added tests/lv2ftp*
This commit is contained in:
parent
3b06cd0228
commit
205ba8c0a8
@ -15,19 +15,28 @@ libsntl = ../lib/.libs/libsntl.la
|
||||
|
||||
if !BUILD_WIN32
|
||||
|
||||
bin_PROGRAMS = lv2sd lv2sc
|
||||
bin_PROGRAMS = lv2sd lv2sc lv2ftpd lv2ftpc
|
||||
|
||||
lv2sd_SOURCES = lv2sd.c
|
||||
lv2sd_LDADD = $(LIBTDATA_LIBS) $(LIBSEXPR_LIBS) $(OPENSSL_LIBS) \
|
||||
$(LIBUUID_LIBS) $(libsntl)
|
||||
$(LIBUUID_LIBS) $(libsntl) -lpthread
|
||||
|
||||
lv2sc_SOURCES = lv2sc.c
|
||||
lv2sc_LDADD = $(LIBTDATA_LIBS) $(LIBSEXPR_LIBS) $(OPENSSL_LIBS) \
|
||||
$(LIBUUID_LIBS) $(libsntl)
|
||||
$(LIBUUID_LIBS) $(libsntl) -lpthread
|
||||
|
||||
lv2ftpd_SOURCES = lv2ftpd.c
|
||||
lv2ftpd_LDADD = $(LIBTDATA_LIBS) $(LIBSEXPR_LIBS) $(OPENSSL_LIBS) \
|
||||
$(LIBUUID_LIBS) $(libsntl) -lpthread
|
||||
|
||||
lv2ftpc_SOURCES = lv2ftpc.c
|
||||
lv2ftpc_LDADD = $(LIBTDATA_LIBS) $(LIBSEXPR_LIBS) $(OPENSSL_LIBS) \
|
||||
$(LIBUUID_LIBS) $(libsntl) -lpthread
|
||||
|
||||
|
||||
else BUILD_WIN32
|
||||
|
||||
bin_PROGRAMS = lv2sc
|
||||
bin_PROGRAMS = lv2sc
|
||||
|
||||
lv2sc_SOURCES = lv2sc.c
|
||||
lv2sc_LDADD = $(LIBTDATA_LIBS) $(LIBSEXPR_LIBS) $(OPENSSL_LIBS) \
|
||||
|
353
tests/lv2ftpc.c
353
tests/lv2ftpc.c
@ -1,19 +1,348 @@
|
||||
/*
|
||||
* Secure Network Transport Layer Library v2 implementation.
|
||||
* (sntllv2) it superseed all versions before due to the:
|
||||
* - memory consumption
|
||||
* - new features such as pulse emitting
|
||||
* - performance optimization
|
||||
*
|
||||
* This is a proprietary software. See COPYING for further details.
|
||||
*
|
||||
* (c) Askele Group 2013-2015 <http://askele.com>
|
||||
*
|
||||
*/
|
||||
#include <stdio.h>
|
||||
#define __USE_GNU
|
||||
#include <stdlib.h>
|
||||
#include <stdarg.h>
|
||||
#include <sys/types.h>
|
||||
|
||||
#include <pthread.h>
|
||||
#include <stdint.h>
|
||||
#include <getopt.h>
|
||||
#include <errno.h>
|
||||
#include <assert.h>
|
||||
#include <time.h>
|
||||
|
||||
#ifdef WIN32
|
||||
#include <Winsock2.h>
|
||||
#include <signal.h>
|
||||
#else
|
||||
#include <sys/select.h>
|
||||
#include <sys/wait.h>
|
||||
#include <sys/socket.h>
|
||||
#include <sys/resource.h>
|
||||
#include <netdb.h>
|
||||
#include <unistd.h>
|
||||
#include <uuid/uuid.h>
|
||||
#include <execinfo.h>
|
||||
#include <netinet/in.h>
|
||||
#endif
|
||||
|
||||
#include <tdata/usrtc.h>
|
||||
#include <sexpr/sexp.h>
|
||||
#include <sntl/sntllv2.h>
|
||||
#include <sntl/limits.h>
|
||||
|
||||
#define DEBUG
|
||||
#define FREE(x) { if (x) { free(x); x = NULL; } }
|
||||
/* define a little bit */
|
||||
#define DEFAULT_PORT 13133
|
||||
#define CHANNEL_COUNT 200
|
||||
#define CLIENT_COUNT 256
|
||||
#define MESSAGES_PER_SESSION 10000
|
||||
#define ITERATION_COUNT 1000
|
||||
|
||||
#define FAILS_ONLY
|
||||
|
||||
struct testdata {
|
||||
int uc;
|
||||
pthread_mutex_t ulock;
|
||||
conn_t *co;
|
||||
};
|
||||
|
||||
static int __init_testdata(struct testdata *t, conn_t *co)
