2010-11-13 17:38:19 +01:00
|
|
|
/*
|
|
|
|
* wlantest control interface
|
|
|
|
* Copyright (c) 2010, Jouni Malinen <j@w1.fi>
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License version 2 as
|
|
|
|
* published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* Alternatively, this software may be distributed under the terms of BSD
|
|
|
|
* license.
|
|
|
|
*
|
|
|
|
* See README and COPYING for more details.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "utils/includes.h"
|
|
|
|
#include <sys/un.h>
|
|
|
|
|
|
|
|
#include "utils/common.h"
|
|
|
|
#include "utils/eloop.h"
|
|
|
|
#include "wlantest.h"
|
|
|
|
#include "wlantest_ctrl.h"
|
|
|
|
|
|
|
|
|
2010-11-18 16:17:18 +01:00
|
|
|
static u8 * attr_get(u8 *buf, size_t buflen, enum wlantest_ctrl_attr attr,
|
|
|
|
size_t *len)
|
|
|
|
{
|
|
|
|
u8 *pos = buf;
|
|
|
|
|
|
|
|
while (pos + 8 <= buf + buflen) {
|
|
|
|
enum wlantest_ctrl_attr a;
|
|
|
|
size_t alen;
|
|
|
|
a = WPA_GET_BE32(pos);
|
|
|
|
pos += 4;
|
|
|
|
alen = WPA_GET_BE32(pos);
|
|
|
|
pos += 4;
|
|
|
|
if (pos + alen > buf + buflen) {
|
|
|
|
wpa_printf(MSG_DEBUG, "Invalid control message "
|
|
|
|
"attribute");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
if (a == attr) {
|
|
|
|
*len = alen;
|
|
|
|
return pos;
|
|
|
|
}
|
|
|
|
pos += alen;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-11-18 18:05:29 +01:00
|
|
|
static u8 * attr_add_be32(u8 *pos, u8 *end, enum wlantest_ctrl_attr attr,
|
|
|
|
u32 val)
|
|
|
|
{
|
|
|
|
if (pos == NULL || end - pos < 12)
|
|
|
|
return NULL;
|
|
|
|
WPA_PUT_BE32(pos, attr);
|
|
|
|
pos += 4;
|
|
|
|
WPA_PUT_BE32(pos, 4);
|
|
|
|
pos += 4;
|
|
|
|
WPA_PUT_BE32(pos, val);
|
|
|
|
pos += 4;
|
|
|
|
return pos;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-11-13 17:38:19 +01:00
|
|
|
static void ctrl_disconnect(struct wlantest *wt, int sock)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
wpa_printf(MSG_DEBUG, "Disconnect control interface connection %d",
|
|
|
|
sock);
|
|
|
|
for (i = 0; i < MAX_CTRL_CONNECTIONS; i++) {
|
|
|
|
if (wt->ctrl_socks[i] == sock) {
|
|
|
|
close(wt->ctrl_socks[i]);
|
|
|
|
eloop_unregister_read_sock(wt->ctrl_socks[i]);
|
|
|
|
wt->ctrl_socks[i] = -1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-11-18 16:17:18 +01:00
|
|
|
static void ctrl_send(struct wlantest *wt, int sock, const u8 *buf,
|
|
|
|
size_t len)
|
|
|
|
{
|
|
|
|
if (send(sock, buf, len, 0) < 0) {
|
|
|
|
wpa_printf(MSG_INFO, "send(ctrl): %s", strerror(errno));
|
|
|
|
ctrl_disconnect(wt, sock);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-11-13 17:38:19 +01:00
|
|
|
static void ctrl_send_simple(struct wlantest *wt, int sock,
|
|
|
|
enum wlantest_ctrl_cmd cmd)
|
|
|
|
{
|
|
|
|
u8 buf[4];
|
|
|
|
WPA_PUT_BE32(buf, cmd);
|
2010-11-18 16:17:18 +01:00
|
|
|
ctrl_send(wt, sock, buf, sizeof(buf));
