| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278 |
- /*
- * Copyright (C) 2011-2013 Michael Tuexen
- *
- * All rights reserved.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- * 1. Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * 2. Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in the
- * documentation and/or other materials provided with the distribution.
- * 3. Neither the name of the project nor the names of its contributors
- * may be used to endorse or promote products derived from this software
- * without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
- * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
- * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
- * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
- * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
- * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
- * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
- * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
- * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
- * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
- * SUCH DAMAGE.
- */
- /*
- * Usage: echo_server [local_encaps_port] [remote_encaps_port]
- *
- * Example
- * Server: $ ./echo_server 11111 22222
- * Client: $ ./client 127.0.0.1 7 0 22222 11111
- */
- #ifdef _WIN32
- #define _CRT_SECURE_NO_WARNINGS
- #endif
- #include <stdio.h>
- #include <stdlib.h>
- #include <string.h>
- #include <stdarg.h>
- #include <sys/types.h>
- #ifndef _WIN32
- #include <unistd.h>
- #include <sys/socket.h>
- #include <netinet/in.h>
- #include <arpa/inet.h>
- #endif
- #include <usrsctp.h>
- #include "programs_helper.h"
- #define PORT 7
- #define BUFFER_SIZE 10240
- #define SLEEP 1
- const int use_cb = 0;
- static int
- receive_cb(struct socket *sock, union sctp_sockstore addr, void *data,
- size_t datalen, struct sctp_rcvinfo rcv, int flags, void *ulp_info)
- {
- char namebuf[INET6_ADDRSTRLEN];
- const char *name;
- uint16_t port;
- if (data) {
- if (flags & MSG_NOTIFICATION) {
- printf("Notification of length %d received.\n", (int)datalen);
- } else {
- switch (addr.sa.sa_family) {
- #ifdef INET
- case AF_INET:
- name = inet_ntop(AF_INET, &addr.sin.sin_addr, namebuf, INET_ADDRSTRLEN);
- port = ntohs(addr.sin.sin_port);
- break;
- #endif
- #ifdef INET6
- case AF_INET6:
- name = inet_ntop(AF_INET6, &addr.sin6.sin6_addr, namebuf, INET6_ADDRSTRLEN),
- port = ntohs(addr.sin6.sin6_port);
- break;
- #endif
- case AF_CONN:
- #ifdef _WIN32
- if (_snprintf(namebuf, INET6_ADDRSTRLEN, "%p", addr.sconn.sconn_addr) < 0) {
- #else
- if (snprintf(namebuf, INET6_ADDRSTRLEN, "%p", addr.sconn.sconn_addr) < 0) {
- #endif
- namebuf[0] = '\0';
- }
- name = namebuf;
- port = ntohs(addr.sconn.sconn_port);
- break;
- default:
- name = "???";
- port = 0;
- break;
- }
- printf("Msg of length %d received from %s:%u on stream %u with SSN %u and TSN %u, PPID %u, context %u.\n",
- (int)datalen,
- name,
- port,
- rcv.rcv_sid,
- rcv.rcv_ssn,
- rcv.rcv_tsn,
- (uint32_t)ntohl(rcv.rcv_ppid),
- rcv.rcv_context);
- if (flags & MSG_EOR) {
- struct sctp_sndinfo snd_info;
- snd_info.snd_sid = rcv.rcv_sid;
- snd_info.snd_flags = 0;
- if (rcv.rcv_flags & SCTP_UNORDERED) {
- snd_info.snd_flags |= SCTP_UNORDERED;
- }
- snd_info.snd_ppid = rcv.rcv_ppid;
- snd_info.snd_context = 0;
- snd_info.snd_assoc_id = rcv.rcv_assoc_id;
- if (usrsctp_sendv(sock, data, datalen, NULL, 0, &snd_info, sizeof(struct sctp_sndinfo), SCTP_SENDV_SNDINFO, 0) < 0) {
- perror("sctp_sendv");
- }
- }
- }
- free(data);
- }
- return (1);
- }
- int
- main(int argc, char *argv[])
- {
- struct socket *sock;
- struct sockaddr_in6 addr;
- struct sctp_udpencaps encaps;
- struct sctp_event event;
- uint16_t event_types[] = {SCTP_ASSOC_CHANGE,
- SCTP_PEER_ADDR_CHANGE,
- SCTP_REMOTE_ERROR,
- SCTP_SHUTDOWN_EVENT,
- SCTP_ADAPTATION_INDICATION,
- SCTP_PARTIAL_DELIVERY_EVENT};
- unsigned int i;
- struct sctp_assoc_value av;
- const int on = 1;
- ssize_t n;
- int flags;
- socklen_t from_len;
- char buffer[BUFFER_SIZE];
- char name[INET6_ADDRSTRLEN];
- socklen_t infolen;
- struct sctp_rcvinfo rcv_info;
