OpenCores
URL https://opencores.org/ocsvn/openrisc_2011-10-31/openrisc_2011-10-31/trunk

Subversion Repositories openrisc_2011-10-31

[/] [openrisc/] [trunk/] [bootloaders/] [orpmon/] [services/] [net.c] - Rev 506

Go to most recent revision | Compare with Previous | Blame | View Log

/*
 *	Copied from Linux Monitor (LiMon) - Networking.
 *
 *	Copyright 1994 - 2000 Neil Russell.
 *	(See License)
 *	Copyright 2000 Roland Borde
 *	Copyright 2000 Paolo Scaffardi
 *	Copyright 2000, 2001 Wolfgang Denk
 */
 
/*
 * General Desription:
 *
 * The user interface supports commands for BOOTP, RARP, and TFTP.
 * Also, we support ARP internally. Depending on available data,
 * these interact as follows:
 *
 * BOOTP:
 *
 *	Prerequisites:	- own ethernet address
 *	We want:	- own IP address
 *			- TFTP server IP address
 *			- name of bootfile
 *	Next step:	ARP
 *
 * RARP:
 *
 *	Prerequisites:	- own ethernet address
 *	We want:	- own IP address
 *			- TFTP server IP address
 *	Next step:	ARP
 *
 * ARP:
 *
 *	Prerequisites:	- own ethernet address
 *			- own IP address
 *			- TFTP server IP address
 *	We want:	- TFTP server ethernet address
 *	Next step:	TFTP
 *
 * DHCP:
 *
 *     Prerequisites:   - own ethernet address
 *     We want:         - IP, Netmask, ServerIP, Gateway IP
 *                      - bootfilename, lease time
 *     Next step:       - TFTP
 *
 * TFTP:
 *
 *	Prerequisites:	- own ethernet address
 *			- own IP address
 *			- TFTP server IP address
 *			- TFTP server ethernet address
 *			- name of bootfile (if unknown, we use a default name
 *			  derived from our own IP address)
 *	We want:	- load the boot file
 *	Next step:	none
 */
 
#include "common.h"
#include "support.h"
#include "net.h"
#include "bootp.h"
#include "tftp.h"
#include "rarp.h"
#include "arp.h"
#if OC_LAN==1
#include "eth.h"
#else
# if SMC91111_LAN==1
#  include "smc91111.h"
# endif
#endif
 
#if 0
#define ET_DEBUG
#endif
 
/** BOOTP EXTENTIONS **/
 
IPaddr_t NetOurSubnetMask = 0;	/* Our subnet mask (0=unknown)  */
IPaddr_t NetOurGatewayIP = 0;	/* Our gateways IP address      */
IPaddr_t NetOurDNSIP = 0;	/* Our DNS IP address           */
char NetOurNISDomain[32] = { 0, };	/* Our NIS domain               */
char NetOurHostName[32] = { 0, };	/* Our hostname                 */
char NetOurRootPath[64] = { 0, };	/* Our bootpath                 */
 
unsigned short NetBootFileSize = 0;	/* Our bootfile size in blocks  */
 
/** END OF BOOTP EXTENTIONS **/
 
unsigned long NetBootFileXferSize;	/* The actual transferred size 
					   of the bootfile (in bytes)   */
unsigned char NetOurEther[6];	/* Our ethernet address                 */
unsigned char NetServerEther[6] =	/* Boot server enet address     */
{ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff };
 
