl_t *ctrl, network_ctrl_t *accept_ctrl)
  1461. {
  1462. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1463. if (adapter->opt->no_accept)
  1464. {
  1465. // DBG("%x,%d,%llu,%x,%x,%x",adapter->opt->socket_accept, ctrl->socket_id, ctrl->tag, &ctrl->remote_ip, &ctrl->remote_port, adapter->user_data);
  1466. adapter->opt->socket_accept(ctrl->socket_id, ctrl->tag, &ctrl->remote_ip, &ctrl->remote_port, adapter->user_data);
  1467. return 0;
  1468. }
  1469. accept_ctrl->socket_id = adapter->opt->socket_accept(ctrl->socket_id, ctrl->tag, &accept_ctrl->remote_ip, &accept_ctrl->remote_port, adapter->user_data);
  1470. if (accept_ctrl->socket_id < 0)
  1471. {
  1472. return -1;
  1473. }
  1474. else
  1475. {
  1476. accept_ctrl->is_tcp = ctrl->is_tcp;
  1477. accept_ctrl->tcp_keep_alive = ctrl->tcp_keep_alive;
  1478. accept_ctrl->tcp_keep_idle = ctrl->tcp_keep_idle;
  1479. accept_ctrl->tcp_keep_interval = ctrl->tcp_keep_interval;
  1480. accept_ctrl->tcp_keep_cnt = ctrl->tcp_keep_cnt;
  1481. accept_ctrl->tcp_timeout_ms = ctrl->tcp_timeout_ms;
  1482. accept_ctrl->local_port = ctrl->local_port;
  1483. accept_ctrl->state = NW_STATE_ONLINE;
  1484. return 0;
  1485. }
  1486. }
  1487. //主动断开一个tcp连接,需要走完整个tcp流程,用户需要接收到close ok回调才能确认彻底断开
  1488. //成功返回0,失败 < 0
  1489. int network_socket_disconnect(network_ctrl_t *ctrl)
  1490. {
  1491. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1492. if (ctrl->socket_id >= 0)
  1493. {
  1494. return adapter->opt->socket_disconnect(ctrl->socket_id, ctrl->tag, adapter->user_data);
  1495. }
  1496. return 0;
  1497. }
  1498. //释放掉socket的控制权
  1499. //成功返回0,失败 < 0
  1500. int network_socket_close(network_ctrl_t *ctrl)
  1501. {
  1502. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1503. if (ctrl->socket_id >= 0)
  1504. {
  1505. return adapter->opt->socket_close(ctrl->socket_id, ctrl->tag, adapter->user_data);
  1506. }
  1507. return 0;
  1508. }
  1509. //强行释放掉socket的控制权
  1510. //成功返回0,失败 < 0
  1511. int network_socket_force_close(network_ctrl_t *ctrl)
  1512. {
  1513. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1514. if (ctrl->socket_id >= 0)
  1515. {
  1516. adapter->opt->socket_force_close(ctrl->socket_id, adapter->user_data);
  1517. }
  1518. ctrl->socket_id = -1;
  1519. return 0;
  1520. }
  1521. //tcp时,不需要remote_ip和remote_port,如果buf为NULL,则返回当前缓存区的数据量,当返回值小于len时说明已经读完了
  1522. //udp时,只返回1个block数据,需要多次读直到没有数据为止
  1523. //成功返回实际读取的值,失败 < 0
  1524. int network_socket_receive(network_ctrl_t *ctrl,uint8_t *buf, uint32_t len, int flags, luat_ip_addr_t *remote_ip, uint16_t *remote_port)
  1525. {
  1526. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1527. return adapter->opt->socket_receive(ctrl->socket_id, ctrl->tag, buf, len, flags, remote_ip, remote_port, adapter->user_data);
  1528. }
  1529. //tcp时,不需要remote_ip和remote_port
  1530. //成功返回0,失败 < 0
  1531. int network_socket_send(network_ctrl_t *ctrl,const uint8_t *buf, uint32_t len, int flags, luat_ip_addr_t *remote_ip, uint16_t remote_port)
  1532. {
  1533. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1534. return adapter->opt->socket_send(ctrl->socket_id, ctrl->tag, buf, len, flags, remote_ip, remote_port, adapter->user_data);
  1535. }
  1536. int network_getsockopt(network_ctrl_t *ctrl, int level, int optname, void *optval, uint32_t *optlen)
  1537. {
  1538. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1539. return adapter->opt->getsockopt(ctrl->socket_id, ctrl->tag, level, optname, optval, optlen, adapter->user_data);
  1540. }
  1541. int network_setsockopt(network_ctrl_t *ctrl, int level, int optname, const void *optval, uint32_t optlen)
  1542. {
  1543. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1544. return adapter->opt->setsockopt(ctrl->socket_id, ctrl->tag, level, optname, optval, optlen, adapter->user_data);
  1545. }
  1546. //非posix的socket,用这个根据实际硬件设置参数
  1547. int network_user_cmd(network_ctrl_t *ctrl, uint32_t cmd, uint32_t value)
  1548. {
  1549. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1550. return adapter->opt->user_cmd(ctrl->socket_id, ctrl->tag, cmd, value, adapter->user_data);
  1551. }
  1552. int network_dns(network_ctrl_t *ctrl)
  1553. {