|
||||
{
|
||||
t->uc = 0;
|
||||
pthread_mutex_init(&t->ulock, NULL);
|
||||
t->co = co;
|
||||
return 0;
|
||||
}
|
||||
|
||||
static void __wait_completion(struct testdata *t)
|
||||
{
|
||||
pthread_mutex_lock(&t->ulock);
|
||||
if(t->uc) {
|
||||
pthread_mutex_lock(&t->ulock);
|
||||
}
|
||||
return;
|
||||
}
|
||||
|
||||
static int __set_typed_list_callback(conn_t *co, int ch, char *desc)
|
||||
{
|
||||
printf("allowed channel %d (%s)\n", ch, desc);
|
||||
return SNE_SUCCESS;
|
||||
}
|
||||
|
||||
static void *__addsthrd(void *a)
|
||||
{
|
||||
struct testdata *t = a;
|
||||
conn_t *co = t->co;
|
||||
chnl_t *mch;
|
||||
sxmsg_t *msg;
|
||||
char mmbuf[1024];
|
||||
size_t ln;
|
||||
int mr, i;
|
||||
|
||||
pthread_mutex_lock(&t->ulock);
|
||||
t->uc++;
|
||||
pthread_mutex_unlock(&t->ulock);
|
||||
|
||||
/* here we go */
|
||||
mch = sxchannel_open(co, 12);
|
||||
if(!mch) {
|
||||
fprintf(stderr, "Failed to openchannel with %d\n", errno);
|
||||
goto __fini;
|
||||
}
|
||||
|
||||
for(i = 0; i < MESSAGES_PER_SESSION; i++) {
|
||||
ln = snprintf(mmbuf, 1024, "(ar-add (10 10))");
|
||||
mr = sxmsg_send(mch, mmbuf, ln, &msg);
|
||||
switch(mr) {
|
||||
case SNE_RAPIDMSG:
|
||||
//fprintf(stdout, "Rapidly replied: %s\n", (char *)sxmsg_payload(msg));
|
||||
sxmsg_clean(msg);
|
||||
break;
|
||||
case SNE_REPLYREQ:
|
||||
if(sxmsg_datalen(msg)) fprintf(stdout, "Replied (confirmation required): %s\n",
|
||||
(char *)sxmsg_payload(msg));
|
||||
mr = sxmsg_return(msg, SNE_SUCCESS);
|
||||
fprintf(stderr, "mr = %d\n", mr);
|
||||
break;
|
||||
case SNE_SUCCESS:
|
||||
fprintf(stdout, "Success.\n");
|
||||
break;
|
||||
default:
|
||||
fprintf(stderr, "ERROR: %d\n", mr);
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
sxchannel_close(mch);
|
||||
|
||||
__fini:
|
||||
t->uc--;
|
||||
if(t->uc <= 1) pthread_mutex_unlock(&t->ulock);
|
||||
|
||||
return NULL;
|
||||
}
|
||||
|
||||
int msg_send(chnl_t *ch, const char *mmbuf, size_t buflen, sxmsg_t *msg, char **rs)
|
||||
{
|
||||
#ifdef DEBUG
|
||||
printf("%s: got sx '%s'\n", __FUNCTION__, mmbuf);
|
||||
#endif /* DEBUG */
|
||||
|
||||
int mr = sxmsg_send(ch, mmbuf, buflen, &msg);
|
||||
switch(mr) {
|
||||
case SNE_RAPIDMSG:
|
||||
if (rs) *rs = strdup((char *)sxmsg_payload(msg));
|
||||
fprintf(stdout, "Rapidly replied: '%s'\n", (char *)sxmsg_payload(msg));
|
||||
sxmsg_clean(msg);
|
||||
break;
|
||||
case SNE_REPLYREQ:
|
||||
if(sxmsg_datalen(msg)) fprintf(stdout, "Replied (confirmation required): %s\n",
|
||||
(char *)sxmsg_payload(msg));
|
||||
mr = sxmsg_return(msg, SNE_SUCCESS);
|
||||
fprintf(stderr, "mr = %d\n", mr);
|
||||
break;
|
||||
case SNE_SUCCESS:
|
||||
fprintf(stdout, "Success.\n");
|
||||
break;
|
||||
default:
|
||||
fprintf(stderr, "ERROR: %d\n", mr);
|
||||
break;
|
||||
}
|
||||
#ifdef DEBUG
|
||||
// printf("%s: got rs %d\n", __FUNCTION__, mr);
|
||||
#endif /* DEBUG */
|
||||
return mr;
|
||||
}
|
||||
|
||||
