OpenCores
URL https://opencores.org/ocsvn/openrisc/openrisc/trunk

Subversion Repositories openrisc

[/] [openrisc/] [trunk/] [rtos/] [freertos-6.1.1/] [Demo/] [Common/] [ethernet/] [FreeRTOS-uIP/] [uip.c] - Blame information for rev 606

Details | Compare with Previous | View Log

Line No. Rev Author Line
1 606 jeremybenn
#define DEBUG_PRINTF( ... )             /*printf(__VA_ARGS__)*/
2
 
3
/**
4
 * \defgroup uip The uIP TCP/IP stack
5
 * @{
6
 *
7
 * uIP is an implementation of the TCP/IP protocol stack intended for
8
 * small 8-bit and 16-bit microcontrollers.
9
 *
10
 * uIP provides the necessary protocols for Internet communication,
11
 * with a very small code footprint and RAM requirements - the uIP
12
 * code size is on the order of a few kilobytes and RAM usage is on
13
 * the order of a few hundred bytes.
14
 */
15
 
16
/**
17
 * \file
18
 * The uIP TCP/IP stack code.
19
 * \author Adam Dunkels <adam@dunkels.com>
20
 */
21
 
22
/*
23
 * Copyright (c) 2001-2003, Adam Dunkels.
24
 * All rights reserved.
25
 *
26
 * Redistribution and use in source and binary forms, with or without
27
 * modification, are permitted provided that the following conditions
28
 * are met:
29
 * 1. Redistributions of source code must retain the above copyright
30
 *    notice, this list of conditions and the following disclaimer.
31
 * 2. Redistributions in binary form must reproduce the above copyright
32
 *    notice, this list of conditions and the following disclaimer in the
33
 *    documentation and/or other materials provided with the distribution.
34
 * 3. The name of the author may not be used to endorse or promote
35
 *    products derived from this software without specific prior
36
 *    written permission.
37
 *
38
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS
39
 * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
40
 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
41
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
42
 * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
43
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
44
 * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
45
 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
46
 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
47
 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
48
 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
49
 *
50
 * This file is part of the uIP TCP/IP stack.
51
 *
52
 * $Id: uip.c 2 2011-07-17 20:13:17Z filepang@gmail.com $
53
 *
54
 */
55
 
56
/*
57
 * uIP is a small implementation of the IP, UDP and TCP protocols (as
58
 * well as some basic ICMP stuff). The implementation couples the IP,
59
 * UDP, TCP and the application layers very tightly. To keep the size
60
 * of the compiled code down, this code frequently uses the goto
61
 * statement. While it would be possible to break the uip_process()
62
 * function into many smaller functions, this would increase the code
63
 * size because of the overhead of parameter passing and the fact that
64
 * the optimier would not be as efficient.
65
 *
66
 * The principle is that we have a small buffer, called the uip_buf,
67
 * in which the device driver puts an incoming packet. The TCP/IP
68
 * stack parses the headers in the packet, and calls the
69
 * application. If the remote host has sent data to the application,
70
 * this data is present in the uip_buf and the application read the
71
 * data from there. It is up to the application to put this data into
72
 * a byte stream if needed. The application will not be fed with data
73
 * that is out of sequence.
74
 *
75
 * If the application whishes to send data to the peer, it should put
76
 * its data into the uip_buf. The uip_appdata pointer points to the
77
 * first available byte. The TCP/IP stack will calculate the
78
 * checksums, and fill in the necessary header fields and finally send
79
 * the packet back to the peer.
80
*/
81
#include "uip.h"
82
#include "uipopt.h"
83
#include "uip_arch.h"
84
#include "uip_arp.h"
85
#include "FreeRTOS.h"
86
 
87
#if UIP_CONF_IPV6
88
        #include "uip-neighbor.h"
89
#endif /* UIP_CONF_IPV6 */
90
 
91
#include <string.h>
92
 
93
/*---------------------------------------------------------------------------*/
94
 
95
/* Variable definitions. */
96
 
97
/* The IP address of this host. If it is defined to be fixed (by
98
   setting UIP_FIXEDADDR to 1 in uipopt.h), the address is set
99
   here. Otherwise, the address */
100
#if UIP_FIXEDADDR > 0
101
const uip_ipaddr_t                      uip_hostaddr = { HTONS( (UIP_IPADDR0 << 8) | UIP_IPADDR1 ), HTONS( (UIP_IPADDR2 << 8) | UIP_IPADDR3 ) };
102
const uip_ipaddr_t                      uip_draddr = { HTONS( (UIP_DRIPADDR0 << 8) | UIP_DRIPADDR1 ), HTONS( (UIP_DRIPADDR2 << 8) | UIP_DRIPADDR3 ) };
103
const uip_ipaddr_t                      uip_netmask = { HTONS( (UIP_NETMASK0 << 8) | UIP_NETMASK1 ), HTONS( (UIP_NETMASK2 << 8) | UIP_NETMASK3 ) };
104
#else
105
uip_ipaddr_t                            uip_hostaddr, uip_draddr, uip_netmask;
106
#endif /* UIP_FIXEDADDR */
107
 
108
static const uip_ipaddr_t       all_ones_addr =
109
#if UIP_CONF_IPV6
110
{ 0xffff, 0xffff, 0xffff, 0xffff, 0xffff, 0xffff, 0xffff, 0xffff };
111
#else /* UIP_CONF_IPV6 */
112
{
113
        0xffff, 0xffff
114
};
115
#endif /* UIP_CONF_IPV6 */
116
static const uip_ipaddr_t       all_zeroes_addr =
117
#if UIP_CONF_IPV6
118
{ 0x0000, 0x0000, 0x0000, 0x0000, 0x0000, 0x0000, 0x0000, 0x0000 };
119
#else /* UIP_CONF_IPV6 */
120
{
121
        0x0000, 0x0000
122
};
123
#endif /* UIP_CONF_IPV6 */
124
 
125
#if UIP_FIXEDETHADDR
126
const struct uip_eth_addr       uip_ethaddr = { { UIP_ETHADDR0, UIP_ETHADDR1, UIP_ETHADDR2, UIP_ETHADDR3, UIP_ETHADDR4, UIP_ETHADDR5 } };
127
#else
128
struct uip_eth_addr                     uip_ethaddr = { { 0, 0, 0, 0, 0, 0 } };
129
#endif
130
#ifndef UIP_CONF_EXTERNAL_BUFFER
131
        #ifdef __ICCARM__
132
                #pragma data_alignment = 4
133
u8_t uip_buf[UIP_BUFSIZE + 2];  /* The packet buffer that contains incoming packets. */
134
        #else
135
u8_t                            uip_buf[UIP_BUFSIZE + 2] ALIGN_STRUCT_END;      /* The packet buffer that contains incoming packets. */
136
        #endif
137
#endif /* UIP_CONF_EXTERNAL_BUFFER */
138
 
139
void                            *uip_appdata;                           /* The uip_appdata pointer points to
140
                                    application data. */
141
void                            *uip_sappdata;                          /* The uip_appdata pointer points to
142
                                    the application data which is to
143
                                    be sent. */
144
#if UIP_URGDATA > 0
145
void                            *uip_urgdata;                           /* The uip_urgdata pointer points to
146
                                    urgent data (out-of-band data), if
147
                                    present. */
148
u16_t                           uip_urglen, uip_surglen;
149
#endif /* UIP_URGDATA > 0 */
150
 
151
u16_t                           uip_len, uip_slen;
152
 
153
/* The uip_len is either 8 or 16 bits,
154
                                depending on the maximum packet
155
                                size. */
156
u8_t                            uip_flags;                                      /* The uip_flags variable is used for
157
                                communication between the TCP/IP stack
158
                                and the application program. */
159
struct uip_conn         *uip_conn;                                      /* uip_conn always points to the current
160
                                connection. */
161
 
162
struct uip_conn         uip_conns[UIP_CONNS];
163
 
164
/* The uip_conns array holds all TCP
165
                                connections. */
166
u16_t                           uip_listenports[UIP_LISTENPORTS];
167
 
168
/* The uip_listenports list all currently
169
                                listning ports. */
170
#if UIP_UDP
171
struct uip_udp_conn *uip_udp_conn;
172
struct uip_udp_conn uip_udp_conns[UIP_UDP_CONNS];
173
#endif /* UIP_UDP */
174
 
175
static u16_t            ipid;                                           /* Ths ipid variable is an increasing
176
                                number that is used for the IP ID
177
                                field. */
178
 
179
void uip_setipid( u16_t id )
180
{
181
        ipid = id;
182
}
183
 
184
static u8_t             iss[4];                                                 /* The iss variable is used for the TCP
185
                                initial sequence number. */
186
 
187
#if UIP_ACTIVE_OPEN
188
static u16_t    lastport;                                               /* Keeps track of the last port used for
189
                                a new connection. */
190
#endif /* UIP_ACTIVE_OPEN */
191
 
192
/* Temporary variables. */
193
u8_t                    uip_acc32[4];
194
static u8_t             c, opt;
195
static u16_t    tmp16;
196
 
197
/* Structures and definitions. */
198
#define TCP_FIN                                                         0x01
199
#define TCP_SYN                                                         0x02
200
#define TCP_RST                                                         0x04
201
#define TCP_PSH                                                         0x08
202
#define TCP_ACK                                                         0x10
203
#define TCP_URG                                                         0x20
204
#define TCP_CTL                                                         0x3f
205
 
206
#define TCP_OPT_END                                                     0        /* End of TCP options list */
207
#define TCP_OPT_NOOP                                            1       /* "No-operation" TCP option */
208
#define TCP_OPT_MSS                                                     2       /* Maximum segment size TCP option */
209
 
210
#define TCP_OPT_MSS_LEN                                         4       /* Length of TCP MSS option. */
211
 
212
#define ICMP_ECHO_REPLY                                         0
213
#define ICMP_ECHO                                                       8
214
 
215
#define ICMP6_ECHO_REPLY                                        129
216
#define ICMP6_ECHO                                                      128
217
#define ICMP6_NEIGHBOR_SOLICITATION                     135
218
#define ICMP6_NEIGHBOR_ADVERTISEMENT            136
219
 
220
#define ICMP6_FLAG_S                                            ( 1 << 6 )
221
#define ICMP6_OPTION_SOURCE_LINK_ADDRESS        1
222
#define ICMP6_OPTION_TARGET_LINK_ADDRESS        2
223
 
224
/* Macros. */
225
#define BUF             ( ( struct uip_tcpip_hdr * ) &uip_buf[UIP_LLH_LEN] )
226
#define FBUF    ( ( struct uip_tcpip_hdr * ) &uip_reassbuf[0] )
227
#define ICMPBUF ( ( struct uip_icmpip_hdr * ) &uip_buf[UIP_LLH_LEN] )
228
#define UDPBUF  ( ( struct uip_udpip_hdr * ) &uip_buf[UIP_LLH_LEN] )
229
#if UIP_STATISTICS == 1
230
struct uip_stats        uip_stat;
231
        #define UIP_STAT( s )   s
232
#else
233
        #define UIP_STAT( s )
234
#endif /* UIP_STATISTICS == 1 */
235
 
236
#if UIP_LOGGING == 1
237
        #include <stdio.h>
238
void    uip_log( char *msg );
239
        #define UIP_LOG( m )    uip_log( m )
240
#else
241
        #define UIP_LOG( m )
242
#endif /* UIP_LOGGING == 1 */
243
 
244
#if !UIP_ARCH_ADD32
245
void uip_add32( u8_t *op32, u16_t op16 )
246
{
247
        uip_acc32[3] = op32[3] + ( op16 & 0xff );
248
        uip_acc32[2] = op32[2] + ( op16 >> 8 );
249
        uip_acc32[1] = op32[1];
250
        uip_acc32[0] = op32[0];
251
 
252
        if( uip_acc32[2] < (op16 >> 8) )
253
        {
254
                ++uip_acc32[1];
255
                if( uip_acc32[1] == 0 )
256
                {
257
                        ++uip_acc32[0];
258
                }
259
        }
260
 
