--- /dev/null
+\r
+\r
+ifdef APPS\r
+ APPDIRS = $(foreach APP, $(APPS), ../apps/$(APP))\r
+ -include $(foreach APP, $(APPS), ../apps/$(APP)/Makefile.$(APP))\r
+ CFLAGS += $(addprefix -I../apps/,$(APPS))\r
+endif\r
+\r
+ifndef CCDEP\r
+ CCDEP = $(CC)\r
+endif\r
+ifndef CCDEPCFLAGS\r
+ CCDEPCFLAGS = $(CFLAGS)\r
+endif\r
+ifndef OBJECTDIR\r
+ OBJECTDIR = obj\r
+endif\r
+\r
+ifeq (${wildcard $(OBJECTDIR)},)\r
+ DUMMY := ${shell mkdir $(OBJECTDIR)}\r
+endif\r
+\r
+\r
+vpath %.c . ../uip ../lib $(APPDIRS)\r
+\r
+$(OBJECTDIR)/%.o: %.c\r
+ $(CC) $(CFLAGS) -c $< -o $@\r
+\r
+$(OBJECTDIR)/%.d: %.c\r
+ @set -e; rm -f $@; \\r
+ $(CCDEP) -MM $(CCDEPCFLAGS) $< > $@.$$$$; \\r
+ sed 's,\($*\)\.o[ :]*,$(OBJECTDIR)/\1.o $@ : ,g' < $@.$$$$ > $@; \\r
+ rm -f $@.$$$$\r
+\r
+UIP_SOURCES=uip.c uip_arp.c uiplib.c psock.c timer.c uip-neighbor.c\r
+\r
+\r
+ifneq ($(MAKECMDGOALS),clean)\r
+-include $(addprefix $(OBJECTDIR)/,$(UIP_SOURCES:.c=.d) \\r
+ $(APP_SOURCES:.c=.d))\r
+endif\r
+\r
+uip.a: ${addprefix $(OBJECTDIR)/, $(UIP_SOURCES:.c=.o)}\r
+ $(AR) rcf $@ $^\r
+\r
+apps.a: ${addprefix $(OBJECTDIR)/, $(APP_SOURCES:.c=.o)}\r
+ $(AR) rcf $@ $^\r
--- /dev/null
+/*\r
+ * Copyright (c) 2006, Swedish Institute of Computer Science.\r
+ * All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ * 3. Neither the name of the Institute nor the names of its contributors\r
+ * may be used to endorse or promote products derived from this software\r
+ * without specific prior written permission.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND\r
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\r
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE\r
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS\r
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\r
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT\r
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY\r
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF\r
+ * SUCH DAMAGE.\r
+ *\r
+ * This file is part of the uIP TCP/IP stack\r
+ *\r
+ * $Id: clock-arch.h,v 1.2 2006/06/12 08:00:31 adam Exp $\r
+ */\r
+\r
+#ifndef __CLOCK_ARCH_H__\r
+#define __CLOCK_ARCH_H__\r
+\r
+#include "FreeRTOS.h"\r
+\r
+typedef unsigned long clock_time_t;\r
+#define CLOCK_CONF_SECOND configTICK_RATE_HZ\r
+\r
+#endif /* __CLOCK_ARCH_H__ */\r
--- /dev/null
+/**\r
+ * \defgroup clock Clock interface\r
+ *\r
+ * The clock interface is the interface between the \ref timer "timer library"\r
+ * and the platform specific clock functionality. The clock\r
+ * interface must be implemented for each platform that uses the \ref\r
+ * timer "timer library".\r
+ *\r
+ * The clock interface does only one this: it measures time. The clock\r
+ * interface provides a macro, CLOCK_SECOND, which corresponds to one\r
+ * second of system time.\r
+ *\r
+ * \sa \ref timer "Timer library"\r
+ *\r
+ * @{\r
+ */\r
+\r
+/*\r
+ * Copyright (c) 2004, Swedish Institute of Computer Science.\r
+ * All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ * 3. Neither the name of the Institute nor the names of its contributors\r
+ * may be used to endorse or promote products derived from this software\r
+ * without specific prior written permission.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND\r
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\r
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE\r
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS\r
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\r
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT\r
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY\r
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF\r
+ * SUCH DAMAGE.\r
+ *\r
+ * This file is part of the uIP TCP/IP stack\r
+ *\r
+ * Author: Adam Dunkels <adam@sics.se>\r
