mirror of
https://github.com/eddyem/ARMsingleboard.git
synced 2025-12-06 10:45:12 +03:00
174 lines
6.0 KiB
C
174 lines
6.0 KiB
C
/*
|
|
* This file is part of the schlagbaum project.
|
|
* Copyright 2023 Edward V. Emelianov <edward.emelianoff@gmail.com>.
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include <usefull_macros.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include "server.h"
|
|
#ifdef __arm__
|
|
#include "gpio.h"
|
|
|
|
// GPIO25 - LEDopen, 8 - LEDclose
|
|
static cmd_t server_in_gpios[] = {
|
|
{25, CMD_LED0},
|
|
{8, CMD_LED1},
|
|
{0, NULL}
|
|
};
|
|
|
|
#endif
|
|
|
|
// 17 - open, 27 - close, 22 - siren
|
|
static cmd_t server_out_gpios[] = {
|
|
{17, CMD_OPEN},
|
|
{27, CMD_CLOSE},
|
|
{22, CMD_SIREN},
|
|
{0, NULL}
|
|
};
|
|
|
|
static const char *maxcl = "Max client number reached, connect later\n";
|
|
static const char *sslerr = "SSL error occured\n";
|
|
|
|
|
|
|
|
// return 0 if client disconnected
|
|
static int handle_connection(SSL *ssl){
|
|
char buf[1024];
|
|
int r = read_string(ssl, buf, 1024);
|
|
if(r < 0) return 0;
|
|
int sd = SSL_get_fd(ssl);
|
|
int l = 0;
|
|
printf("Client %d msg: \"%s\"\n", sd, buf);
|
|
LOGDBG("fd=%d, message=%s", sd, buf);
|
|
const char *ans = "FAIL";
|
|
#ifdef __arm__
|
|
if(strcmp(buf, CMD_OPEN) || strcmp(buf, CMD_CLOSE)){ // shut both 17/27 channels before run cmd
|
|
gpio_clear_output(17);
|
|
gpio_clear_output(27);
|
|
usleep(100000); // wait a little
|
|
}
|
|
#endif
|
|
if(handle_message(buf, server_out_gpios)) ans = "OK";
|
|
l = snprintf(buf, 1023, "%s\n", ans);
|
|
if(SSL_write(ssl, buf, l) <= 0) WARNX("SSL write error");
|
|
return 1;
|
|
}
|
|
|
|
/**
|
|
* @brief timeouted_sslaccept - SSL_accept with timeout
|
|
* @param ssl - SSL
|
|
* @return 1 if connection ready or 0 if error
|
|
*/
|
|
static int timeouted_sslaccept(SSL *ssl){
|
|
double t0 = dtime();
|
|
while(dtime() - t0 < ACCEPT_TIMEOUT){
|
|
int x = SSL_accept(ssl);
|
|
if(x < 0){
|
|
int sslerr = SSL_get_error(ssl, x);
|
|
if(SSL_ERROR_WANT_READ == sslerr ||
|
|
SSL_ERROR_WANT_WRITE == sslerr) continue;
|
|
DBG("SSL error %d", sslerr);
|
|
return FALSE;
|
|
}
|
|
else return TRUE;
|
|
}
|
|
DBG("Timeout");
|
|
return FALSE;
|
|
}
|
|
|
|
void serverproc(SSL_CTX *ctx, int fd){
|
|
int enable = 1;
|
|
if(ioctl(fd, FIONBIO, (void *)&enable) < 0){
|
|
LOGERR("Can't make socket nonblocking");
|
|
ERRX("ioctl()");
|
|
}
|
|
int nfd = 1; // only one listening socket @start
|
|
struct pollfd poll_set[BACKLOG+1];
|
|
memset(poll_set, 0, sizeof(poll_set));
|
|
poll_set[0].fd = fd;
|
|
poll_set[0].events = POLLIN | POLLPRI;
|
|
SSL *ssls[BACKLOG+1] = {0}; // !!! start from 1 - like in poll_set !!!
|
|
double t0 = dtime();
|
|
while(1){
|
|
double t = dtime();
|
|
if(t - t0 > PING_TIMEOUT){
|
|
t0 = t;
|
|
char buf[32];
|
|
int l = sprintf(buf, "%s\n", CMD_PING);
|
|
for(int i = nfd-1; i > 0; --i){
|
|
DBG("send test to fd[%d]=%d", i, poll_set[i].fd);
|
|
if(SSL_write(ssls[i], buf, l) <= 0) WARNX("SSL write error");
|
|
}
|
|
}
|
|
#ifdef __arm__
|
|
poll_gpio(ssls, nfd, server_in_gpios);
|
|
#endif
|
|
poll(poll_set, nfd, 1); // max timeout - 1ms
|
|
// check for accept()
|
|
if(poll_set[0].revents & (POLLIN | POLLPRI)){
|
|
struct sockaddr_in addr;
|
|
socklen_t len = sizeof(addr);
|
|
int client = accept4(fd, (struct sockaddr*)&addr, &len, SOCK_NONBLOCK); // non-blocking for timeout of SSL_accept
|
|
DBG("Connection: %s @ %d (fd=%d)\n", inet_ntoa(addr.sin_addr), ntohs(addr.sin_port), client);
|
|
LOGMSG("Client %s connected to port %d (fd=%d)", inet_ntoa(addr.sin_addr), ntohs(addr.sin_port), client);
|
|
if(nfd == BACKLOG + 1){
|
|
LOGWARN("Max amount of connections: disconnect fd=%d", client);
|
|
WARNX("Limit of connections reached");
|
|
send(client, maxcl, sizeof(maxcl)-1, MSG_NOSIGNAL);
|
|
close(client);
|
|
}else{
|
|
DBG("New ssl");
|
|
SSL *ssl = SSL_new(ctx);
|
|
SSL_set_fd(ssl, client);
|
|
DBG("Accept");
|
|
if(timeouted_sslaccept(ssl)){
|
|
DBG("OK");
|
|
ssls[nfd] = ssl;
|
|
bzero(&poll_set[nfd], sizeof(struct pollfd));
|
|
poll_set[nfd].fd = client;
|
|
poll_set[nfd].events = POLLIN | POLLPRI;
|
|
DBG("nfd=%d, fd=%d, events=0x%x", nfd, poll_set[nfd].fd, poll_set[nfd].events);
|
|
++nfd;
|
|
}else{
|
|
LOGERR("SSL_accept()");
|
|
WARNX("SSL_accept()");
|
|
SSL_free(ssl);
|
|
send(client, sslerr, sizeof(sslerr)-1, MSG_NOSIGNAL);
|
|
close(client);
|
|
}
|
|
}
|
|
}
|
|
// scan connections
|
|
for(int fdidx = 1; fdidx < nfd; ++fdidx){
|
|
if(poll_set[fdidx].revents) DBG("%d, revents=0x%x", fdidx, poll_set[fdidx].revents);
|
|
if((poll_set[fdidx].revents & (POLLIN | POLLPRI)) == 0) continue;
|
|
DBG("%d poll", fdidx);
|
|
int fd = poll_set[fdidx].fd;
|
|
if(!handle_connection(ssls[fdidx])){ // socket closed
|
|
SSL_free(ssls[fdidx]);
|
|
DBG("Client fd=%d disconnected", fd);
|
|
LOGMSG("Client fd=%d disconnected", fd);
|
|
close(fd);
|
|
if(--nfd > fdidx){ // move last FD to current position
|
|
poll_set[fdidx] = poll_set[nfd];
|
|
ssls[fdidx] = ssls[nfd];
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|