261
        if( uip_acc32[3] < (op16 & 0xff) )
262
        {
263
                ++uip_acc32[2];
264
                if( uip_acc32[2] == 0 )
265
                {
266
                        ++uip_acc32[1];
267
                        if( uip_acc32[1] == 0 )
268
                        {
269
                                ++uip_acc32[0];
270
                        }
271
                }
272
        }
273
}
274
 
275
#endif /* UIP_ARCH_ADD32 */
276
 
277
#if !UIP_ARCH_CHKSUM
278
 
279
/*---------------------------------------------------------------------------*/
280
static u16_t chksum( u16_t sum, const u8_t *data, u16_t len )
281
{
282
        u16_t           t;
283
        const u8_t      *dataptr;
284
        const u8_t      *last_byte;
285
 
286
        dataptr = data;
287
        last_byte = data + len - 1;
288
 
289
        while( dataptr < last_byte )
290
        {                               /* At least two more bytes */
291
                t = ( dataptr[0] << 8 ) + dataptr[1];
292
                sum += t;
293
                if( sum < t )
294
                {
295
                        sum++;  /* carry */
296
                }
297
 
298
                dataptr += 2;
299
        }
300
 
301
        if( dataptr == last_byte )
302
        {
303
                t = ( dataptr[0] << 8 ) + 0;
304
                sum += t;
305
                if( sum < t )
306
                {
307
                        sum++;  /* carry */
308
                }
309
        }
310
 
311
        /* Return sum in host byte order. */
312
        return sum;
313
}
314
 
315
/*---------------------------------------------------------------------------*/
316
u16_t uip_chksum( u16_t *data, u16_t len )
317
{
318
        return htons( chksum(0, ( u8_t * ) data, len) );
319
}
320
 
321
/*---------------------------------------------------------------------------*/
322
        #ifndef UIP_ARCH_IPCHKSUM
323
u16_t uip_ipchksum( void )
324
{
325
        u16_t   sum;
326
 
327
        sum = chksum( 0, &uip_buf[UIP_LLH_LEN], UIP_IPH_LEN );
328
        DEBUG_PRINTF( "uip_ipchksum: sum 0x%04x\n", sum );
329
        return( sum == 0 ) ? 0xffff : htons( sum );
330
}
331
 
332
        #endif
333
 
334
/*---------------------------------------------------------------------------*/
335
static u16_t upper_layer_chksum( u8_t proto )
336
{
337
        u16_t   upper_layer_len;
338
        u16_t   sum;
339
 
340
                #if UIP_CONF_IPV6
341
        upper_layer_len = ( ((u16_t) (BUF->len[0]) << 8) + BUF->len[1] );
342
                #else /* UIP_CONF_IPV6 */
343
        upper_layer_len = ( ((u16_t) (BUF->len[0]) << 8) + BUF->len[1] ) - UIP_IPH_LEN;
344
                #endif /* UIP_CONF_IPV6 */
345
 
346
        /* First sum pseudoheader. */
347
 
348
        /* IP protocol and length fields. This addition cannot carry. */
349
        sum = upper_layer_len + proto;
350
 
351
        /* Sum IP source and destination addresses. */
352
        sum = chksum( sum, ( u8_t * ) &BUF->srcipaddr[0], 2 * sizeof(uip_ipaddr_t) );
353
 
354
        /* Sum TCP header and data. */
355
        sum = chksum( sum, &uip_buf[UIP_IPH_LEN + UIP_LLH_LEN], upper_layer_len );
356
 
357
        return( sum == 0 ) ? 0xffff : htons( sum );
358
}
359
 
360
/*---------------------------------------------------------------------------*/
361
        #if UIP_CONF_IPV6
362
u16_t uip_icmp6chksum( void )
363
{
364
        return upper_layer_chksum( UIP_PROTO_ICMP6 );
365
}
366
 
367
        #endif /* UIP_CONF_IPV6 */
368
 
369
/*---------------------------------------------------------------------------*/
370
u16_t uip_tcpchksum( void )
371
{
372
        return upper_layer_chksum( UIP_PROTO_TCP );
373
}
374
 
375
/*---------------------------------------------------------------------------*/
376
        #if UIP_UDP_CHECKSUMS
377
u16_t uip_udpchksum( void )
378
{
379
        return upper_layer_chksum( UIP_PROTO_UDP );
380
}
381
 
382
        #endif /* UIP_UDP_CHECKSUMS */
383
#endif /* UIP_ARCH_CHKSUM */
384
 
385
/*---------------------------------------------------------------------------*/
386
void uip_init( void )
387
{
388
        for( c = 0; c < UIP_LISTENPORTS; ++c )
389
        {
390
                uip_listenports[c] = 0;
391
        }
392
 
393
        for( c = 0; c < UIP_CONNS; ++c )
394
        {
395
                uip_conns[c].tcpstateflags = UIP_CLOSED;
396
        }
397
 
398
        #if UIP_ACTIVE_OPEN
399
        lastport = 1024;
400
        #endif /* UIP_ACTIVE_OPEN */
401
 
402
        #if UIP_UDP
403
        for( c = 0; c < UIP_UDP_CONNS; ++c )
404
        {
405
                uip_udp_conns[c].lport = 0;
406
        }
407
 
408
        #endif /* UIP_UDP */
409
 
410
        /* IPv4 initialization. */
411
        #if UIP_FIXEDADDR == 0
412
 
413
        /*  uip_hostaddr[0] = uip_hostaddr[1] = 0;*/
414
        #endif /* UIP_FIXEDADDR */
415
}
416
 
417
/*---------------------------------------------------------------------------*/
418
#if UIP_ACTIVE_OPEN
419
struct uip_conn *uip_connect( uip_ipaddr_t *ripaddr, u16_t rport )
420
{
421
        register struct uip_conn        *conn, *cconn;
422
 
423
        /* Find an unused local port. */
424
again:
425
        ++lastport;
426
 
427
        if( lastport >= 32000 )
428
        {
429
                lastport = 4096;
430
        }
431
 
432
        /* Check if this port is already in use, and if so try to find
433
     another one. */
434
        for( c = 0; c < UIP_CONNS; ++c )
435
        {
436
                conn = &uip_conns[c];
437
                if( conn->tcpstateflags != UIP_CLOSED && conn->lport == htons(lastport) )
438
                {
439
                        goto again;
440
                }
441
        }
442
 
443
        conn = 0;
444
        for( c = 0; c < UIP_CONNS; ++c )
445
        {
446
                cconn = &uip_conns[c];
447
                if( cconn->tcpstateflags == UIP_CLOSED )
448
                {
449
                        conn = cconn;
450
                        break;
451
                }
452
 
453
                if( cconn->tcpstateflags == UIP_TIME_WAIT )
454
                {
455
                        if( conn == 0 || cconn->timer > conn->timer )
456
                        {
457
                                conn = cconn;
458
                        }
459
                }
460
        }
461
 
462
        if( conn == 0 )
463
        {
464
                return 0;
465
        }
466
 
467
        conn->tcpstateflags = UIP_SYN_SENT;
468
 
469
        conn->snd_nxt[0] = iss[0];
470
        conn->snd_nxt[1] = iss[1];
471
        conn->snd_nxt[2] = iss[2];
472
        conn->snd_nxt[3] = iss[3];
473
 
474
        conn->initialmss = conn->mss = UIP_TCP_MSS;
475
 
476
        conn->len = 1;          /* TCP length of the SYN is one. */
477
        conn->nrtx = 0;
478
        conn->timer = 1;        /* Send the SYN next time around. */
479
        conn->rto = UIP_RTO;
480
        conn->sa = 0;
481
        conn->sv = 16;          /* Initial value of the RTT variance. */
482
        conn->lport = htons( lastport );
483
        conn->rport = rport;
484
        uip_ipaddr_copy( &conn->ripaddr, ripaddr );
485
 
486
        return conn;
487
}
488
 
489
#endif /* UIP_ACTIVE_OPEN */
490
 
491
/*---------------------------------------------------------------------------*/
492
#if UIP_UDP
493
struct uip_udp_conn *uip_udp_new( uip_ipaddr_t *ripaddr, u16_t rport )
494
{
495
        register struct uip_udp_conn    *conn;
496
 
497
        /* Find an unused local port. */
498
again:
499
        ++lastport;
500
 
501
        if( lastport >= 32000 )
502
        {
503
                lastport = 4096;
504
        }
505
 
506
        for( c = 0; c < UIP_UDP_CONNS; ++c )
507
        {
508
                if( uip_udp_conns[c].lport == htons(lastport) )
509
                {
510
                        goto again;
511
                }
512
        }
513
 
514
        conn = 0;
515
        for( c = 0; c < UIP_UDP_CONNS; ++c )
516
        {
517
                if( uip_udp_conns[c].lport == 0 )
518
                {
519
                        conn = &uip_udp_conns[c];
520
                        break;
521
                }
522
        }
523
 
524
        if( conn == 0 )
525
        {
526
                return 0;
527
        }
528
 
529
        conn->lport = HTONS( lastport );
530
        conn->rport = rport;
531
        if( ripaddr == NULL )
532
        {
533
                memset( conn->ripaddr, 0, sizeof(uip_ipaddr_t) );
534
        }
535
        else
536
        {
537
                uip_ipaddr_copy( &conn->ripaddr, ripaddr );
538
        }
539
 
540
        conn->ttl = UIP_TTL;
541
 
542
        return conn;
543
}
544
 
545
#endif /* UIP_UDP */
546
 
547
/*---------------------------------------------------------------------------*/
548
void uip_unlisten( u16_t port )
549
{
550
        for( c = 0; c < UIP_LISTENPORTS; ++c )
551
        {
552
                if( uip_listenports[c] == port )
553
                {
554
                        uip_listenports[c] = 0;
555
                        return;
556
                }
557
        }
558
}
559
 
560
/*---------------------------------------------------------------------------*/
561
void uip_listen( u16_t port )
562
{
563
        for( c = 0; c < UIP_LISTENPORTS; ++c )
564
        {
565
                if( uip_listenports[c] == 0 )
566
                {
567
                        uip_listenports[c] = port;
568
                        return;
569
                }
570
        }
571
}
572
 
573
/*---------------------------------------------------------------------------*/
574
 
575
/* XXX: IP fragment reassembly: not well-tested. */
576
#if UIP_REASSEMBLY && !UIP_CONF_IPV6
577
        #define UIP_REASS_BUFSIZE       ( UIP_BUFSIZE - UIP_LLH_LEN )
578
static u8_t                     uip_reassbuf[UIP_REASS_BUFSIZE];
579
static u8_t                     uip_reassbitmap[UIP_REASS_BUFSIZE / ( 8 * 8 )];
580
static const u8_t       bitmap_bits[8] = { 0xff, 0x7f, 0x3f, 0x1f, 0x0f, 0x07, 0x03, 0x01 };
581
static u16_t            uip_reasslen;
582
static u8_t                     uip_reassflags;
583
        #define UIP_REASS_FLAG_LASTFRAG 0x01
584
static u8_t                     uip_reasstmr;
585
 
586
        #define IP_MF   0x20
587
 
588
static u8_t uip_reass( void )
589
{
590
        u16_t   offset, len;
591
        u16_t   i;
592
 
593
        /* If ip_reasstmr is zero, no packet is present in the buffer, so we
594
     write the IP header of the fragment into the reassembly
595
     buffer. The timer is updated with the maximum age. */
596
        if( uip_reasstmr == 0 )
597
        {
598
                memcpy( uip_reassbuf, &BUF->vhl, UIP_IPH_LEN );
599
                uip_reasstmr = UIP_REASS_MAXAGE;
600
                uip_reassflags = 0;
601
 
602
                /* Clear the bitmap. */
603
                memset( uip_reassbitmap, 0, sizeof(uip_reassbitmap) );
604
        }
605
 