IPaddr_t NetOurIP;		/* Our IP addr (0 = unknown)            */
IPaddr_t NetServerIP;		/* Our IP addr (0 = unknown)            */
volatile unsigned char *NetRxPkt;	/* Current receive packet       */
int NetRxPktLen;		/* Current rx packet length             */
unsigned NetIPID;		/* IP packet ID                         */
unsigned char NetBcastAddr[6] =	/* Ethernet bcast address               */
{ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff };
 
int NetState;			/* Network loop state                   */
 
char BootFile[128];		/* Boot File name                       */
 
volatile unsigned char PktBuf[(PKTBUFSRX + 1) * PKTSIZE_ALIGN + PKTALIGN];
 
volatile unsigned char *NetRxPackets[PKTBUFSRX];      /* Receive packets*/
 
static rxhand_f *packetHandler;	/* Current RX packet handler            */
static thand_f *timeHandler;	/* Current timeout handler              */
static unsigned long timeValue;	/* Current timeout value                */
volatile unsigned char *NetTxPacket = 0;	/* THE transmit packet  */
 
static int net_check_prereq(proto_t protocol);
 
/**********************************************************************/
/*
 *	Main network processing loop.
 */
int NetLoop(proto_t protocol)
{
 
	if (!NetTxPacket) {
		int i;
		printf("NetTxPacket begin setup\n");
		/*
		 *  Setup packet buffers, aligned correctly.
		 */
		NetTxPacket = &PktBuf[0] + (PKTALIGN - 1);
		NetTxPacket -= (unsigned long)NetTxPacket % PKTALIGN;
		for (i = 0; i < PKTBUFSRX; i++) {
			NetRxPackets[i] = NetTxPacket + (i + 1) * PKTSIZE_ALIGN;
		}
	}
 
	eth_halt();
	eth_init(NetReceive);
 
restart:
 
	NetCopyEther(NetOurEther, global.eth_add);
 
	NetState = NETLOOP_CONTINUE;
 
	/*
	 *    Start the ball rolling with the given start function.  From
	 *    here on, this code is a state machine driven by received
	 *    packets and timer events.
	 */
 
	if (protocol == TFTP) {	/* TFTP */
		NetOurIP = global.ip;
		NetServerIP = global.srv_ip;
		NetOurGatewayIP = global.gw_ip;
		NetOurSubnetMask = global.mask;
 
		if (net_check_prereq(protocol) != 0) {
			return 0;
		}
 
		/* always use ARP to get server ethernet address */
		ArpTry = 0;
 
		ArpRequest();
 
#if (CONFIG_COMMANDS & CFG_CMD_DHCP)
	} else if (protocol == DHCP) {
		if (net_check_prereq(protocol) != 0) {
			return 0;
		}
 
		/* Start with a clean slate... */
		NetOurIP = 0;
		NetServerIP = 0;
		DhcpRequest();	/* Basically same as BOOTP */
 
#endif /* CFG_CMD_DHCP */
 
	} else {		/* BOOTP or RARP */
 
		/*
		 * initialize our IP addr to 0 in order to accept ANY
		 * IP addr assigned to us by the BOOTP / RARP server
		 */
		NetOurIP = 0;
		NetServerIP = 0;
 
		if (net_check_prereq(protocol) != 0) {
			return 0;
		}
#ifdef BOOTP
		if (protocol == BOOTP) {
			BootpTry = 0;
			BootpRequest();
		}
#endif
#ifdef RARP
		if {
			RarpTry
				= 0;
			RarpRequest();
		}
#endif
	}
 
	NetBootFileXferSize = 0;
 
	/*
	 *    Main packet reception loop.  Loop receiving packets until
	 *    someone sets `NetQuit'.
	 */
	for (;;) {
		//          WATCHDOG_RESET();
		/*
		 *  Check the ethernet for a new packet.  The ethernet
		 *  receive routine will process it.
		 */
		eth_rx();
 
		/*
		 *  Abort if ctrl-c was pressed.
		 */
		if (ctrlc()) {
			eth_halt();
			printf("\nAbort\n");
			return 0;
		}
 