  1554. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1555. if (ctrl->domain_ipv6)
  1556. {
  1557. return adapter->opt->dns_ipv6(ctrl->domain_name, ctrl->domain_name_len, ctrl, adapter->user_data);
  1558. }
  1559. else
  1560. {
  1561. return adapter->opt->dns(ctrl->domain_name, ctrl->domain_name_len, ctrl, adapter->user_data);
  1562. }
  1563. }
  1564. int network_set_mac(uint8_t adapter_index, uint8_t *mac)
  1565. {
  1566. network_adapter_t *adapter = &prv_adapter_table[adapter_index];
  1567. return adapter->opt->set_mac(mac, adapter->user_data);
  1568. }
  1569. int network_set_static_ip_info(uint8_t adapter_index, luat_ip_addr_t *ip, luat_ip_addr_t *submask, luat_ip_addr_t *gateway, luat_ip_addr_t *ipv6)
  1570. {
  1571. network_adapter_t *adapter = &prv_adapter_table[adapter_index];
  1572. return adapter->opt->set_static_ip(ip, submask, gateway, ipv6, adapter->user_data);
  1573. }
  1574. int network_get_local_ip_info(network_ctrl_t *ctrl, luat_ip_addr_t *ip, luat_ip_addr_t *submask, luat_ip_addr_t *gateway)
  1575. {
  1576. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1577. return adapter->opt->get_local_ip_info(ip, submask, gateway, adapter->user_data);
  1578. }
  1579. int network_get_full_local_ip_info(network_ctrl_t *ctrl, uint8_t index, luat_ip_addr_t *ip, luat_ip_addr_t *submask, luat_ip_addr_t *gateway, luat_ip_addr_t *ipv6)
  1580. {
  1581. network_adapter_t *adapter;
  1582. if (ctrl)
  1583. {
  1584. adapter = &prv_adapter_table[ctrl->adapter_index];
  1585. }
  1586. else
  1587. {
  1588. adapter = &prv_adapter_table[index];
  1589. }
  1590. return adapter->opt->get_full_ip_info(ip, submask, gateway, ipv6, adapter->user_data);
  1591. }
  1592. void network_force_close_socket(network_ctrl_t *ctrl)
  1593. {
  1594. #ifdef LUAT_USE_TLS
  1595. if (ctrl->tls_mode)
  1596. {
  1597. mbedtls_ssl_free(ctrl->ssl);
  1598. }
  1599. #endif
  1600. if (network_socket_close(ctrl))
  1601. {
  1602. network_clean_invaild_socket(ctrl->adapter_index);
  1603. network_socket_force_close(ctrl);
  1604. }
  1605. ctrl->need_close = 0;
  1606. ctrl->socket_id = -1;
  1607. ctrl->new_rx_flag = 0;
  1608. if (ctrl->dns_ip)
  1609. {
  1610. free(ctrl->dns_ip);
  1611. ctrl->dns_ip = NULL;
  1612. }
  1613. if (ctrl->domain_name)
  1614. {
  1615. free(ctrl->domain_name);
  1616. ctrl->domain_name = NULL;
  1617. }
  1618. ctrl->dns_ip_cnt = 0;
  1619. ctrl->dns_ip_nums = 0;
  1620. ctrl->wait_target_state = NW_WAIT_NONE;
  1621. }
  1622. void network_clean_invaild_socket(uint8_t adapter_index)
  1623. {
  1624. int i;
  1625. int *list;
  1626. network_adapter_t *adapter = &prv_adapter_table[adapter_index];
  1627. network_ctrl_t *ctrl;
  1628. list = malloc(adapter->opt->max_socket_num * sizeof(int));
  1629. OS_LOCK;
  1630. for (i = 0; i < adapter->opt->max_socket_num; i++)
  1631. {
  1632. ctrl = &adapter->ctrl_table[i];
  1633. if (!adapter->opt->socket_check(ctrl->socket_id, ctrl->tag, adapter->user_data))
  1634. {
  1635. list[i] = ctrl->socket_id;
  1636. }
  1637. else
  1638. {
  1639. ctrl->socket_id = -1;
  1640. list[i] = -1;
  1641. }
  1642. DBG("%d,%d", i, list[i]);
  1643. }
  1644. OS_UNLOCK;
  1645. adapter->opt->socket_clean(list, adapter->opt->max_socket_num, adapter->user_data);
  1646. free(list);
  1647. }
  1648. #ifdef LUAT_USE_TLS
  1649. static int tls_verify(void *ctx, mbedtls_x509_crt *crt, int Index, uint32_t *result)
  1650. {
  1651. network_ctrl_t *ctrl = (network_ctrl_t *)ctx;
  1652. DBG("%d, %08x", Index, *result);
  1653. return 0;
  1654. }
  1655. #endif
  1656. int network_set_psk_info(network_ctrl_t *ctrl,
  1657. const unsigned char *psk, size_t psk_len,
  1658. const unsigned char *psk_identity, size_t psk_identity_len)
  1659. {
  1660. #ifdef LUAT_USE_TLS
  1661. if (!ctrl->tls_mode)
  1662. {
  1663. return -ERROR_PERMISSION_DENIED;
  1664. }
  1665. // DBG("%.*s, %.*s", psk_len, psk, psk_identity_len, psk_identity);
  1666. int ret = mbedtls_ssl_conf_psk( ctrl->config,
  1667. psk, psk_len, psk_identity, psk_identity_len );
  1668. if (ret != 0)
  1669. {
  1670. DBG("0x%x", -ret);
  1671. return -ERROR_OPERATION_FAILED;
  1672. }
  1673. return ERROR_NONE;
  1674. #else
  1675. return -1;
  1676. #endif
  1677. }