+ *\r
+ * $Id: clock.h,v 1.3 2006/06/11 21:46:39 adam Exp $\r
+ */\r
+#ifndef __CLOCK_H__\r
+#define __CLOCK_H__\r
+\r
+#include "clock-arch.h"\r
+\r
+/**\r
+ * Initialize the clock library.\r
+ *\r
+ * This function initializes the clock library and should be called\r
+ * from the main() function of the system.\r
+ *\r
+ */\r
+void clock_init(void);\r
+\r
+/**\r
+ * Get the current clock time.\r
+ *\r
+ * This function returns the current system clock time.\r
+ *\r
+ * \return The current clock time, measured in system ticks.\r
+ */\r
+clock_time_t clock_time(void);\r
+\r
+/**\r
+ * A second, measured in system clock time.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#ifdef CLOCK_CONF_SECOND\r
+#define CLOCK_SECOND CLOCK_CONF_SECOND\r
+#else\r
+#define CLOCK_SECOND (clock_time_t)32\r
+#endif\r
+\r
+#endif /* __CLOCK_H__ */\r
+\r
+/** @} */\r
--- /dev/null
+/*\r
+ * Copyright (c) 2004-2005, Swedish Institute of Computer Science.\r
+ * All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ * 3. Neither the name of the Institute nor the names of its contributors\r
+ * may be used to endorse or promote products derived from this software\r
+ * without specific prior written permission.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND\r
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\r
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE\r
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS\r
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\r
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT\r
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY\r
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF\r
+ * SUCH DAMAGE.\r
+ *\r
+ * This file is part of the uIP TCP/IP stack\r
+ *\r
+ * Author: Adam Dunkels <adam@sics.se>\r
+ *\r
+ * $Id: lc-addrlabels.h,v 1.3 2006/06/12 08:00:30 adam Exp $\r
+ */\r
+\r
+/**\r
+ * \addtogroup lc\r
+ * @{\r
+ */\r
+\r
+/**\r
+ * \file\r
+ * Implementation of local continuations based on the "Labels as\r
+ * values" feature of gcc\r
+ * \author\r
+ * Adam Dunkels <adam@sics.se>\r
+ *\r
+ * This implementation of local continuations is based on a special\r
+ * feature of the GCC C compiler called "labels as values". This\r
+ * feature allows assigning pointers with the address of the code\r
+ * corresponding to a particular C label.\r
+ *\r
+ * For more information, see the GCC documentation:\r
+ * http://gcc.gnu.org/onlinedocs/gcc/Labels-as-Values.html\r
+ *\r
+ * Thanks to dividuum for finding the nice local scope label\r
+ * implementation.\r
+ */\r
+\r
+#ifndef __LC_ADDRLABELS_H__\r
+#define __LC_ADDRLABELS_H__\r
+\r
+/** \hideinitializer */\r
+typedef void * lc_t;\r
+\r
+#define LC_INIT(s) s = NULL\r
+\r
+\r
+#define LC_RESUME(s) \\r
+ do { \\r
+ if(s != NULL) { \\r
+ goto *s; \\r
+ } \\r
+ } while(0)\r
+\r
+#define LC_SET(s) \\r
+ do { ({ __label__ resume; resume: (s) = &&resume; }); }while(0)\r
+\r
+#define LC_END(s)\r
+\r
+#endif /* __LC_ADDRLABELS_H__ */\r
+\r
+/** @} */\r
--- /dev/null
+/*\r
+ * Copyright (c) 2004-2005, Swedish Institute of Computer Science.\r
+ * All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ * 3. Neither the name of the Institute nor the names of its contributors\r
+ * may be used to endorse or promote products derived from this software\r
+ * without specific prior written permission.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND\r
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\r
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE\r
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS\r
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\r
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT\r
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY\r