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void ctrl_list_bss(struct wlantest *wt, int sock)
|
|
|
|
{
|
|
|
|
u8 buf[WLANTEST_CTRL_MAX_RESP_LEN], *pos, *len;
|
|
|
|
struct wlantest_bss *bss;
|
|
|
|
|
|
|
|
pos = buf;
|
|
|
|
WPA_PUT_BE32(pos, WLANTEST_CTRL_SUCCESS);
|
|
|
|
pos += 4;
|
|
|
|
WPA_PUT_BE32(pos, WLANTEST_ATTR_BSSID);
|
|
|
|
pos += 4;
|
|
|
|
len = pos; /* to be filled */
|
|
|
|
pos += 4;
|
|
|
|
|
|
|
|
dl_list_for_each(bss, &wt->bss, struct wlantest_bss, list) {
|
|
|
|
if (pos + ETH_ALEN > buf + WLANTEST_CTRL_MAX_RESP_LEN)
|
|
|
|
break;
|
|
|
|
os_memcpy(pos, bss->bssid, ETH_ALEN);
|
|
|
|
pos += ETH_ALEN;
|
2010-11-13 17:38:19 +01:00
|
|
|
}
|
2010-11-18 16:17:18 +01:00
|
|
|
|
|
|
|
WPA_PUT_BE32(len, pos - len - 4);
|
|
|
|
ctrl_send(wt, sock, buf, pos - buf);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void ctrl_list_sta(struct wlantest *wt, int sock, u8 *cmd, size_t clen)
|
|
|
|
{
|
|
|
|
u8 buf[WLANTEST_CTRL_MAX_RESP_LEN], *pos, *len;
|
|
|
|
u8 *bssid;
|
|
|
|
size_t bssid_len;
|
|
|
|
struct wlantest_bss *bss;
|
|
|
|
struct wlantest_sta *sta;
|
|
|
|
|
|
|
|
bssid = attr_get(cmd, clen, WLANTEST_ATTR_BSSID, &bssid_len);
|
|
|
|
if (bssid == NULL || bssid_len != ETH_ALEN) {
|
|
|
|
ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
bss = bss_get(wt, bssid);
|
|
|
|
if (bss == NULL) {
|
|
|
|
ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
pos = buf;
|
|
|
|
WPA_PUT_BE32(pos, WLANTEST_CTRL_SUCCESS);
|
|
|
|
pos += 4;
|
|
|
|
WPA_PUT_BE32(pos, WLANTEST_ATTR_STA_ADDR);
|
|
|
|
pos += 4;
|
|
|
|
len = pos; /* to be filled */
|
|
|
|
pos += 4;
|
|
|
|
|
|
|
|
dl_list_for_each(sta, &bss->sta, struct wlantest_sta, list) {
|
|
|
|
if (pos + ETH_ALEN > buf + WLANTEST_CTRL_MAX_RESP_LEN)
|
|
|
|
break;
|
|
|
|
os_memcpy(pos, sta->addr, ETH_ALEN);
|
|
|
|
pos += ETH_ALEN;
|
|
|
|
}
|
|
|
|
|
|
|
|
WPA_PUT_BE32(len, pos - len - 4);
|
|
|
|
ctrl_send(wt, sock, buf, pos - buf);
|
2010-11-13 17:38:19 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-11-18 16:36:08 +01:00
|
|
|
static void ctrl_flush(struct wlantest *wt, int sock)
|
|
|
|
{
|
|
|
|
wpa_printf(MSG_DEBUG, "Drop all collected BSS data");
|
|
|
|
bss_flush(wt);
|
|
|
|
ctrl_send_simple(wt, sock, WLANTEST_CTRL_SUCCESS);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-11-18 18:05:29 +01:00
|
|
|
static void ctrl_clear_sta_counters(struct wlantest *wt, int sock, u8 *cmd,
|
|
|
|
size_t clen)
|
|
|
|
{
|
|
|
|
u8 *addr;
|
|
|
|
size_t addr_len;
|
|
|
|
struct wlantest_bss *bss;
|
|
|
|
struct wlantest_sta *sta;
|
|
|
|
|
|
|
|
addr = attr_get(cmd, clen, WLANTEST_ATTR_BSSID, &addr_len);
|
|
|
|
if (addr == NULL || addr_len != ETH_ALEN) {
|
|
|
|
ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
bss = bss_get(wt, addr);
|
|
|
|
if (bss == NULL) {
|
|
|
|
ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
