URL
https://opencores.org/ocsvn/openrisc_me/openrisc_me/trunk
Subversion Repositories openrisc_me
[/] [openrisc/] [trunk/] [bootloaders/] [orpmon/] [services/] [net.c] - Rev 299
Go to most recent revision | Compare with Previous | Blame | View Log
/* * Copied from Linux Monitor (LiMon) - Networking. * * Copyright 1994 - 2000 Neil Russell. * (See License) * Copyright 2000 Roland Borde * Copyright 2000 Paolo Scaffardi * Copyright 2000, 2001 Wolfgang Denk */ /* * General Desription: * * The user interface supports commands for BOOTP, RARP, and TFTP. * Also, we support ARP internally. Depending on available data, * these interact as follows: * * BOOTP: * * Prerequisites: - own ethernet address * We want: - own IP address * - TFTP server IP address * - name of bootfile * Next step: ARP * * RARP: * * Prerequisites: - own ethernet address * We want: - own IP address * - TFTP server IP address * Next step: ARP * * ARP: * * Prerequisites: - own ethernet address * - own IP address * - TFTP server IP address * We want: - TFTP server ethernet address * Next step: TFTP * * DHCP: * * Prerequisites: - own ethernet address * We want: - IP, Netmask, ServerIP, Gateway IP * - bootfilename, lease time * Next step: - TFTP * * TFTP: * * Prerequisites: - own ethernet address * - own IP address * - TFTP server IP address * - TFTP server ethernet address * - name of bootfile (if unknown, we use a default name * derived from our own IP address) * We want: - load the boot file * Next step: none */ #include "common.h" #include "support.h" #include "net.h" #include "bootp.h" #include "tftp.h" #include "rarp.h" #include "arp.h" #if OC_LAN==1 #include "eth.h" #else # if SMC91111_LAN==1 # include "smc91111.h" # endif #endif #if 0 #define ET_DEBUG #endif /** BOOTP EXTENTIONS **/ IPaddr_t NetOurSubnetMask=0; /* Our subnet mask (0=unknown) */ IPaddr_t NetOurGatewayIP=0; /* Our gateways IP address */ IPaddr_t NetOurDNSIP=0; /* Our DNS IP address */ char NetOurNISDomain[32]={0,}; /* Our NIS domain */ char NetOurHostName[32]={0,}; /* Our hostname */ char NetOurRootPath[64]={0,}; /* Our bootpath */ unsigned short NetBootFileSize=0; /* Our bootfile size in blocks */ /** END OF BOOTP EXTENTIONS **/ unsigned long NetBootFileXferSize; /* The actual transferred size of the bootfile (in bytes) */ unsigned char NetOurEther[6]; /* Our ethernet address */ unsigned char NetServerEther[6] = /* Boot server enet address */ { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff }; IPaddr_t NetOurIP; /* Our IP addr (0 = unknown) */ IPaddr_t NetServerIP; /* Our IP addr (0 = unknown) */ volatile unsigned char *NetRxPkt; /* Current receive packet */ int NetRxPktLen; /* Current rx packet length */ unsigned NetIPID; /* IP packet ID */ unsigned char NetBcastAddr[6] = /* Ethernet bcast address */ { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff }; int NetState; /* Network loop state */ char BootFile[128]; /* Boot File name */ volatile unsigned char PktBuf[(PKTBUFSRX+1) * PKTSIZE_ALIGN + PKTALIGN]; volatile unsigned char *NetRxPackets[PKTBUFSRX]; /* Receive packets */ static rxhand_f *packetHandler; /* Current RX packet handler */ static thand_f *timeHandler; /* Current timeout handler */ static unsigned long timeValue; /* Current timeout value */ volatile unsigned char *NetTxPacket = 0; /* THE transmit packet */ static int net_check_prereq (proto_t protocol); /**********************************************************************/ /* * Main network processing loop. */ int NetLoop(proto_t protocol) { #if 1 if (!NetTxPacket) { int i; printf("NetTxPacket begin setup\n"); /* * Setup packet buffers, aligned correctly. */ NetTxPacket = &PktBuf[0] + (PKTALIGN - 1); NetTxPacket -= (unsigned long)NetTxPacket % PKTALIGN; for (i = 0; i < PKTBUFSRX; i++) { NetRxPackets[i] = NetTxPacket + (i+1)*PKTSIZE_ALIGN; } } eth_halt(); eth_init(NetReceive); restart: NetCopyEther(NetOurEther, global.eth_add); NetState = NETLOOP_CONTINUE; /* * Start the ball rolling with the given start function. From * here on, this code is a state machine driven by received * packets and timer events. */ if (protocol == TFTP) { /* TFTP */ NetOurIP = global.ip; NetServerIP = global.srv_ip; NetOurGatewayIP = global.gw_ip; NetOurSubnetMask= global.mask; if (net_check_prereq (protocol) != 0) { return 0; } /* always use ARP to get server ethernet address */ ArpTry = 0; ArpRequest (); #if (CONFIG_COMMANDS & CFG_CMD_DHCP) } else if (protocol == DHCP) { if (net_check_prereq (protocol) != 0) { return 0; } /* Start with a clean slate... */ NetOurIP = 0; NetServerIP = 0; DhcpRequest(); /* Basically same as BOOTP */ #endif /* CFG_CMD_DHCP */ } else { /* BOOTP or RARP */ /* * initialize our IP addr to 0 in order to accept ANY * IP addr assigned to us by the BOOTP / RARP server */ NetOurIP = 0; NetServerIP = 0; if (net_check_prereq (protocol) != 0) { return 0; } #ifdef BOOTP if (protocol == BOOTP) { BootpTry = 0; BootpRequest (); } #endif #ifdef RARP if { RarpTry = 0; RarpRequest (); } #endif } NetBootFileXferSize = 0; /* * Main packet reception loop. Loop receiving packets until * someone sets `NetQuit'. */ for (;;) { // WATCHDOG_RESET(); /* * Check the ethernet for a new packet. The ethernet * receive routine will process it. */ eth_rx(); /* * Abort if ctrl-c was pressed. */ if (ctrlc()) { eth_halt(); printf("\nAbort\n"); return 0; } /* * Check for a timeout, and run the timeout handler * if we have one. */ /* if (timeHandler && (get_timer(0) > timeValue)) { thand_f *x; x = timeHandler; timeHandler = (thand_f *)0; (*x)(); } */ switch (NetState) { case NETLOOP_RESTART: goto restart; case NETLOOP_SUCCESS: if (NetBootFileXferSize > 0) { printf("Bytes transferred = %ld (0x%lx)\n", NetBootFileXferSize, NetBootFileXferSize); #ifdef TFTP_CALC_CHKSUM printf("CHKSUM: 0x%lx\n", TFTP_CHKSUM); #endif } eth_halt(); return NetBootFileXferSize; case NETLOOP_FAIL: return 0; } } #endif } /**********************************************************************/ #if 1 void NetStartAgain(void) { NetState = NETLOOP_RESTART; } /**********************************************************************/ /* * Miscelaneous bits. */ void NetSetHandler(rxhand_f * f) { packetHandler = f; } void NetSetTimeout(int iv, thand_f * f) { if (iv == 0) { timeHandler = (thand_f *)0; } else { timeHandler = f; timeValue = get_timer(0) + iv; } } void NetSendPacket(volatile unsigned char * pkt, int len) { #if OC_LAN==1 unsigned char *p = (unsigned char *)0; while (p == (unsigned char*) 0) p = eth_get_tx_buf(); memcpy(p, (void *)pkt, len); eth_send(p, len); #else # if SMC91111_LAN==1 eth_send(pkt, len); # endif #endif } void NetReceive(volatile unsigned char * pkt, int len) { Ethernet_t *et; IP_t *ip; ARP_t *arp; int x; IPaddr_t ip_to_check; // Used as a temp variable to check IP NetRxPkt = pkt; NetRxPktLen = len; et = (Ethernet_t *)pkt; x = SWAP16(et->et_protlen); if (x < 1514) { /* * Got a 802 packet. Check the other protocol field. */ x = SWAP16(et->et_prot); ip = (IP_t *)(pkt + E802_HDR_SIZE); len -= E802_HDR_SIZE; } else { ip = (IP_t *)(pkt + ETHER_HDR_SIZE); len -= ETHER_HDR_SIZE; } #ifdef ET_DEBUG printf("Receive from protocol 0x%x\n", x); #endif switch (x) { case PROT_ARP: /* * We have to deal with two types of ARP packets: * - REQUEST packets will be answered by sending our * IP address - if we know it. * - REPLY packates are expected only after we asked * for the TFTP server's or the gateway's ethernet * address; so if we receive such a packet, we set * the server ethernet address */ #ifdef ET_DEBUG printf("Got ARP\n"); #endif arp = (ARP_t *)ip; if (len < ARP_HDR_SIZE) { printf("bad length %d < %d\n", len, ARP_HDR_SIZE); return; } if (SWAP16(arp->ar_hrd) != ARP_ETHER) { return; } if (SWAP16(arp->ar_pro) != PROT_IP) { return; } if (arp->ar_hln != 6) { return; } if (arp->ar_pln != 4) { return; } memcpy((void*) &ip_to_check, (void*)&arp->ar_data[16], sizeof(IPaddr_t)); if (NetOurIP == 0 || ip_to_check != NetOurIP) { return; } switch (SWAP16(arp->ar_op)) { case ARPOP_REQUEST: /* reply with our IP address */ #ifdef ET_DEBUG printf("Got ARP REQUEST, return our IP\n"); #endif NetSetEther((unsigned char *)et, et->et_src, PROT_ARP); arp->ar_op = SWAP16(ARPOP_REPLY); NetCopyEther(&arp->ar_data[10], &arp->ar_data[0]); NetCopyEther(&arp->ar_data[0], NetOurEther); //*(IPaddr_t *)(&arp->ar_data[16]) = *(IPaddr_t *)(&arp->ar_data[6]); memcpy((void*)&arp->ar_data[16],(void*) &arp->ar_data[6], sizeof(IPaddr_t)); //*(IPaddr_t *)(&arp->ar_data[6]) = NetOurIP; memcpy((void*)&arp->ar_data[6],(void*) &NetOurIP, sizeof(IPaddr_t)); NetSendPacket((unsigned char *)et, ((unsigned char *)arp-pkt)+ARP_HDR_SIZE); return; case ARPOP_REPLY: /* set TFTP server eth addr */ #ifdef ET_DEBUG printf("Got ARP REPLY, set server/gtwy eth addr\n"); #endif NetCopyEther(NetServerEther, &arp->ar_data[0]); (*packetHandler)(0,0,0,0); /* start TFTP */ return; default: #ifdef ET_DEBUG printf("Unexpected ARP opcode 0x%x\n", SWAP16(arp->ar_op)); #endif return; } case PROT_RARP: #ifdef ET_DEBUG printf("Got RARP\n"); #endif arp = (ARP_t *)ip; if (len < ARP_HDR_SIZE) { printf("bad length %d < %d\n", len, ARP_HDR_SIZE); return; } if ((SWAP16(arp->ar_op) != RARPOP_REPLY) || (SWAP16(arp->ar_hrd) != ARP_ETHER) || (SWAP16(arp->ar_pro) != PROT_IP) || (arp->ar_hln != 6) || (arp->ar_pln != 4)) { printf("invalid RARP header\n"); } else { //NetOurIP = *((IPaddr_t *)&arp->ar_data[16]); memcpy((void*) &NetOurIP, (void*) &arp->ar_data[16], sizeof(IPaddr_t)); //NetServerIP = *((IPaddr_t *)&arp->ar_data[6]); memcpy((void*) &NetServerIP,(void*) &arp->ar_data[6], sizeof(IPaddr_t)); NetCopyEther(NetServerEther, &arp->ar_data[0]); (*packetHandler)(0,0,0,0); } break; case PROT_IP: #ifdef ET_DEBUG printf("Got IP\n"); #endif if (len < IP_HDR_SIZE) { debug ("len bad %d < %d\n", len, IP_HDR_SIZE); return; } if (len < SWAP16(ip->ip_len)) { printf("len bad %d < %d\n", len, SWAP16(ip->ip_len)); return; } len = SWAP16(ip->ip_len); #ifdef ET_DEBUG printf("len=%d, v=%02x\n", len, ip->ip_hl_v & 0xff); #endif if ((ip->ip_hl_v & 0xf0) != 0x40) { return; } if (ip->ip_off & SWAP16c(0x1fff)) { /* Can't deal w/ fragments */ return; } if (!NetCksumOk((unsigned char *)ip, IP_HDR_SIZE_NO_UDP / 2)) { //printf("checksum bad\n"); return; } memcpy((void*)&ip_to_check,(void*)&ip->ip_dst, sizeof (IPaddr_t)); if (NetOurIP && ip_to_check != NetOurIP && ip_to_check != 0xFFFFFFFF) { return; } /* * watch for ICMP host redirects * * There is no real handler code (yet). We just watch * for ICMP host redirect messages. In case anybody * sees these messages: please contact me * (wd@denx.de), or - even better - send me the * necessary fixes :-) * * Note: in all cases where I have seen this so far * it was a problem with the router configuration, * for instance when a router was configured in the * BOOTP reply, but the TFTP server was on the same * subnet. So this is probably a warning that your * configuration might be wrong. But I'm not really * sure if there aren't any other situations. */ if (ip->ip_p == IPPROTO_ICMP) { ICMP_t *icmph = (ICMP_t *)&(ip->udp_src); if (icmph->type != ICMP_REDIRECT) return; if (icmph->code != ICMP_REDIR_HOST) return; printf (" ICMP Host Redirect to "); print_IPaddr(icmph->un.gateway); putc(' '); } else if (ip->ip_p != IPPROTO_UDP) { /* Only UDP packets */ return; } /* * IP header OK. Pass the packet to the current handler. */ (*packetHandler)((unsigned char *)ip +IP_HDR_SIZE, SWAP16(ip->udp_dst), SWAP16(ip->udp_src), SWAP16(ip->udp_len) - 8); break; } } /**********************************************************************/ static int net_check_prereq (proto_t protocol) { switch (protocol) { case ARP: /* nothing to do */ break; case TFTP: if (NetServerIP == 0) { printf ("*** ERROR: `serverip' not set\n"); return (1); } if (NetOurIP == 0) { printf ("*** ERROR: `ipaddr' not set\n"); return (1); } /* Fall through */ case DHCP: case RARP: case BOOTP: if (memcmp(NetOurEther, "\0\0\0\0\0\0", 6) == 0) { printf ("*** ERROR: `ethaddr' not set\n"); return (1); } /* Fall through */ } return (0); /* OK */ } /**********************************************************************/ int NetCksumOk(unsigned char * ptr, int len) { return !