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF\r
+ * SUCH DAMAGE.\r
+ *\r
+ * This file is part of the uIP TCP/IP stack\r
+ *\r
+ * Author: Adam Dunkels <adam@sics.se>\r
+ *\r
+ * $Id: lc-switch.h,v 1.2 2006/06/12 08:00:30 adam Exp $\r
+ */\r
+\r
+/**\r
+ * \addtogroup lc\r
+ * @{\r
+ */\r
+\r
+/**\r
+ * \file\r
+ * Implementation of local continuations based on switch() statment\r
+ * \author Adam Dunkels <adam@sics.se>\r
+ *\r
+ * This implementation of local continuations uses the C switch()\r
+ * statement to resume execution of a function somewhere inside the\r
+ * function's body. The implementation is based on the fact that\r
+ * switch() statements are able to jump directly into the bodies of\r
+ * control structures such as if() or while() statmenets.\r
+ *\r
+ * This implementation borrows heavily from Simon Tatham's coroutines\r
+ * implementation in C:\r
+ * http://www.chiark.greenend.org.uk/~sgtatham/coroutines.html\r
+ */\r
+\r
+#ifndef __LC_SWITCH_H__\r
+#define __LC_SWTICH_H__\r
+\r
+/* WARNING! lc implementation using switch() does not work if an\r
+ LC_SET() is done within another switch() statement! */\r
+\r
+/** \hideinitializer */\r
+typedef unsigned short lc_t;\r
+\r
+#define LC_INIT(s) s = 0;\r
+\r
+#define LC_RESUME(s) switch(s) { case 0:\r
+\r
+#define LC_SET(s) s = __LINE__; case __LINE__:\r
+\r
+#define LC_END(s) }\r
+\r
+#endif /* __LC_SWITCH_H__ */\r
+\r
+/** @} */\r
--- /dev/null
+/*\r
+ * Copyright (c) 2004-2005, Swedish Institute of Computer Science.\r
+ * All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ * 3. Neither the name of the Institute nor the names of its contributors\r
+ * may be used to endorse or promote products derived from this software\r
+ * without specific prior written permission.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND\r
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\r
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE\r
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS\r
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\r
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT\r
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY\r
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF\r
+ * SUCH DAMAGE.\r
+ *\r
+ * This file is part of the uIP TCP/IP stack\r
+ *\r
+ * Author: Adam Dunkels <adam@sics.se>\r
+ *\r
+ * $Id: lc.h,v 1.2 2006/06/12 08:00:30 adam Exp $\r
+ */\r
+\r
+/**\r
+ * \addtogroup pt\r
+ * @{\r
+ */\r
+\r
+/**\r
+ * \defgroup lc Local continuations\r
+ * @{\r
+ *\r
+ * Local continuations form the basis for implementing protothreads. A\r
+ * local continuation can be <i>set</i> in a specific function to\r
+ * capture the state of the function. After a local continuation has\r
+ * been set can be <i>resumed</i> in order to restore the state of the\r
+ * function at the point where the local continuation was set.\r
+ *\r
+ *\r
+ */\r
+\r
+/**\r
+ * \file lc.h\r
+ * Local continuations\r
+ * \author\r
+ * Adam Dunkels <adam@sics.se>\r
+ *\r
+ */\r
+\r
+#ifdef DOXYGEN\r
+/**\r
+ * Initialize a local continuation.\r
+ *\r
+ * This operation initializes the local continuation, thereby\r
+ * unsetting any previously set continuation state.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define LC_INIT(lc)\r
+\r
+/**\r
+ * Set a local continuation.\r
+ *\r
+ * The set operation saves the state of the function at the point\r
+ * where the operation is executed. As far as the set operation is\r
+ * concerned, the state of the function does <b>not</b> include the\r
+ * call-stack or local (automatic) variables, but only the program\r
+ * counter and such CPU registers that needs to be saved.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define LC_SET(lc)\r