		/*
		 *  Check for a timeout, and run the timeout handler
		 *  if we have one.
		 */
		/*
		   if (timeHandler && (get_timer(0) > timeValue)) {
		   thand_f *x;
 
		   x = timeHandler;
		   timeHandler = (thand_f *)0;
		   (*x)();
		   }
		 */
 
		switch (NetState) {
 
		case NETLOOP_RESTART:
			goto restart;
 
		case NETLOOP_SUCCESS:
			if (NetBootFileXferSize > 0) {
				printf("Bytes transferred = %ld (0x%lx)\n",
				       NetBootFileXferSize,
				       NetBootFileXferSize);
#ifdef TFTP_CALC_CHKSUM
				printf("CHKSUM: 0x%lx\n", TFTP_CHKSUM);
#endif
			}
			eth_halt();
			return NetBootFileXferSize;
 
		case NETLOOP_FAIL:
			return 0;
		}
	}
 
}
 
/**********************************************************************/
 
#if 1
void NetStartAgain(void)
{
	NetState = NETLOOP_RESTART;
}
 
/**********************************************************************/
/*
 *	Miscelaneous bits.
 */
 
void NetSetHandler(rxhand_f * f)
{
	packetHandler = f;
}
 
void NetSetTimeout(int iv, thand_f * f)
{
	if (iv == 0) {
		timeHandler = (thand_f *) 0;
	} else {
		timeHandler = f;
		timeValue = get_timer(0) + iv;
	}
}
 
void NetSendPacket(volatile unsigned char *pkt, int len)
{
 
#if OC_LAN==1
	unsigned char *p = (unsigned char *)0;
	while (p == (unsigned char *)0)
		p = eth_get_tx_buf();
 
	memcpy(p, (void *)pkt, len);
	eth_send(p, len);
#else
# if  SMC91111_LAN==1
	eth_send(pkt, len);
# endif
#endif
}
 
void NetReceive(volatile unsigned char *pkt, int len)
{
	Ethernet_t *et;
	IP_t *ip;
	ARP_t *arp;
	int x;
	IPaddr_t ip_to_check;	// Used as a temp variable to check IP
 
	NetRxPkt = pkt;
	NetRxPktLen = len;
	et = (Ethernet_t *) pkt;
 
	x = SWAP16(et->et_protlen);
 
	if (x < 1514) {
		/*
		 *  Got a 802 packet.  Check the other protocol field.
		 */
		x = SWAP16(et->et_prot);
		ip = (IP_t *) (pkt + E802_HDR_SIZE);
		len -= E802_HDR_SIZE;
	} else {
		ip = (IP_t *) (pkt + ETHER_HDR_SIZE);
		len -= ETHER_HDR_SIZE;
	}
 
#ifdef ET_DEBUG
	printf("Receive from protocol 0x%x\n", x);
#endif
 
	switch (x) {
 
	case PROT_ARP:
		/*
		 * We have to deal with two types of ARP packets:
		 * - REQUEST packets will be answered by sending  our
		 *   IP address - if we know it.
		 * - REPLY packates are expected only after we asked
		 *   for the TFTP server's or the gateway's ethernet
		 *   address; so if we receive such a packet, we set
		 *   the server ethernet address
		 */
#ifdef ET_DEBUG
		printf("Got ARP\n");
#endif
		arp = (ARP_t *) ip;
		if (len < ARP_HDR_SIZE) {
			printf("bad length %d < %d\n", len, ARP_HDR_SIZE);
			return;
		}
		if (SWAP16(arp->ar_hrd) != ARP_ETHER) {
			return;
		}
		if (SWAP16(arp->ar_pro) != PROT_IP) {
			return;
		}
		if (arp->ar_hln != 6) {
			return;
		}
		if (arp->ar_pln != 4) {
			return;
		}
 
		memcpy((void *)&ip_to_check, (void *)&arp->ar_data[16],
		       sizeof(IPaddr_t));
		if (NetOurIP == 0 || ip_to_check != NetOurIP) {
			return;
		}
 