int main(int argc, char **argv)
|
||||
{
|
||||
char *rootca = NULL, *cert = NULL;
|
||||
int port = DEFAULT_PORT;
|
||||
char *addr = NULL, *login = NULL, *password = NULL;
|
||||
int opt;
|
||||
conn_sys_t *ssys;
|
||||
conn_t *co;
|
||||
|
||||
while((opt = getopt(argc, argv, "p:r:a:u:l:w:")) != -1) {
|
||||
switch(opt) {
|
||||
case 'p':
|
||||
port = atoi(optarg);
|
||||
break;
|
||||
case 'r':
|
||||
rootca = strdup(optarg);
|
||||
break;
|
||||
case 'a':
|
||||
addr = strdup(optarg);
|
||||
break;
|
||||
case 'u':
|
||||
cert = strdup(optarg);
|
||||
break;
|
||||
case 'l':
|
||||
login = strdup(optarg);
|
||||
break;
|
||||
case 'w':
|
||||
password = strdup(optarg);
|
||||
break;
|
||||
default:
|
||||
fprintf(stderr, "usage: %s [-p <PORTNUM>] -r <PATH to Root CA> -a <Server ip address> -u <PATH"
|
||||
" to SSL certificate> -l <User login> -w <User password>\n", argv[0]);
|
||||
return EINVAL;
|
||||
}
|
||||
}
|
||||
|
||||
if(!rootca) {
|
||||
fprintf(stderr, "Root CA not pointed.\n Failure.\n");
|
||||
return EINVAL;
|
||||
}
|
||||
|
||||
if(!addr) {
|
||||
fprintf(stderr, "Server address not pointed.\n Failure.\n");
|
||||
return EINVAL;
|
||||
}
|
||||
|
||||
if(!cert) {
|
||||
fprintf(stderr, "User certificate not pointed.\n Failure.\n");
|
||||
return EINVAL;
|
||||
}
|
||||
|
||||
if(!login) {
|
||||
fprintf(stderr, "User login not pointed.\n Failure.\n");
|
||||
return EINVAL;
|
||||
}
|
||||
|
||||
if(!password) {
|
||||
fprintf(stderr, "User password not pointed.\n Failure.\n");
|
||||
return EINVAL;
|
||||
}
|
||||
|
||||
sntl_init();
|
||||
/* all is fine let's init connection subsystem */
|
||||
ssys = connections_create();
|
||||
if(!ssys) {
|
||||
fprintf(stderr, "Subsystem init failed: %d\n", errno);
|
||||
return errno;
|
||||
}
|
||||
/* set working certificates */
|
||||
opt = connections_setsslserts(ssys, rootca, cert, cert);
|
||||
if(opt) {
|
||||
fprintf(stderr, "Subsystem init failed (set SSL x.509 pems): %d\n", opt);
|
||||
return opt;
|
||||
}
|
||||
|
||||
/* Tests */
|
||||
struct timeval beg, end;
|
||||
/* try to open connection */
|
||||
connections_set_channelcall(ssys, __set_typed_list_callback);
|
||||
|
||||
gettimeofday(&beg, NULL);
|
||||
co = connection_link(ssys, addr, port, cert, login, password);
|
||||
|
||||
if(!co) {
|
||||
fprintf(stderr, "Failed to connection with %d\n", errno);
|
||||
return errno;
|
||||
}
|
||||
gettimeofday(&end, NULL);
|
||||
|
||||
if((end.tv_sec - beg.tv_sec) > 0) {
|
||||
printf("Seconds: %ld ", end.tv_sec - beg.tv_sec);
|
||||
printf("µS: %ld\n", end.tv_usec + (1000000 - beg.tv_usec));
|
||||
} else printf("µS: %ld\n", end.tv_usec - beg.tv_usec);
|
||||
|
||||
/* ok now we should open a channel */
|
||||
chnl_t *testchannel = sxchannel_open(co, 12);
|
||||
|
||||
if(!testchannel) {
|
||||
fprintf(stderr, "Failed to openchannel with %d\n", errno);
|
||||
return errno;
|
||||
}
|
||||
gettimeofday(&end, NULL);
|
||||
|
||||
