summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authormrb0nk500 <b0nk@b0nk.xyz>2023-02-28 16:46:41 -0400
committermrb0nk500 <b0nk@b0nk.xyz>2023-02-28 16:46:41 -0400
commitb1d5ff8898c1cca680842848586251c6f64b6932 (patch)
tree6277c47ec9238c4ba73bbfa3a3bb44375dc8bd2c /src
parent707b3cefe5df770944ce6956c2ceaa194b96f111 (diff)
TTcpSocket: Start work on `TTcpSocket`
I've done most of it, still have to do `test_connection()`, and `open()`.
Diffstat (limited to 'src')
-rw-r--r--src/pso/TTcpSocket.cpp181
1 files changed, 181 insertions, 0 deletions
diff --git a/src/pso/TTcpSocket.cpp b/src/pso/TTcpSocket.cpp
new file mode 100644
index 0000000..71bdd99
--- /dev/null
+++ b/src/pso/TTcpSocket.cpp
@@ -0,0 +1,181 @@
+#include <global_types.h>
+#include <stdio.h>
+#include <string.h>
+#include "pso/macros.h"
+#include "pso/TArray.h"
+#include "pso/TObject.h"
+#include "pso/TSocket.h"
+#include "pso/TTcpSocket.h"
+
+OBJECT_NAME(TTcpSocket);
+TTcpSocket *tcp_socket_table[16] = {nullptr};
+
+struct send_buffs {
+ short len;
+ u8 *buff;
+};
+
+short tcp_abort(short nh);
+short tcp_delete(short nh);
+short tcp_send(short nh, void (*notify)(short size, short sock_fd), char bufnum, struct send_buffs *sb);
+short tcp_stat(short nh, short *stat, short *backlog, u32 *sendwin, u32 *recvwin);
+short tcp_receive(short nh, void (*notify)(short size, short sock_fd), short len, u8 *buf);
+int get_link_status();
+char *get_sock_status_name(short code);
+
+
+WEAK_FUNC TTcpSocket::TTcpSocket(TObject *parent) : TSocket(parent) {
+ set_name(TTcpSocket_name);
+}
+
+TTcpSocket::~TTcpSocket() {
+ close();
+}
+
+void TTcpSocket::recv() {
+ if (sock_fd() != -1) {
+ packet_buffer().fill(0);
+ set_buffer_cleared(true);
+ (int)tcp_receive(sock_fd(), notify, packet_buffer().size(), packet_buffer().data());
+ }
+}
+
+void TTcpSocket::notify(short size, short sock_fd) {
+ char tmp_str[64];
+ TTcpSocket *socket = tcp_socket_table[sock_fd];
+
+ if (socket != nullptr) {
+ if (size > 0) {
+ socket->set_buffer_cleared(false);
+ socket->set_size(size);
+ socket->set_buffer_offset(0);
+ sprintf(tmp_str, "Rcv:%d byte", size);
+ socket->log(tmp_str);
+ if (socket->callback() != nullptr) {
+ socket->callback()(socket);
+ }
+ } else {
+ socket->set_flags(1);
+ }
+ }
+}
+
+int TTcpSocket::send(u8 *data, size_t size) {
+ if (sock_fd() != -1) {
+ if (!m_is_encrypted) {
+ m_send_crypt.encrypt(data, size);
+ }
+
+ const s8 flags = sock_flags();
+ if (flags || !get_link_status()) {
+ return -1;
+ } else {
+ if (int status = stat()) {
+ log(get_sock_status_name(status));
+ set_flags(1);
+ return 1;
+ } else {
+ if (send_window() <= size) {
+ set_flags(1);
+ return 1;
+ } else {
+ if (stat_val() < 0) {
+ set_flags(1);
+ return 1;
+ } else {
+ struct send_buffs sb;
+ sb.buff = data;
+ sb.len = size;
+ set_unused(0);
+ int ret = tcp_send(sock_fd(), nullptr, 1, &sb);
+ if (ret >= 1 || ret < -1) {
+ set_flags(1);
+ log(get_sock_status_name(ret));
+ close();
+ return ret;
+ }
+ }
+ }
+ }
+ }
+ } else {
+ return -1;
+ }
+}
+
+short TTcpSocket::send(u8 *data) {
+ if (sock_fd() != -1) {
+ const s8 flags = sock_flags();
+ if (flags || !get_link_status()) {
+ return -1;
+ } else {
+ if (short status = stat()) {
+ log(get_sock_status_name(status));
+ set_flags(1);
+ return 1;
+ } else {
+ if (stat_val() < 0) {
+ set_flags(1);
+ return 1;
+ } else {
+ s8 len = strlen(reinterpret_cast<const char *>(data));
+ struct send_buffs sb;
+ sb.buff = data;
+ sb.len = len;
+ if (send_window() <= len) {
+ set_flags(1);
+ return 1;
+ } else {
+ short ret = tcp_send(sock_fd(), nullptr, 1, &sb);
+ if (ret) {
+ close();
+ }
+ return ret;
+ }
+ }
+ }
+ }
+ } else {
+ return -1;
+ }
+}
+
+int TTcpSocket::test_connection() {
+
+}
+
+void some_stub() {}
+
+int TTcpSocket::stat() {
+ if (sock_fd() != -1) {
+ return tcp_stat(sock_fd(), &stat_val(), nullptr, &send_window(), &recv_window());
+ } else {
+ return 0;
+ }
+}
+
+short TTcpSocket::close() {
+ if (sock_fd() != -1) {
+ (short)tcp_abort(sock_fd());
+ (short)tcp_delete(sock_fd());
+ tcp_socket_table[sock_fd()] = nullptr;
+ set_sock_fd(-1);
+ m_is_encrypted = 0;
+ set_size(0);
+ set_buffer_offset(0);
+ set_buffer_cleared(true);
+ }
+ return sock_fd();
+}
+
+short TTcpSocket::open() {
+
+}
+
+short tcp_abort(short nh) {}
+short tcp_delete(short nh) {}
+short tcp_send(short nh, void (*notify)(short size, short sock_fd), char bufnum, struct send_buffs *sb) {}
+short tcp_stat(short nh, short *stat, short *backlog, u32 *sendwin, u32 *recvwin) {}
+short tcp_receive(short nh, void (*notify)(short size, short sock_fd), short len, u8 *buf) {}
+int get_link_status() {}
+char *get_sock_status_name(short code) {}