- unsigned int infotype;
- if (argc > 1) {
- usrsctp_init(atoi(argv[1]), NULL, debug_printf_stack);
- } else {
- usrsctp_init(9899, NULL, debug_printf_stack);
- }
- #ifdef SCTP_DEBUG
- usrsctp_sysctl_set_sctp_debug_on(SCTP_DEBUG_NONE);
- #endif
- usrsctp_sysctl_set_sctp_blackhole(2);
- usrsctp_sysctl_set_sctp_no_csum_on_loopback(0);
- if ((sock = usrsctp_socket(AF_INET6, SOCK_SEQPACKET, IPPROTO_SCTP, use_cb?receive_cb:NULL, NULL, 0, NULL)) == NULL) {
- perror("usrsctp_socket");
- }
- if (usrsctp_setsockopt(sock, IPPROTO_SCTP, SCTP_I_WANT_MAPPED_V4_ADDR, (const void*)&on, (socklen_t)sizeof(int)) < 0) {
- perror("usrsctp_setsockopt SCTP_I_WANT_MAPPED_V4_ADDR");
- }
- memset(&av, 0, sizeof(struct sctp_assoc_value));
- av.assoc_id = SCTP_ALL_ASSOC;
- av.assoc_value = 47;
- if (usrsctp_setsockopt(sock, IPPROTO_SCTP, SCTP_CONTEXT, (const void*)&av, (socklen_t)sizeof(struct sctp_assoc_value)) < 0) {
- perror("usrsctp_setsockopt SCTP_CONTEXT");
- }
- if (usrsctp_setsockopt(sock, IPPROTO_SCTP, SCTP_RECVRCVINFO, &on, sizeof(int)) < 0) {
- perror("usrsctp_setsockopt SCTP_RECVRCVINFO");
- }
- if (argc > 2) {
- memset(&encaps, 0, sizeof(struct sctp_udpencaps));
- encaps.sue_address.ss_family = AF_INET6;
- encaps.sue_port = htons(atoi(argv[2]));
- if (usrsctp_setsockopt(sock, IPPROTO_SCTP, SCTP_REMOTE_UDP_ENCAPS_PORT, (const void*)&encaps, (socklen_t)sizeof(struct sctp_udpencaps)) < 0) {
- perror("usrsctp_setsockopt SCTP_REMOTE_UDP_ENCAPS_PORT");
- }
- }
- memset(&event, 0, sizeof(event));
- event.se_assoc_id = SCTP_FUTURE_ASSOC;
- event.se_on = 1;
- for (i = 0; i < (unsigned int)(sizeof(event_types)/sizeof(uint16_t)); i++) {
- event.se_type = event_types[i];
- if (usrsctp_setsockopt(sock, IPPROTO_SCTP, SCTP_EVENT, &event, sizeof(struct sctp_event)) < 0) {
- perror("usrsctp_setsockopt SCTP_EVENT");
- }
- }
- memset((void *)&addr, 0, sizeof(struct sockaddr_in6));
- #ifdef HAVE_SIN6_LEN
- addr.sin6_len = sizeof(struct sockaddr_in6);
- #endif
- addr.sin6_family = AF_INET6;
- addr.sin6_port = htons(PORT);
- addr.sin6_addr = in6addr_any;
- if (usrsctp_bind(sock, (struct sockaddr *)&addr, sizeof(struct sockaddr_in6)) < 0) {
- perror("usrsctp_bind");
- }
- if (usrsctp_listen(sock, 1) < 0) {
- perror("usrsctp_listen");
- }
- while (1) {
- if (use_cb) {
- #ifdef _WIN32
- Sleep(SLEEP * 1000);
- #else
- sleep(SLEEP);
- #endif
- } else {
- from_len = (socklen_t)sizeof(struct sockaddr_in6);
- flags = 0;
- infolen = (socklen_t)sizeof(struct sctp_rcvinfo);
- n = usrsctp_recvv(sock, (void*)buffer, BUFFER_SIZE, (struct sockaddr *) &addr, &from_len, (void *)&rcv_info,
- &infolen, &infotype, &flags);
- if (n > 0) {
- if (flags & MSG_NOTIFICATION) {
- printf("Notification of length %llu received.\n", (unsigned long long)n);
- } else {
- if (infotype == SCTP_RECVV_RCVINFO) {
- printf("Msg of length %llu received from %s:%u on stream %u with SSN %u and TSN %u, PPID %u, context %u, complete %d.\n",
- (unsigned long long)n,
- inet_ntop(AF_INET6, &addr.sin6_addr, name, INET6_ADDRSTRLEN), ntohs(addr.sin6_port),
- rcv_info.rcv_sid,
- rcv_info.rcv_ssn,
- rcv_info.rcv_tsn,
- (uint32_t)ntohl(rcv_info.rcv_ppid),
- rcv_info.rcv_context,
- (flags & MSG_EOR) ? 1 : 0);
- if (flags & MSG_EOR) {
- struct sctp_sndinfo snd_info;
- snd_info.snd_sid = rcv_info.rcv_sid;
- snd_info.snd_flags = 0;
- if (rcv_info.rcv_flags & SCTP_UNORDERED) {
- snd_info.snd_flags |= SCTP_UNORDERED;
- }
- snd_info.snd_ppid = rcv_info.rcv_ppid;
- snd_info.snd_context = 0;
- snd_info.snd_assoc_id = rcv_info.rcv_assoc_id;
- if (usrsctp_sendv(sock, buffer, (size_t)n, NULL, 0, &snd_info, (socklen_t)sizeof(struct sctp_sndinfo), SCTP_SENDV_SNDINFO, 0) < 0) {
- perror("sctp_sendv");
- }
- }
- } else {
- printf("Msg of length %llu received from %s:%u, complete %d.\n",
- (unsigned long long)n,
- inet_ntop(AF_INET6, &addr.sin6_addr, name, INET6_ADDRSTRLEN), ntohs(addr.sin6_port),
- (flags & MSG_EOR) ? 1 : 0);
- }
- }
- } else {
- break;
- }
- }
- }
- usrsctp_close(sock);
- while (usrsctp_finish() != 0) {
- #ifdef _WIN32
- Sleep(SLEEP * 1000);
- #else
- sleep(SLEEP);
- #endif
- }
- return (0);
- }
|