X-Git-Url: http://review.tizen.org/git/?a=blobdiff_plain;f=resource%2Fcsdk%2Fconnectivity%2Fsrc%2Ftcp_adapter%2Fcatcpadapter.c;h=ac6f6d71b355c909b63851dc74d7a1c11b72a636;hb=6018efac19eee094d340d353673df673ad4f1c4e;hp=56cc8f6b6e578c68afb2ce6d7c5ea9af53742263;hpb=01be9765a95ede47003777ee576fe9a4de4229e5;p=platform%2Fupstream%2Fiotivity.git diff --git a/resource/csdk/connectivity/src/tcp_adapter/catcpadapter.c b/resource/csdk/connectivity/src/tcp_adapter/catcpadapter.c index 56cc8f6..ac6f6d7 100644 --- a/resource/csdk/connectivity/src/tcp_adapter/catcpadapter.c +++ b/resource/csdk/connectivity/src/tcp_adapter/catcpadapter.c @@ -23,21 +23,30 @@ #include #include +#ifndef __STDC_FORMAT_MACROS +#define __STDC_FORMAT_MACROS +#endif +#include + +#include "cainterface.h" +#include "caipnwmonitor.h" #include "catcpadapter.h" #include "catcpinterface.h" #include "caqueueingthread.h" #include "caadapterutils.h" -#include "camutex.h" +#include "octhread.h" #include "uarraylist.h" #include "caremotehandler.h" #include "logger.h" #include "oic_malloc.h" -#include "oic_string.h" +#ifdef __WITH_TLS__ +#include "ca_adapter_net_ssl.h" +#endif /** * Logging tag for module name. */ -#define TAG "TCP_ADAP" +#define TAG "OIC_CA_TCP_ADAP" /** * Holds internal thread TCP data information. @@ -50,10 +59,10 @@ typedef struct bool isMulticast; } CATCPData; -#define CA_TCP_TIMEOUT 1000 - #define CA_TCP_LISTEN_BACKLOG 3 +#define CA_TCP_SELECT_TIMEOUT 10 + /** * Queue handle for Send Data. */ @@ -65,17 +74,30 @@ static CAQueueingThread_t *g_sendQueueHandle = NULL; static CANetworkPacketReceivedCallback g_networkPacketCallback = NULL; /** - * Network Changed Callback to CA. + * Adapter Changed Callback to CA. + */ +static CAAdapterChangeCallback g_networkChangeCallback = NULL; + +/** + * Connection Changed Callback to CA. */ -static CANetworkChangeCallback g_networkChangeCallback = NULL; +static CAConnectionChangeCallback g_connectionChangeCallback = NULL; /** * error Callback to CA adapter. */ static CAErrorHandleCallback g_errorCallback = NULL; -static void CATCPPacketReceivedCB(const CAEndpoint_t *endpoint, - const void *data, size_t dataLength); +/** + * KeepAlive Connected or Disconnected Callback to CA adapter. + */ +static CAKeepAliveConnectionCallback g_connKeepAliveCallback = NULL; + +static CAResult_t CATCPPacketReceivedCB(const CASecureEndpoint_t *sep, + const void *data, uint32_t dataLength); + +static void CATCPErrorHandler(const CAEndpoint_t *endpoint, const void *data, + size_t dataLength, CAResult_t result); static CAResult_t CATCPInitializeQueueHandles(); @@ -88,12 +110,10 @@ static CATCPData *CACreateTCPData(const CAEndpoint_t *remoteEndpoint, bool isMulticast); void CAFreeTCPData(CATCPData *ipData); -static void CADataDestroyer(void *data, size_t size); +static void CADataDestroyer(void *data, uint32_t size); CAResult_t CATCPInitializeQueueHandles() { - OIC_LOG(DEBUG, TAG, "IN"); - // Check if the message queue is already initialized if (g_sendQueueHandle) { @@ -119,65 +139,190 @@ CAResult_t CATCPInitializeQueueHandles() return CA_STATUS_FAILED; } - OIC_LOG(DEBUG, TAG, "OUT"); return