606
        /* Check if the incoming fragment matches the one currently present
607
     in the reasembly buffer. If so, we proceed with copying the
608
     fragment into the buffer. */
609
        if
610
        (
611
                BUF->srcipaddr[0] == FBUF->srcipaddr[0] &&
612
                BUF->srcipaddr[1] == FBUF->srcipaddr[1] &&
613
                BUF->destipaddr[0] == FBUF->destipaddr[0] &&
614
                BUF->destipaddr[1] == FBUF->destipaddr[1] &&
615
                BUF->ipid[0] == FBUF->ipid[0] &&
616
                BUF->ipid[1] == FBUF->ipid[1]
617
        )
618
        {
619
                len = ( BUF->len[0] << 8 ) + BUF->len[1] - ( BUF->vhl & 0x0f ) * 4;
620
                offset = ( ((BUF->ipoffset[0] & 0x3f) << 8) + BUF->ipoffset[1] ) * 8;
621
 
622
                /* If the offset or the offset + fragment length overflows the
623
       reassembly buffer, we discard the entire packet. */
624
                if( offset > UIP_REASS_BUFSIZE || offset + len > UIP_REASS_BUFSIZE )
625
                {
626
                        uip_reasstmr = 0;
627
                        goto nullreturn;
628
                }
629
 
630
                /* Copy the fragment into the reassembly buffer, at the right
631
       offset. */
632
                memcpy( &uip_reassbuf[UIP_IPH_LEN + offset], ( char * ) BUF + ( int ) ((BUF->vhl & 0x0f) * 4), len );
633
 
634
                /* Update the bitmap. */
635
                if( offset / (8 * 8) == (offset + len) / (8 * 8) )
636
                {
637
                        /* If the two endpoints are in the same byte, we only update
638
         that byte. */
639
                        uip_reassbitmap[offset / ( 8 * 8 )] |= bitmap_bits[( offset / 8 ) & 7] &~bitmap_bits[( (offset + len) / 8 ) & 7];
640
                }
641
                else
642
                {
643
                        /* If the two endpoints are in different bytes, we update the
644
         bytes in the endpoints and fill the stuff inbetween with
645
         0xff. */
646
                        uip_reassbitmap[offset / ( 8 * 8 )] |= bitmap_bits[( offset / 8 ) & 7];
647
                        for( i = 1 + offset / (8 * 8); i < (offset + len) / (8 * 8); ++i )
648
                        {
649
                                uip_reassbitmap[i] = 0xff;
650
                        }
651
 
652
                        uip_reassbitmap[( offset + len ) / ( 8 * 8 )] |= ~bitmap_bits[( (offset + len) / 8 ) & 7];
653
                }
654
 
655
                /* If this fragment has the More Fragments flag set to zero, we
656
       know that this is the last fragment, so we can calculate the
657
       size of the entire packet. We also set the
658
       IP_REASS_FLAG_LASTFRAG flag to indicate that we have received
659
       the final fragment. */
660
                if( (BUF->ipoffset[0] & IP_MF) == 0 )
661
                {
662
                        uip_reassflags |= UIP_REASS_FLAG_LASTFRAG;
663
                        uip_reasslen = offset + len;
664
                }
665
 
666
                /* Finally, we check if we have a full packet in the buffer. We do
667
       this by checking if we have the last fragment and if all bits
668
       in the bitmap are set. */
669
                if( uip_reassflags & UIP_REASS_FLAG_LASTFRAG )
670
                {
671
                        /* Check all bytes up to and including all but the last byte in
672
         the bitmap. */
673
                        for( i = 0; i < uip_reasslen / (8 * 8) - 1; ++i )
674
                        {
675
                                if( uip_reassbitmap[i] != 0xff )
676
                                {
677
                                        goto nullreturn;
678
                                }
679
                        }
680
 
681
                        /* Check the last byte in the bitmap. It should contain just the
682
         right amount of bits. */
683
                        if( uip_reassbitmap[uip_reasslen / (8 * 8)] != (u8_t)~bitmap_bits[uip_reasslen / 8 & 7] )
684
                        {
685
                                goto nullreturn;
686
                        }
687
 
688
                        /* If we have come this far, we have a full packet in the
689
         buffer, so we allocate a pbuf and copy the packet into it. We
690
         also reset the timer. */
691
                        uip_reasstmr = 0;
692
                        memcpy( BUF, FBUF, uip_reasslen );
693
 
694
                        /* Pretend to be a "normal" (i.e., not fragmented) IP packet
695
         from now on. */
696
                        BUF->ipoffset[0] = BUF->ipoffset[1] = 0;
697
                        BUF->len[0] = uip_reasslen >> 8;
698
                        BUF->len[1] = uip_reasslen & 0xff;
699
                        BUF->ipchksum = 0;
700
                        BUF->ipchksum = ~( uip_ipchksum() );
701
 
702
                        return uip_reasslen;
703
                }
704
        }
705
 
706
nullreturn:
707
        return 0;
708
}
709
 
710
#endif /* UIP_REASSEMBLY */
711
 
712
/*---------------------------------------------------------------------------*/
713
static void uip_add_rcv_nxt( u16_t n )
714
{
715
        uip_add32( uip_conn->rcv_nxt, n );
716
        uip_conn->rcv_nxt[0] = uip_acc32[0];
717
        uip_conn->rcv_nxt[1] = uip_acc32[1];
718
        uip_conn->rcv_nxt[2] = uip_acc32[2];
719
        uip_conn->rcv_nxt[3] = uip_acc32[3];
720
}
721
 
722
/*---------------------------------------------------------------------------*/
723
void uip_process( u8_t flag )
724
{
725
        register struct uip_conn        *uip_connr = uip_conn;
726
 
727
        #if UIP_UDP
728
        if( flag == UIP_UDP_SEND_CONN )
729
        {
730
                goto udp_send;
731
        }
732
 
733
        #endif /* UIP_UDP */
734
 
735
        uip_sappdata = uip_appdata = &uip_buf[UIP_IPTCPH_LEN + UIP_LLH_LEN];
736
 
737
        /* Check if we were invoked because of a poll request for a
738
     particular connection. */
739
        if( flag == UIP_POLL_REQUEST )
740
        {
741
                if( (uip_connr->tcpstateflags & UIP_TS_MASK) == UIP_ESTABLISHED && !uip_outstanding(uip_connr) )
742
                {
743
                        uip_flags = UIP_POLL;
744
                        UIP_APPCALL();
745
                        goto appsend;
746
                }
747
 
748
                goto drop;
749
 
750
                /* Check if we were invoked because of the perodic timer fireing. */
751
        }
752
        else if( flag == UIP_TIMER )
753
        {
754
                #if UIP_REASSEMBLY
755
                if( uip_reasstmr != 0 )
756
                {
757
                        --uip_reasstmr;
758
                }
759
 
760
                #endif /* UIP_REASSEMBLY */
761
 
762
                /* Increase the initial sequence number. */
763
                if( ++iss[3] == 0 )
764
                {
765
                        if( ++iss[2] == 0 )
766
                        {
767
                                if( ++iss[1] == 0 )
768
                                {
769
                                        ++iss[0];
770
                                }
771
                        }
772
                }
773
 
774
                /* Reset the length variables. */
775
                uip_len = 0;
776
                uip_slen = 0;
777
 
778
                /* Check if the connection is in a state in which we simply wait
779
       for the connection to time out. If so, we increase the
780
       connection's timer and remove the connection if it times
781
       out. */
782
                if( uip_connr->tcpstateflags == UIP_TIME_WAIT || uip_connr->tcpstateflags == UIP_FIN_WAIT_2 )
783
                {
784
                        ++( uip_connr->timer );
785
                        if( uip_connr->timer == UIP_TIME_WAIT_TIMEOUT )
786
                        {
787
                                uip_connr->tcpstateflags = UIP_CLOSED;
788
                        }
789
                }
790
                else if( uip_connr->tcpstateflags != UIP_CLOSED )
791
                {
792
                        /* If the connection has outstanding data, we increase the
793
         connection's timer and see if it has reached the RTO value
794
         in which case we retransmit. */
795
                        if( uip_outstanding(uip_connr) )
796
                        {
797
                                uip_connr->timer = uip_connr->timer - 1;
798
                                if( uip_connr->timer == 0 )
799
                                {
800
                                        if
801
                                        (
802
                                                uip_connr->nrtx == UIP_MAXRTX ||
803
                                                (
804
                                                        (uip_connr->tcpstateflags == UIP_SYN_SENT || uip_connr->tcpstateflags == UIP_SYN_RCVD) &&
805
                                                        uip_connr->nrtx == UIP_MAXSYNRTX
806
                                                )
807
                                        )
808
                                        {
809
                                                uip_connr->tcpstateflags = UIP_CLOSED;
810
 
811
                                                /* We call UIP_APPCALL() with uip_flags set to
812
               UIP_TIMEDOUT to inform the application that the
813
               connection has timed out. */
814
                                                uip_flags = UIP_TIMEDOUT;
815
                                                UIP_APPCALL();
816
 
817
                                                /* We also send a reset packet to the remote host. */
818
                                                BUF->flags = TCP_RST | TCP_ACK;
819
                                                goto tcp_send_nodata;
820
                                        }
821
 
822
                                        /* Exponential backoff. */
823
                                        uip_connr->timer = UIP_RTO << ( uip_connr->nrtx > 4 ? 4 : uip_connr->nrtx );
824
                                        ++( uip_connr->nrtx );
825
 
826
                                        /* Ok, so we need to retransmit. We do this differently
827
             depending on which state we are in. In ESTABLISHED, we
828
             call upon the application so that it may prepare the
829
             data for the retransmit. In SYN_RCVD, we resend the
830
             SYNACK that we sent earlier and in LAST_ACK we have to
831
             retransmit our FINACK. */
832
                                        UIP_STAT( ++uip_stat.tcp.rexmit );
833
                                        switch( uip_connr->tcpstateflags & UIP_TS_MASK )
834
                                        {
835
                                                case UIP_SYN_RCVD:
836
                                                        /* In the SYN_RCVD state, we should retransmit our
837
               SYNACK. */
838
                                                        goto tcp_send_synack;
839
 
840
                                                        #if UIP_ACTIVE_OPEN
841
 
842
                                                case UIP_SYN_SENT:
843
                                                        /* In the SYN_SENT state, we retransmit out SYN. */
844
                                                        BUF->flags = 0;
845
                                                        goto tcp_send_syn;
846
                                                        #endif /* UIP_ACTIVE_OPEN */
847
 
848
                                                case UIP_ESTABLISHED:
849
                                                        /* In the ESTABLISHED state, we call upon the application
850
               to do the actual retransmit after which we jump into
851
               the code for sending out the packet (the apprexmit
852
               label). */
853
                                                        uip_flags = UIP_REXMIT;
854
                                                        UIP_APPCALL();
855
                                                        goto apprexmit;
856
 
857
                                                case UIP_FIN_WAIT_1:
858
                                                case UIP_CLOSING:
859
                                                case UIP_LAST_ACK:
860
                                                        /* In all these states we should retransmit a FINACK. */
861
                                                        goto tcp_send_finack;
862
                                        }
863
                                }
864
                        }
865
                        else if( (uip_connr->tcpstateflags & UIP_TS_MASK) == UIP_ESTABLISHED )
866
                        {
867
                                /* If there was no need for a retransmission, we poll the
868
           application for new data. */
869
                                uip_flags = UIP_POLL;
870
                                UIP_APPCALL();
871
                                goto appsend;
872
                        }
873
                }
874
 
875
                goto drop;
876
        }
877
 
878
        #if UIP_UDP
879
        if( flag == UIP_UDP_TIMER )
880
        {
881
                if( uip_udp_conn->lport != 0 )
882
                {
883
                        uip_conn = NULL;
884
                        uip_sappdata = uip_appdata = &uip_buf[UIP_LLH_LEN + UIP_IPUDPH_LEN];
885
                        uip_len = uip_slen = 0;
886
                        uip_flags = UIP_POLL;
887
                        UIP_UDP_APPCALL();
888
                        goto udp_send;
889
                }
890
                else
891
                {
892
                        goto drop;
893
                }
894
        }
895
 
