2 Copyright 2020 Chris Tallon
4 This file is part of VOMP.
6 VOMP is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 2 of the License, or
9 (at your option) any later version.
11 VOMP is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with VOMP. If not, see <https://www.gnu.org/licenses/>.
20 #include <string.h> // memcmp
26 #include <unistd.h> // pipe2
27 #include <fcntl.h> // pipe2-O_NONBLOCK fcntl
28 #include <sys/socket.h> // socket connect getaddrinfo
29 #include <netdb.h> // getaddrinfo
30 #include <sys/select.h> // select
31 #include <linux/if_packet.h> // for getMAC
32 #include <net/ethernet.h> // for getMAC
33 #include <ifaddrs.h> // getifaddrs
36 #include <sys/types.h> // socket connect getaddrinfo
37 #include <string.h> // memset
38 #include <errno.h> // errno var
39 #include <stdlib.h> // malloc / free
53 CLOSESOCKET(abortSocket);
55 if (abortPipe[0] != -1)
67 logger = Log::getInstance();
70 abortSocket = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
71 if (abortSocket == INVALID_SOCKET)
73 logger->log("TCP", Log::CRIT, "socket error");
77 if (pipe2(abortPipe, O_NONBLOCK) == -1)
79 logger->log("TCP", Log::CRIT, "pipe2 error");
87 bool TCP::connect(const std::string& ip, USHORT port)
89 if (connected) return false;
91 struct addrinfo hints;
92 memset(&hints, 0, sizeof(struct addrinfo));
93 hints.ai_family = AF_UNSPEC;
94 hints.ai_socktype = SOCK_STREAM;
95 hints.ai_flags = AI_NUMERICHOST | AI_NUMERICSERV;
99 SNPRINTF(portString, 10, "%u", port);
100 int gaiResult = getaddrinfo(ip.c_str(), portString, &hints, &aip);
102 if ((gaiResult != 0) || !aip)
104 logger->log("TCP", Log::CRIT, "getaddrinfo error");
108 sockfd = socket(aip->ai_family, SOCK_STREAM, 0);
109 if (sockfd == -1) { logger->log("TCP", Log::CRIT, "socket error"); return false; }
113 ioctlsocket(sockfd, FIONBIO, ¶m);
115 fcntl(sockfd, F_SETFL, O_NONBLOCK);
119 // There should only be one aip result..
120 int connectResult = ::connect(sockfd, aip->ai_addr, aip->ai_addrlen);
122 if (connectResult == 0) // success
130 if ((connectResult != SOCKET_ERROR) || (WSAGetLastError() != WSAEWOULDBLOCK))
132 if (errno != EINPROGRESS)
137 logger->log("TCP", Log::CRIT, "connect error");
141 // Wait for connect to complete
144 FD_SET(sockfd, &writefds);
152 FD_SET(abortSocket, &readfds);
154 FD_SET(abortPipe[0], &readfds);
155 if (abortPipe[0] > maxfd) maxfd = abortPipe[0];
159 tv.tv_sec = 20; // Allow 5s for a connect
162 int selectResult = select(maxfd + 1, &readfds, &writefds, NULL, &tv);
164 if (FD_ISSET(abortSocket, &readfds))
166 if (FD_ISSET(abortPipe[0], &readfds))
171 logger->log("TCP", Log::INFO, "connect/select aborting");
175 if ((selectResult == 1) || FD_ISSET(sockfd, &writefds))
178 logger->log("TCP", Log::INFO, "Connected");
186 logger->log("TCP", Log::CRIT, "connect/select error");
193 if (!connected) return;
200 while (recv(abortSocket, waste, 10, 0) > 0) ;
202 while (::read(abortPipe[0], waste, 10) > 0) ;
209 recStringBufStart = 0;
210 recStringBufUsed = 0;
219 void TCP::abortCall()