  1678. int network_set_server_cert(network_ctrl_t *ctrl, const unsigned char *cert, size_t cert_len)
  1679. {
  1680. #ifdef LUAT_USE_TLS
  1681. int ret;
  1682. if (!ctrl->tls_mode)
  1683. {
  1684. return -ERROR_PERMISSION_DENIED;
  1685. }
  1686. ret = mbedtls_x509_crt_parse( ctrl->ca_cert, cert, cert_len);
  1687. if (ret != 0)
  1688. {
  1689. DBG("%08x", -ret);
  1690. return -ERROR_OPERATION_FAILED;
  1691. }
  1692. return ERROR_NONE;
  1693. #else
  1694. return -1;
  1695. #endif
  1696. }
  1697. int network_set_client_cert(network_ctrl_t *ctrl,
  1698. const unsigned char *cert, size_t certLen,
  1699. const unsigned char *key, size_t keylen,
  1700. const unsigned char *pwd, size_t pwdlen)
  1701. {
  1702. #ifdef LUAT_USE_TLS
  1703. int ret;
  1704. mbedtls_x509_crt *client_cert = NULL;
  1705. mbedtls_pk_context *pkey = NULL;
  1706. if (!ctrl->tls_mode)
  1707. {
  1708. return -ERROR_PERMISSION_DENIED;
  1709. }
  1710. client_cert = zalloc(sizeof(mbedtls_x509_crt));
  1711. pkey = zalloc(sizeof(mbedtls_pk_context));
  1712. if (!client_cert || !pkey)
  1713. {
  1714. goto ERROR_OUT;
  1715. }
  1716. ret = mbedtls_x509_crt_parse( client_cert, cert, certLen );
  1717. if (ret != 0)
  1718. {
  1719. DBG("%08x", -ret);
  1720. goto ERROR_OUT;
  1721. }
  1722. #if MBEDTLS_VERSION_NUMBER >= 0x03000000
  1723. ret = mbedtls_pk_parse_key( pkey, key, keylen, pwd, pwdlen , tls_random, NULL);
  1724. #else
  1725. ret = mbedtls_pk_parse_key( pkey, key, keylen, pwd, pwdlen );
  1726. #endif
  1727. if (ret != 0)
  1728. {
  1729. DBG("%08x", -ret);
  1730. goto ERROR_OUT;
  1731. }
  1732. ret = mbedtls_ssl_conf_own_cert( ctrl->config, client_cert, pkey );
  1733. if (ret != 0)
  1734. {
  1735. DBG("%08x", -ret);
  1736. goto ERROR_OUT;
  1737. }
  1738. return ERROR_NONE;
  1739. ERROR_OUT:
  1740. if (client_cert) free(client_cert);
  1741. if (pkey) free(pkey);
  1742. return -1;
  1743. #else
  1744. return -1;
  1745. #endif
  1746. }
  1747. int network_cert_verify_result(network_ctrl_t *ctrl)
  1748. {
  1749. #ifdef LUAT_USE_TLS
  1750. if (!ctrl->tls_mode)
  1751. {
  1752. return -1;
  1753. }
  1754. return mbedtls_ssl_get_verify_result(ctrl->ssl);
  1755. #else
  1756. return -1;
  1757. #endif
  1758. }
  1759. static int tls_random( void *p_rng,
  1760. unsigned char *output, size_t output_len )
  1761. {
  1762. platform_random((char*)output, output_len);
  1763. return 0;
  1764. }
  1765. int network_init_tls(network_ctrl_t *ctrl, int verify_mode)
  1766. {
  1767. #ifdef LUAT_USE_TLS
  1768. ctrl->tls_mode = 1;
  1769. if (!ctrl->ssl)
  1770. {
  1771. ctrl->ssl = zalloc(sizeof(mbedtls_ssl_context));
  1772. ctrl->ca_cert = zalloc(sizeof(mbedtls_x509_crt));
  1773. ctrl->config = zalloc(sizeof(mbedtls_ssl_config));
  1774. mbedtls_ssl_config_defaults( ctrl->config, MBEDTLS_SSL_IS_CLIENT, ctrl->is_tcp?MBEDTLS_SSL_TRANSPORT_STREAM:MBEDTLS_SSL_TRANSPORT_DATAGRAM, MBEDTLS_SSL_PRESET_DEFAULT);
  1775. // ctrl->config->authmode = verify_mode;
  1776. mbedtls_ssl_conf_authmode(ctrl->config, verify_mode);
  1777. // ctrl->config->hs_timeout_min = 20000;
  1778. #if defined(MBEDTLS_SSL_PROTO_DTLS)
  1779. mbedtls_ssl_conf_handshake_timeout(ctrl->config, 2000, MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MAX);
  1780. #endif
  1781. // ctrl->config->f_rng = tls_random;
  1782. // ctrl->config->p_rng = NULL;
  1783. mbedtls_ssl_conf_rng(ctrl->config, tls_random, NULL);
  1784. // ctrl->config->f_dbg = tls_dbg;
  1785. // ctrl->config->p_dbg = NULL;
  1786. mbedtls_ssl_conf_dbg(ctrl->config, tls_dbg, NULL);
  1787. // ctrl->config->f_vrfy = tls_verify;
  1788. // ctrl->config->p_vrfy = ctrl;
  1789. mbedtls_ssl_conf_verify(ctrl->config, tls_verify, ctrl);
  1790. // ctrl->config->ca_chain = ctrl->ca_cert;
  1791. mbedtls_ssl_conf_ca_chain(ctrl->config, ctrl->ca_cert, NULL);
  1792. // ctrl->config->read_timeout = 20000;
  1793. mbedtls_ssl_conf_read_timeout(ctrl->config, 20000);
  1794. #ifdef MBEDTLS_SSL_RENEGOTIATION
  1795. mbedtls_ssl_conf_renegotiation(ctrl->config, MBEDTLS_SSL_RENEGOTIATION_ENABLED);
  1796. mbedtls_ssl_conf_legacy_renegotiation(ctrl->config, MBEDTLS_SSL_LEGACY_ALLOW_RENEGOTIATION);
  1797. #endif