896
        #endif
897
 
898
        /* This is where the input processing starts. */
899
        UIP_STAT( ++uip_stat.ip.recv );
900
 
901
        /* Start of IP input header processing code. */
902
        #if UIP_CONF_IPV6
903
 
904
        /* Check validity of the IP header. */
905
        if( (BUF->vtc & 0xf0) != 0x60 )
906
        {                                       /* IP version and header length. */
907
                UIP_STAT( ++uip_stat.ip.drop );
908
                UIP_STAT( ++uip_stat.ip.vhlerr );
909
                UIP_LOG( "ipv6: invalid version." );
910
                goto drop;
911
        }
912
 
913
        #else /* UIP_CONF_IPV6 */
914
 
915
        /* Check validity of the IP header. */
916
        if( BUF->vhl != 0x45 )
917
        {                                       /* IP version and header length. */
918
                UIP_STAT( ++uip_stat.ip.drop );
919
                UIP_STAT( ++uip_stat.ip.vhlerr );
920
                UIP_LOG( "ip: invalid version or header length." );
921
                goto drop;
922
        }
923
 
924
        #endif /* UIP_CONF_IPV6 */
925
 
926
        /* Check the size of the packet. If the size reported to us in
927
     uip_len is smaller the size reported in the IP header, we assume
928
     that the packet has been corrupted in transit. If the size of
929
     uip_len is larger than the size reported in the IP packet header,
930
     the packet has been padded and we set uip_len to the correct
931
     value.. */
932
        if( (BUF->len[0] << 8) + BUF->len[1] <= uip_len )
933
        {
934
                uip_len = ( BUF->len[0] << 8 ) + BUF->len[1];
935
                #if UIP_CONF_IPV6
936
                uip_len += 40;  /* The length reported in the IPv6 header is the
937
                      length of the payload that follows the
938
                      header. However, uIP uses the uip_len variable
939
                      for holding the size of the entire packet,
940
                      including the IP header. For IPv4 this is not a
941
                      problem as the length field in the IPv4 header
942
                      contains the length of the entire packet. But
943
                      for IPv6 we need to add the size of the IPv6
944
                      header (40 bytes). */
945
                #endif /* UIP_CONF_IPV6 */
946
        }
947
        else
948
        {
949
                UIP_LOG( "ip: packet shorter than reported in IP header." );
950
                goto drop;
951
        }
952
 
953
        #if !UIP_CONF_IPV6
954
 
955
        /* Check the fragment flag. */
956
        if( (BUF->ipoffset[0] & 0x3f) != 0 || BUF->ipoffset[1] != 0 )
957
        {
958
                        #if UIP_REASSEMBLY
959
                uip_len = uip_reass();
960
                if( uip_len == 0 )
961
                {
962
                        goto drop;
963
                }
964
 
965
                        #else /* UIP_REASSEMBLY */
966
                UIP_STAT( ++uip_stat.ip.drop );
967
                UIP_STAT( ++uip_stat.ip.fragerr );
968
                UIP_LOG( "ip: fragment dropped." );
969
                goto drop;
970
                        #endif /* UIP_REASSEMBLY */
971
        }
972
 
973
        #endif /* UIP_CONF_IPV6 */
974
 
975
        if( uip_ipaddr_cmp(uip_hostaddr, all_zeroes_addr) )
976
        {
977
                /* If we are configured to use ping IP address configuration and
978
       hasn't been assigned an IP address yet, we accept all ICMP
979
       packets. */
980
                #if UIP_PINGADDRCONF && !UIP_CONF_IPV6
981
                if( BUF->proto == UIP_PROTO_ICMP )
982
                {
983
                        UIP_LOG( "ip: possible ping config packet received." );
984
                        goto icmp_input;
985
                }
986
                else
987
                {
988
                        UIP_LOG( "ip: packet dropped since no address assigned." );
989
                        goto drop;
990
                }
991
 
992
                #endif /* UIP_PINGADDRCONF */
993
        }
994
        else
995
        {
996
                /* If IP broadcast support is configured, we check for a broadcast
997
       UDP packet, which may be destined to us. */
998
                #if UIP_BROADCAST
999
                DEBUG_PRINTF( "UDP IP checksum 0x%04x\n", uip_ipchksum() );
1000
                if( BUF->proto == UIP_PROTO_UDP && uip_ipaddr_cmp(BUF->destipaddr, all_ones_addr) /*&&
1001
         uip_ipchksum() == 0xffff*/ )
1002
                {
1003
                        goto udp_input;
1004
                }
1005
 
1006
                #endif /* UIP_BROADCAST */
1007
 
1008
                /* Check if the packet is destined for our IP address. */
1009
                #if !UIP_CONF_IPV6
1010
                if( !uip_ipaddr_cmp(BUF->destipaddr, uip_hostaddr) )
1011
                {
1012
                        UIP_STAT( ++uip_stat.ip.drop );
1013
                        goto drop;
1014
                }
1015
 
1016
                #else /* UIP_CONF_IPV6 */
1017
 
1018
                /* For IPv6, packet reception is a little trickier as we need to
1019
       make sure that we listen to certain multicast addresses (all
1020
       hosts multicast address, and the solicited-node multicast
1021
       address) as well. However, we will cheat here and accept all
1022
       multicast packets that are sent to the ff02::/16 addresses. */
1023
                if( !uip_ipaddr_cmp(BUF->destipaddr, uip_hostaddr) && BUF->destipaddr[0] != HTONS(0xff02) )
1024
                {
1025
                        UIP_STAT( ++uip_stat.ip.drop );
1026
                        goto drop;
1027
                }
1028
 
1029
                #endif /* UIP_CONF_IPV6 */
1030
        }
1031
 
1032
        #if !UIP_CONF_IPV6
1033
        if( uip_ipchksum() != 0xffff )
1034
        {                                       /* Compute and check the IP header
1035
                                    checksum. */
1036
                UIP_STAT( ++uip_stat.ip.drop );
1037
                UIP_STAT( ++uip_stat.ip.chkerr );
1038
                UIP_LOG( "ip: bad checksum." );
1039
                goto drop;
1040
        }
1041
 
1042
        #endif /* UIP_CONF_IPV6 */
1043
 
1044
        if( BUF->proto == UIP_PROTO_TCP )
1045
        {                                       /* Check for TCP packet. If so,
1046
                                       proceed with TCP input
1047
                                       processing. */
1048
                goto tcp_input;
1049
        }
1050
 
1051
        #if UIP_UDP
1052
        if( BUF->proto == UIP_PROTO_UDP )
1053
        {
1054
                goto udp_input;
1055
        }
1056
 
1057
        #endif /* UIP_UDP */
1058
 
1059
        #if !UIP_CONF_IPV6
1060
 
1061
        /* ICMPv4 processing code follows. */
1062
        if( BUF->proto != UIP_PROTO_ICMP )
1063
        {                                       /* We only allow ICMP packets from
1064
                                        here. */
1065
                UIP_STAT( ++uip_stat.ip.drop );
1066
                UIP_STAT( ++uip_stat.ip.protoerr );
1067
                UIP_LOG( "ip: neither tcp nor icmp." );
1068
                goto drop;
1069
        }
1070
 
1071
                #if UIP_PINGADDRCONF
1072
        icmp_input :
1073
                #endif /* UIP_PINGADDRCONF */
1074
        UIP_STAT( ++uip_stat.icmp.recv );
1075
 
1076
        /* ICMP echo (i.e., ping) processing. This is simple, we only change
1077
     the ICMP type from ECHO to ECHO_REPLY and adjust the ICMP
1078
     checksum before we return the packet. */
1079
        if( ICMPBUF->type != ICMP_ECHO )
1080
        {
1081
                UIP_STAT( ++uip_stat.icmp.drop );
1082
                UIP_STAT( ++uip_stat.icmp.typeerr );
1083
                UIP_LOG( "icmp: not icmp echo." );
1084
                goto drop;
1085
        }
1086
 
1087
        /* If we are configured to use ping IP address assignment, we use
1088
     the destination IP address of this ping packet and assign it to
1089
     ourself. */
1090
                #if UIP_PINGADDRCONF
1091
        if( (uip_hostaddr[0] | uip_hostaddr[1]) == 0 )
1092
        {
1093
                uip_hostaddr[0] = BUF->destipaddr[0];
1094
                uip_hostaddr[1] = BUF->destipaddr[1];
1095
        }
1096
 
1097
                #endif /* UIP_PINGADDRCONF */
1098
 
1099
        ICMPBUF->type = ICMP_ECHO_REPLY;
1100
 
1101
        if( ICMPBUF->icmpchksum >= HTONS(0xffff - (ICMP_ECHO << 8)) )
1102
        {
1103
                ICMPBUF->icmpchksum += HTONS( ICMP_ECHO << 8 ) + 1;
1104
        }
1105
        else
1106
        {
1107
                ICMPBUF->icmpchksum += HTONS( ICMP_ECHO << 8 );
1108
        }
1109
 
1110
        /* Swap IP addresses. */
1111
        uip_ipaddr_copy( BUF->destipaddr, BUF->srcipaddr );
1112
        uip_ipaddr_copy( BUF->srcipaddr, uip_hostaddr );
1113
 
1114
        UIP_STAT( ++uip_stat.icmp.sent );
1115
        goto send;
1116
 
1117
        /* End of IPv4 input header processing code. */
1118
        #else /* !UIP_CONF_IPV6 */
1119
 
1120
        /* This is IPv6 ICMPv6 processing code. */
1121
        DEBUG_PRINTF( "icmp6_input: length %d\n", uip_len );
1122
 
1123
        if( BUF->proto != UIP_PROTO_ICMP6 )
1124
        {                                       /* We only allow ICMPv6 packets from
1125
                                         here. */
1126
                UIP_STAT( ++uip_stat.ip.drop );
1127
                UIP_STAT( ++uip_stat.ip.protoerr );
1128
                UIP_LOG( "ip: neither tcp nor icmp6." );
1129
                goto drop;
1130
        }
1131
 
1132
        UIP_STAT( ++uip_stat.icmp.recv );
1133
 
1134
        /* If we get a neighbor solicitation for our address we should send
1135
     a neighbor advertisement message back. */
1136
        if( ICMPBUF->type == ICMP6_NEIGHBOR_SOLICITATION )
1137
        {
1138
                if( uip_ipaddr_cmp(ICMPBUF->icmp6data, uip_hostaddr) )
1139
                {
1140
                        if( ICMPBUF->options[0] == ICMP6_OPTION_SOURCE_LINK_ADDRESS )
1141
                        {
1142
                                /* Save the sender's address in our neighbor list. */
1143
                                uip_neighbor_add( ICMPBUF->srcipaddr, &(ICMPBUF->options[2]) );
1144
                        }
1145
 
1146
                        /* We should now send a neighbor advertisement back to where the
1147
         neighbor solicication came from. */
1148
                        ICMPBUF->type = ICMP6_NEIGHBOR_ADVERTISEMENT;
1149
                        ICMPBUF->flags = ICMP6_FLAG_S;  /* Solicited flag. */
1150
 
1151
                        ICMPBUF->reserved1 = ICMPBUF->reserved2 = ICMPBUF->reserved3 = 0;
1152
 
1153
                        uip_ipaddr_copy( ICMPBUF->destipaddr, ICMPBUF->srcipaddr );
1154
                        uip_ipaddr_copy( ICMPBUF->srcipaddr, uip_hostaddr );
1155
                        ICMPBUF->options[0] = ICMP6_OPTION_TARGET_LINK_ADDRESS;
1156
                        ICMPBUF->options[1] = 1;                /* Options length, 1 = 8 bytes. */
1157
                        memcpy( &(ICMPBUF->options[2]), &uip_ethaddr, sizeof(uip_ethaddr) );
1158
                        ICMPBUF->icmpchksum = 0;
1159
                        ICMPBUF->icmpchksum = ~uip_icmp6chksum();
1160
                        goto send;
1161
                }
1162
 