addr = attr_get(cmd, clen, WLANTEST_ATTR_STA_ADDR, &addr_len);
|
|
|
|
if (addr == NULL || addr_len != ETH_ALEN) {
|
|
|
|
ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
sta = sta_get(bss, addr);
|
|
|
|
if (sta == NULL) {
|
|
|
|
ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
os_memset(sta->counters, 0, sizeof(sta->counters));
|
|
|
|
ctrl_send_simple(wt, sock, WLANTEST_CTRL_SUCCESS);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void ctrl_clear_bss_counters(struct wlantest *wt, int sock, u8 *cmd,
|
|
|
|
size_t clen)
|
|
|
|
{
|
|
|
|
u8 *addr;
|
|
|
|
size_t addr_len;
|
|
|
|
struct wlantest_bss *bss;
|
|
|
|
|
|
|
|
addr = attr_get(cmd, clen, WLANTEST_ATTR_BSSID, &addr_len);
|
|
|
|
if (addr == NULL || addr_len != ETH_ALEN) {
|
|
|
|
ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
bss = bss_get(wt, addr);
|
|
|
|
if (bss == NULL) {
|
|
|
|
ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
os_memset(bss->counters, 0, sizeof(bss->counters));
|
|
|
|
ctrl_send_simple(wt, sock, WLANTEST_CTRL_SUCCESS);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void ctrl_get_sta_counter(struct wlantest *wt, int sock, u8 *cmd,
|
|
|
|
size_t clen)
|
|
|
|
{
|
|
|
|
u8 *addr;
|
|
|
|
size_t addr_len;
|
|
|
|
struct wlantest_bss *bss;
|
|
|
|
struct wlantest_sta *sta;
|
|
|
|
u32 counter;
|
|
|
|
u8 buf[4 + 12], *end, *pos;
|
|
|
|
|
|
|
|
addr = attr_get(cmd, clen, WLANTEST_ATTR_BSSID, &addr_len);
|
|
|
|
if (addr == NULL || addr_len != ETH_ALEN) {
|
|
|
|
ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
bss = bss_get(wt, addr);
|
|
|
|
if (bss == NULL) {
|
|
|
|
ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
addr = attr_get(cmd, clen, WLANTEST_ATTR_STA_ADDR, &addr_len);
|
|
|
|
if (addr == NULL || addr_len != ETH_ALEN) {
|
|
|
|
ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
sta = sta_get(bss, addr);
|
|
|
|
if (sta == NULL) {
|
|
|
|
ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
addr = attr_get(cmd, clen, WLANTEST_ATTR_STA_COUNTER, &addr_len);
|
|
|
|
if (addr == NULL || addr_len != 4) {
|
|
|
|
ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
counter = WPA_GET_BE32(addr);
|
|
|
|
if (counter >= NUM_WLANTEST_STA_COUNTER) {
|
|
|
|
ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
pos = buf;
|
|
|
|
end = buf + sizeof(buf);
|
|
|
|
WPA_PUT_BE32(pos, WLANTEST_CTRL_SUCCESS);
|
|
|
|
pos += 4;
|
|
|
|
pos = attr_add_be32(pos, end, WLANTEST_ATTR_COUNTER,
|
|
|
|
sta->counters[counter]);
|
|
|
|
ctrl_send(wt, sock, buf, pos - buf);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void ctrl_get_bss_counter(struct wlantest *wt, int sock, u8 *cmd,
|
|
|
|
size_t clen)
|
|
|
|
{
|
|
|
|
u8 *addr;
|
|
|
|
size_t addr_len;
|
|
|
|
struct wlantest_bss *bss;
|
|
|
|
u32 counter;
|
|
|
|
u8 buf[4 + 12], *end, *pos;
|
|
|
|
|
|
|
|