222 CLOSESOCKET(abortSocket);
224 ::write(abortPipe[1], "X", 1);
228 bool TCP::write(void* src, ULONG numBytes)
230 if (!connected) return false;
232 std::lock_guard<std::mutex> lg(writeMutex);
233 int result = send(sockfd, reinterpret_cast<char*>(src), numBytes, 0); // FIXME does send return < numBytes? Might need loop
234 if (result < 0) return false;
235 if (static_cast<ULONG>(result) != numBytes) return false;
240 bool TCP::read(void* dst, ULONG numBytes, int timeoutSec)
242 if (!connected) return false;
247 ULONG totalReceived = 0;
249 char* pointer = static_cast<char*>(dst); // WIN32 requires char*
253 if (++abortCount == 1000)
255 logger->log("TCP", Log::ALERT, "abortCount = 1000 - runaway error, or packet arrived in > 1000 pieces??");
260 FD_SET(sockfd, &readfds);
261 int maxfd = sockfd; // WIN32 ignores
264 FD_SET(abortSocket, &readfds);
266 FD_SET(abortPipe[0], &readfds);
267 if (abortPipe[0] > maxfd) maxfd = abortPipe[0];
273 tv.tv_sec = timeoutSec;
275 selectResult = select(maxfd + 1, &readfds, NULL, NULL, &tv);
279 selectResult = select(maxfd + 1, &readfds, NULL, NULL, NULL);
282 if (selectResult == -1) { shutdown(); return false; }
283 if (selectResult == 0) return false;
286 if (FD_ISSET(abortSocket, &readfds)) { logger->log("TCP", Log::DEBUG, "Aborting..."); return false; }
288 if (FD_ISSET(abortPipe[0], &readfds)) { logger->log("TCP", Log::DEBUG, "Aborting..."); return false; }
291 int recvResult = recv(sockfd, pointer, numBytes - totalReceived, 0);
292 if (recvResult == -1) { shutdown(); return false; }
293 totalReceived += recvResult;
294 pointer += recvResult;
296 } while (totalReceived < numBytes);
301 std::stringstream TCP::readString(bool* result, int timeoutSec)
305 std::stringstream ss;
307 if (!connected) return ss;
314 if (!recStringBuf) recStringBuf = static_cast<char*>(malloc(recStringBufSize));
315 if (!recStringBuf) return ss;
317 // Absorb over-read from last time?
318 if (recStringBufUsed)
320 ss.write(&recStringBuf[recStringBufStart], recStringBufUsed);
321 recStringBufStart = 0;
322 recStringBufUsed = 0;
327 if (++abortCount == 20)
329 logger->log("TCP", Log::DEBUG, "abortCount = 20");
334 FD_SET(sockfd, &readfds);
335 int maxfd = sockfd; // WIN32 ignores
338 FD_SET(abortSocket, &readfds);
340 FD_SET(abortPipe[0], &readfds);
341 if (abortPipe[0] > maxfd) maxfd = abortPipe[0];
347 tv.tv_sec = timeoutSec;
349 selectResult = select(maxfd + 1, &readfds, NULL, NULL, &tv);
353 selectResult = select(maxfd + 1, &readfds, NULL, NULL, NULL);
356 if (selectResult == -1) { shutdown(); return ss; }
357 if (selectResult == 0) return ss;
360 if (FD_ISSET(abortSocket, &readfds)) { logger->log("TCP", Log::DEBUG, "Aborting..."); return ss; }
362 if (FD_ISSET(abortPipe[0], &readfds)) { logger->log("TCP", Log::DEBUG, "Aborting..."); return ss; }
365 int recvResult = recv(sockfd, &recStringBuf[recStringBufUsed], recStringBufSize - recStringBufUsed, 0);
366 if (recvResult == -1) { shutdown(); return ss; }
367 recStringBufUsed += recvResult;
369 // Do we have a full string?
