diff options
Diffstat (limited to 'programs/http_client_upcall.c')
-rw-r--r-- | programs/http_client_upcall.c | 336 |
1 files changed, 336 insertions, 0 deletions
diff --git a/programs/http_client_upcall.c b/programs/http_client_upcall.c new file mode 100644 index 00000000..63916266 --- /dev/null +++ b/programs/http_client_upcall.c @@ -0,0 +1,336 @@ +/* + * Copyright (C) 2016-2019 Felix Weinrank + * + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * 3. Neither the name of the project nor the names of its contributors + * may be used to endorse or promote products derived from this software + * without specific prior written permission. + * + * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + * SUCH DAMAGE. + */ + +/* + * Usage: http_client_upcall remote_addr remote_port [local_port] [local_encaps_port] [remote_encaps_port] [uri] + */ + +#ifdef _WIN32 +#define _CRT_SECURE_NO_WARNINGS +#endif +#include <stdio.h> +#include <stdlib.h> +#include <string.h> +#include <stdarg.h> +#ifndef _WIN32 +#include <unistd.h> +#endif +#include <sys/types.h> +#ifndef _WIN32 +#include <sys/socket.h> +#include <netinet/in.h> +#include <arpa/inet.h> +#include <sys/time.h> +#else +#include <sys/types.h> +#include <sys/timeb.h> +#include <io.h> +#endif +#include <usrsctp.h> +#include "programs_helper.h" + + +#define RETVAL_CATCHALL 50 +#define RETVAL_TIMEOUT 60 +#define RETVAL_ECONNREFUSED 61 + +int done = 0; +int writePending = 1; +int result = 0; + +static const char *request_prefix = "GET"; +static const char *request_postfix = "HTTP/1.0\r\nUser-agent: libusrsctp\r\nConnection: close\r\n\r\n"; +char request[512]; + +#ifdef _WIN32 +typedef char* caddr_t; +#endif + +#define BUFFERSIZE (1<<16) + +static void handle_upcall(struct socket *sock, void *arg, int flgs) +{ + int events = usrsctp_get_events(sock); + ssize_t bytesSent = 0; + char *buf; + + if ((events & SCTP_EVENT_READ) && !done) { + struct sctp_recvv_rn rn; + ssize_t n; + struct sockaddr_in addr; + buf = malloc(BUFFERSIZE); + int flags = 0; + socklen_t len = (socklen_t)sizeof(struct sockaddr_in); + unsigned int infotype = 0; + socklen_t infolen = sizeof(struct sctp_recvv_rn); + + memset(&rn, 0, sizeof(struct sctp_recvv_rn)); + n = usrsctp_recvv(sock, buf, BUFFERSIZE, (struct sockaddr *) &addr, &len, (void *)&rn, + &infolen, &infotype, &flags); + + if (n < 0) { + if (errno == ECONNREFUSED) { + result = RETVAL_ECONNREFUSED; + } else if (errno == ETIMEDOUT) { + result = RETVAL_TIMEOUT; + } else { + result = RETVAL_CATCHALL; + } + perror("usrsctp_connect"); + } + + if (n <= 0){ + done = 1; + usrsctp_close(sock); + } else { +#ifdef _WIN32 + _write(_fileno(stdout), buf, (unsigned int)n); +#else + if (write(fileno(stdout), buf, n) < 0) { + perror("write"); + } +#endif + } + free(buf); + } + + if ((events & SCTP_EVENT_WRITE) && writePending && !done) { + writePending = 0; + printf("\nHTTP request:\n%s\n", request); + printf("\nHTTP response:\n"); + + /* send GET request */ + bytesSent = usrsctp_sendv(sock, request, strlen(request), NULL, 0, NULL, 0, SCTP_SENDV_NOINFO, 0); + if (bytesSent < 0) { + perror("usrsctp_sendv"); + usrsctp_close(sock); + } else { + printf("%d bytes sent\n", (int)bytesSent); + } + } +} + +int +main(int argc, char *argv[]) +{ + struct socket *sock; + struct sockaddr *addr; + socklen_t addr_len; + struct sockaddr_in addr4; + struct sockaddr_in6 addr6; + struct sockaddr_in bind4; + struct sockaddr_in6 bind6; + struct sctp_udpencaps encaps; + struct sctp_rtoinfo rtoinfo; + struct sctp_initmsg initmsg; + uint8_t address_family = 0; + + if (argc < 3) { + printf("Usage: http_client_upcall remote_addr remote_port [local_port] [local_encaps_port] [remote_encaps_port] [uri]\n"); + return(EXIT_FAILURE); + } + + memset((void *)&addr4, 0, sizeof(struct sockaddr_in)); + memset((void *)&addr6, 0, sizeof(struct sockaddr_in6)); + + if (inet_pton(AF_INET, argv[1], &addr4.sin_addr) == 1) { + address_family = AF_INET; + + addr = (struct sockaddr *)&addr4; + addr_len = sizeof(addr4); +#ifdef HAVE_SIN_LEN + addr4.sin_len = sizeof(struct sockaddr_in); +#endif + addr4.sin_family = AF_INET; + addr4.sin_port = htons(atoi(argv[2])); + } else if (inet_pton(AF_INET6, argv[1], &addr6.sin6_addr) == 