		switch (SWAP16(arp->ar_op)) {
		case ARPOP_REQUEST:	/* reply with our IP address  */
#ifdef ET_DEBUG
			printf("Got ARP REQUEST, return our IP\n");
#endif
			NetSetEther((unsigned char *)et, et->et_src, PROT_ARP);
			arp->ar_op = SWAP16(ARPOP_REPLY);
			NetCopyEther(&arp->ar_data[10], &arp->ar_data[0]);
			NetCopyEther(&arp->ar_data[0], NetOurEther);
			//*(IPaddr_t *)(&arp->ar_data[16]) = *(IPaddr_t *)(&arp->ar_data[6]);
			memcpy((void *)&arp->ar_data[16],
			       (void *)&arp->ar_data[6], sizeof(IPaddr_t));
			//*(IPaddr_t *)(&arp->ar_data[6]) = NetOurIP;
			memcpy((void *)&arp->ar_data[6], (void *)&NetOurIP,
			       sizeof(IPaddr_t));
 
			NetSendPacket((unsigned char *)et,
				      ((unsigned char *)arp - pkt) +
				      ARP_HDR_SIZE);
			return;
		case ARPOP_REPLY:	/* set TFTP server eth addr     */
#ifdef ET_DEBUG
			printf("Got ARP REPLY, set server/gtwy eth addr\n");
#endif
			NetCopyEther(NetServerEther, &arp->ar_data[0]);
			(*packetHandler) (0, 0, 0, 0);	/* start TFTP */
			return;
		default:
#ifdef ET_DEBUG
			printf("Unexpected ARP opcode 0x%x\n",
			       SWAP16(arp->ar_op));
#endif
			return;
		}
 
	case PROT_RARP:
#ifdef ET_DEBUG
		printf("Got RARP\n");
#endif
		arp = (ARP_t *) ip;
		if (len < ARP_HDR_SIZE) {
			printf("bad length %d < %d\n", len, ARP_HDR_SIZE);
			return;
		}
 
		if ((SWAP16(arp->ar_op) != RARPOP_REPLY) ||
		    (SWAP16(arp->ar_hrd) != ARP_ETHER) ||
		    (SWAP16(arp->ar_pro) != PROT_IP) ||
		    (arp->ar_hln != 6) || (arp->ar_pln != 4)) {
 
			printf("invalid RARP header\n");
		} else {
			//NetOurIP = *((IPaddr_t *)&arp->ar_data[16]);
			memcpy((void *)&NetOurIP, (void *)&arp->ar_data[16],
			       sizeof(IPaddr_t));
			//NetServerIP = *((IPaddr_t *)&arp->ar_data[6]);
			memcpy((void *)&NetServerIP, (void *)&arp->ar_data[6],
			       sizeof(IPaddr_t));
 
			NetCopyEther(NetServerEther, &arp->ar_data[0]);
 
			(*packetHandler) (0, 0, 0, 0);
		}
		break;
 
	case PROT_IP:
#ifdef ET_DEBUG
		printf("Got IP\n");
#endif
		if (len < IP_HDR_SIZE) {
			debug("ip header len bad %d < %d\n", len, IP_HDR_SIZE);
			return;
		}
		if (len < SWAP16(ip->ip_len)) {
			printf("ip header (swap) len bad %d < %d\n", len,
			       SWAP16(ip->ip_len));
			return;
		}
		len = SWAP16(ip->ip_len);
#ifdef ET_DEBUG
		printf("len=%d, v=%02x\n", len, ip->ip_hl_v & 0xff);
#endif
		if ((ip->ip_hl_v & 0xf0) != 0x40) {
			return;
		}
		if (ip->ip_off & SWAP16c(0x1fff)) {	/* Can't deal w/ fragments */
			return;
		}
		if (!NetCksumOk((unsigned char *)ip, IP_HDR_SIZE_NO_UDP / 2)) {
			//printf("checksum bad\n");
			return;
		}
 