CA_STATUS_OK; } void CATCPDeinitializeQueueHandles() { - OIC_LOG(DEBUG, TAG, "IN"); - CAQueueingThreadDestroy(g_sendQueueHandle); OICFree(g_sendQueueHandle); g_sendQueueHandle = NULL; - - OIC_LOG(DEBUG, TAG, "OUT"); } void CATCPConnectionStateCB(const char *ipAddress, CANetworkStatus_t status) { (void)ipAddress; (void)status; - OIC_LOG(DEBUG, TAG, "IN"); } -void CATCPPacketReceivedCB(const CAEndpoint_t *endpoint, const void *data, - size_t dataLength) +CAResult_t CATCPPacketReceivedCB(const CASecureEndpoint_t *sep, const void *data, + uint32_t dataLength) { - OIC_LOG(DEBUG, TAG, "IN"); - - VERIFY_NON_NULL_VOID(endpoint, TAG, "ipAddress is NULL"); - VERIFY_NON_NULL_VOID(data, TAG, "data is NULL"); + VERIFY_NON_NULL(sep, TAG, "sep is NULL"); + VERIFY_NON_NULL(data, TAG, "data is NULL"); - OIC_LOG_V(DEBUG, TAG, "Address: %s, port:%d", endpoint->addr, endpoint->port); + OIC_LOG_V(DEBUG, TAG, "Address: %s, port:%d", sep->endpoint.addr, sep->endpoint.port); + CAResult_t res = CA_STATUS_OK; +#ifdef SINGLE_THREAD if (g_networkPacketCallback) { - g_networkPacketCallback(endpoint, data, dataLength); + res = g_networkPacketCallback(sep, data, dataLength); + if (CA_STATUS_OK != res) + { + OIC_LOG(ERROR, TAG, "Error parsing CoAP data"); + } + } +#else + unsigned char *buffer = (unsigned char*)data; + size_t bufferLen = dataLength; + size_t index = 0; + + //get remote device information from file descriptor. + CATCPSessionInfo_t *svritem = CAGetTCPSessionInfoFromEndpoint(&sep->endpoint, &index); + if (!svritem) + { + OIC_LOG(ERROR, TAG, "there is no connection information in list"); + return CA_STATUS_INVALID_PARAM; + } + if (UNKNOWN == svritem->protocol) + { + OIC_LOG(ERROR, TAG, "invalid protocol type"); + return CA_STATUS_INVALID_PARAM; } - OIC_LOG(DEBUG, TAG, "OUT"); + + //totalLen filled only when header fully read and parsed + while (0 != bufferLen) + { + res = CAConstructCoAP(svritem, &buffer, &bufferLen); + if (CA_STATUS_OK != res) + { + OIC_LOG_V(ERROR, TAG, "CAConstructCoAP return error : %d", res); + return res; + } + + //when successfully read all required data - pass them to upper layer. + if (svritem->len == svritem->totalLen) + { + if (g_networkPacketCallback) + { + res = g_networkPacketCallback(sep, svritem->data, svritem->totalLen); + if (CA_STATUS_OK != res) + { + OIC_LOG(ERROR, TAG, "Error parsing CoAP data"); + return res; + } + } + CACleanData(svritem); + } + else + { + OIC_LOG_V(DEBUG, TAG, "%u bytes required for complete CoAP", + svritem->totalLen - svritem->len); + } + } +#endif + return res; } -void CATCPErrorHandler(const CAEndpoint_t *endpoint, const void *data, - size_t dataLength, CAResult_t result) +#ifdef __WITH_TLS__ +static ssize_t CATCPPacketSendCB(CAEndpoint_t *endpoint, const void *data, size_t dataLength) { - OIC_LOG(DEBUG, TAG, "IN"); + OIC_LOG_V(DEBUG, TAG, "In %s", __func__); + VERIFY_NON_NULL_RET(endpoint, TAG, "endpoint is NULL", -1); + VERIFY_NON_NULL_RET(data, TAG, "data is NULL", -1); - VERIFY_NON_NULL_VOID(endpoint, TAG, "endpoint is NULL"); + OIC_LOG_V(DEBUG, TAG, "Address: %s, port:%d", endpoint->addr, endpoint->port); + OIC_LOG_BUFFER(DEBUG, TAG, data, dataLength); + + ssize_t