addr = attr_get(cmd, clen, WLANTEST_ATTR_BSSID, &addr_len);
|
|
|
|
if (addr == NULL || addr_len != ETH_ALEN) {
|
|
|
|
ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
bss = bss_get(wt, addr);
|
|
|
|
if (bss == NULL) {
|
|
|
|
ctrl_send_simple(wt, sock, WLANTEST_CTRL_FAILURE);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
addr = attr_get(cmd, clen, WLANTEST_ATTR_BSS_COUNTER, &addr_len);
|
|
|
|
if (addr == NULL || addr_len != 4) {
|
|
|
|
ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
counter = WPA_GET_BE32(addr);
|
|
|
|
if (counter >= NUM_WLANTEST_BSS_COUNTER) {
|
|
|
|
ctrl_send_simple(wt, sock, WLANTEST_CTRL_INVALID_CMD);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
pos = buf;
|
|
|
|
end = buf + sizeof(buf);
|
|
|
|
WPA_PUT_BE32(pos, WLANTEST_CTRL_SUCCESS);
|
|
|
|
pos += 4;
|
|
|
|
pos = attr_add_be32(pos, end, WLANTEST_ATTR_COUNTER,
|
|
|
|
bss->counters[counter]);
|
|
|
|
ctrl_send(wt, sock, buf, pos - buf);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-11-13 17:38:19 +01:00
|
|
|
static void ctrl_read(int sock, void *eloop_ctx, void *sock_ctx)
|
|
|
|
{
|
|
|
|
struct wlantest *wt = eloop_ctx;
|
|
|
|
u8 buf[WLANTEST_CTRL_MAX_CMD_LEN];
|
|
|
|
int len;
|
|
|
|
enum wlantest_ctrl_cmd cmd;
|
|
|
|
|
|
|
|
wpa_printf(MSG_EXCESSIVE, "New control interface message from %d",
|
|
|
|
sock);
|
|
|
|
len = recv(sock, buf, sizeof(buf), 0);
|
|
|
|
if (len < 0) {
|
|
|
|
wpa_printf(MSG_INFO, "recv(ctrl): %s", strerror(errno));
|
|
|
|
ctrl_disconnect(wt, sock);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (len == 0) {
|
|
|
|
ctrl_disconnect(wt, sock);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (len < 4) {
|
|
|
|
wpa_printf(MSG_INFO, "Too short control interface command "
|
|
|
|
"from %d", sock);
|
|
|
|
ctrl_disconnect(wt, sock);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
cmd = WPA_GET_BE32(buf);
|
|
|
|
wpa_printf(MSG_EXCESSIVE, "Control interface command %d from %d",
|
|
|
|
cmd, sock);
|
|
|
|
|
|
|
|
switch (cmd) {
|
|
|
|
case WLANTEST_CTRL_PING:
|
|
|
|
ctrl_send_simple(wt, sock, WLANTEST_CTRL_SUCCESS);
|
|
|
|
break;
|
|
|
|
case WLANTEST_CTRL_TERMINATE:
|
|
|
|
ctrl_send_simple(wt, sock, WLANTEST_CTRL_SUCCESS);
|
|
|
|
eloop_terminate();
|
|
|
|
break;
|
2010-11-18 16:17:18 +01:00
|
|
|
case WLANTEST_CTRL_LIST_BSS:
|
|
|
|
ctrl_list_bss(wt, sock);
|
|
|
|
break;
|
|
|
|
case WLANTEST_CTRL_LIST_STA:
|
|
|
|
ctrl_list_sta(wt, sock, buf + 4, len - 4);
|
|
|
|
break;
|
2010-11-18 16:36:08 +01:00
|
|
|
case WLANTEST_CTRL_FLUSH:
|
|
|
|
ctrl_flush(wt, sock);
|
|
|
|
break;
|
2010-11-18 18:05:29 +01:00
|
|
|
case WLANTEST_CTRL_CLEAR_STA_COUNTERS:
|
|
|
|
ctrl_clear_sta_counters(wt, sock, buf + 4, len - 4);
|
|
|
|
break;
|
|
|
|
case WLANTEST_CTRL_CLEAR_BSS_COUNTERS:
|
|
|
|
ctrl_clear_bss_counters(wt, sock, buf + 4, len - 4);
|
|
|
|
break;