1163
                goto drop;
1164
        }
1165
        else if( ICMPBUF->type == ICMP6_ECHO )
1166
        {
1167
                /* ICMP echo (i.e., ping) processing. This is simple, we only
1168
       change the ICMP type from ECHO to ECHO_REPLY and update the
1169
       ICMP checksum before we return the packet. */
1170
                ICMPBUF->type = ICMP6_ECHO_REPLY;
1171
 
1172
                uip_ipaddr_copy( BUF->destipaddr, BUF->srcipaddr );
1173
                uip_ipaddr_copy( BUF->srcipaddr, uip_hostaddr );
1174
                ICMPBUF->icmpchksum = 0;
1175
                ICMPBUF->icmpchksum = ~uip_icmp6chksum();
1176
 
1177
                UIP_STAT( ++uip_stat.icmp.sent );
1178
                goto send;
1179
        }
1180
        else
1181
        {
1182
                DEBUG_PRINTF( "Unknown icmp6 message type %d\n", ICMPBUF->type );
1183
                UIP_STAT( ++uip_stat.icmp.drop );
1184
                UIP_STAT( ++uip_stat.icmp.typeerr );
1185
                UIP_LOG( "icmp: unknown ICMP message." );
1186
                goto drop;
1187
        }
1188
 
1189
        /* End of IPv6 ICMP processing. */
1190
        #endif /* !UIP_CONF_IPV6 */
1191
 
1192
        #if UIP_UDP
1193
 
1194
        /* UDP input processing. */
1195
        udp_input :
1196
        /* UDP processing is really just a hack. We don't do anything to the
1197
     UDP/IP headers, but let the UDP application do all the hard
1198
     work. If the application sets uip_slen, it has a packet to
1199
     send. */
1200
                #if UIP_UDP_CHECKSUMS
1201
        uip_len = uip_len - UIP_IPUDPH_LEN;
1202
        uip_appdata = &uip_buf[UIP_LLH_LEN + UIP_IPUDPH_LEN];
1203
        if( UDPBUF->udpchksum != 0 && uip_udpchksum() != 0xffff )
1204
        {
1205
                UIP_STAT( ++uip_stat.udp.drop );
1206
                UIP_STAT( ++uip_stat.udp.chkerr );
1207
                UIP_LOG( "udp: bad checksum." );
1208
                goto drop;
1209
        }
1210
 
1211
                #else /* UIP_UDP_CHECKSUMS */
1212
        uip_len = uip_len - UIP_IPUDPH_LEN;
1213
                #endif /* UIP_UDP_CHECKSUMS */
1214
 
1215
        /* Demultiplex this UDP packet between the UDP "connections". */
1216
        for( uip_udp_conn = &uip_udp_conns[0]; uip_udp_conn < &uip_udp_conns[UIP_UDP_CONNS]; ++uip_udp_conn )
1217
        {
1218
                /* If the local UDP port is non-zero, the connection is considered
1219
       to be used. If so, the local port number is checked against the
1220
       destination port number in the received packet. If the two port
1221
       numbers match, the remote port number is checked if the
1222
       connection is bound to a remote port. Finally, if the
1223
       connection is bound to a remote IP address, the source IP
1224
       address of the packet is checked. */
1225
                if
1226
                (
1227
                        uip_udp_conn->lport != 0 &&
1228
                        UDPBUF->destport == uip_udp_conn->lport &&
1229
                        (uip_udp_conn->rport == 0 || UDPBUF->srcport == uip_udp_conn->rport) &&
1230
                        (
1231
                                uip_ipaddr_cmp(uip_udp_conn->ripaddr, all_zeroes_addr) ||
1232
                                uip_ipaddr_cmp(uip_udp_conn->ripaddr, all_ones_addr) ||
1233
                                uip_ipaddr_cmp(BUF->srcipaddr, uip_udp_conn->ripaddr)
1234
                        )
1235
                )
1236
                {
1237
                        goto udp_found;
1238
                }
1239
        }
1240
 
1241
        UIP_LOG( "udp: no matching connection found" );
1242
        goto drop;
1243
 
1244
udp_found:
1245
        UIP_STAT( ++uip_stat.udp.recv );
1246
        uip_conn = NULL;
1247
        uip_flags = UIP_NEWDATA;
1248
        uip_sappdata = uip_appdata = &uip_buf[UIP_LLH_LEN + UIP_IPUDPH_LEN];
1249
        uip_slen = 0;
1250
        UIP_UDP_APPCALL();
1251
udp_send:
1252
        if( uip_slen == 0 )
1253
        {
1254
                goto drop;
1255
        }
1256
 
1257
        uip_len = uip_slen + UIP_IPUDPH_LEN;
1258
 
1259
                #if UIP_CONF_IPV6
1260
 
1261
        /* For IPv6, the IP length field does not include the IPv6 IP header
1262
     length. */
1263
        BUF->len[0] = ( (uip_len - UIP_IPH_LEN) >> 8 );
1264
        BUF->len[1] = ( (uip_len - UIP_IPH_LEN) & 0xff );
1265
                #else /* UIP_CONF_IPV6 */
1266
        BUF->len[0] = ( uip_len >> 8 );
1267
        BUF->len[1] = ( uip_len & 0xff );
1268
                #endif /* UIP_CONF_IPV6 */
1269
 
1270
        BUF->ttl = uip_udp_conn->ttl;
1271
        BUF->proto = UIP_PROTO_UDP;
1272
 
1273
        UDPBUF->udplen = HTONS( uip_slen + UIP_UDPH_LEN );
1274
        UDPBUF->udpchksum = 0;
1275
 
1276
        BUF->srcport = uip_udp_conn->lport;
1277
        BUF->destport = uip_udp_conn->rport;
1278
 
1279
        uip_ipaddr_copy( BUF->srcipaddr, uip_hostaddr );
1280
        uip_ipaddr_copy( BUF->destipaddr, uip_udp_conn->ripaddr );
1281
 
1282
        uip_appdata = &uip_buf[UIP_LLH_LEN + UIP_IPTCPH_LEN];
1283
 
1284
                #if UIP_UDP_CHECKSUMS
1285
 
1286
        /* Calculate UDP checksum. */
1287
        UDPBUF->udpchksum = ~( uip_udpchksum() );
1288
        if( UDPBUF->udpchksum == 0 )
1289
        {
1290
                UDPBUF->udpchksum = 0xffff;
1291
        }
1292
 
1293
                #endif /* UIP_UDP_CHECKSUMS */
1294
        UIP_STAT( ++uip_stat.udp.sent );
1295
        goto ip_send_nolen;
1296
        #endif /* UIP_UDP */
1297
 
1298
        /* TCP input processing. */
1299
        tcp_input : UIP_STAT( ++uip_stat.tcp.recv );
1300
 
1301
        /* Start of TCP input header processing code. */
1302
        if( uip_tcpchksum() != 0xffff )
1303
        {       /* Compute and check the TCP
1304
                                       checksum. */
1305
                UIP_STAT( ++uip_stat.tcp.drop );
1306
                UIP_STAT( ++uip_stat.tcp.chkerr );
1307
                UIP_LOG( "tcp: bad checksum." );
1308
                goto drop;
1309
        }
1310
 
1311
        /* Demultiplex this segment. */
1312
 
1313
        /* First check any active connections. */
1314
        for( uip_connr = &uip_conns[0]; uip_connr <= &uip_conns[UIP_CONNS - 1]; ++uip_connr )
1315
        {
1316
                if
1317
                (
1318
                        uip_connr->tcpstateflags != UIP_CLOSED &&
1319
                        BUF->destport == uip_connr->lport &&
1320
                        BUF->srcport == uip_connr->rport &&
1321
                        uip_ipaddr_cmp(BUF->srcipaddr, uip_connr->ripaddr)
1322
                )
1323
                {
1324
                        goto found;
1325
                }
1326
        }
1327
 
1328
        /* If we didn't find and active connection that expected the packet,
1329
     either this packet is an old duplicate, or this is a SYN packet
1330
     destined for a connection in LISTEN. If the SYN flag isn't set,
1331
     it is an old packet and we send a RST. */
1332
        if( (BUF->flags & TCP_CTL) != TCP_SYN )
1333
        {
1334
                goto reset;
1335
        }
1336
 
1337
        tmp16 = BUF->destport;
1338
 
1339
        /* Next, check listening connections. */
1340
        for( c = 0; c < UIP_LISTENPORTS; ++c )
1341
        {
1342
                if( tmp16 == uip_listenports[c] )
1343
                {
1344
                        goto found_listen;
1345
                }
1346
        }
1347
 
1348
        /* No matching connection found, so we send a RST packet. */
1349
        UIP_STAT( ++uip_stat.tcp.synrst );
1350
reset:
1351
        /* We do not send resets in response to resets. */
1352
        if( BUF->flags & TCP_RST )
1353
        {
1354
                goto drop;
1355
        }
1356
 
1357
        UIP_STAT( ++uip_stat.tcp.rst );
1358
 
1359
        BUF->flags = TCP_RST | TCP_ACK;
1360
        uip_len = UIP_IPTCPH_LEN;
1361
        BUF->tcpoffset = 5 << 4;
1362
 
1363
        /* Flip the seqno and ackno fields in the TCP header. */
1364
        c = BUF->seqno[3];
1365
        BUF->seqno[3] = BUF->ackno[3];
1366
        BUF->ackno[3] = c;
1367
 
1368
        c = BUF->seqno[2];
1369
        BUF->seqno[2] = BUF->ackno[2];
1370
        BUF->ackno[2] = c;
1371
 
1372
        c = BUF->seqno[1];
1373
        BUF->seqno[1] = BUF->ackno[1];
1374
        BUF->ackno[1] = c;
1375
 
1376
        c = BUF->seqno[0];
1377
        BUF->seqno[0] = BUF->ackno[0];
1378
        BUF->ackno[0] = c;
1379
 
1380
        /* We also have to increase the sequence number we are
1381
     acknowledging. If the least significant byte overflowed, we need
1382
     to propagate the carry to the other bytes as well. */
1383
        if( ++BUF->ackno[3] == 0 )
1384
        {
1385
                if( ++BUF->ackno[2] == 0 )
1386
                {
1387
                        if( ++BUF->ackno[1] == 0 )
1388
                        {
1389
                                ++BUF->ackno[0];
1390
                        }
1391
                }
1392
        }
1393
 
1394
        /* Swap port numbers. */
1395
        tmp16 = BUF->srcport;
1396
        BUF->srcport = BUF->destport;
1397
        BUF->destport = tmp16;
1398
 
1399
        /* Swap IP addresses. */
1400
        uip_ipaddr_copy( BUF->destipaddr, BUF->srcipaddr );
1401
        uip_ipaddr_copy( BUF->srcipaddr, uip_hostaddr );
1402
 
1403
        /* And send out the RST packet! */
1404
        goto tcp_send_noconn;
1405
 
1406
        /* This label will be jumped to if we matched the incoming packet
1407
     with a connection in LISTEN. In that case, we should create a new
1408
     connection and send a SYNACK in return. */
1409
found_listen:
1410
        /* First we check if there are any connections avaliable. Unused
1411
     connections are kept in the same table as used connections, but
1412
     unused ones have the tcpstate set to CLOSED. Also, connections in
1413
     TIME_WAIT are kept track of and we'll use the oldest one if no
1414
     CLOSED connections are found. Thanks to Eddie C. Dost for a very
1415
     nice algorithm for the TIME_WAIT search. */
1416
        uip_connr = 0;
1417
        for( c = 0; c < UIP_CONNS; ++c )
1418
        {
1419
                if( uip_conns[c].tcpstateflags == UIP_CLOSED )
1420
                {
1421
                        uip_connr = &uip_conns[c];
1422
                        break;
1423
                }
1424
 