  1798. ctrl->tls_long_timer = platform_create_timer(tls_longtimeout, ctrl, NULL);
  1799. ctrl->tls_short_timer = platform_create_timer(tls_shorttimeout, ctrl, NULL);
  1800. }
  1801. ctrl->tls_timer_state = -1;
  1802. return 0;
  1803. #else
  1804. DBG("NOT SUPPORT TLS");
  1805. return -1;
  1806. #endif
  1807. }
  1808. void network_deinit_tls(network_ctrl_t *ctrl)
  1809. {
  1810. #ifdef LUAT_USE_TLS
  1811. if (ctrl->ssl)
  1812. {
  1813. mbedtls_ssl_free(ctrl->ssl);
  1814. free(ctrl->ssl);
  1815. ctrl->ssl = NULL;
  1816. }
  1817. if (ctrl->config)
  1818. {
  1819. mbedtls_ssl_config_free(ctrl->config);
  1820. free(ctrl->config);
  1821. ctrl->config = NULL;
  1822. }
  1823. if (ctrl->ca_cert)
  1824. {
  1825. mbedtls_x509_crt_free(ctrl->ca_cert);
  1826. free(ctrl->ca_cert);
  1827. ctrl->ca_cert = NULL;
  1828. }
  1829. ctrl->tls_mode = 0;
  1830. ctrl->tls_timer_state = -1;
  1831. if (ctrl->tls_short_timer)
  1832. {
  1833. platform_release_timer(ctrl->tls_short_timer);
  1834. ctrl->tls_short_timer = NULL;
  1835. }
  1836. if (ctrl->tls_long_timer)
  1837. {
  1838. platform_release_timer(ctrl->tls_long_timer);
  1839. ctrl->tls_long_timer = NULL;
  1840. }
  1841. #endif
  1842. }
  1843. int network_wait_link_up(network_ctrl_t *ctrl, uint32_t timeout_ms)
  1844. {
  1845. NW_LOCK;
  1846. ctrl->auto_mode = 1;
  1847. // network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1848. if (network_check_ready(ctrl, 0))
  1849. {
  1850. ctrl->state = NW_STATE_OFF_LINE;
  1851. ctrl->wait_target_state = NW_WAIT_NONE;
  1852. NW_UNLOCK;
  1853. return 0;
  1854. }
  1855. ctrl->state = NW_STATE_LINK_OFF;
  1856. ctrl->wait_target_state = NW_WAIT_LINK_UP;
  1857. NW_UNLOCK;
  1858. if (!ctrl->task_handle || !timeout_ms)
  1859. {
  1860. return 1;
  1861. }
  1862. uint8_t finish = 0;
  1863. OS_EVENT event;
  1864. int result;
  1865. //DBG_INFO("%s wait for active!,%u,%x", Net->Tag, To * SYS_TICK, Net->hTask);
  1866. platform_start_timer(ctrl->timer, timeout_ms, 0);
  1867. while (!finish)
  1868. {
  1869. platform_wait_event(ctrl->task_handle, 0, &event, NULL, 0);
  1870. switch (event.ID)
  1871. {
  1872. case EV_NW_RESULT_LINK:
  1873. result = (int)event.Param1;
  1874. finish = 1;
  1875. break;
  1876. case EV_NW_TIMEOUT:
  1877. result = -1;
  1878. finish = 1;
  1879. break;
  1880. default:
  1881. if (ctrl->user_callback)
  1882. {
  1883. ctrl->user_callback((void *)&event, ctrl->user_data);
  1884. }
  1885. break;
  1886. }
  1887. }
  1888. platform_stop_timer(ctrl->timer);
  1889. return result;
  1890. }
  1891. /*
  1892. * 1.进行ready检测和等待ready
  1893. * 2.有remote_ip则开始连接服务器并等待连接结果
  1894. * 3.没有remote_ip则开始对url进行dns解析,解析完成后对所有ip进行尝试连接直到有个成功或者全部失败
  1895. * 4.如果是加密模式,还要走握手环节,等到握手环节完成后才能返回结果
  1896. * local_port如果为0则api内部自动生成一个
  1897. */
  1898. int network_connect(network_ctrl_t *ctrl, const char *domain_name, uint32_t domain_name_len, luat_ip_addr_t *remote_ip, uint16_t remote_port, uint32_t timeout_ms)
  1899. {
  1900. if (ctrl->socket_id >= 0)
  1901. {
  1902. return -1;
  1903. }
  1904. NW_LOCK;
  1905. ctrl->is_server_mode = 0;
  1906. ctrl->tx_size = 0;
  1907. ctrl->ack_size = 0;
  1908. if (ctrl->dns_ip)
  1909. {
  1910. free(ctrl->dns_ip);
  1911. ctrl->dns_ip = NULL;
  1912. }
  1913. if (ctrl->cache_data)
  1914. {
  1915. free(ctrl->cache_data);
  1916. ctrl->cache_data = NULL;
  1917. }
  1918. ctrl->need_close = 0;
  1919. if (ctrl->domain_name)
  1920. {
  1921. free(ctrl->domain_name);
  1922. }
  1923. ctrl->domain_name = zalloc(domain_name_len + 1);
  1924. memcpy(ctrl->domain_name, domain_name, domain_name_len);
  1925. ctrl->domain_name_len = domain_name_len;
  1926. if (remote_ip)
  1927. {
  1928. ctrl->remote_ip = *remote_ip;
  1929. }
  1930. else
  1931. {
  1932. network_set_ip_invaild(&ctrl->remote_ip);
  1933. }
  1934. ctrl->auto_mode = 1;
  1935. ctrl->remote_port = remote_port;
  1936. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  1937. ctrl->wait_target_state = NW_WAIT_ON_LINE;
  1938. if (!network_check_ready(ctrl, 0))
  1939. {
  1940. ctrl->state = NW_STATE_LINK_OFF;
  1941. goto NETWORK_CONNECT_WAIT;
  1942. }
  1943. if (network_prepare_connect(ctrl))
  1944. {
  1945. ctrl->state = NW_STATE_OFF_LINE;