if((end.tv_sec - beg.tv_sec) > 0) {
|
||||
printf("Seconds: %ld ", end.tv_sec - beg.tv_sec);
|
||||
printf("µS: %ld\n", end.tv_usec + (1000000 - beg.tv_usec));
|
||||
} else printf("µS: %ld\n", end.tv_usec - beg.tv_usec);
|
||||
|
||||
/* ok, send a message */
|
||||
char mmbuf[1024];
|
||||
char *s_ret = NULL;
|
||||
sxmsg_t *msg = NULL;
|
||||
size_t ln;
|
||||
int mr, ee, stid;
|
||||
sexp_t *sx_ret = NULL;
|
||||
|
||||
ln = snprintf(mmbuf, 1024, "(dir-open \".\")");
|
||||
mr = msg_send(testchannel, mmbuf, ln, msg, &s_ret);
|
||||
if (mr != SNE_RAPIDMSG) goto __finish;
|
||||
|
||||
sx_ret = parse_sexp(s_ret, strlen(s_ret));
|
||||
FREE(s_ret);
|
||||
if (!sx_ret || !sx_ret->list || strcmp(sx_ret->list->val, "dir-stream") ||
|
||||
!sx_ret->list->next || !sx_ret->list->next->val)
|
||||
goto __finish;
|
||||
|
||||
stid = atoi(sx_ret->list->next->val);
|
||||
ln = snprintf(mmbuf, 1024, "(dir-read %d)", stid);
|
||||
while (1) {
|
||||
mr = msg_send(testchannel, mmbuf, ln, msg, &s_ret);
|
||||
if (mr != SNE_RAPIDMSG) goto __finish;
|
||||
|
||||
sx_ret = parse_sexp(s_ret, strlen(s_ret));
|
||||
if (!sx_ret || !sx_ret->list || !sx_ret->list->val)
|
||||
goto __finish;
|
||||
|
||||
if (!strcmp(sx_ret->list->val, "dir-end")) {
|
||||
ln = snprintf(mmbuf, 1024, "(dir-close %d)", stid);
|
||||
mr = msg_send(testchannel, mmbuf, ln, msg, &s_ret);
|
||||
break;
|
||||
}
|
||||
#ifdef DEBUG
|
||||
printf("%s: '%s'\n", __FUNCTION__, s_ret);
|
||||
#endif /* DEBUG */
|
||||
FREE(s_ret);
|
||||
}
|
||||
|
||||
// switch(mr) {
|
||||
// case SNE_RAPIDMSG:
|
||||
// fprintf(stdout, "Rapidly replied: %s\n", (char *)sxmsg_payload(msg));
|
||||
// sxmsg_clean(msg);
|
||||
// break;
|
||||
// case SNE_REPLYREQ:
|
||||
// if(sxmsg_datalen(msg)) fprintf(stdout, "Replied (confirmation required): %s\n",
|
||||
// (char *)sxmsg_payload(msg));
|
||||
// mr = sxmsg_return(msg, SNE_SUCCESS);
|
||||
// fprintf(stderr, "mr = %d\n", mr);
|
||||
// break;
|
||||
// case SNE_SUCCESS:
|
||||
// fprintf(stdout, "Success.\n");
|
||||
// break;
|
||||
// default:
|
||||
// fprintf(stderr, "ERROR: %d\n", mr);
|
||||
// break;
|
||||
// }
|
||||
|
||||
__finish:
|
||||
ee = sxchannel_close(testchannel);
|
||||
printf("ee = %d\n", ee);
|
||||
gettimeofday(&end, NULL);
|
||||
|
||||
if((end.tv_sec - beg.tv_sec) > 0) {
|
||||
printf("Seconds: %ld ", end.tv_sec - beg.tv_sec);
|
||||
printf("µS: %ld\n", end.tv_usec + (1000000 - beg.tv_usec));
|
||||
} else printf("µS: %ld\n", end.tv_usec - beg.tv_usec);
|
||||
// sleep(10);
|
||||
// /* ok, now we need to create many threads */
|
||||
// struct testdata trd;
|
||||
// pthread_t thrd;
|
||||
// int i;
|
||||
// __init_testdata(&trd, co);
|
||||
|
||||
// for(i = 0; i < 256; i++) pthread_create(&thrd, NULL, __addsthrd, &trd);
|
||||
|
||||
// __wait_completion(&trd);
|
||||
|
||||
connection_close(co);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
440
tests/lv2ftpd.c
440
tests/lv2ftpd.c
@ -11,9 +11,447 @@