1425
                if( uip_conns[c].tcpstateflags == UIP_TIME_WAIT )
1426
                {
1427
                        if( uip_connr == 0 || uip_conns[c].timer > uip_connr->timer )
1428
                        {
1429
                                uip_connr = &uip_conns[c];
1430
                        }
1431
                }
1432
        }
1433
 
1434
        if( uip_connr == 0 )
1435
        {
1436
                /* All connections are used already, we drop packet and hope that
1437
       the remote end will retransmit the packet at a time when we
1438
       have more spare connections. */
1439
                UIP_STAT( ++uip_stat.tcp.syndrop );
1440
                UIP_LOG( "tcp: found no unused connections." );
1441
                goto drop;
1442
        }
1443
 
1444
        uip_conn = uip_connr;
1445
 
1446
        /* Fill in the necessary fields for the new connection. */
1447
        uip_connr->rto = uip_connr->timer = UIP_RTO;
1448
        uip_connr->sa = 0;
1449
        uip_connr->sv = 4;
1450
        uip_connr->nrtx = 0;
1451
        uip_connr->lport = BUF->destport;
1452
        uip_connr->rport = BUF->srcport;
1453
        uip_ipaddr_copy( uip_connr->ripaddr, BUF->srcipaddr );
1454
        uip_connr->tcpstateflags = UIP_SYN_RCVD;
1455
 
1456
        uip_connr->snd_nxt[0] = iss[0];
1457
        uip_connr->snd_nxt[1] = iss[1];
1458
        uip_connr->snd_nxt[2] = iss[2];
1459
        uip_connr->snd_nxt[3] = iss[3];
1460
        uip_connr->len = 1;
1461
 
1462
        /* rcv_nxt should be the seqno from the incoming packet + 1. */
1463
        uip_connr->rcv_nxt[3] = BUF->seqno[3];
1464
        uip_connr->rcv_nxt[2] = BUF->seqno[2];
1465
        uip_connr->rcv_nxt[1] = BUF->seqno[1];
1466
        uip_connr->rcv_nxt[0] = BUF->seqno[0];
1467
        uip_add_rcv_nxt( 1 );
1468
 
1469
        /* Parse the TCP MSS option, if present. */
1470
        if( (BUF->tcpoffset & 0xf0) > 0x50 )
1471
        {
1472
                for( c = 0; c < ((BUF->tcpoffset >> 4) - 5) << 2; )
1473
                {
1474
                        opt = uip_buf[UIP_TCPIP_HLEN + UIP_LLH_LEN + c];
1475
                        if( opt == TCP_OPT_END )
1476
                        {
1477
                                /* End of options. */
1478
                                break;
1479
                        }
1480
                        else if( opt == TCP_OPT_NOOP )
1481
                        {
1482
                                ++c;
1483
 
1484
                                /* NOP option. */
1485
                        }
1486
                        else if( opt == TCP_OPT_MSS && uip_buf[UIP_TCPIP_HLEN + UIP_LLH_LEN + 1 + c] == TCP_OPT_MSS_LEN )
1487
                        {
1488
                                /* An MSS option with the right option length. */
1489
                                tmp16 = ( (u16_t) uip_buf[UIP_TCPIP_HLEN + UIP_LLH_LEN + 2 + c] << 8 ) | ( u16_t ) uip_buf[UIP_IPTCPH_LEN + UIP_LLH_LEN + 3 + c];
1490
                                uip_connr->initialmss = uip_connr->mss = tmp16 > UIP_TCP_MSS ? UIP_TCP_MSS : tmp16;
1491
 
1492
                                /* And we are done processing options. */
1493
                                break;
1494
                        }
1495
                        else
1496
                        {
1497
                                /* All other options have a length field, so that we easily
1498
           can skip past them. */
1499
                                if( uip_buf[UIP_TCPIP_HLEN + UIP_LLH_LEN + 1 + c] == 0 )
1500
                                {
1501
                                        /* If the length field is zero, the options are malformed
1502
             and we don't process them further. */
1503
                                        break;
1504
                                }
1505
 
1506
                                c += uip_buf[UIP_TCPIP_HLEN + UIP_LLH_LEN + 1 + c];
1507
                        }
1508
                }
1509
        }
1510
 
1511
        /* Our response will be a SYNACK. */
1512
        #if UIP_ACTIVE_OPEN
1513
        tcp_send_synack : BUF->flags = TCP_ACK;
1514
 
1515
tcp_send_syn:
1516
        BUF->flags |= TCP_SYN;
1517
        #else /* UIP_ACTIVE_OPEN */
1518
        tcp_send_synack : BUF->flags = TCP_SYN | TCP_ACK;
1519
        #endif /* UIP_ACTIVE_OPEN */
1520
 
1521
        /* We send out the TCP Maximum Segment Size option with our
1522
     SYNACK. */
1523
        BUF->optdata[0] = TCP_OPT_MSS;
1524
        BUF->optdata[1] = TCP_OPT_MSS_LEN;
1525
        BUF->optdata[2] = ( UIP_TCP_MSS ) / 256;
1526
        BUF->optdata[3] = ( UIP_TCP_MSS ) & 255;
1527
        uip_len = UIP_IPTCPH_LEN + TCP_OPT_MSS_LEN;
1528
        BUF->tcpoffset = ( (UIP_TCPH_LEN + TCP_OPT_MSS_LEN) / 4 ) << 4;
1529
        goto tcp_send;
1530
 
1531
        /* This label will be jumped to if we found an active connection. */
1532
found:
1533
        uip_conn = uip_connr;
1534
        uip_flags = 0;
1535
 
1536
        /* We do a very naive form of TCP reset processing; we just accept
1537
     any RST and kill our connection. We should in fact check if the
1538
     sequence number of this reset is wihtin our advertised window
1539
     before we accept the reset. */
1540
        if( BUF->flags & TCP_RST )
1541
        {
1542
                uip_connr->tcpstateflags = UIP_CLOSED;
1543
                UIP_LOG( "tcp: got reset, aborting connection." );
1544
                uip_flags = UIP_ABORT;
1545
                UIP_APPCALL();
1546
                goto drop;
1547
        }
1548
 
1549
        /* Calculated the length of the data, if the application has sent
1550
     any data to us. */
1551
        c = ( BUF->tcpoffset >> 4 ) << 2;
1552
 
1553
        /* uip_len will contain the length of the actual TCP data. This is
1554
     calculated by subtracing the length of the TCP header (in
1555
     c) and the length of the IP header (20 bytes). */
1556
        uip_len = uip_len - c - UIP_IPH_LEN;
1557
 
1558
        /* First, check if the sequence number of the incoming packet is
1559
     what we're expecting next. If not, we send out an ACK with the
1560
     correct numbers in. */
1561
        if( !(((uip_connr->tcpstateflags & UIP_TS_MASK) == UIP_SYN_SENT) && ((BUF->flags & TCP_CTL) == (TCP_SYN | TCP_ACK))) )
1562
        {
1563
                if
1564
                (
1565
                        (uip_len > 0 || ((BUF->flags & (TCP_SYN | TCP_FIN)) != 0)) &&
1566
                        (
1567
                                BUF->seqno[0] != uip_connr->rcv_nxt[0] ||
1568
                                BUF->seqno[1] != uip_connr->rcv_nxt[1] ||
1569
                                BUF->seqno[2] != uip_connr->rcv_nxt[2] ||
1570
                                BUF->seqno[3] != uip_connr->rcv_nxt[3]
1571
                        )
1572
                )
1573
                {
1574
                        goto tcp_send_ack;
1575
                }
1576
        }
1577
 
1578
        /* Next, check if the incoming segment acknowledges any outstanding
1579
     data. If so, we update the sequence number, reset the length of
1580
     the outstanding data, calculate RTT estimations, and reset the
1581
     retransmission timer. */
1582
        if( (BUF->flags & TCP_ACK) && uip_outstanding(uip_connr) )
1583
        {
1584
                uip_add32( uip_connr->snd_nxt, uip_connr->len );
1585
 
1586
                if
1587
                (
1588
                        BUF->ackno[0] == uip_acc32[0] &&
1589
                        BUF->ackno[1] == uip_acc32[1] &&
1590
                        BUF->ackno[2] == uip_acc32[2] &&
1591
                        BUF->ackno[3] == uip_acc32[3]
1592
                )
1593
                {
1594
                        /* Update sequence number. */
1595
                        uip_connr->snd_nxt[0] = uip_acc32[0];
1596
                        uip_connr->snd_nxt[1] = uip_acc32[1];
1597
                        uip_connr->snd_nxt[2] = uip_acc32[2];
1598
                        uip_connr->snd_nxt[3] = uip_acc32[3];
1599
 
1600
                        /* Do RTT estimation, unless we have done retransmissions. */
1601
                        if( uip_connr->nrtx == 0 )
1602
                        {
1603
                                signed char m;
1604
                                m = uip_connr->rto - uip_connr->timer;
1605
 
1606
                                /* This is taken directly from VJs original code in his paper */
1607
                                m = m - ( uip_connr->sa >> 3 );
1608
                                uip_connr->sa += m;
1609
                                if( m < 0 )
1610
                                {
1611
                                        m = -m;
1612
                                }
1613
 
1614
                                m = m - ( uip_connr->sv >> 2 );
1615
                                uip_connr->sv += m;
1616
                                uip_connr->rto = ( uip_connr->sa >> 3 ) + uip_connr->sv;
1617
                        }
1618
 
1619
                        /* Set the acknowledged flag. */
1620
                        uip_flags = UIP_ACKDATA;
1621
 
1622
                        /* Reset the retransmission timer. */
1623
                        uip_connr->timer = uip_connr->rto;
1624
 
1625
                        /* Reset length of outstanding data. */
1626
                        uip_connr->len = 0;
1627
                }
1628
        }
1629
 
1630
        /* Do different things depending on in what state the connection is. */
1631
        switch( uip_connr->tcpstateflags & UIP_TS_MASK )
1632
        {
1633
                /* CLOSED and LISTEN are not handled here. CLOSE_WAIT is not
1634
        implemented, since we force the application to close when the
1635
        peer sends a FIN (hence the application goes directly from
1636
        ESTABLISHED to LAST_ACK). */
1637
                case UIP_SYN_RCVD:
1638
                        /* In SYN_RCVD we have sent out a SYNACK in response to a SYN, and
1639
       we are waiting for an ACK that acknowledges the data we sent
1640
       out the last time. Therefore, we want to have the UIP_ACKDATA
1641
       flag set. If so, we enter the ESTABLISHED state. */
1642
                        if( uip_flags & UIP_ACKDATA )
1643
                        {
1644
                                uip_connr->tcpstateflags = UIP_ESTABLISHED;
1645
                                uip_flags = UIP_CONNECTED;
1646
                                uip_connr->len = 0;
1647
                                if( uip_len > 0 )
1648
                                {
1649
                                        uip_flags |= UIP_NEWDATA;
1650
                                        uip_add_rcv_nxt( uip_len );
1651
                                }
1652
 
1653
                                uip_slen = 0;
1654
                                UIP_APPCALL();
1655
                                goto appsend;
1656
                        }
1657
 
1658
                        goto drop;
1659
                        #if UIP_ACTIVE_OPEN
1660
 
1661
                case UIP_SYN_SENT:
1662
                        /* In SYN_SENT, we wait for a SYNACK that is sent in response to
1663
       our SYN. The rcv_nxt is set to sequence number in the SYNACK
1664
       plus one, and we send an ACK. We move into the ESTABLISHED
1665
       state. */
1666
                        if( (uip_flags & UIP_ACKDATA) && (BUF->flags & TCP_CTL) == (TCP_SYN | TCP_ACK) )
1667
                        {
1668
                                /* Parse the TCP MSS option, if present. */
1669
                                if( (BUF->tcpoffset & 0xf0) > 0x50 )
1670
                                {
1671
                                        for( c = 0; c < ((BUF->tcpoffset >> 4) - 5) << 2; )
1672
                                        {
1673
                                                opt = uip_buf[UIP_IPTCPH_LEN + UIP_LLH_LEN + c];
1674
                                                if( opt == TCP_OPT_END )
1675
                                                {
1676
                                                        /* End of options. */
1677
                                                        break;
1678
                                                }
1679
                                                else if( opt == TCP_OPT_NOOP )
1680
                                                {
1681
                                                        ++c;
1682
 