  1946. ctrl->wait_target_state = NW_WAIT_NONE;
  1947. NW_UNLOCK;
  1948. return -1;
  1949. }
  1950. NETWORK_CONNECT_WAIT:
  1951. NW_UNLOCK;
  1952. if (!ctrl->task_handle || !timeout_ms)
  1953. {
  1954. return 1;
  1955. }
  1956. uint8_t finish = 0;
  1957. OS_EVENT event = {0};
  1958. int result;
  1959. //DBG_INFO("%s wait for active!,%u,%x", Net->Tag, To * SYS_TICK, Net->hTask);
  1960. platform_start_timer(ctrl->timer, timeout_ms, 0);
  1961. while (!finish)
  1962. {
  1963. platform_wait_event(ctrl->task_handle, 0, &event, NULL, 0);
  1964. switch (event.ID)
  1965. {
  1966. case EV_NW_RESULT_CONNECT:
  1967. result = (int)event.Param1;
  1968. finish = 1;
  1969. break;
  1970. case EV_NW_TIMEOUT:
  1971. result = -1;
  1972. finish = 1;
  1973. break;
  1974. default:
  1975. if (ctrl->user_callback)
  1976. {
  1977. ctrl->user_callback((void *)&event, ctrl->user_data);
  1978. }
  1979. break;
  1980. }
  1981. }
  1982. platform_stop_timer(ctrl->timer);
  1983. return result;
  1984. }
  1985. int network_listen(network_ctrl_t *ctrl, uint32_t timeout_ms)
  1986. {
  1987. if (NW_STATE_LISTEN == ctrl->state)
  1988. {
  1989. DBG("socket %d is listen", ctrl->socket_id);
  1990. return 0;
  1991. }
  1992. if (ctrl->socket_id >= 0)
  1993. {
  1994. return -1;
  1995. }
  1996. NW_LOCK;
  1997. ctrl->is_server_mode = 1;
  1998. ctrl->auto_mode = 1;
  1999. ctrl->need_close = 0;
  2000. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  2001. ctrl->wait_target_state = NW_WAIT_ON_LINE;
  2002. if (!network_check_ready(ctrl, 0))
  2003. {
  2004. ctrl->state = NW_STATE_LINK_OFF;
  2005. goto NETWORK_LISTEN_WAIT;
  2006. }
  2007. if (network_base_connect(ctrl, NULL))
  2008. {
  2009. ctrl->state = NW_STATE_OFF_LINE;
  2010. ctrl->wait_target_state = NW_WAIT_NONE;
  2011. NW_UNLOCK;
  2012. return -1;
  2013. }
  2014. ctrl->state = NW_STATE_CONNECTING;
  2015. NETWORK_LISTEN_WAIT:
  2016. NW_UNLOCK;
  2017. if (!ctrl->task_handle || !timeout_ms)
  2018. {
  2019. return 1;
  2020. }
  2021. uint8_t finish = 0;
  2022. OS_EVENT event;
  2023. int result;
  2024. //DBG_INFO("%s wait for active!,%u,%x", Net->Tag, To * SYS_TICK, Net->hTask);
  2025. if (timeout_ms != 0xffffffff)
  2026. {
  2027. platform_start_timer(ctrl->timer, timeout_ms, 0);
  2028. }
  2029. while (!finish)
  2030. {
  2031. platform_wait_event(ctrl->task_handle, 0, &event, NULL, 0);
  2032. switch (event.ID)
  2033. {
  2034. case EV_NW_RESULT_CONNECT:
  2035. result = (int)event.Param1;
  2036. finish = 1;
  2037. break;
  2038. case EV_NW_TIMEOUT:
  2039. result = -1;
  2040. finish = 1;
  2041. break;
  2042. default:
  2043. if (ctrl->user_callback)
  2044. {
  2045. ctrl->user_callback((void *)&event, ctrl->user_data);
  2046. }
  2047. break;
  2048. }
  2049. }
  2050. if (timeout_ms != 0xffffffff)
  2051. {
  2052. platform_stop_timer(ctrl->timer);
  2053. }
  2054. return result;
  2055. }
  2056. int network_close(network_ctrl_t *ctrl, uint32_t timeout_ms)
  2057. {
  2058. NW_LOCK;
  2059. if (ctrl->cache_data)
  2060. {
  2061. free(ctrl->cache_data);
  2062. ctrl->cache_data = NULL;
  2063. }
  2064. uint8_t old_state = ctrl->state;
  2065. ctrl->auto_mode = 1;
  2066. ctrl->need_close = 0;
  2067. ctrl->new_rx_flag = 0;
  2068. network_adapter_t *adapter = &prv_adapter_table[ctrl->adapter_index];
  2069. #ifdef LUAT_USE_TLS
  2070. if (ctrl->tls_mode)
  2071. {
  2072. mbedtls_ssl_free(ctrl->ssl);
  2073. }
  2074. #endif
  2075. if (ctrl->socket_id < 0)
  2076. {
  2077. ctrl->state = NW_STATE_OFF_LINE;
  2078. ctrl->wait_target_state = NW_WAIT_NONE;
  2079. NW_UNLOCK;
  2080. return 0;
  2081. }
  2082. ctrl->state = NW_STATE_DISCONNECTING;
  2083. ctrl->wait_target_state = NW_WAIT_OFF_LINE;
  2084. if ((NW_STATE_ONLINE == old_state) && ctrl->is_tcp)
  2085. {
  2086. if (network_socket_disconnect(ctrl))
  2087. {
  2088. network_force_close_socket(ctrl);
  2089. ctrl->state = NW_STATE_OFF_LINE;
  2090. ctrl->wait_target_state = NW_WAIT_NONE;
  2091. NW_UNLOCK;
  2092. return 0;
  2093. }
  2094. }
  2095. else
  2096. {
  2097. network_force_close_socket(ctrl);
  2098. ctrl->state = NW_STATE_OFF_LINE;
  2099. ctrl->wait_target_state = NW_WAIT_NONE;