|
||||
*
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <dirent.h>
|
||||
#define __USE_GNU
|
||||
#include <stdlib.h>
|
||||
#include <stdarg.h>
|
||||
#include <sys/types.h>
|
||||
#include <limits.h>
|
||||
#ifdef WIN32
|
||||
#include <Winsock2.h>
|
||||
#include <signal.h>
|
||||
#include <ws2tcpip.h>
|
||||
#else
|
||||
#include <sys/select.h>
|
||||
#include <sys/wait.h>
|
||||
#include <sys/socket.h>
|
||||
#include <sys/resource.h>
|
||||
#include <netdb.h>
|
||||
#include <unistd.h>
|
||||
#include <uuid/uuid.h>
|
||||
#include <execinfo.h>
|
||||
#include <netinet/in.h>
|
||||
#endif
|
||||
|
||||
#include <tdata/usrtc.h>
|
||||
#include <sexpr/sexp.h>
|
||||
#include <sntl/limits.h>
|
||||
#include <sntl/sntllv2.h>
|
||||
|
||||
int main(int argc, char **argv)
|
||||
#include <pthread.h>
|
||||
// #include <unistd.h>
|
||||
#include <stdint.h>
|
||||
#include <getopt.h>
|
||||
#include <errno.h>
|
||||
|
||||
#define DEBUG
|
||||
#define FREE(x) { if (x) { free(x); x = NULL; } }
|
||||
#define MAX_STREAMS INT_MAX
|
||||
|
||||
typedef struct __datastream_type {
|
||||
int dsid;
|
||||
usrtc_node_t node;
|
||||
// readdir_r
|
||||
DIR *dp;
|
||||
struct dirent dent;
|
||||
struct dirent *dres;
|
||||
} datastream_t;
|
||||
|
||||
usrtc_t *_rd_streams;
|
||||
int _rd_last_id = 0;
|
||||
pthread_rwlock_t _lock;
|
||||
|
||||
/* helper functions */
|
||||
static long __cmp_int(const void *a, const void *b)
|
||||
{
|
||||
return *(int *)a - *(int *)b;
|
||||
}
|
||||
|
||||
inline void dump_dirent(struct dirent *d, char *buf)
|
||||
{
|
||||
if (d == NULL) return;
|
||||
strcat(buf, "\"");
|
||||
strcat(buf, d->d_name);
|
||||
strcat(buf, "\" ");
|
||||
switch(d->d_type)
|
||||
{
|
||||
case DT_REG:
|
||||
strcat(buf, "\"regular\"");
|
||||
break;
|
||||
case DT_DIR:
|
||||
strcat(buf, "\"directory\"");
|
||||
break;
|
||||
case DT_BLK:
|
||||
strcat(buf, "\"block\"");
|
||||
break;
|
||||
case DT_CHR:
|
||||
strcat(buf, "\"char\"");
|
||||
break;
|
||||
case DT_FIFO:
|
||||
strcat(buf, "\"fifo\"");
|
||||
break;
|
||||
case DT_LNK:
|
||||
strcat(buf, "\"link\"");
|
||||
break;
|
||||
case DT_UNKNOWN:
|
||||
strcat(buf, "\"unknown\"");
|
||||
break;
|
||||
default:
|
||||
strcat(buf, "\"another\"");
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
int __openlistener(int port)
|
||||
{
|
||||
int sd;
|
||||
struct sockaddr_in addr;
|
||||
|
||||
sd = socket(PF_INET, SOCK_STREAM, 0);
|
||||
bzero(&addr, sizeof(addr));
|
||||
addr.sin_family = AF_INET;
|
||||
addr.sin_port = htons(port);
|
||||
addr.sin_addr.s_addr = INADDR_ANY;
|
||||
if ( bind(sd, (struct sockaddr*)&addr, sizeof(addr)) != 0 ) {
|
||||
perror("can't bind port");
|
||||
abort();
|
||||
}
|
||||
if ( listen(sd, 10) != 0 ) {
|
||||
perror("Can't configure listening port");
|
||||
abort();
|
||||
}
|
||||
|
||||
return sd;
|
||||
}
|
||||
|
||||
/*
|
||||
* Validation of the SSL certificate
|
||||
* this function must be exist.