+\r
+/**\r
+ * Resume a local continuation.\r
+ *\r
+ * The resume operation resumes a previously set local continuation, thus\r
+ * restoring the state in which the function was when the local\r
+ * continuation was set. If the local continuation has not been\r
+ * previously set, the resume operation does nothing.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define LC_RESUME(lc)\r
+\r
+/**\r
+ * Mark the end of local continuation usage.\r
+ *\r
+ * The end operation signifies that local continuations should not be\r
+ * used any more in the function. This operation is not needed for\r
+ * most implementations of local continuation, but is required by a\r
+ * few implementations.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define LC_END(lc)\r
+\r
+/**\r
+ * \var typedef lc_t;\r
+ *\r
+ * The local continuation type.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#endif /* DOXYGEN */\r
+\r
+#ifndef __LC_H__\r
+#define __LC_H__\r
+\r
+#ifdef LC_CONF_INCLUDE\r
+#include LC_CONF_INCLUDE\r
+#else\r
+#include "lc-switch.h"\r
+#endif /* LC_CONF_INCLUDE */\r
+\r
+#endif /* __LC_H__ */\r
+\r
+/** @} */\r
+/** @} */\r
--- /dev/null
+/*\r
+ * Copyright (c) 2004, Swedish Institute of Computer Science.\r
+ * All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ * 3. Neither the name of the Institute nor the names of its contributors\r
+ * may be used to endorse or promote products derived from this software\r
+ * without specific prior written permission.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND\r
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\r
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE\r
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS\r
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\r
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT\r
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY\r
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF\r
+ * SUCH DAMAGE.\r
+ *\r
+ * This file is part of the uIP TCP/IP stack\r
+ *\r
+ * Author: Adam Dunkels <adam@sics.se>\r
+ *\r
+ * $Id: psock.c,v 1.1 2007/01/04 11:06:40 adamdunkels Exp $\r
+ */\r
+#include <stdio.h>\r
+#include <string.h>\r
+\r
+#include "uipopt.h"\r
+#include "psock.h"\r
+#include "uip.h"\r
+\r
+#define STATE_NONE 0\r
+#define STATE_ACKED 1\r
+#define STATE_READ 2\r
+#define STATE_BLOCKED_NEWDATA 3\r
+#define STATE_BLOCKED_CLOSE 4\r
+#define STATE_BLOCKED_SEND 5\r
+#define STATE_DATA_SENT 6\r
+\r
+/*\r
+ * Return value of the buffering functions that indicates that a\r
+ * buffer was not filled by incoming data.\r
+ *\r
+ */\r
+#define BUF_NOT_FULL 0\r
+#define BUF_NOT_FOUND 0\r
+\r
+/*\r
+ * Return value of the buffering functions that indicates that a\r
+ * buffer was completely filled by incoming data.\r
+ *\r
+ */\r
+#define BUF_FULL 1\r
+\r
+/*\r
+ * Return value of the buffering functions that indicates that an\r
+ * end-marker byte was found.\r
+ *\r
+ */\r
+#define BUF_FOUND 2\r
+\r
+/*---------------------------------------------------------------------------*/\r
+static void buf_setup( struct psock_buf *buf, u8_t *bufptr, u16_t bufsize )\r
+{\r
+ buf->ptr = bufptr;\r
+ buf->left = bufsize;\r
+}\r
+\r
+/*---------------------------------------------------------------------------*/\r
+static u8_t buf_bufdata( struct psock_buf *buf, u16_t len, u8_t **dataptr, u16_t *datalen )\r
+{\r
+ ( void ) len;\r
+\r
+ if( *datalen < buf->left )\r
+ {\r
+ memcpy( buf->ptr, *dataptr, *datalen );\r
+ buf->ptr += *datalen;\r
+ buf->left -= *datalen;\r
+ *dataptr += *datalen;\r
+ *datalen = 0;\r
+ return BUF_NOT_FULL;\r
+ }\r
+ else if( *datalen == buf->left )\r
+ {\r
+ memcpy( buf->ptr, *dataptr, *datalen );\r
+ buf->ptr += *datalen;\r
+ buf->left = 0;\r
