summaryrefslogtreecommitdiff
path: root/src/libc/net/socket.c
blob: ce74029acaf75ed65b00c52fa8ba0acc9b18e903 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
#include <arpa/inet.h>
#include <camellia.h>
#include <camellia/syscalls.h>
#include <errno.h>
#include <netdb.h>
#include <netinet/in.h>
#include <stdio.h>
#include <string.h>
#include <sys/socket.h>

int socket(int domain, int type, int protocol) {
	if (domain != AF_INET || type != SOCK_STREAM || protocol != IPPROTO_TCP) {
		return errno = ENOSYS, -1;
	}
	int h = _sys_getnull(0);
	if (h < 0) {
		return errno = -h, -1;
	} else {
		return h;
	}
}

int bind(int, const struct sockaddr *, socklen_t) {
	return errno = ENOSYS, -1;
}

int accept(int, struct sockaddr *, socklen_t *) {
	return errno = ENOSYS, -1;
}

int listen(int, int) {
	return errno = ENOSYS, -1;
}

int connect(int sockfd, const struct sockaddr *addr, socklen_t addrlen) {
	char buf[256];
	struct sockaddr_in *addr4 = (void*)addr;
	uint32_t ip;
	uint16_t port;
	int newfd;

	if (addr->sa_family != AF_INET) {
		return errno = ENOSYS, -1;
	}

	if (addrlen < (ssize_t)sizeof(*addr4)) {
		return errno = EINVAL, -1;
	}

	ip   = ntohl(addr4->sin_addr.s_addr);
	port = ntohs(addr4->sin_port);
	if (
		snprintf(buf, sizeof(buf),
			"/net/connect/0.0.0.0/%d.%d.%d.%d/tcp/%d",
			(ip >> 24) & 0xFF,
			(ip >> 16) & 0xFF,
			(ip >>  8) & 0xFF,
			(ip      ) & 0xFF,
			port
		) >= 256
	) {
		return errno = EGENERIC, -1;
	}
	newfd = camellia_open(buf, OPEN_READ | OPEN_WRITE);
	if (newfd < 0) {
		return -1;
	}
	dup2(newfd, sockfd);
	close(newfd);
	return 0;
}

ssize_t send(int sockfd, const void *buf, size_t len, int flags) {
	if (flags != 0) {
		return errno = ENOSYS, -1;
	}
	return write(sockfd, buf, len);
}

ssize_t recv(int sockfd, void *buf, size_t len, int flags) {
	if (flags != 0) {
		return errno = ENOSYS, -1;
	}
	return read(sockfd, buf, len);
}

int getsockopt(int, int, int, void *, socklen_t *) {
	return errno = ENOSYS, -1;
}

int setsockopt(int, int, int, const void *, socklen_t) {
	return 0;
}

int getsockname(int sockfd, struct sockaddr *addr, socklen_t *addrlen) {
	// TODO /net/ should expose the local address somehow

	/* Outputs a fake address, just to satisfy curl.
	 * Can't be AF_UNSPEC, as curl tries to print it with inet_ntop. */
	(void)sockfd;
	struct sockaddr_in dummy = {
		.sin_family = AF_INET,
		.sin_port = 0,
		.sin_addr = {0},
	};
	if ((int)sizeof(dummy) < *addrlen) {
		*addrlen = sizeof(dummy);
	} else if (*addrlen < 0) {
		return errno = EINVAL, -1;
	}
	memcpy(addr, &dummy, *addrlen);
	return 0;
}