370 for(int i = 0; i < recStringBufUsed; i++)
372 if (recStringBuf[i] == '\n')
375 ss.write(recStringBuf, i);
377 if ((i + 1) != recStringBufUsed) // over read
379 i += 1; // Advance over \n
380 recStringBufStart = i;
381 recStringBufUsed -= i;
385 recStringBufUsed = 0;
392 // no \n in buffer, go around
396 MACAddress TCP::getMAC()
399 MACAddress macerror{ 00, 00, 00, 00, 00, 00 };
400 if (!connected) return macerror;
403 struct sockaddr - man 2 bind
404 struct sockaddr_in - man 7 ip
405 struct sockaddr_in6 - man 7 ipv6
406 struct sockaddr_ll - man 7 packet
409 // Measured sizeof(struct sockaddr_in) = 16, and in6 = 28
411 unsigned char gsnBuffer[buflen];
412 struct sockaddr* sap = reinterpret_cast<struct sockaddr*>(gsnBuffer);
413 if (getsockname(sockfd, sap, &buflen) == -1) return macerror;
416 unsigned char my6Addr[16];
418 if (sap->sa_family == AF_INET)
420 struct sockaddr_in* sap4 = reinterpret_cast<struct sockaddr_in*>(gsnBuffer);
421 my4AddrU32 = sap4->sin_addr.s_addr;
423 else if (sap->sa_family == AF_INET6)
425 struct sockaddr_in6* sap6 = reinterpret_cast<struct sockaddr_in6*>(gsnBuffer);
426 memcpy(my6Addr, sap6->sin6_addr.s6_addr, 16);
433 struct ifaddrs* ifAddrs;
434 if (getifaddrs(&ifAddrs) == -1) return macerror;
438 for(struct ifaddrs* ifa = ifAddrs; ifa != NULL; ifa = ifa->ifa_next)
440 if (ifa->ifa_addr->sa_family != sap->sa_family) continue;
442 if (sap->sa_family == AF_INET)
444 struct sockaddr_in* test = reinterpret_cast<struct sockaddr_in*>(ifa->ifa_addr);
445 if (test->sin_addr.s_addr == my4AddrU32)
447 ifName = ifa->ifa_name;
451 else if (sap->sa_family == AF_INET6)
453 struct sockaddr_in6* test = reinterpret_cast<struct sockaddr_in6*>(ifa->ifa_addr);
454 if (!memcmp(my6Addr, test->sin6_addr.s6_addr, 16))
456 ifName = ifa->ifa_name;
464 freeifaddrs(ifAddrs);
468 // Walk the list again to get the MAC for ifName using family == AF_PACKET
469 MACAddress toReturn = macerror;
471 for(struct ifaddrs* ifa = ifAddrs; ifa != NULL; ifa = ifa->ifa_next)
473 if (ifa->ifa_addr->sa_family != AF_PACKET) continue;
474 if (strcmp(ifName, ifa->ifa_name)) continue;
475 struct sockaddr_ll* sall = reinterpret_cast<struct sockaddr_ll*>(ifa->ifa_addr);
476 if (sall->sll_halen != 6) continue;
478 memcpy(&toReturn, sall->sll_addr, 6);
482 freeifaddrs(ifAddrs);
486 PIP_ADAPTER_INFO daptinfo = NULL;
488 GetAdaptersInfo(daptinfo, &size);
489 daptinfo = (PIP_ADAPTER_INFO)new char[size + 1];
490 MACAddress macresult;
491 memcpy(¯esult, "ABCDEF", 6);//Dummy Address
492 sockaddr_in sock_address;
493 int sockname_len = sizeof(sock_address);
494 getsockname(sockfd, (sockaddr*)&sock_address, &sockname_len);
495 ULONG sockip = sock_address.sin_addr.s_addr;
496 if (GetAdaptersInfo(daptinfo, &size) == ERROR_SUCCESS)
498 PIP_ADAPTER_INFO daptinfo_it = daptinfo;
499 while (daptinfo_it != NULL)
501 ULONG ipaddress = inet_addr(daptinfo_it->IpAddressList.IpAddress.String);
502 if (ipaddress == sockip)
504 memcpy(¯esult, daptinfo_it->Address, 6);
507 daptinfo_it = daptinfo_it->Next;
508 if (daptinfo_it == daptinfo) break;