  2100. NW_UNLOCK;
  2101. return 0;
  2102. }
  2103. NW_UNLOCK;
  2104. if (!ctrl->task_handle || !timeout_ms)
  2105. {
  2106. return 1;
  2107. }
  2108. uint8_t finish = 0;
  2109. OS_EVENT event;
  2110. int result;
  2111. //DBG_INFO("%s wait for active!,%u,%x", Net->Tag, To * SYS_TICK, Net->hTask);
  2112. platform_start_timer(ctrl->timer, timeout_ms, 0);
  2113. while (!finish)
  2114. {
  2115. platform_wait_event(ctrl->task_handle, 0, &event, NULL, 0);
  2116. switch (event.ID)
  2117. {
  2118. case EV_NW_RESULT_CLOSE:
  2119. result = 0;
  2120. finish = 1;
  2121. break;
  2122. case EV_NW_TIMEOUT:
  2123. result = 0;
  2124. finish = 1;
  2125. break;
  2126. default:
  2127. if (ctrl->user_callback)
  2128. {
  2129. ctrl->user_callback((void *)&event, ctrl->user_data);
  2130. }
  2131. break;
  2132. }
  2133. }
  2134. platform_stop_timer(ctrl->timer);
  2135. network_socket_force_close(ctrl);
  2136. return result;
  2137. }
  2138. /*
  2139. * timeout_ms=0时,为非阻塞接口
  2140. */
  2141. int network_tx(network_ctrl_t *ctrl, const uint8_t *data, uint32_t len, int flags, luat_ip_addr_t *remote_ip, uint16_t remote_port, uint32_t *tx_len, uint32_t timeout_ms)
  2142. {
  2143. if ((ctrl->need_close) || (ctrl->socket_id < 0) || (ctrl->state != NW_STATE_ONLINE))
  2144. {
  2145. return -1;
  2146. }
  2147. NW_LOCK;
  2148. int result;
  2149. ctrl->auto_mode = 1;
  2150. #ifdef LUAT_USE_TLS
  2151. if (ctrl->tls_mode)
  2152. {
  2153. if (ctrl->tls_need_reshakehand)
  2154. {
  2155. ctrl->tls_need_reshakehand = 0;
  2156. if (ctrl->cache_data)
  2157. {
  2158. free(ctrl->cache_data);
  2159. ctrl->cache_data = NULL;
  2160. }
  2161. ctrl->cache_data = malloc(len);
  2162. memcpy(ctrl->cache_data, data, len);
  2163. ctrl->cache_len = len;
  2164. mbedtls_ssl_session_reset(ctrl->ssl);
  2165. do
  2166. {
  2167. result = mbedtls_ssl_handshake_step( ctrl->ssl );
  2168. switch(result)
  2169. {
  2170. case MBEDTLS_ERR_SSL_WANT_READ:
  2171. ctrl->state = NW_STATE_SHAKEHAND;
  2172. goto NETWORK_TX_WAIT;
  2173. case 0:
  2174. break;
  2175. default:
  2176. #if MBEDTLS_VERSION_NUMBER >= 0x03000000
  2177. #else
  2178. DBG_ERR("0x%x, %d", -result, ctrl->ssl->state);
  2179. #endif
  2180. ctrl->need_close = 1;
  2181. NW_UNLOCK;
  2182. return -1;
  2183. }
  2184. #if MBEDTLS_VERSION_NUMBER >= 0x03000000
  2185. }while(!mbedtls_ssl_is_handshake_over(ctrl->ssl));
  2186. #else
  2187. }while(ctrl->ssl->state != MBEDTLS_SSL_HANDSHAKE_OVER);
  2188. #endif
  2189. }
  2190. uint32_t done = 0;
  2191. while(done < len)
  2192. {
  2193. result = mbedtls_ssl_write(ctrl->ssl, data + done, len - done);
  2194. if (result < 0)
  2195. {
  2196. DBG("%08x", -result);
  2197. ctrl->need_close = 1;
  2198. NW_UNLOCK;
  2199. return -1;
  2200. }
  2201. done += result;
  2202. }
  2203. *tx_len = done;
  2204. }
  2205. else
  2206. #endif
  2207. {
  2208. result = network_base_tx(ctrl, data, len, flags, remote_ip, remote_port);
  2209. if (result < 0)
  2210. {
  2211. ctrl->need_close = 1;
  2212. NW_UNLOCK;
  2213. return -1;
  2214. }
  2215. *tx_len = result;
  2216. if (!result && len)
  2217. {
  2218. NW_UNLOCK;
  2219. return 0;
  2220. }
  2221. }
  2222. #ifdef LUAT_USE_TLS
  2223. NETWORK_TX_WAIT:
  2224. #endif
  2225. ctrl->wait_target_state = NW_WAIT_TX_OK;
  2226. NW_UNLOCK;
  2227. if (!ctrl->task_handle || !timeout_ms)
  2228. {
  2229. return 1;
  2230. }
  2231. uint8_t finish = 0;
  2232. OS_EVENT event;
  2233. //DBG_INFO("%s wait for active!,%u,%x", Net->Tag, To * SYS_TICK, Net->hTask);
  2234. platform_start_timer(ctrl->timer, timeout_ms, 0);
  2235. while (!finish)
  2236. {
  2237. platform_wait_event(ctrl->task_handle, 0, &event, NULL, 0);
  2238. switch (event.ID)
  2239. {
  2240. case EV_NW_RESULT_TX:
  2241. result = (int)event.Param1;
  2242. finish = 1;
  2243. break;
  2244. case EV_NW_TIMEOUT:
  2245. result = -1;
  2246. finish = 1;
  2247. break;
  2248. default:
  2249. if (ctrl->user_callback)
  2250. {
  2251. ctrl->user_callback((void *)&event, ctrl->user_data);
  2252. }
  2253. break;
  2254. }
  2255. }
  2256. platform_stop_timer(ctrl->timer);
  2257. return result;
  2258. }
  2259. /*