|
||||
*/
|
||||
static int __validate_sslpem(conn_t *co)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
|
||||
/*
|
||||
* validate - authorize user with password
|
||||
*/
|
||||
static int __secure_check(conn_t *co)
|
||||
{
|
||||
return SNE_SUCCESS;
|
||||
}
|
||||
|
||||
/*
|
||||
* typed list callback
|
||||
*/
|
||||
static int __set_typed_list_callback(conn_t *co, int ch, char *desc)
|
||||
{
|
||||
printf("allowed channel %d (%s)\n", ch, desc);
|
||||
return SNE_SUCCESS;
|
||||
}
|
||||
|
||||
/* list of rpc calls functions */
|
||||
usrtc_t *fulist;
|
||||
|
||||
/* our fake */
|
||||
usrtc_t *__rettlist(conn_t *c)
|
||||
{
|
||||
return fulist;
|
||||
}
|
||||
|
||||
/* RPC functions implementation */
|
||||
static int __dir_open(void *m, sexp_t *sx)
|
||||
{
|
||||
sexp_t *lsx = NULL;
|
||||
sxmsg_t *msg = (sxmsg_t *)m;
|
||||
char *buf;
|
||||
size_t ln = 0;
|
||||
|
||||
#ifdef DEBUG
|
||||
char dbuf[2048];
|
||||
print_sexp(dbuf, sizeof(dbuf), sx);
|
||||
printf("%s: got sx '%s'\n", __FUNCTION__, dbuf);
|
||||
#endif /* DEBUG */
|
||||
|
||||
if(sexp_list_cdr(sx, &lsx) || !sx->list->next || !sx->list->next->val) {
|
||||
printf("Invalid protocol\n");
|
||||
return sxmsg_return(msg, SNE_BADPROTO);
|
||||
}
|
||||
|
||||
char *dir_name = sx->list->next->val;
|
||||
|
||||
if ( usrtc_isfull(_rd_streams) ) {
|
||||
return sxmsg_return(msg, EINVAL);
|
||||
}
|
||||
|
||||
datastream_t *item;
|
||||
if ( !(item = malloc(sizeof(datastream_t))) ) {
|
||||
return sxmsg_return(msg, ENOMEM);
|
||||
}
|
||||
|
||||
/* find free id */
|
||||
pthread_rwlock_wrlock(&_lock);
|
||||
do {
|
||||
if (_rd_last_id == INT_MAX)
|
||||
_rd_last_id = 1;
|
||||
else
|
||||
++_rd_last_id;
|
||||
} while (usrtc_lookup(_rd_streams, &_rd_last_id));
|
||||
|
||||
/* create rd stream */
|
||||
DIR *dp = NULL;
|
||||
if ( !(dp = opendir(dir_name)) ) {
|
||||
pthread_rwlock_unlock(&_lock);
|
||||
free(item);
|
||||
return sxmsg_return(msg, EINVAL);
|
||||
}
|
||||
|
||||
/* init stream */
|
||||
item->dsid = _rd_last_id;
|
||||
item->dp = dp;
|
||||
item->dres = NULL;
|
||||
usrtc_node_init(&(item->node), item);
|
||||
usrtc_insert(_rd_streams, &(item->node), &item->dsid);
|
||||
|
||||
buf = sxmsg_rapidbuf(msg);
|
||||
ln = snprintf(buf, MAX_RBBUF_LEN, "(dir-stream %d)", item->dsid);
|
||||
|
||||
pthread_rwlock_unlock(&_lock);
|
||||
|
||||
#ifdef DEBUG
|
||||
printf("%s: stream %d has been opened\n", __FUNCTION__, item->dsid);
|
||||
#endif /* DEBUG */
|
||||
|
||||
return sxmsg_rreply(msg, ln + 1);
|
||||
}
|
||||
|
||||
static int __dir_read(void *m, sexp_t *sx)
|
||||
{
|
||||
sexp_t *lsx = NULL;
|
||||
sxmsg_t *msg = (sxmsg_t *)m;
|
||||
char *buf;
|
||||
size_t ln = 0;
|
||||
int stid = -1;
|
||||
|
||||
#ifdef DEBUG
|
||||
char dbuf[2048];
|
||||
print_sexp(dbuf, sizeof(dbuf), sx);
|
||||
printf("%s: got sx '%s'\n", __FUNCTION__, dbuf);
|
||||
#endif /* DEBUG */
|
||||
|
||||
if (sexp_list_cdr(sx, &lsx) || !sx->list->next || !sx->list->next->val
|
||||
|| (0 >= (stid = atoi(sx->list->next->val) )) )
|
||||
{
|
||||
printf("Invalid protocol\n");
|
||||
return sxmsg_return(msg, SNE_BADPROTO);
|
||||
}
|
||||
|
||||
/* get stream item */