+ *dataptr += *datalen;\r
+ *datalen = 0;\r
+ return BUF_FULL;\r
+ }\r
+ else\r
+ {\r
+ memcpy( buf->ptr, *dataptr, buf->left );\r
+ buf->ptr += buf->left;\r
+ *datalen -= buf->left;\r
+ *dataptr += buf->left;\r
+ buf->left = 0;\r
+ return BUF_FULL;\r
+ }\r
+}\r
+\r
+/*---------------------------------------------------------------------------*/\r
+static u8_t buf_bufto( register struct psock_buf *buf, u8_t endmarker, register u8_t **dataptr, register u16_t *datalen )\r
+{\r
+ u8_t c;\r
+ while( buf->left > 0 && *datalen > 0 )\r
+ {\r
+ c = *buf->ptr = **dataptr;\r
+ ++ *dataptr;\r
+ ++buf->ptr;\r
+ -- *datalen;\r
+ --buf->left;\r
+\r
+ if( c == endmarker )\r
+ {\r
+ return BUF_FOUND;\r
+ }\r
+ }\r
+\r
+ if( *datalen == 0 )\r
+ {\r
+ return BUF_NOT_FOUND;\r
+ }\r
+\r
+ while( *datalen > 0 )\r
+ {\r
+ c = **dataptr;\r
+ -- *datalen;\r
+ ++ *dataptr;\r
+\r
+ if( c == endmarker )\r
+ {\r
+ return BUF_FOUND | BUF_FULL;\r
+ }\r
+ }\r
+\r
+ return BUF_FULL;\r
+}\r
+\r
+/*---------------------------------------------------------------------------*/\r
+static char send_data( register struct psock *s )\r
+{\r
+ if( s->state != STATE_DATA_SENT || uip_rexmit() )\r
+ {\r
+ if( s->sendlen > uip_mss() )\r
+ {\r
+ uip_send( s->sendptr, uip_mss() );\r
+ }\r
+ else\r
+ {\r
+ uip_send( s->sendptr, s->sendlen );\r
+ }\r
+\r
+ s->state = STATE_DATA_SENT;\r
+ return 1;\r
+ }\r
+\r
+ return 0;\r
+}\r
+\r
+/*---------------------------------------------------------------------------*/\r
+static char data_acked( register struct psock *s )\r
+{\r
+ if( s->state == STATE_DATA_SENT && uip_acked() )\r
+ {\r
+ if( s->sendlen > uip_mss() )\r
+ {\r
+ s->sendlen -= uip_mss();\r
+ s->sendptr += uip_mss();\r
+ }\r
+ else\r
+ {\r
+ s->sendptr += s->sendlen;\r
+ s->sendlen = 0;\r
+ }\r
+\r
+ s->state = STATE_ACKED;\r
+ return 1;\r
+ }\r
+\r
+ return 0;\r
+}\r
+\r
+/*---------------------------------------------------------------------------*/\r
+PT_THREAD( psock_send ( register struct psock *s, const char *buf, unsigned int len ) )\r
+{\r
+ PT_BEGIN( &s->psockpt );\r
+\r
+ /* If there is no data to send, we exit immediately. */\r
+ if( len == 0 )\r
+ {\r
+ PT_EXIT( &s->psockpt );\r
+ }\r
+\r
+ /* Save the length of and a pointer to the data that is to be\r
+ sent. */\r
+ s->sendptr = ( u8_t*)buf;\r
+ s->sendlen = len;\r
+\r
+ s->state = STATE_NONE;\r
+\r
+ /* We loop here until all data is sent. The s->sendlen variable is\r
+ updated by the data_sent() function. */\r
+ while( s->sendlen > 0 )\r
+ {\r
+ /*\r
+ * The condition for this PT_WAIT_UNTIL is a little tricky: the\r
+ * protothread will wait here until all data has been acknowledged\r
+ * (data_acked() returns true) and until all data has been sent\r
+ * (send_data() returns true). The two functions data_acked() and\r
+ * send_data() must be called in succession to ensure that all\r
+ * data is sent. Therefore the & operator is used instead of the\r
+ * && operator, which would cause only the data_acked() function\r
+ * to be called when it returns false.\r
+ */\r
+ PT_WAIT_UNTIL( &s->psockpt, data_acked(s) & send_data(s) );\r
+ }\r
+\r
+ s->state = STATE_NONE;\r
+\r
+ PT_END( &s->psockpt );\r
+}\r
+\r
+/*---------------------------------------------------------------------------*/\r
+PT_THREAD( psock_generator_send ( register struct psock *s, unsigned short ( *generate ) ( void * ), void *arg ) )\r
+{\r
+ PT_BEGIN( &s->psockpt );\r
+\r
+ /* Ensure that there is a generator function to call. */\r
+ if( generate == NULL )\r
+ {\r
+ PT_EXIT( &s->psockpt );\r
+ }\r
+\r
+ /* Call the generator function to generate the data in the\r
+ uip_appdata buffer. */\r
+ s->sendlen = generate( arg );\r
+ s->sendptr = uip_appdata;\r
+\r
+ s->state = STATE_NONE;\r
+ do\r
+ {\r