  2260. * 实际读到的数据量在rx_len里,如果是UDP模式且为server时,需要看remote_ip和remote_port
  2261. */
  2262. int network_rx(network_ctrl_t *ctrl, uint8_t *data, uint32_t len, int flags, luat_ip_addr_t *remote_ip, uint16_t *remote_port, uint32_t *rx_len)
  2263. {
  2264. if (((ctrl->need_close && !ctrl->new_rx_flag) || (ctrl->socket_id < 0) || (ctrl->state != NW_STATE_ONLINE)))
  2265. {
  2266. return -1;
  2267. }
  2268. NW_LOCK;
  2269. int result = -1;
  2270. ctrl->auto_mode = 1;
  2271. uint32_t read_len = 0;
  2272. uint8_t is_error = 0;
  2273. if (data)
  2274. {
  2275. ctrl->new_rx_flag = 0;
  2276. #ifdef LUAT_USE_TLS
  2277. if (ctrl->tls_mode)
  2278. {
  2279. do
  2280. {
  2281. result = mbedtls_ssl_read(ctrl->ssl, data + read_len, len - read_len);
  2282. if (result < 0 && (result != MBEDTLS_ERR_SSL_WANT_READ))
  2283. {
  2284. is_error = 1;
  2285. break;
  2286. }
  2287. else if (result > 0)
  2288. {
  2289. read_len += result;
  2290. if (read_len >= len)
  2291. {
  2292. break;
  2293. }
  2294. }
  2295. else
  2296. {
  2297. break;
  2298. }
  2299. }while(network_socket_receive(ctrl, NULL, len, flags, remote_ip, remote_port) > 0);
  2300. if ( !is_error )
  2301. {
  2302. result = read_len;
  2303. }
  2304. else
  2305. {
  2306. result = -1;
  2307. }
  2308. }
  2309. else
  2310. #endif
  2311. {
  2312. result = network_socket_receive(ctrl, data, len, flags, remote_ip, remote_port);
  2313. }
  2314. }
  2315. else
  2316. {
  2317. #ifdef LUAT_USE_TLS
  2318. if (ctrl->tls_mode)
  2319. {
  2320. read_len = 0;
  2321. do
  2322. {
  2323. result = mbedtls_ssl_read(ctrl->ssl, NULL, 0);
  2324. if ((result < 0) && (result != (MBEDTLS_ERR_SSL_WANT_READ)))
  2325. {
  2326. is_error = 1;
  2327. read_len = 0;
  2328. break;
  2329. }
  2330. else if (!result)
  2331. {
  2332. #if MBEDTLS_VERSION_NUMBER >= 0x03000000
  2333. read_len = ctrl->ssl->MBEDTLS_PRIVATE(in_msglen);
  2334. #else
  2335. read_len = ctrl->ssl->in_msglen;
  2336. #endif
  2337. break;
  2338. }
  2339. else if ((MBEDTLS_ERR_SSL_WANT_READ) == result)
  2340. {
  2341. read_len = 0;
  2342. ctrl->new_rx_flag = 0;
  2343. DBG("socket %d ssl data need more", ctrl->socket_id);
  2344. break;
  2345. }
  2346. }while(network_socket_receive(ctrl, NULL, len, flags, remote_ip, remote_port) > 0);
  2347. if ( !is_error )
  2348. {
  2349. result = read_len;
  2350. }
  2351. else
  2352. {
  2353. result = -1;
  2354. }
  2355. }
  2356. else
  2357. #endif
  2358. {
  2359. result = network_socket_receive(ctrl, data, len, flags, remote_ip, remote_port);
  2360. }
  2361. }
  2362. NW_UNLOCK;
  2363. if (result >= 0)
  2364. {
  2365. *rx_len = result;
  2366. return 0;
  2367. }
  2368. else
  2369. {
  2370. return -1;
  2371. }
  2372. }
  2373. int network_wait_event(network_ctrl_t *ctrl, OS_EVENT *out_event, uint32_t timeout_ms, uint8_t *is_timeout)
  2374. {
  2375. if (ctrl->new_rx_flag)
  2376. {
  2377. ctrl->wait_target_state = NW_WAIT_EVENT;
  2378. if (out_event)
  2379. {
  2380. out_event->ID = 0;
  2381. }
  2382. return 0;
  2383. }
  2384. if ((ctrl->need_close) || (ctrl->socket_id < 0) || (ctrl->state != NW_STATE_ONLINE))
  2385. {
  2386. return -1;
  2387. }
  2388. NW_LOCK;
  2389. ctrl->auto_mode = 1;
  2390. ctrl->wait_target_state = NW_WAIT_EVENT;
  2391. NW_UNLOCK;
  2392. if (!ctrl->task_handle || !timeout_ms)
  2393. {
  2394. return 1;
  2395. }
  2396. *is_timeout = 0;
  2397. uint8_t finish = 0;
  2398. OS_EVENT event;
  2399. int result;
  2400. //DBG_INFO("%s wait for active!,%u,%x", Net->Tag, To * SYS_TICK, Net->hTask);
  2401. platform_start_timer(ctrl->timer, timeout_ms, 0);
  2402. while (!finish)
  2403. {
  2404. platform_wait_event(ctrl->task_handle, 0, &event, NULL, 0);
  2405. switch (event.ID)
  2406. {
  2407. case EV_NW_RESULT_EVENT:
  2408. result = (int)event.Param1;
  2409. if (result)
  2410. {
  2411. result = -1;
  2412. }
  2413. if (out_event)
  2414. {
  2415. out_event->ID = 0;
  2416. }
  2417. finish = 1;
  2418. break;
  2419. case EV_NW_TIMEOUT:
  2420. *is_timeout = 1;
  2421. result = 0;
  2422. finish = 1;
  2423. break;
  2424. case EV_NW_BREAK_WAIT:
  2425. if (out_event)
  2426. {
  2427. *out_event = event;
  2428. }
  2429. result = 0;
  2430. finish = 1;