1683
                                                        /* NOP option. */
1684
                                                }
1685
                                                else if( opt == TCP_OPT_MSS && uip_buf[UIP_TCPIP_HLEN + UIP_LLH_LEN + 1 + c] == TCP_OPT_MSS_LEN )
1686
                                                {
1687
                                                        /* An MSS option with the right option length. */
1688
                                                        tmp16 = ( uip_buf[UIP_TCPIP_HLEN + UIP_LLH_LEN + 2 + c] << 8 ) | uip_buf[UIP_TCPIP_HLEN + UIP_LLH_LEN + 3 + c];
1689
                                                        uip_connr->initialmss = uip_connr->mss = tmp16 > UIP_TCP_MSS ? UIP_TCP_MSS : tmp16;
1690
 
1691
                                                        /* And we are done processing options. */
1692
                                                        break;
1693
                                                }
1694
                                                else
1695
                                                {
1696
                                                        /* All other options have a length field, so that we easily
1697
               can skip past them. */
1698
                                                        if( uip_buf[UIP_TCPIP_HLEN + UIP_LLH_LEN + 1 + c] == 0 )
1699
                                                        {
1700
                                                                /* If the length field is zero, the options are malformed
1701
                 and we don't process them further. */
1702
                                                                break;
1703
                                                        }
1704
 
1705
                                                        c += uip_buf[UIP_TCPIP_HLEN + UIP_LLH_LEN + 1 + c];
1706
                                                }
1707
                                        }
1708
                                }
1709
 
1710
                                uip_connr->tcpstateflags = UIP_ESTABLISHED;
1711
                                uip_connr->rcv_nxt[0] = BUF->seqno[0];
1712
                                uip_connr->rcv_nxt[1] = BUF->seqno[1];
1713
                                uip_connr->rcv_nxt[2] = BUF->seqno[2];
1714
                                uip_connr->rcv_nxt[3] = BUF->seqno[3];
1715
                                uip_add_rcv_nxt( 1 );
1716
                                uip_flags = UIP_CONNECTED | UIP_NEWDATA;
1717
                                uip_connr->len = 0;
1718
                                uip_len = 0;
1719
                                uip_slen = 0;
1720
                                UIP_APPCALL();
1721
                                goto appsend;
1722
                        }
1723
 
1724
                        /* Inform the application that the connection failed */
1725
                        uip_flags = UIP_ABORT;
1726
                        UIP_APPCALL();
1727
 
1728
                        /* The connection is closed after we send the RST */
1729
                        uip_conn->tcpstateflags = UIP_CLOSED;
1730
                        goto reset;
1731
                        #endif /* UIP_ACTIVE_OPEN */
1732
 
1733
                case UIP_ESTABLISHED:
1734
                        /* In the ESTABLISHED state, we call upon the application to feed
1735
    data into the uip_buf. If the UIP_ACKDATA flag is set, the
1736
    application should put new data into the buffer, otherwise we are
1737
    retransmitting an old segment, and the application should put that
1738
    data into the buffer.
1739
 
1740
    If the incoming packet is a FIN, we should close the connection on
1741
    this side as well, and we send out a FIN and enter the LAST_ACK
1742
    state. We require that there is no outstanding data; otherwise the
1743
    sequence numbers will be screwed up. */
1744
                        if( BUF->flags & TCP_FIN && !(uip_connr->tcpstateflags & UIP_STOPPED) )
1745
                        {
1746
                                if( uip_outstanding(uip_connr) )
1747
                                {
1748
                                        goto drop;
1749
                                }
1750
 
1751
                                uip_add_rcv_nxt( 1 + uip_len );
1752
                                uip_flags |= UIP_CLOSE;
1753
                                if( uip_len > 0 )
1754
                                {
1755
                                        uip_flags |= UIP_NEWDATA;
1756
                                }
1757
 
1758
                                UIP_APPCALL();
1759
                                uip_connr->len = 1;
1760
                                uip_connr->tcpstateflags = UIP_LAST_ACK;
1761
                                uip_connr->nrtx = 0;
1762
        tcp_send_finack:
1763
                                BUF->flags = TCP_FIN | TCP_ACK;
1764
                                goto tcp_send_nodata;
1765
                        }
1766
 
1767
                        /* Check the URG flag. If this is set, the segment carries urgent
1768
       data that we must pass to the application. */
1769
                        if( (BUF->flags & TCP_URG) != 0 )
1770
                        {
1771
                                #if UIP_URGDATA > 0
1772
                                uip_urglen = ( BUF->urgp[0] << 8 ) | BUF->urgp[1];
1773
                                if( uip_urglen > uip_len )
1774
                                {
1775
                                        /* There is more urgent data in the next segment to come. */
1776
                                        uip_urglen = uip_len;
1777
                                }
1778
 
1779
                                uip_add_rcv_nxt( uip_urglen );
1780
                                uip_len -= uip_urglen;
1781
                                uip_urgdata = uip_appdata;
1782
                                uip_appdata += uip_urglen;
1783
                        }
1784
                        else
1785
                        {
1786
                                uip_urglen = 0;
1787
                                #else /* UIP_URGDATA > 0 */
1788
                                uip_appdata = ( ( char * ) uip_appdata ) + ( (BUF->urgp[0] << 8) | BUF->urgp[1] );
1789
                                uip_len -= ( BUF->urgp[0] << 8 ) | BUF->urgp[1];
1790
                                #endif /* UIP_URGDATA > 0 */
1791
                        }
1792
 
1793
                        /* If uip_len > 0 we have TCP data in the packet, and we flag this
1794
       by setting the UIP_NEWDATA flag and update the sequence number
1795
       we acknowledge. If the application has stopped the dataflow
1796
       using uip_stop(), we must not accept any data packets from the
1797
       remote host. */
1798
                        if( uip_len > 0 && !(uip_connr->tcpstateflags & UIP_STOPPED) )
1799
                        {
1800
                                uip_flags |= UIP_NEWDATA;
1801
                                uip_add_rcv_nxt( uip_len );
1802
                        }
1803
 
1804
                        /* Check if the available buffer space advertised by the other end
1805
       is smaller than the initial MSS for this connection. If so, we
1806
       set the current MSS to the window size to ensure that the
1807
       application does not send more data than the other end can
1808
       handle.
1809
 
1810
       If the remote host advertises a zero window, we set the MSS to
1811
       the initial MSS so that the application will send an entire MSS
1812
       of data. This data will not be acknowledged by the receiver,
1813
       and the application will retransmit it. This is called the
1814
       "persistent timer" and uses the retransmission mechanim.
1815
    */
1816
                        tmp16 = ( (u16_t) BUF->wnd[0] << 8 ) + ( u16_t ) BUF->wnd[1];
1817
                        if( tmp16 > (uip_connr->initialmss * FRAME_MULTIPLE) || tmp16 == 0 )
1818
                        {
1819
                                tmp16 = uip_connr->initialmss * FRAME_MULTIPLE;
1820
                        }
1821
 
1822
                        uip_connr->mss = tmp16;
1823
 
1824
                        /* If this packet constitutes an ACK for outstanding data (flagged
1825
       by the UIP_ACKDATA flag, we should call the application since it
1826
       might want to send more data. If the incoming packet had data
1827
       from the peer (as flagged by the UIP_NEWDATA flag), the
1828
       application must also be notified.
1829
 
1830
       When the application is called, the global variable uip_len
1831
       contains the length of the incoming data. The application can
1832
       access the incoming data through the global pointer
1833
       uip_appdata, which usually points UIP_IPTCPH_LEN + UIP_LLH_LEN
1834
       bytes into the uip_buf array.
1835
 
1836
       If the application wishes to send any data, this data should be
1837
       put into the uip_appdata and the length of the data should be
1838
       put into uip_len. If the application don't have any data to
1839
       send, uip_len must be set to 0. */
1840
                        if( uip_flags & (UIP_NEWDATA | UIP_ACKDATA) )
1841
                        {
1842
                                uip_slen = 0;
1843
                                UIP_APPCALL();
1844
 
1845
        appsend:
1846
                                if( uip_flags & UIP_ABORT )
1847
                                {
1848
                                        uip_slen = 0;
1849
                                        uip_connr->tcpstateflags = UIP_CLOSED;
1850
                                        BUF->flags = TCP_RST | TCP_ACK;
1851
                                        goto tcp_send_nodata;
1852
                                }
1853
 
1854
                                if( uip_flags & UIP_CLOSE )
1855
                                {
1856
                                        uip_slen = 0;
1857
                                        uip_connr->len = 1;
1858
                                        uip_connr->tcpstateflags = UIP_FIN_WAIT_1;
1859
                                        uip_connr->nrtx = 0;
1860
                                        BUF->flags = TCP_FIN | TCP_ACK;
1861
                                        goto tcp_send_nodata;
1862
                                }
1863
 
1864
                                /* If uip_slen > 0, the application has data to be sent. */
1865
                                if( uip_slen > 0 )
1866
                                {
1867
                                        /* If the connection has acknowledged data, the contents of
1868
           the ->len variable should be discarded. */
1869
                                        if( (uip_flags & UIP_ACKDATA) != 0 )
1870
                                        {
1871
                                                uip_connr->len = 0;
1872
                                        }
1873
 
1874
                                        /* If the ->len variable is non-zero the connection has
1875
           already data in transit and cannot send anymore right
1876
           now. */
1877
                                        if( uip_connr->len == 0 )
1878
                                        {
1879
                                                /* The application cannot send more than what is allowed by
1880
             the mss (the minumum of the MSS and the available
1881
             window). */
1882
                                                if( uip_slen > uip_connr->mss )
1883
                                                {
1884
                                                        uip_slen = uip_connr->mss;
1885
                                                }
1886
 
1887
                                                /* Remember how much data we send out now so that we know
1888
             when everything has been acknowledged. */
1889
                                                uip_connr->len = uip_slen;
1890
                                        }
1891
                                        else
1892
                                        {
1893
                                                /* If the application already had unacknowledged data, we
1894
             make sure that the application does not send (i.e.,
1895
             retransmit) out more than it previously sent out. */
1896
                                                uip_slen = uip_connr->len;
1897
                                        }
1898
                                }
1899
 
1900
                                uip_connr->nrtx = 0;
1901
        apprexmit:
1902
                                uip_appdata = uip_sappdata;
1903
 
1904
                                /* If the application has data to be sent, or if the incoming
1905
         packet had new data in it, we must send out a packet. */
1906
                                if( uip_slen > 0 && uip_connr->len > 0 )
1907
                                {
1908
                                        /* Add the length of the IP and TCP headers. */
1909
                                        uip_len = uip_connr->len + UIP_TCPIP_HLEN;
1910
 
1911
                                        /* We always set the ACK flag in response packets. */
1912
                                        BUF->flags = TCP_ACK | TCP_PSH;
1913
 
1914
                                        /* Send the packet. */
1915
                                        goto tcp_send_noopts;
1916
                                }
1917
 
1918
                                /* If there is no data to send, just send out a pure ACK if
1919
         there is newdata. */
1920
                                if( uip_flags & UIP_NEWDATA )
1921
                                {
1922
                                        uip_len = UIP_TCPIP_HLEN;
1923
                                        BUF->flags = TCP_ACK;
1924
                                        goto tcp_send_noopts;
1925
                                }
1926
                        }
1927
 
1928
                        goto drop;
1929
 
1930
                case UIP_LAST_ACK:
1931
                        /* We can close this connection if the peer has acknowledged our
1932
       FIN. This is indicated by the UIP_ACKDATA flag. */
1933
                        if( uip_flags & UIP_ACKDATA )
1934
                        {
1935
                                uip_connr->tcpstateflags = UIP_CLOSED;
1936
                                uip_flags = UIP_CLOSE;
1937
                                UIP_APPCALL();
1938
                        }
1939
 