+ /* Call the generator function again if we are called to perform a\r
+ retransmission. */\r
+ if( uip_rexmit() )\r
+ {\r
+ generate( arg );\r
+ }\r
+\r
+ /* Wait until all data is sent and acknowledged. */\r
+ PT_WAIT_UNTIL( &s->psockpt, data_acked(s) & send_data(s) );\r
+ } while( s->sendlen > 0 );\r
+\r
+ s->state = STATE_NONE;\r
+\r
+ PT_END( &s->psockpt );\r
+}\r
+\r
+/*---------------------------------------------------------------------------*/\r
+u16_t psock_datalen( struct psock *psock )\r
+{\r
+ return psock->bufsize - psock->buf.left;\r
+}\r
+\r
+/*---------------------------------------------------------------------------*/\r
+char psock_newdata( struct psock *s )\r
+{\r
+ if( s->readlen > 0 )\r
+ {\r
+ /* There is data in the uip_appdata buffer that has not yet been\r
+ read with the PSOCK_READ functions. */\r
+ return 1;\r
+ }\r
+ else if( s->state == STATE_READ )\r
+ {\r
+ /* All data in uip_appdata buffer already consumed. */\r
+ s->state = STATE_BLOCKED_NEWDATA;\r
+ return 0;\r
+ }\r
+ else if( uip_newdata() )\r
+ {\r
+ /* There is new data that has not been consumed. */\r
+ return 1;\r
+ }\r
+ else\r
+ {\r
+ /* There is no new data. */\r
+ return 0;\r
+ }\r
+}\r
+\r
+/*---------------------------------------------------------------------------*/\r
+PT_THREAD( psock_readto ( register struct psock *psock, unsigned char c ) )\r
+{\r
+ PT_BEGIN( &psock->psockpt );\r
+\r
+ buf_setup( &psock->buf, (u8_t*) psock->bufptr, psock->bufsize );\r
+\r
+ /* XXX: Should add buf_checkmarker() before do{} loop, if\r
+ incoming data has been handled while waiting for a write. */\r
+ do\r
+ {\r
+ if( psock->readlen == 0 )\r
+ {\r
+ PT_WAIT_UNTIL( &psock->psockpt, psock_newdata(psock) );\r
+ psock->state = STATE_READ;\r
+ psock->readptr = ( u8_t * ) uip_appdata;\r
+ psock->readlen = uip_datalen();\r
+ }\r
+ } while( (buf_bufto(&psock->buf, c, &psock->readptr, &psock->readlen) & BUF_FOUND) == 0 );\r
+\r
+ if( psock_datalen(psock) == 0 )\r
+ {\r
+ psock->state = STATE_NONE;\r
+ PT_RESTART( &psock->psockpt );\r
+ }\r
+\r
+ PT_END( &psock->psockpt );\r
+}\r
+\r
+/*---------------------------------------------------------------------------*/\r
+PT_THREAD( psock_readbuf ( register struct psock *psock ) )\r
+{\r
+ PT_BEGIN( &psock->psockpt );\r
+\r
+ buf_setup( &psock->buf, (u8_t*) psock->bufptr, psock->bufsize );\r
+\r
+ /* XXX: Should add buf_checkmarker() before do{} loop, if\r
+ incoming data has been handled while waiting for a write. */\r
+ do\r
+ {\r
+ if( psock->readlen == 0 )\r
+ {\r
+ PT_WAIT_UNTIL( &psock->psockpt, psock_newdata(psock) );\r
+ printf( "Waited for newdata\n" );\r
+ psock->state = STATE_READ;\r
+ psock->readptr = ( u8_t * ) uip_appdata;\r
+ psock->readlen = uip_datalen();\r
+ }\r
+ } while( buf_bufdata(&psock->buf, psock->bufsize, &psock->readptr, &psock->readlen) != BUF_FULL );\r
+\r
+ if( psock_datalen(psock) == 0 )\r
+ {\r
+ psock->state = STATE_NONE;\r
+ PT_RESTART( &psock->psockpt );\r
+ }\r
+\r
+ PT_END( &psock->psockpt );\r
+}\r
+\r
+/*---------------------------------------------------------------------------*/\r
+void psock_init( register struct psock *psock, char *buffer, unsigned int buffersize )\r
+{\r
+ psock->state = STATE_NONE;\r
+ psock->readlen = 0;\r
+ psock->bufptr = buffer;\r
+ psock->bufsize = buffersize;\r
+ buf_setup( &psock->buf, (u8_t*) buffer, buffersize );\r
+ PT_INIT( &psock->pt );\r
+ PT_INIT( &psock->psockpt );\r
+}\r
+\r
+/*---------------------------------------------------------------------------*/\r
--- /dev/null
+/*\r
+ * Copyright (c) 2004, Swedish Institute of Computer Science.\r
+ * All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ * 3. Neither the name of the Institute nor the names of its contributors\r