1) { + address_family = AF_INET6; + + addr = (struct sockaddr *)&addr6; + addr_len = sizeof(addr6); +#ifdef HAVE_SIN6_LEN + addr6.sin6_len = sizeof(struct sockaddr_in6); +#endif + addr6.sin6_family = AF_INET6; + addr6.sin6_port = htons(atoi(argv[2])); + } else { + printf("Unsupported destination address - use IPv4 or IPv6 address\n"); + result = RETVAL_CATCHALL; + goto out; + } + + if (argc > 4) { + usrsctp_init(atoi(argv[4]), NULL, debug_printf_stack); + } else { + usrsctp_init(9899, NULL, debug_printf_stack); + } + +#ifdef SCTP_DEBUG + usrsctp_sysctl_set_sctp_debug_on(SCTP_DEBUG_ALL); +#endif + + usrsctp_sysctl_set_sctp_blackhole(2); + usrsctp_sysctl_set_sctp_no_csum_on_loopback(0); + + if ((sock = usrsctp_socket(address_family, SOCK_STREAM, IPPROTO_SCTP, NULL, NULL, 0, NULL)) == NULL) { + perror("usrsctp_socket"); + result = RETVAL_CATCHALL; + goto out; + } + + /* usrsctp_set_non_blocking(sock, 1); */ + + rtoinfo.srto_assoc_id = 0; + rtoinfo.srto_initial = 1000; + rtoinfo.srto_min = 1000; + rtoinfo.srto_max = 8000; + if (usrsctp_setsockopt(sock, IPPROTO_SCTP, SCTP_RTOINFO, (const void *)&rtoinfo, (socklen_t)sizeof(struct sctp_rtoinfo)) < 0) { + perror("setsockopt"); + usrsctp_close(sock); + result = RETVAL_CATCHALL; + goto out; + } + initmsg.sinit_num_ostreams = 1; + initmsg.sinit_max_instreams = 1; + initmsg.sinit_max_attempts = 5; + initmsg.sinit_max_init_timeo = 4000; + if (usrsctp_setsockopt(sock, IPPROTO_SCTP, SCTP_INITMSG, (const void *)&initmsg, (socklen_t)sizeof(struct sctp_initmsg)) < 0) { + perror("setsockopt"); + usrsctp_close(sock); + result = RETVAL_CATCHALL; + goto out; + } + + if (argc > 3) { + + if (address_family == AF_INET) { + memset((void *)&bind4, 0, sizeof(struct sockaddr_in)); +#ifdef HAVE_SIN_LEN + bind4.sin_len = sizeof(struct sockaddr_in6); +#endif + bind4.sin_family = AF_INET; + bind4.sin_port = htons(atoi(argv[3])); + bind4.sin_addr.s_addr = htonl(INADDR_ANY); + + if (usrsctp_bind(sock, (struct sockaddr *)&bind4, sizeof(bind4)) < 0) { + perror("bind"); + usrsctp_close(sock); + result = RETVAL_CATCHALL; + goto out; + } + } else { + memset((void *)&bind6, 0, sizeof(struct sockaddr_in6)); +#ifdef HAVE_SIN6_LEN + bind6.sin6_len = sizeof(struct sockaddr_in6); +#endif + bind6.sin6_family = AF_INET6; + bind6.sin6_port = htons(atoi(argv[3])); + bind6.sin6_addr = in6addr_any; + if (usrsctp_bind(sock, (struct sockaddr *)&bind6, sizeof(bind6)) < 0) { + perror("bind"); + usrsctp_close(sock); + result = RETVAL_CATCHALL; + goto out; + } + } + } + + if (argc > 5) { + memset(&encaps, 0, sizeof(struct sctp_udpencaps)); + encaps.sue_address.ss_family = address_family; + encaps.sue_port = htons(atoi(argv[5])); + if (usrsctp_setsockopt(sock, IPPROTO_SCTP, SCTP_REMOTE_UDP_ENCAPS_PORT, (const void *)&encaps, (socklen_t)sizeof(struct sctp_udpencaps)) < 0) { + perror("setsockopt"); + usrsctp_close(sock); + result = RETVAL_CATCHALL; + goto out; + } + } + + if (argc > 6) { +#ifdef _WIN32 + if (_snprintf(request, sizeof(request), "%s %s %s", request_prefix, argv[6], request_postfix) < 0) { +#else + if (snprintf(request, sizeof(request), "%s %s %s", request_prefix, argv[6], request_postfix) < 0) { +#endif + request[0] = '\0'; + } + } else { +#ifdef _WIN32 + if (_snprintf(request, sizeof(request), "%s %s %s", request_prefix, "/", request_postfix) < 0) { +#else + if (snprintf(request, sizeof(request), "%s %s %s", request_prefix, "/", request_postfix) < 0) { +#endif + request[0] = '\0'; + } + } + + printf("\nHTTP request:\n%s\n", request); + printf("\nHTTP response:\n"); + + + usrsctp_set_upcall(sock, handle_upcall, NULL); + usrsctp_set_non_blocking(sock, 1); + + if (usrsctp_connect(sock, addr, addr_len) < 0) { + if (errno != EINPROGRESS) { + if (errno == ECONNREFUSED) { + result = RETVAL_ECONNREFUSED; + } else if (errno == ETIMEDOUT) { + result = RETVAL_TIMEOUT; + } else { + result = RETVAL_CATCHALL; + } + perror("usrsctp_connect"); + usrsctp_close(sock); + + goto out; + } + } + + while (!done) { +#ifdef _WIN32 + Sleep(1*1000); +#else + sleep(1); +#endif + } +out: + while (usrsctp_finish() != 0) { +#ifdef _WIN32 + Sleep(1000); +#else + sleep(1); +#endif + } + + printf("Finished, returning with %d\n", result); + return (result); +} |