1940
                        break;
1941
 
1942
                case UIP_FIN_WAIT_1:
1943
                        /* The application has closed the connection, but the remote host
1944
       hasn't closed its end yet. Thus we do nothing but wait for a
1945
       FIN from the other side. */
1946
                        if( uip_len > 0 )
1947
                        {
1948
                                uip_add_rcv_nxt( uip_len );
1949
                        }
1950
 
1951
                        if( BUF->flags & TCP_FIN )
1952
                        {
1953
                                if( uip_flags & UIP_ACKDATA )
1954
                                {
1955
                                        uip_connr->tcpstateflags = UIP_TIME_WAIT;
1956
                                        uip_connr->timer = 0;
1957
                                        uip_connr->len = 0;
1958
                                }
1959
                                else
1960
                                {
1961
                                        uip_connr->tcpstateflags = UIP_CLOSING;
1962
                                }
1963
 
1964
                                uip_add_rcv_nxt( 1 );
1965
                                uip_flags = UIP_CLOSE;
1966
                                UIP_APPCALL();
1967
                                goto tcp_send_ack;
1968
                        }
1969
                        else if( uip_flags & UIP_ACKDATA )
1970
                        {
1971
                                uip_connr->tcpstateflags = UIP_FIN_WAIT_2;
1972
                                uip_connr->len = 0;
1973
                                goto drop;
1974
                        }
1975
 
1976
                        if( uip_len > 0 )
1977
                        {
1978
                                goto tcp_send_ack;
1979
                        }
1980
 
1981
                        goto drop;
1982
 
1983
                case UIP_FIN_WAIT_2:
1984
                        if( uip_len > 0 )
1985
                        {
1986
                                uip_add_rcv_nxt( uip_len );
1987
                        }
1988
 
1989
                        if( BUF->flags & TCP_FIN )
1990
                        {
1991
                                uip_connr->tcpstateflags = UIP_TIME_WAIT;
1992
                                uip_connr->timer = 0;
1993
                                uip_add_rcv_nxt( 1 );
1994
                                uip_flags = UIP_CLOSE;
1995
                                UIP_APPCALL();
1996
                                goto tcp_send_ack;
1997
                        }
1998
 
1999
                        if( uip_len > 0 )
2000
                        {
2001
                                goto tcp_send_ack;
2002
                        }
2003
 
2004
                        goto drop;
2005
 
2006
                case UIP_TIME_WAIT:
2007
                        goto tcp_send_ack;
2008
 
2009
                case UIP_CLOSING:
2010
                        if( uip_flags & UIP_ACKDATA )
2011
                        {
2012
                                uip_connr->tcpstateflags = UIP_TIME_WAIT;
2013
                                uip_connr->timer = 0;
2014
                        }
2015
        }
2016
 
2017
        goto drop;
2018
 
2019
        /* We jump here when we are ready to send the packet, and just want
2020
     to set the appropriate TCP sequence numbers in the TCP header. */
2021
tcp_send_ack:
2022
        BUF->flags = TCP_ACK;
2023
tcp_send_nodata:
2024
        uip_len = UIP_IPTCPH_LEN;
2025
tcp_send_noopts:
2026
        BUF->tcpoffset = ( UIP_TCPH_LEN / 4 ) << 4;
2027
tcp_send:
2028
        /* We're done with the input processing. We are now ready to send a
2029
     reply. Our job is to fill in all the fields of the TCP and IP
2030
     headers before calculating the checksum and finally send the
2031
     packet. */
2032
        BUF->ackno[0] = uip_connr->rcv_nxt[0];
2033
        BUF->ackno[1] = uip_connr->rcv_nxt[1];
2034
        BUF->ackno[2] = uip_connr->rcv_nxt[2];
2035
        BUF->ackno[3] = uip_connr->rcv_nxt[3];
2036
 
2037
        BUF->seqno[0] = uip_connr->snd_nxt[0];
2038
        BUF->seqno[1] = uip_connr->snd_nxt[1];
2039
        BUF->seqno[2] = uip_connr->snd_nxt[2];
2040
        BUF->seqno[3] = uip_connr->snd_nxt[3];
2041
 
2042
        BUF->proto = UIP_PROTO_TCP;
2043
 
2044
        BUF->srcport = uip_connr->lport;
2045
        BUF->destport = uip_connr->rport;
2046
 
2047
        uip_ipaddr_copy( BUF->srcipaddr, uip_hostaddr );
2048
        uip_ipaddr_copy( BUF->destipaddr, uip_connr->ripaddr );
2049
 
2050
        if( uip_connr->tcpstateflags & UIP_STOPPED )
2051
        {
2052
                /* If the connection has issued uip_stop(), we advertise a zero
2053
       window so that the remote host will stop sending data. */
2054
                BUF->wnd[0] = BUF->wnd[1] = 0;
2055
        }
2056
        else
2057
        {
2058
                BUF->wnd[0] = ( (UIP_RECEIVE_WINDOW) >> 8 );
2059
                BUF->wnd[1] = ( (UIP_RECEIVE_WINDOW) & 0xff );
2060
        }
2061
 
2062
tcp_send_noconn:
2063
        BUF->ttl = UIP_TTL;
2064
        #if UIP_CONF_IPV6
2065
 
2066
        /* For IPv6, the IP length field does not include the IPv6 IP header
2067
     length. */
2068
        BUF->len[0] = ( (uip_len - UIP_IPH_LEN) >> 8 );
2069
        BUF->len[1] = ( (uip_len - UIP_IPH_LEN) & 0xff );
2070
        #else /* UIP_CONF_IPV6 */
2071
        BUF->len[0] = ( uip_len >> 8 );
2072
        BUF->len[1] = ( uip_len & 0xff );
2073
        #endif /* UIP_CONF_IPV6 */
2074
 
2075
        BUF->urgp[0] = BUF->urgp[1] = 0;
2076
 
2077
        /* Calculate TCP checksum. */
2078
        BUF->tcpchksum = 0;
2079
        BUF->tcpchksum = ~( uip_tcpchksum() );
2080
 
2081
        #if UIP_UDP
2082
        ip_send_nolen :
2083
        #endif
2084
        #if UIP_CONF_IPV6
2085
        BUF->vtc = 0x60;
2086
        BUF->tcflow = 0x00;
2087
        BUF->flow = 0x00;
2088
        #else /* UIP_CONF_IPV6 */
2089
        BUF->vhl = 0x45;
2090
        BUF->tos = 0;
2091
        BUF->ipoffset[0] = BUF->ipoffset[1] = 0;
2092
        ++ipid;
2093
        BUF->ipid[0] = ipid >> 8;
2094
        BUF->ipid[1] = ipid & 0xff;
2095
 
2096
        /* Calculate IP checksum. */
2097
        BUF->ipchksum = 0;
2098
        BUF->ipchksum = ~( uip_ipchksum() );
2099
        DEBUG_PRINTF( "uip ip_send_nolen: chkecum 0x%04x\n", uip_ipchksum() );
2100
        #endif /* UIP_CONF_IPV6 */
2101
 
2102
        UIP_STAT( ++uip_stat.tcp.sent );
2103
send:
2104
        DEBUG_PRINTF( "Sending packet with length %d (%d)\n", uip_len, (BUF->len[0] << 8) | BUF->len[1] );
2105
 
2106
        UIP_STAT( ++uip_stat.ip.sent );
2107
 
2108
        /* Return and let the caller do the actual transmission. */
2109
        uip_flags = 0;
2110
        return;
2111
drop:
2112
        uip_len = 0;
2113
        uip_flags = 0;
2114
        return;
2115
}
2116
 
2117
/*---------------------------------------------------------------------------*/
2118
u16_t htons( u16_t val )
2119
{
2120
        return HTONS( val );
2121
}
2122
 
2123
/*---------------------------------------------------------------------------*/
2124
void uip_send( const void *data, int len )
2125
{
2126
        if( len > 0 )
2127
        {
2128
                uip_slen = len;
2129
                if( data != uip_sappdata )
2130
                {
2131
                        memcpy( uip_sappdata, (data), uip_slen );
2132
                }
2133
        }
2134
}
2135
 
2136
/*---------------------------------------------------------------------------*/
2137
int uip_fast_send( int xARP )
2138
{
2139
        ( void ) xARP;
2140
        #if NOT_YET_COMPLETE
2141
 
2142
        u16_t           tcplen, len1 = 0, uiAccumulatedLen = 0, len_previous = 0, split_len;
2143
        int                     iSplitNo = 0;
2144
        extern int      uip_low_level_output( unsigned char *pcBuf, int ilen );
2145
 
2146
        if( xARP == pdTRUE )
2147
        {
2148
                if( BUF->proto == UIP_PROTO_TCP && uip_slen > 1 )
2149
                {
2150
                        tcplen = uip_len - UIP_TCPIP_HLEN;
2151
 
2152
                        if( tcplen > UIP_TCP_MSS )
2153
                        {
2154
                                split_len = UIP_TCP_MSS;
2155
                        }
2156
                        else
2157
                        {
2158
                                split_len = tcplen / 2;
2159
                        }
2160
 
2161
                        while( tcplen > 0 )
2162
                        {
2163
                                uiAccumulatedLen += len1;
2164
 
2165
                                if( tcplen > split_len )
2166
                                {
2167
                                        len1 = split_len;
2168
                                        tcplen -= split_len;
2169
                                }
2170
                                else
2171
                                {
2172
                                        len1 = tcplen;
2173
                                        tcplen = 0;
2174
                                }
2175
 
2176
                                uip_len = len1 + UIP_TCPIP_HLEN;
2177
                                BUF->len[0] = uip_len >> 8;
2178
                                BUF->len[1] = uip_len & 0xff;
2179
                                if( iSplitNo == 0 )
2180
                                {
2181
                                        iSplitNo++;
2182
 
2183
                                        /* Create the first packet. This is done by altering the length
2184
                                        field of the IP header and updating the checksums. */
2185
                                }
2186
                                else
2187
                                {
2188
                                        /* Now, create the second packet. To do this, it is not enough to
2189
                                        just alter the length field, but we must also update the TCP
2190
                                        sequence number and point the uip_appdata to a new place in
2191
                                        memory. This place is determined by the length of the first
2192
                                        packet (len1). */
2193
 
2194
                                        /*    uip_appdata += len1;*/
2195
                                        memcpy( uip_appdata, ( u8_t * ) uip_appdata + uiAccumulatedLen, len1 );
2196
                                        uip_add32( BUF->seqno, len_previous );
2197
                                        BUF->seqno[0] = uip_acc32[0];
2198
                                        BUF->seqno[1] = uip_acc32[1];
2199
                                        BUF->seqno[2] = uip_acc32[2];
2200
                                        BUF->seqno[3] = uip_acc32[3];
2201
                                }
2202
 
2203
                                /* Recalculate the TCP checksum. */
2204
                                BUF->tcpchksum = 0;
2205
                                BUF->tcpchksum = ~( uip_tcpchksum() );
2206
 
2207
                                /* Recalculate the IP checksum. */
2208
                                BUF->ipchksum = 0;
2209
                                BUF->ipchksum = ~( uip_ipchksum() );
2210
 
2211
                                /* Transmit the packet. */
2212
                                uip_arp_out();
2213
                                uip_low_level_output( uip_buf, uip_len );
2214
 
2215
                                len_previous = len1;
2216
                        }
2217
                }
2218
                else
2219
                {
2220
                        uip_arp_out();
2221
                        uip_low_level_output( uip_buf, uip_len );
2222
                }
2223
        }
2224
        else
2225
        {
2226
                uip_low_level_output( uip_buf, uip_len );
2227
        }
2228
 
2229
        #endif
2230
        return 1;
2231
}
2232
 
2233
/** @} */

powered by: WebSVN 2.1.0

© copyright 1999-2024 OpenCores.org, equivalent to Oliscience, all rights reserved. OpenCores®, registered trademark.