+ * may be used to endorse or promote products derived from this software\r
+ * without specific prior written permission.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND\r
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\r
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE\r
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS\r
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\r
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT\r
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY\r
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF\r
+ * SUCH DAMAGE.\r
+ *\r
+ * This file is part of the uIP TCP/IP stack\r
+ *\r
+ * Author: Adam Dunkels <adam@sics.se>\r
+ *\r
+ * $Id: psock.h,v 1.3 2006/06/12 08:00:30 adam Exp $\r
+ */\r
+\r
+/**\r
+ * \defgroup psock Protosockets library\r
+ * @{\r
+ *\r
+ * The protosocket library provides an interface to the uIP stack that is\r
+ * similar to the traditional BSD socket interface. Unlike programs\r
+ * written for the ordinary uIP event-driven interface, programs\r
+ * written with the protosocket library are executed in a sequential\r
+ * fashion and does not have to be implemented as explicit state\r
+ * machines.\r
+ *\r
+ * Protosockets only work with TCP connections.\r
+ *\r
+ * The protosocket library uses \ref pt protothreads to provide\r
+ * sequential control flow. This makes the protosockets lightweight in\r
+ * terms of memory, but also means that protosockets inherits the\r
+ * functional limitations of protothreads. Each protosocket lives only\r
+ * within a single function. Automatic variables (stack variables) are\r
+ * not retained across a protosocket library function call.\r
+ *\r
+ * \note Because the protosocket library uses protothreads, local\r
+ * variables will not always be saved across a call to a protosocket\r
+ * library function. It is therefore advised that local variables are\r
+ * used with extreme care.\r
+ *\r
+ * The protosocket library provides functions for sending data without\r
+ * having to deal with retransmissions and acknowledgements, as well\r
+ * as functions for reading data without having to deal with data\r
+ * being split across more than one TCP segment.\r
+ *\r
+ * Because each protosocket runs as a protothread, the protosocket has to be\r
+ * started with a call to PSOCK_BEGIN() at the start of the function\r
+ * in which the protosocket is used. Similarly, the protosocket protothread can\r
+ * be terminated by a call to PSOCK_EXIT().\r
+ *\r
+ */\r
+\r
+/**\r
+ * \file\r
+ * Protosocket library header file\r
+ * \author\r
+ * Adam Dunkels <adam@sics.se>\r
+ *\r
+ */\r
+\r
+#ifndef __PSOCK_H__\r
+#define __PSOCK_H__\r
+\r
+#include "uipopt.h"\r
+#include "pt.h"\r
+\r
+ /*\r
+ * The structure that holds the state of a buffer.\r
+ *\r
+ * This structure holds the state of a uIP buffer. The structure has\r
+ * no user-visible elements, but is used through the functions\r
+ * provided by the library.\r
+ *\r
+ */\r
+struct psock_buf {\r
+ u8_t *ptr;\r
+ unsigned short left;\r
+};\r
+\r
+/**\r
+ * The representation of a protosocket.\r
+ *\r
+ * The protosocket structrure is an opaque structure with no user-visible\r
+ * elements.\r
+ */\r
+struct psock {\r
+ struct pt pt, psockpt; /* Protothreads - one that's using the psock\r
+ functions, and one that runs inside the\r
+ psock functions. */\r
+ const u8_t *sendptr; /* Pointer to the next data to be sent. */\r
+ u8_t *readptr; /* Pointer to the next data to be read. */\r
+ \r
+ char *bufptr; /* Pointer to the buffer used for buffering\r
+ incoming data. */\r
+ \r
+ u16_t sendlen; /* The number of bytes left to be sent. */\r
+ u16_t readlen; /* The number of bytes left to be read. */\r
+\r
+ struct psock_buf buf; /* The structure holding the state of the\r