|
|
|
|
case WLANTEST_CTRL_GET_STA_COUNTER:
|
|
|
|
ctrl_get_sta_counter(wt, sock, buf + 4, len - 4);
|
|
|
|
break;
|
|
|
|
case WLANTEST_CTRL_GET_BSS_COUNTER:
|
|
|
|
ctrl_get_bss_counter(wt, sock, buf + 4, len - 4);
|
|
|
|
break;
|
2010-11-13 17:38:19 +01:00
|
|
|
default:
|
|
|
|
ctrl_send_simple(wt, sock, WLANTEST_CTRL_UNKNOWN_CMD);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void ctrl_connect(int sock, void *eloop_ctx, void *sock_ctx)
|
|
|
|
{
|
|
|
|
struct wlantest *wt = eloop_ctx;
|
|
|
|
int conn, i;
|
|
|
|
|
|
|
|
conn = accept(sock, NULL, NULL);
|
|
|
|
if (conn < 0) {
|
|
|
|
wpa_printf(MSG_INFO, "accept(ctrl): %s", strerror(errno));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
wpa_printf(MSG_MSGDUMP, "New control interface connection %d", conn);
|
|
|
|
|
|
|
|
for (i = 0; i < MAX_CTRL_CONNECTIONS; i++) {
|
|
|
|
if (wt->ctrl_socks[i] < 0)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (i == MAX_CTRL_CONNECTIONS) {
|
|
|
|
wpa_printf(MSG_INFO, "No room for new control connection");
|
|
|
|
close(conn);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
wt->ctrl_socks[i] = conn;
|
|
|
|
eloop_register_read_sock(conn, ctrl_read, wt, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int ctrl_init(struct wlantest *wt)
|
|
|
|
{
|
|
|
|
struct sockaddr_un addr;
|
|
|
|
|
|
|
|
wt->ctrl_sock = socket(AF_UNIX, SOCK_SEQPACKET, 0);
|
|
|
|
if (wt->ctrl_sock < 0) {
|
|
|
|
wpa_printf(MSG_ERROR, "socket: %s", strerror(errno));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
os_memset(&addr, 0, sizeof(addr));
|
|
|
|
addr.sun_family = AF_UNIX;
|
|
|
|
os_strlcpy(addr.sun_path + 1, WLANTEST_SOCK_NAME,
|
|
|
|
sizeof(addr.sun_path) - 1);
|
|
|
|
if (bind(wt->ctrl_sock, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
|
|
|
|
wpa_printf(MSG_ERROR, "bind: %s", strerror(errno));
|
|
|
|
close(wt->ctrl_sock);
|
|
|
|
wt->ctrl_sock = -1;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (listen(wt->ctrl_sock, 5) < 0) {
|
|
|
|
wpa_printf(MSG_ERROR, "listen: %s", strerror(errno));
|
|
|
|
close(wt->ctrl_sock);
|
|
|
|
wt->ctrl_sock = -1;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (eloop_register_read_sock(wt->ctrl_sock, ctrl_connect, wt, NULL)) {
|
|
|
|
close(wt->ctrl_sock);
|
|
|
|
wt->ctrl_sock = -1;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void ctrl_deinit(struct wlantest *wt)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if (wt->ctrl_sock < 0)
|
|
|
|
return;
|
|
|
|
|
|
|
|
for (i = 0; i < MAX_CTRL_CONNECTIONS; i++) {
|
|
|
|
if (wt->ctrl_socks[i] >= 0) {
|
|
|
|
close(wt->ctrl_socks[i]);
|
|
|
|
eloop_unregister_read_sock(wt->ctrl_socks[i]);
|
|
|
|
wt->ctrl_socks[i] = -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
eloop_unregister_read_sock(wt->ctrl_sock);
|
|
|
|
close(wt->ctrl_sock);
|
|
|
|
wt->ctrl_sock = -1;
|
|
|
|
}
|