ret = CATCPSendData(endpoint, data, dataLength); + OIC_LOG_V(DEBUG, TAG, "Out %s : %d bytes sent", __func__, ret); + return ret; +} +#endif +static void CATCPErrorHandler(const CAEndpoint_t *endpoint, const void *data, + size_t dataLength, CAResult_t result) +{ + VERIFY_NON_NULL_VOID(endpoint, TAG, "endpoint is NULL"); VERIFY_NON_NULL_VOID(data, TAG, "data is NULL"); if (g_errorCallback) { g_errorCallback(endpoint, data, dataLength, result); } +} + +static void CATCPConnectionHandler(const CAEndpoint_t *endpoint, bool isConnected, bool isClient) +{ + // Pass the changed connection status to RI Layer for keepalive. + if (g_connKeepAliveCallback) + { + g_connKeepAliveCallback(endpoint, isConnected, isClient); + } + + // Pass the changed connection status to CAUtil. + if (g_connectionChangeCallback) + { + g_connectionChangeCallback(endpoint, isConnected); + } +} - OIC_LOG(DEBUG, TAG, "OUT"); +void CATCPSetKeepAliveCallbacks(CAKeepAliveConnectionCallback ConnHandler) +{ + g_connKeepAliveCallback = ConnHandler; +} + +void CATCPAdapterHandler(CATransportAdapter_t adapter, CANetworkStatus_t status) +{ + if (g_networkChangeCallback) + { + g_networkChangeCallback(adapter, status); + } + + if (CA_INTERFACE_DOWN == status) + { + OIC_LOG(INFO, TAG, "Network status is down, close all session"); + + CAResult_t res = CAQueueingThreadClearData(g_sendQueueHandle); + if (res != CA_STATUS_OK) + { + OIC_LOG_V(ERROR, TAG, "CAQueueingThreadClearData failed[%d]", res); + } + + CATCPStopServer(); + } + else if (CA_INTERFACE_UP == status) + { + OIC_LOG(INFO, TAG, "Network status is up, create new socket for listening"); + + CAResult_t ret = CA_STATUS_FAILED; +#ifndef SINGLE_THREAD + ret = CATCPStartServer((const ca_thread_pool_t)caglobals.tcp.threadpool); +#else + ret = CATCPStartServer(); +#endif + if (CA_STATUS_OK != ret) + { + OIC_LOG_V(ERROR, TAG, "CATCPStartServer failed[%d]", ret); + } + } } static void CAInitializeTCPGlobals() { - caglobals.tcp.selectTimeout = CA_TCP_TIMEOUT; + caglobals.tcp.ipv4.fd = -1; + caglobals.tcp.ipv4s.fd = -1; + caglobals.tcp.ipv6.fd = -1; + caglobals.tcp.ipv6s.fd = -1; + + // Set the port number received from application. + caglobals.tcp.ipv4.port = caglobals.ports.tcp.u4; + caglobals.tcp.ipv4s.port = caglobals.ports.tcp.u4s; + caglobals.tcp.ipv6.port = caglobals.ports.tcp.u6; + caglobals.tcp.ipv6s.port = caglobals.ports.tcp.u6s; + + caglobals.tcp.selectTimeout = CA_TCP_SELECT_TIMEOUT; caglobals.tcp.listenBacklog = CA_TCP_LISTEN_BACKLOG; caglobals.tcp.svrlist = NULL; @@ -192,40 +337,69 @@ static void CAInitializeTCPGlobals() } caglobals.tcp.ipv4tcpenabled = flags & CA_IPV4; + caglobals.tcp.ipv6tcpenabled = flags & CA_IPV6; } CAResult_t CAInitializeTCP(CARegisterConnectivityCallback registerCallback, CANetworkPacketReceivedCallback networkPacketCallback, - CANetworkChangeCallback netCallback, + CAAdapterChangeCallback netCallback, + CAConnectionChangeCallback connCallback, CAErrorHandleCallback errorCallback, ca_thread_pool_t