  2431. break;
  2432. default:
  2433. if (out_event)
  2434. {
  2435. *out_event = event;
  2436. result = 0;
  2437. finish = 1;
  2438. break;
  2439. }
  2440. else if (ctrl->user_callback)
  2441. {
  2442. ctrl->user_callback((void *)&event, ctrl->user_data);
  2443. }
  2444. break;
  2445. }
  2446. }
  2447. platform_stop_timer(ctrl->timer);
  2448. return result;
  2449. }
  2450. int network_wait_rx(network_ctrl_t *ctrl, uint32_t timeout_ms, uint8_t *is_break, uint8_t *is_timeout)
  2451. {
  2452. *is_timeout = 0;
  2453. *is_break = 0;
  2454. if (ctrl->new_rx_flag)
  2455. {
  2456. ctrl->wait_target_state = NW_WAIT_EVENT;
  2457. return 0;
  2458. }
  2459. if ((ctrl->need_close) || (ctrl->socket_id < 0) || (ctrl->state != NW_STATE_ONLINE))
  2460. {
  2461. return -1;
  2462. }
  2463. NW_LOCK;
  2464. ctrl->auto_mode = 1;
  2465. ctrl->wait_target_state = NW_WAIT_EVENT;
  2466. NW_UNLOCK;
  2467. uint8_t finish = 0;
  2468. OS_EVENT event;
  2469. int result;
  2470. //DBG_INFO("%s wait for active!,%u,%x", Net->Tag, To * SYS_TICK, Net->hTask);
  2471. if (timeout_ms)
  2472. {
  2473. platform_start_timer(ctrl->timer, timeout_ms, 0);
  2474. }
  2475. while (!finish)
  2476. {
  2477. platform_wait_event(ctrl->task_handle, 0, &event, NULL, 0);
  2478. switch (event.ID)
  2479. {
  2480. case EV_NW_RESULT_EVENT:
  2481. result = (int)event.Param1;
  2482. if (result)
  2483. {
  2484. result = -1;
  2485. finish = 1;
  2486. }
  2487. else if (ctrl->new_rx_flag)
  2488. {
  2489. result = 0;
  2490. finish = 1;
  2491. }
  2492. break;
  2493. case EV_NW_TIMEOUT:
  2494. *is_timeout = 1;
  2495. result = 0;
  2496. finish = 1;
  2497. break;
  2498. case EV_NW_BREAK_WAIT:
  2499. *is_break = 1;
  2500. result = 0;
  2501. finish = 1;
  2502. break;
  2503. default:
  2504. if (ctrl->user_callback)
  2505. {
  2506. ctrl->user_callback((void *)&event, ctrl->user_data);
  2507. }
  2508. break;
  2509. }
  2510. ctrl->wait_target_state = NW_WAIT_EVENT;
  2511. }
  2512. platform_stop_timer(ctrl->timer);
  2513. return result;
  2514. }
  2515. uint8_t network_check_ready(network_ctrl_t *ctrl, uint8_t adapter_index)
  2516. {
  2517. network_adapter_t *adapter;
  2518. if (ctrl)
  2519. {
  2520. adapter = &prv_adapter_table[ctrl->adapter_index];
  2521. }
  2522. else if (adapter_index < NW_ADAPTER_QTY)
  2523. {
  2524. adapter = &prv_adapter_table[adapter_index];
  2525. }
  2526. else
  2527. {
  2528. return 0;
  2529. }
  2530. if (adapter->opt)
  2531. {
  2532. return adapter->opt->check_ready(adapter->user_data);
  2533. }
  2534. else
  2535. {
  2536. return 0;
  2537. }
  2538. }
  2539. //将IP设置成无效状态
  2540. void network_set_ip_invaild(luat_ip_addr_t *ip)
  2541. {
  2542. #ifdef LUAT_USE_LWIP
  2543. #if LWIP_IPV6
  2544. ip->type = 0xff;
  2545. #else
  2546. ip->addr = 0;
  2547. #endif
  2548. #else
  2549. ip->is_ipv6 = 0xff;
  2550. #endif
  2551. }
  2552. //检测IP是不是无效的,无效返回0
  2553. uint8_t network_ip_is_vaild(luat_ip_addr_t *ip)
  2554. {
  2555. #ifdef LUAT_USE_LWIP
  2556. #if LWIP_IPV6
  2557. return (ip->type != 0xff);
  2558. #else
  2559. return (ip->addr != 0);
  2560. #endif
  2561. #else
  2562. return (ip->is_ipv6 != 0xff);
  2563. #endif
  2564. }
  2565. uint8_t network_ip_is_ipv6(luat_ip_addr_t *ip)
  2566. {
  2567. #ifdef LUAT_USE_LWIP
  2568. #if LWIP_IPV6
  2569. return (IPADDR_TYPE_V6 == ip->type);
  2570. #else
  2571. return 0;
  2572. #endif
  2573. #else
  2574. return (ip->is_ipv6 && (ip->is_ipv6 != 0xff));
  2575. #endif
  2576. }
  2577. //检测IP是不是有效的IPV4类型,不是返回0
  2578. uint8_t network_ip_is_vaild_ipv4(luat_ip_addr_t *ip)
  2579. {
  2580. #ifdef LUAT_USE_LWIP
  2581. #if LWIP_IPV6
  2582. return (IPADDR_TYPE_V4 == ip->type);
  2583. #else
  2584. return (ip->addr != 0);
  2585. #endif
  2586. #else
  2587. return !ip->is_ipv6;
  2588. #endif
  2589. }
  2590. void network_set_ip_ipv4(luat_ip_addr_t *ip, uint32_t ipv4)
  2591. {
  2592. #ifdef LUAT_USE_LWIP
  2593. #if LWIP_IPV6
  2594. ip->type = IPADDR_TYPE_V4;
  2595. ip->u_addr.ip4.addr = ipv4;
  2596. #else
  2597. ip->addr = ipv4;
  2598. #endif
  2599. #else
  2600. ip->is_ipv6 = 0;
  2601. ip->ipv4 = ipv4;
  2602. #endif
  2603. }
  2604. #endif