		memcpy((void *)&ip_to_check, (void *)&ip->ip_dst,
		       sizeof(IPaddr_t));
 
		if (NetOurIP &&
		    ip_to_check != NetOurIP && ip_to_check != 0xFFFFFFFF) {
			return;
		}
		/*
		 * watch for ICMP host redirects
		 *
		 * There is no real handler code (yet). We just watch
		 * for ICMP host redirect messages. In case anybody
		 * sees these messages: please contact me
		 * (wd@denx.de), or - even better - send me the
		 * necessary fixes :-)
		 *
		 * Note: in all cases where I have seen this so far
		 * it was a problem with the router configuration,
		 * for instance when a router was configured in the
		 * BOOTP reply, but the TFTP server was on the same
		 * subnet. So this is probably a warning that your
		 * configuration might be wrong. But I'm not really
		 * sure if there aren't any other situations.
		 */
		if (ip->ip_p == IPPROTO_ICMP) {
			ICMP_t *icmph = (ICMP_t *) & (ip->udp_src);
 
			if (icmph->type != ICMP_REDIRECT)
				return;
			if (icmph->code != ICMP_REDIR_HOST)
				return;
			printf(" ICMP Host Redirect to ");
			print_IPaddr(icmph->un.gateway);
			putc(' ');
		} else if (ip->ip_p != IPPROTO_UDP) {	/* Only UDP packets */
			return;
		}
 
		/*
		 *  IP header OK.  Pass the packet to the current handler.
		 */
		(*packetHandler) ((unsigned char *)ip + IP_HDR_SIZE,
				  SWAP16(ip->udp_dst),
				  SWAP16(ip->udp_src), SWAP16(ip->udp_len) - 8);
 
		break;
	}
}
 
/**********************************************************************/
 
static int net_check_prereq(proto_t protocol)
{
	switch (protocol) {
	case ARP:		/* nothing to do */
		break;
 
	case TFTP:
		if (NetServerIP == 0) {
			printf("*** ERROR: `serverip' not set\n");
			return (1);
		}
 
		if (NetOurIP == 0) {
			printf("*** ERROR: `ipaddr' not set\n");
			return (1);
		}
		/* Fall through */
 
	case DHCP:
	case RARP:
	case BOOTP:
		if (memcmp(NetOurEther, "\0\0\0\0\0\0", 6) == 0) {
			printf("*** ERROR: `ethaddr' not set\n");
			return (1);
		}
		/* Fall through */
	}
	return (0);		/* OK */
}
 
/**********************************************************************/
 
int NetCksumOk(unsigned char *ptr, int len)
{
	return !((NetCksum(ptr, len) + 1) & 0xfffe);
}
 
unsigned NetCksum(unsigned char *ptr, int len)
{
	unsigned long xsum;
 
	xsum = 0;
	while (len-- > 0) {
		xsum += (*((unsigned short *)ptr));
		ptr += sizeof(short);
	}
 
	xsum = (xsum & 0xffff) + (xsum >> 16);
	xsum = (xsum & 0xffff) + (xsum >> 16);
	return (xsum & 0xffff);
}
 
void NetCopyEther(volatile unsigned char *to, unsigned char *from)
{
	int i;
 
	for (i = 0; i < 6; i++)
		*to++ = *from++;
}
 
void
NetSetEther(volatile unsigned char *xet, unsigned char *addr,
	    unsigned long prot)
{
	volatile Ethernet_t *et = (Ethernet_t *) xet;
 
	NetCopyEther(et->et_dest, addr);
	NetCopyEther(et->et_src, NetOurEther);
	et->et_protlen = SWAP16(prot);
}
 
void
NetSetIP(volatile unsigned char *xip, IPaddr_t dest, int dport, int sport,
	 int len)
{
	volatile IP_t *ip = (IP_t *) xip;
 