handle) { OIC_LOG(DEBUG, TAG, "IN"); VERIFY_NON_NULL(registerCallback, TAG, "registerCallback"); VERIFY_NON_NULL(networkPacketCallback, TAG, "networkPacketCallback"); VERIFY_NON_NULL(netCallback, TAG, "netCallback"); +#ifndef SINGLE_THREAD VERIFY_NON_NULL(handle, TAG, "thread pool handle"); +#endif g_networkChangeCallback = netCallback; + g_connectionChangeCallback = connCallback; g_networkPacketCallback = networkPacketCallback; g_errorCallback = errorCallback; CAInitializeTCPGlobals(); + + CAResult_t res = CATCPCreateMutex(); + if (CA_STATUS_OK == res) + { + res = CATCPCreateCond(); + } + if (CA_STATUS_OK != res) + { + OIC_LOG(ERROR, TAG, "failed to create mutex/cond"); + CATCPDestroyMutex(); + CATCPDestroyCond(); + return res; + } + +#ifndef SINGLE_THREAD caglobals.tcp.threadpool = handle; +#endif + CATCPSetConnectionChangedCallback(CATCPConnectionHandler); CATCPSetPacketReceiveCallback(CATCPPacketReceivedCB); CATCPSetErrorHandler(CATCPErrorHandler); - CAConnectivityHandler_t TCPHandler = { +#ifdef __WITH_TLS__ + CAsetSslAdapterCallbacks(CATCPPacketReceivedCB, CATCPPacketSendCB, CA_ADAPTER_TCP); +#endif + + CAConnectivityHandler_t tcpHandler = { .startAdapter = CAStartTCP, .startListenServer = CAStartTCPListeningServer, + .stopListenServer = CAStopTCPListeningServer, .startDiscoveryServer = CAStartTCPDiscoveryServer, .sendData = CASendTCPUnicastData, .sendDataToAll = CASendTCPMulticastData, .GetnetInfo = CAGetTCPInterfaceInformation, .readData = CAReadTCPData, .stopAdapter = CAStopTCP, - .terminate = CATerminateTCP }; - registerCallback(TCPHandler, CA_ADAPTER_TCP); + .terminate = CATerminateTCP, + .cType = CA_ADAPTER_TCP}; + + registerCallback(tcpHandler); OIC_LOG(INFO, TAG, "OUT IntializeTCP is Success"); return CA_STATUS_OK; @@ -235,6 +409,7 @@ CAResult_t CAStartTCP() { OIC_LOG(DEBUG, TAG, "IN"); +#ifndef SINGLE_THREAD if (CA_STATUS_OK != CATCPInitializeQueueHandles()) { OIC_LOG(ERROR, TAG, "Failed to Initialize Queue Handle"); @@ -243,45 +418,133 @@ CAResult_t CAStartTCP() } // Start send queue thread +#ifndef __TIZENRT__ if (CA_STATUS_OK != CAQueueingThreadStart(g_sendQueueHandle)) +#else + if (CA_STATUS_OK != CAQueueingThreadStart(g_sendQueueHandle, "IoT_TCPSendQueue")) +#endif { OIC_LOG(ERROR, TAG, "Failed to Start Send Data Thread"); return CA_STATUS_FAILED; } - - CAResult_t ret = CATCPStartServer((const ca_thread_pool_t)caglobals.tcp.threadpool); +#else + CAResult_t ret = CATCPStartServer(); if (CA_STATUS_OK != ret) { - OIC_LOG_V(ERROR, TAG, "Failed to start server![%d]", ret); + OIC_LOG_V(DEBUG, TAG, "CATCPStartServer failed[%d]", ret); return ret; } +#endif + + // Start network monitoring to receive adapter status changes. + CAIPStartNetworkMonitor(CATCPAdapterHandler, CA_ADAPTER_TCP); - OIC_LOG(DEBUG, TAG, "OUT"); return CA_STATUS_OK; } +static bool CAClearQueueEndpointDataContext(void *data, uint32_t size, void *ctx) +{ + if (NULL == data || NULL == ctx) + { + return false; + } + + CATCPData *tcpData = (CATCPData *)data; + CAEndpoint_t *endpoint = (CAEndpoint_t *)ctx; + + if (NULL != tcpData && NULL != tcpData->remoteEndpoint) + { + if (strcmp(tcpData->remoteEndpoint->addr, endpoint->addr) == 0 + && tcpData->remoteEndpoint->port == endpoint->port) + { + return