|
||||
datastream_t *item;
|
||||
usrtc_node_t *node;
|
||||
pthread_rwlock_rdlock(&_lock);
|
||||
if ( !(node = usrtc_lookup(_rd_streams, &stid)) ) {
|
||||
pthread_rwlock_unlock(&_lock);
|
||||
return sxmsg_return(msg, ENOENT);
|
||||
}
|
||||
pthread_rwlock_unlock(&_lock);
|
||||
|
||||
pthread_rwlock_wrlock(&_lock);
|
||||
item = usrtc_node_getdata(node);
|
||||
if (readdir_r(item->dp, &(item->dent), &(item->dres))) {
|
||||
#ifdef DEBUG
|
||||
printf("%s: readdir_r() is failed (%d)\n", __FUNCTION__, errno);
|
||||
#endif /* DEBUG */
|
||||
pthread_rwlock_unlock(&_lock);
|
||||
return sxmsg_return(msg, EINVAL);
|
||||
}
|
||||
|
||||
if (!item->dres) {
|
||||
buf = sxmsg_rapidbuf(msg);
|
||||
ln = snprintf(buf, MAX_RBBUF_LEN, "(dir-end %d)", item->dsid);
|
||||
goto __finish;
|
||||
}
|
||||
|
||||
char dump[2048];
|
||||
sprintf(dump, "(dir-entry (");
|
||||
dump_dirent(item->dres, dump);
|
||||
strcat(dump, "))");
|
||||
|
||||
#ifdef DEBUG
|
||||
printf("%s: dump = '%s'\n", __FUNCTION__, dump);
|
||||
#endif /* DEBUG */
|
||||
|
||||
buf = sxmsg_rapidbuf(msg);
|
||||
ln = snprintf(buf, MAX_RBBUF_LEN, "%s", dump);
|
||||
|
||||
__finish:
|
||||
pthread_rwlock_unlock(&_lock);
|
||||
return sxmsg_rreply(msg, ln + 1);
|
||||
}
|
||||
|
||||
static int __dir_close(void *m, sexp_t *sx)
|
||||
{
|
||||
sexp_t *lsx = NULL;
|
||||
sxmsg_t *msg = (sxmsg_t *)m;
|
||||
int stid = -1;
|
||||
|
||||
#ifdef DEBUG
|
||||
char dbuf[2048];
|
||||
print_sexp(dbuf, sizeof(dbuf), sx);
|
||||
printf("%s: got sx '%s'\n", __FUNCTION__, dbuf);
|
||||
#endif /* DEBUG */
|
||||
|
||||
if (sexp_list_cdr(sx, &lsx) || !sx->list->next || !sx->list->next->val
|
||||
|| (0 >= (stid = atoi(sx->list->next->val) )) )
|
||||
{
|
||||
printf("Invalid protocol\n");
|
||||
return sxmsg_return(msg, SNE_BADPROTO);
|
||||
}
|
||||
|
||||
/* get stream item */
|
||||
datastream_t *item;
|
||||
usrtc_node_t *node;
|
||||
pthread_rwlock_rdlock(&_lock);
|
||||
if ( !(node = usrtc_lookup(_rd_streams, &stid)) ) {
|
||||
pthread_rwlock_unlock(&_lock);
|
||||
return sxmsg_return(msg, ENOENT);
|
||||
}
|
||||
pthread_rwlock_unlock(&_lock);
|
||||
|
||||
pthread_rwlock_wrlock(&_lock);
|
||||
item = usrtc_node_getdata(node);
|
||||
closedir(item->dp);
|
||||
FREE(item);
|
||||
usrtc_delete(_rd_streams, node);
|
||||
pthread_rwlock_unlock(&_lock);
|
||||
|
||||
#ifdef DEBUG
|
||||
printf("%s: stream %d has been closed\n", __FUNCTION__, stid);
|
||||
#endif /* DEBUG */
|
||||
|
||||
return sxmsg_return(msg, SNE_SUCCESS);
|
||||
}
|
||||
|
||||
/* define a little bit */
|
||||
#define DEFAULT_PORT 13133
|
||||
|
||||
static void sigpipe_handler(int a)
|
||||
{
|
||||
return;
|
||||
}
|
||||
|
||||
int main(int argc, char **argv)
|
||||
{
|
||||
signal(SIGPIPE, SIG_IGN);
|
||||
|
||||
char *rootca = NULL, *cert = NULL;
|
||||
conn_sys_t *ssys = connections_create();
|
||||
int port = DEFAULT_PORT;
|
||||
int opt;
|
||||
|
||||
while((opt = getopt(argc, argv, "p:r:u:")) != -1) {
|
||||
switch(opt) {
|
||||
case 'p':
|
||||
port = atoi(optarg);
|
||||
break;
|
||||
case 'r':
|
||||
rootca = strdup(optarg);
|
||||
break;
|
||||
case 'u':
|
||||
cert = strdup(optarg);
|
||||
break;
|