	/*
	 *    If the data is an odd number of bytes, zero the
	 *    byte after the last byte so that the checksum
	 *    will work.
	 */
	if (len & 1)
		xip[IP_HDR_SIZE + len] = 0;
 
	/*
	 *    Construct an IP and UDP header.
	 (need to set no fragment bit - XXX)
	 */
	ip->ip_hl_v = 0x45;	/* IP_HDR_SIZE / 4 (not including UDP) */
	ip->ip_tos = 0;
	ip->ip_len = SWAP16(IP_HDR_SIZE + len);
	ip->ip_id = SWAP16(NetIPID++);
	ip->ip_off = SWAP16c(0x4000);	/* No fragmentation */
	ip->ip_ttl = 255;
	ip->ip_p = 17;		/* UDP */
	ip->ip_sum = 0;
	//ip->ip_src   = NetOurIP;
	memcpy((void *)&ip->ip_src, (void *)&NetOurIP, sizeof(IPaddr_t));
	//ip->ip_dst   = dest;
	memcpy((void *)&ip->ip_dst, (void *)&dest, sizeof(IPaddr_t));
	ip->udp_src = SWAP16(sport);
	ip->udp_dst = SWAP16(dport);
	ip->udp_len = SWAP16(8 + len);
	ip->udp_xsum = 0;
	ip->ip_sum = ~NetCksum((unsigned char *)ip, IP_HDR_SIZE_NO_UDP / 2);
}
 
void copy_filename(unsigned char *dst, unsigned char *src, int size)
{
	if (*src && (*src == '"')) {
		++src;
		--size;
	}
 
	while ((--size > 0) && *src && (*src != '"')) {
		*dst++ = *src++;
	}
	*dst = '\0';
}
 
void ip_to_string(IPaddr_t x, char *s)
{
	char num[] = "0123456789ABCDEF";
	int i;
 
	x = SWAP32(x);
 
	for (i = 28; i >= 0; i -= 4)
		*s++ = num[((x >> i) & 0x0f)];
	*s = 0;
}
 
void print_IPaddr(IPaddr_t x)
{
	char tmp[12];
 
	ip_to_string(x, tmp);
 
	printf(tmp);
}
 
static unsigned int i2a(char *dest, unsigned int x)
{
	register unsigned int tmp = x;
	register unsigned int len = 0;
	if (x >= 100) {
		*dest++ = tmp / 100 + '0';
		tmp = tmp % 100;
		++len;
	}
	if (x >= 10) {
		*dest++ = tmp / 10 + '0';
		tmp = tmp % 10;
		++len;
	}
	*dest++ = tmp + '0';
	return len + 1;
}
 
char *inet_ntoa(unsigned long in)
{
	static char buf[20];
	unsigned int len;
	unsigned char *ip = (unsigned char *)&in;
 
	len = i2a(buf, ip[0]);
	buf[len] = '.';
	++len;
	len += i2a(buf + len, ip[1]);
	buf[len] = '.';
	++len;
	len += i2a(buf + len, ip[2]);
	buf[len] = '.';
	++len;
	len += i2a(buf + len, ip[3]);
	buf[len] = 0;
	return buf;
}
 
unsigned long inet_aton(const char *cp)
{
	unsigned long a[4];
	unsigned long ret;
	char *p = (char *)cp;
	int i, d;
	if (strcmp(cp, "255.255.255.255") == 0)
		return -1;
 
	for (i = 0; i < 4; i++) {
		a[i] = strtoul(p, 0, 0);
		for (d = 1; (p[d] != '.') && (i < 3); d++) ;
		p = &p[d + 1];
	}
 
	ret = (a[0] << 24) | (a[1] << 16) | (a[2] << 8) | a[3];
	return ret;
}
 
#endif
 

Go to most recent revision | Compare with Previous | Blame | View Log

powered by: WebSVN 2.1.0

© copyright 1999-2024 OpenCores.org, equivalent to Oliscience, all rights reserved. OpenCores®, registered trademark.