true; + } + } + return false; +} + +CAResult_t CATCPDisconnectSession(const CAEndpoint_t *endpoint) +{ + CAResult_t res = CA_STATUS_OK; +#ifdef __WITH_TLS__ + res = CAcloseSslConnection(endpoint); + if (CA_STATUS_OK != res) + { + OIC_LOG(ERROR, TAG, "failed to close TLS session"); + res = CAQueueingThreadClearContextData(g_sendQueueHandle, + CAClearQueueEndpointDataContext, + endpoint); + if (CA_STATUS_OK != res) + { + OIC_LOG(ERROR, TAG, "failed to clear context data"); + } + + return res; + } +#endif + + res = CASearchAndDeleteTCPSession(endpoint); + if (CA_STATUS_OK != res) + { + OIC_LOG(ERROR, TAG, "failed to close TCP session"); + } + + res = CAQueueingThreadClearContextData(g_sendQueueHandle, + CAClearQueueEndpointDataContext, + endpoint); + if (CA_STATUS_OK != res) + { + OIC_LOG(ERROR, TAG, "failed to clear context data"); + } + + return res; +} + CAResult_t CAStartTCPListeningServer() { - OIC_LOG(DEBUG, TAG, "IN"); +#ifndef SINGLE_THREAD + if (!caglobals.server) + { + caglobals.server = true; // only needed to run CA tests + } + + CAResult_t ret = CATCPStartServer((const ca_thread_pool_t)caglobals.tcp.threadpool); + if (CA_STATUS_OK != ret) + { + OIC_LOG_V(ERROR, TAG, "Failed to start listening server![%d]", ret); + return ret; + } +#endif + + return CA_STATUS_OK; +} - OIC_LOG(DEBUG, TAG, "OUT"); +CAResult_t CAStopTCPListeningServer() +{ return CA_STATUS_OK; } CAResult_t CAStartTCPDiscoveryServer() { - OIC_LOG(DEBUG, TAG, "IN"); + if (!caglobals.client) + { + caglobals.client = true; // only needed to run CA tests + } + + CAResult_t ret = CATCPStartServer((const ca_thread_pool_t)caglobals.tcp.threadpool); + if (CA_STATUS_OK != ret) + { + OIC_LOG_V(ERROR, TAG, "Failed to start discovery server![%d]", ret); + return ret; + } - OIC_LOG(DEBUG, TAG, "OUT"); return CA_STATUS_OK; } static size_t CAQueueTCPData(bool isMulticast, const CAEndpoint_t *endpoint, const void *data, size_t dataLength) { - OIC_LOG(DEBUG, TAG, "IN"); - - VERIFY_NON_NULL_RET(endpoint, TAG, "remoteEndpoint", -1); + VERIFY_NON_NULL_RET(endpoint, TAG, "endpoint", -1); VERIFY_NON_NULL_RET(data, TAG, "data", -1); if (0 == dataLength) @@ -293,80 +556,94 @@ static size_t CAQueueTCPData(bool isMulticast, const CAEndpoint_t *endpoint, VERIFY_NON_NULL_RET(g_sendQueueHandle, TAG, "sendQueueHandle", -1); // Create TCPData to add to queue - CATCPData *TCPData = CACreateTCPData(endpoint, data, dataLength, isMulticast); - if (!TCPData) + CATCPData *tcpData = CACreateTCPData(endpoint, data, dataLength, isMulticast); + if (!tcpData) { OIC_LOG(ERROR, TAG, "Failed to create ipData!"); return -1; } // Add message to send queue - CAQueueingThreadAddData(g_sendQueueHandle, TCPData, sizeof(CATCPData)); + CAQueueingThreadAddData(g_sendQueueHandle, tcpData, sizeof(CATCPData)); - OIC_LOG(DEBUG, TAG, "OUT"); return dataLength; } int32_t CASendTCPUnicastData(const CAEndpoint_t *endpoint, - const void *data, uint32_t dataLength) + const void *data, uint32_t dataLength, + CADataType_t dataType) { OIC_LOG(DEBUG, TAG, "IN"); + (void)dataType; +#ifndef SINGLE_THREAD return CAQueueTCPData(false, endpoint, data, dataLength); +#else + return