||||
default:
|
||||
fprintf(stderr, "usage: %s [-p <PORTNUM>] -r <PATH to Root CA> -u <PATH"
|
||||
" to SSL certificate>\n", argv[0]);
|
||||
return EINVAL;
|
||||
}
|
||||
}
|
||||
|
||||
if(!rootca) {
|
||||
fprintf(stderr, "Root CA not pointed.\n Failure.\n");
|
||||
return EINVAL;
|
||||
}
|
||||
|
||||
if(!cert) {
|
||||
fprintf(stderr, "User certificate not pointed.\n Failure.\n");
|
||||
return EINVAL;
|
||||
}
|
||||
|
||||
sntl_init();
|
||||
/* all is fine let's init connection subsystem */
|
||||
if(!ssys) {
|
||||
fprintf(stderr, "Subsystem init failed: %d\n", opt);
|
||||
return 2;
|
||||
}
|
||||
/* set wroking certificates */
|
||||
opt = connections_setsslserts(ssys, rootca, cert, cert);
|
||||
if(opt) {
|
||||
fprintf(stderr, "Subsystem init failed (set SSL x.509 pems): %d\n", opt);
|
||||
return opt;
|
||||
}
|
||||
|
||||
/* clean up */
|
||||
free(rootca);
|
||||
free(cert);
|
||||
|
||||
/* set important callbacks to do the security checking */
|
||||
connections_set_authcheck(ssys, __secure_check);
|
||||
connections_set_sslvalidate(ssys, __validate_sslpem);
|
||||
/* set a callback, it's optional and doesn't required in server side apps */
|
||||
connections_set_channelcall(ssys, __set_typed_list_callback);
|
||||
|
||||
/* ok, now we need to construct RPC lists (channels) */
|
||||
if(!(fulist = malloc(sizeof(usrtc_t)))) {
|
||||
fprintf(stderr, "Cannot allocate memory for RPC lists\n Failure.\n");
|
||||
return ENOMEM;
|
||||
}
|
||||
opt = sntl_rpclist_init(fulist);
|
||||
if(opt) {
|
||||
fprintf(stderr, "Failed to init rpc list\n Failure.\n");
|
||||
return opt;
|
||||
}
|
||||
|
||||
/* we will add one channel with type id 12 "Demo rpc list" */
|
||||
opt = sntl_rpclist_add(fulist, 12, "Demo RPC list", NULL);
|
||||
if(opt) {
|
||||
fprintf(stderr, "Failed to add typed RPC channel\n Failure.\n");
|
||||
return opt;
|
||||
}
|
||||
|
||||
/* ok, let's add stream functions */
|
||||
opt = sntl_rpclist_add_function(fulist, 12, "dir-open", __dir_open);
|
||||
if(opt) {
|
||||
__fail:
|
||||
fprintf(stderr, "Failed to add functions to typed RPC channel\n Failure.\n");
|
||||
return opt;
|
||||
}
|
||||
opt = sntl_rpclist_add_function(fulist, 12, "dir-read", __dir_read);
|
||||
if(opt) goto __fail;
|
||||
opt = sntl_rpclist_add_function(fulist, 12, "dir-close", __dir_close);
|
||||
if(opt) goto __fail;
|
||||
|
||||
/* ok, setup it */
|
||||
connections_set_rpcvalidator(ssys, __rettlist);
|
||||
|
||||
/* create stream tree */
|
||||
if(!(_rd_streams = malloc(sizeof(usrtc_t)) ))
|
||||
return ENOMEM;
|
||||
usrtc_init(_rd_streams, USRTC_REDBLACK, MAX_STREAMS, __cmp_int);
|
||||
|
||||
/* now we're ready to run the listen process */
|
||||
int srv = __openlistener(port);
|
||||
while(1) {
|
||||
struct sockaddr_in addr;
|
||||
socklen_t len = sizeof(addr);
|
||||
conn_t *co;
|
||||
|
||||
int client = accept(srv, (struct sockaddr*)&addr, &len); /* accept connection as usual */
|
||||
co = connection_master_link(ssys, client, NULL); /* create connection, that's all */
|
||||
if(!co) {
|
||||
fprintf(stderr, "Cannot create connetion (%d)\n", opt);
|
||||
}
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user