((NetCksum(ptr, len) + 1) & 0xfffe); } unsigned NetCksum(unsigned char * ptr, int len) { unsigned long xsum; xsum = 0; while (len-- > 0) { xsum += (*((unsigned short *)ptr)); ptr += sizeof(short); } xsum = (xsum & 0xffff) + (xsum >> 16); xsum = (xsum & 0xffff) + (xsum >> 16); return (xsum & 0xffff); } void NetCopyEther(volatile unsigned char * to, unsigned char * from) { int i; for (i = 0; i < 6; i++) *to++ = *from++; } void NetSetEther(volatile unsigned char * xet, unsigned char * addr, unsigned long prot) { volatile Ethernet_t *et = (Ethernet_t *)xet; NetCopyEther(et->et_dest, addr); NetCopyEther(et->et_src, NetOurEther); et->et_protlen = SWAP16(prot); } void NetSetIP(volatile unsigned char * xip, IPaddr_t dest, int dport, int sport, int len) { volatile IP_t *ip = (IP_t *)xip; /* * If the data is an odd number of bytes, zero the * byte after the last byte so that the checksum * will work. */ if (len & 1) xip[IP_HDR_SIZE + len] = 0; /* * Construct an IP and UDP header. (need to set no fragment bit - XXX) */ ip->ip_hl_v = 0x45; /* IP_HDR_SIZE / 4 (not including UDP) */ ip->ip_tos = 0; ip->ip_len = SWAP16(IP_HDR_SIZE + len); ip->ip_id = SWAP16(NetIPID++); ip->ip_off = SWAP16c(0x4000); /* No fragmentation */ ip->ip_ttl = 255; ip->ip_p = 17; /* UDP */ ip->ip_sum = 0; //ip->ip_src = NetOurIP; memcpy((void*)&ip->ip_src,(void*) &NetOurIP, sizeof(IPaddr_t)); //ip->ip_dst = dest; memcpy((void*)&ip->ip_dst,(void*) &dest, sizeof(IPaddr_t)); ip->udp_src = SWAP16(sport); ip->udp_dst = SWAP16(dport); ip->udp_len = SWAP16(8 + len); ip->udp_xsum = 0; ip->ip_sum = ~NetCksum((unsigned char *)ip, IP_HDR_SIZE_NO_UDP / 2); } void copy_filename (unsigned char *dst, unsigned char *src, int size) { if (*src && (*src == '"')) { ++src; --size; } while ((--size > 0) && *src && (*src != '"')) { *dst++ = *src++; } *dst = '\0'; } void ip_to_string (IPaddr_t x, char *s) { char num[] = "0123456789ABCDEF"; int i; x = SWAP32(x); for(i = 28; i >= 0; i -= 4) *s++ = num[((x >> i) & 0x0f)]; *s = 0; } void print_IPaddr (IPaddr_t x) { char tmp[12]; ip_to_string(x, tmp); printf(tmp); } static unsigned int i2a(char* dest,unsigned int x) { register unsigned int tmp=x; register unsigned int len=0; if (x>=100) { *dest++=tmp/100+'0'; tmp=tmp%100; ++len; } if (x>=10) { *dest++=tmp/10+'0'; tmp=tmp%10; ++len; } *dest++=tmp+'0'; return len+1; } char *inet_ntoa(unsigned long in) { static char buf[20]; unsigned int len; unsigned char *ip=(unsigned char*)∈ len=i2a(buf,ip[0]); buf[len]='.'; ++len; len+=i2a(buf+ len,ip[1]); buf[len]='.'; ++len; len+=i2a(buf+ len,ip[2]); buf[len]='.'; ++len; len+=i2a(buf+ len,ip[3]); buf[len]=0; return buf; } unsigned long inet_aton(const char *cp) { unsigned long a[4]; unsigned long ret; char *p = (char *)cp; int i,d; if (strcmp(cp, "255.255.255.255") == 0) return -1; for(i = 0; i < 4; i++) { a[i] = strtoul(p, 0, 0); for(d=1; (p[d] != '.') && (i < 3); d++); p = &p[d+1]; } ret = (a[0] << 24) | (a[1] << 16) | (a[2] << 8) | a[3]; return ret; } #endif
Go to most recent revision | Compare with Previous | Blame | View Log