CATCPSendData(endpoint, data, dataLength); +#endif } int32_t CASendTCPMulticastData(const CAEndpoint_t *endpoint, - const void *data, uint32_t dataLength) + const void *data, uint32_t dataLength, + CADataType_t dataType) { - OIC_LOG(DEBUG, TAG, "IN"); + (void)dataType; return CAQueueTCPData(true, endpoint, data, dataLength); } CAResult_t CAReadTCPData() { OIC_LOG(DEBUG, TAG, "IN"); - OIC_LOG(DEBUG, TAG, "OUT"); +#ifdef SINGLE_THREAD + CATCPPullData(); +#endif return CA_STATUS_OK; } CAResult_t CAStopTCP() { - OIC_LOG(DEBUG, TAG, "IN"); + CAIPStopNetworkMonitor(CA_ADAPTER_TCP); +#ifndef SINGLE_THREAD if (g_sendQueueHandle && g_sendQueueHandle->threadMutex) { CAQueueingThreadStop(g_sendQueueHandle); } - CATCPDeinitializeQueueHandles(); +#endif CATCPStopServer(); - OIC_LOG(DEBUG, TAG, "OUT"); + //Re-initializing the Globals to start them again + CAInitializeTCPGlobals(); + return CA_STATUS_OK; } void CATerminateTCP() { - OIC_LOG(DEBUG, TAG, "IN"); - CATCPSetPacketReceiveCallback(NULL); - CATCPDeinitializeQueueHandles(); - - OIC_LOG(DEBUG, TAG, "OUT"); + CATCPDestroyMutex(); + CATCPDestroyCond(); } void CATCPSendDataThread(void *threadData) { - OIC_LOG(DEBUG, TAG, "IN"); - - CATCPData *TCPData = (CATCPData *) threadData; - if (!TCPData) + CATCPData *tcpData = (CATCPData *) threadData; + if (!tcpData) { OIC_LOG(DEBUG, TAG, "Invalid TCP data!"); return; } - if (TCPData->isMulticast) + if (caglobals.tcp.terminate) + { + OIC_LOG(DEBUG, TAG, "Adapter is not enabled"); + CATCPErrorHandler(tcpData->remoteEndpoint, tcpData->data, tcpData->dataLen, + CA_SEND_FAILED); + return; + } + + if (tcpData->isMulticast) { //Processing for sending multicast OIC_LOG(DEBUG, TAG, "Send Multicast Data is called, not supported"); @@ -374,58 +651,137 @@ void CATCPSendDataThread(void *threadData) } else { +#ifdef __WITH_TLS__ + if (tcpData->remoteEndpoint && tcpData->remoteEndpoint->flags & CA_SECURE) + { + CAResult_t result = CA_STATUS_OK; + OIC_LOG(DEBUG, TAG, "CAencryptSsl called!"); + result = CAencryptSsl(tcpData->remoteEndpoint, tcpData->data, tcpData->dataLen); + + if (CA_STATUS_OK != result) + { + OIC_LOG(ERROR, TAG, "CAAdapterNetDtlsEncrypt failed!"); + CASearchAndDeleteTCPSession(tcpData->remoteEndpoint); + CATCPErrorHandler(tcpData->remoteEndpoint, tcpData->data, tcpData->dataLen, + CA_SEND_FAILED); + } + OIC_LOG_V(DEBUG, TAG, + "CAAdapterNetDtlsEncrypt returned with result[%d]", result); + return; + } +#endif //Processing for sending unicast - CATCPSendData(TCPData->remoteEndpoint, TCPData->data, TCPData->dataLen, false); + ssize_t dlen = CATCPSendData(tcpData->remoteEndpoint, tcpData->data, tcpData->dataLen); + if (-1 == dlen) + { + OIC_LOG(ERROR, TAG, "CATCPSendData failed"); + CASearchAndDeleteTCPSession(tcpData->remoteEndpoint); + CATCPErrorHandler(tcpData->remoteEndpoint, tcpData->data, tcpData->dataLen, + CA_SEND_FAILED); + } } - - OIC_LOG(DEBUG, TAG, "OUT"); } CATCPData *CACreateTCPData(const CAEndpoint_t *remoteEndpoint, const void *data, size_t dataLength, bool isMulticast) { - VERIFY_NON_NULL_RET(data, TAG, "TCPData is NULL", NULL); + VERIFY_NON_NULL_RET(remoteEndpoint, TAG, "remoteEndpoint is NULL", NULL); + VERIFY_NON_NULL_RET(data, TAG, "data is NULL", NULL); - CATCPData *TCPData = (CATCPData *) OICMalloc(sizeof(CATCPData)); - if (!TCPData) + CATCPData *tcpData = (CATCPData *) OICCalloc(1, sizeof(*tcpData)); + if (!tcpData) { OIC_LOG(ERROR, TAG, "Memory allocation failed!"); return NULL; } - TCPData->remoteEndpoint = CACloneEndpoint(remoteEndpoint); - TCPData->data = (void *) OICMalloc(dataLength); - if (!TCPData->data) + tcpData->remoteEndpoint = CACloneEndpoint(remoteEndpoint); + tcpData->data = (void *) OICMalloc(dataLength); + if (!tcpData->data) { OIC_LOG(ERROR, TAG, "Memory allocation failed!"); - CAFreeTCPData(TCPData); + CAFreeTCPData(tcpData); return NULL; } - memcpy(TCPData->data, data, dataLength); - TCPData->dataLen = dataLength; + memcpy(tcpData->data, data, dataLength); + tcpData->dataLen = dataLength; - TCPData->isMulticast = isMulticast; + tcpData->isMulticast = isMulticast; - return TCPData; + return tcpData; } -void CAFreeTCPData(CATCPData *TCPData) +void CAFreeTCPData(CATCPData *tcpData) { - VERIFY_NON_NULL_VOID(TCPData, TAG, "TCPData is NULL"); + VERIFY_NON_NULL_VOID(tcpData, TAG, "tcpData is NULL"); - CAFreeEndpoint(TCPData->remoteEndpoint); - OICFree(TCPData->data); - OICFree(TCPData); + CAFreeEndpoint(tcpData->remoteEndpoint); + OICFree(tcpData->data); + OICFree(tcpData); } -void CADataDestroyer(void *data, size_t size) +void CADataDestroyer(void *data, uint32_t size) { if (size < sizeof(CATCPData)) { - OIC_LOG_V(ERROR, TAG, "Destroy data too small %p %d", data, size); +#ifndef __TIZENRT__ + OIC_LOG_V(ERROR, TAG, "Destroy data too small %p %" PRIu32, data, size); +#endif } CATCPData *TCPData = (CATCPData *) data; CAFreeTCPData(TCPData); } + +#ifdef SINGLE_THREAD +size_t CAGetTotalLengthFromPacketHeader(const unsigned char *recvBuffer, size_t size) +{ + OIC_LOG(DEBUG, TAG, "IN - CAGetTotalLengthFromHeader"); + + if (NULL == recvBuffer || !size) + { + OIC_LOG(ERROR, TAG, "recvBuffer is NULL"); + return 0; + } + + coap_transport_t transport = coap_get_tcp_header_type_from_initbyte( + ((unsigned char *)recvBuffer)[0] >> 4); + size_t optPaylaodLen = coap_get_length_from_header((unsigned char *)recvBuffer, + transport); + size_t headerLen = coap_get_tcp_header_length((unsigned char *)recvBuffer); + + OIC_LOG_V(DEBUG, TAG, "option/paylaod length [%d]", optPaylaodLen); + OIC_LOG_V(DEBUG, TAG, "header length [%d]", headerLen); + OIC_LOG_V(DEBUG, TAG, "total data length [%d]", headerLen + optPaylaodLen); + + OIC_LOG(DEBUG, TAG, "OUT - CAGetTotalLengthFromHeader"); + return headerLen + optPaylaodLen; +} + +void CAGetTCPHeaderDetails(unsigned char* recvBuffer, coap_transport_t *transport, + size_t *headerlen) +{ + if (NULL == recvBuffer) + { + OIC_LOG(ERROR, TAG, "recvBuffer is NULL"); + return; + } + + if (NULL == transport) + { + OIC_LOG(ERROR, TAG, "transport is NULL"); + return; + } + + if (NULL == headerlen) + { + OIC_LOG(ERROR, TAG, "headerlen is NULL"); + return; + } + + *transport = coap_get_tcp_header_type_from_initbyte( + ((unsigned char *)recvBuffer)[0] >> 4); + *headerlen = coap_get_tcp_header_length_for_transport(*transport); +} +#endif