+ input buffer. */\r
+ unsigned int bufsize; /* The size of the input buffer. */\r
+ \r
+ unsigned char state; /* The state of the protosocket. */\r
+};\r
+\r
+void psock_init(struct psock *psock, char *buffer, unsigned int buffersize);\r
+/**\r
+ * Initialize a protosocket.\r
+ *\r
+ * This macro initializes a protosocket and must be called before the\r
+ * protosocket is used. The initialization also specifies the input buffer\r
+ * for the protosocket.\r
+ *\r
+ * \param psock (struct psock *) A pointer to the protosocket to be\r
+ * initialized\r
+ *\r
+ * \param buffer (char *) A pointer to the input buffer for the\r
+ * protosocket.\r
+ *\r
+ * \param buffersize (unsigned int) The size of the input buffer.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define PSOCK_INIT(psock, buffer, buffersize) \\r
+ psock_init(psock, buffer, buffersize)\r
+\r
+/**\r
+ * Start the protosocket protothread in a function.\r
+ *\r
+ * This macro starts the protothread associated with the protosocket and\r
+ * must come before other protosocket calls in the function it is used.\r
+ *\r
+ * \param psock (struct psock *) A pointer to the protosocket to be\r
+ * started.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define PSOCK_BEGIN(psock) PT_BEGIN(&((psock)->pt))\r
+\r
+PT_THREAD(psock_send(struct psock *psock, const char *buf, unsigned int len));\r
+/**\r
+ * Send data.\r
+ *\r
+ * This macro sends data over a protosocket. The protosocket protothread blocks\r
+ * until all data has been sent and is known to have been received by\r
+ * the remote end of the TCP connection.\r
+ *\r
+ * \param psock (struct psock *) A pointer to the protosocket over which\r
+ * data is to be sent.\r
+ *\r
+ * \param data (char *) A pointer to the data that is to be sent.\r
+ *\r
+ * \param datalen (unsigned int) The length of the data that is to be\r
+ * sent.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define PSOCK_SEND(psock, data, datalen) \\r
+ PT_WAIT_THREAD(&((psock)->pt), psock_send(psock, data, datalen))\r
+\r
+/**\r
+ * \brief Send a null-terminated string.\r
+ * \param psock Pointer to the protosocket.\r
+ * \param str The string to be sent.\r
+ *\r
+ * This function sends a null-terminated string over the\r
+ * protosocket.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define PSOCK_SEND_STR(psock, str) \\r
+ PT_WAIT_THREAD(&((psock)->pt), psock_send(psock, str, strlen(str)))\r
+\r
+PT_THREAD(psock_generator_send(struct psock *psock,\r
+ unsigned short (*f)(void *), void *arg));\r
+\r
+/**\r
+ * \brief Generate data with a function and send it\r
+ * \param psock Pointer to the protosocket.\r
+ * \param generator Pointer to the generator function\r
+ * \param arg Argument to the generator function\r
+ *\r
+ * This function generates data and sends it over the\r
+ * protosocket. This can be used to dynamically generate\r
+ * data for a transmission, instead of generating the data\r
+ * in a buffer beforehand. This function reduces the need for\r
+ * buffer memory. The generator function is implemented by\r
+ * the application, and a pointer to the function is given\r
+ * as an argument with the call to PSOCK_GENERATOR_SEND().\r
+ *\r
+ * The generator function should place the generated data\r
+ * directly in the uip_appdata buffer, and return the\r
+ * length of the generated data. The generator function is\r
+ * called by the protosocket layer when the data first is\r
+ * sent, and once for every retransmission that is needed.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define PSOCK_GENERATOR_SEND(psock, generator, arg) \\r
+ PT_WAIT_THREAD(&((psock)->pt), \\r
+ psock_generator_send(psock, generator, arg))\r
+\r
+\r
+/**\r
+ * Close a protosocket.\r
+ *\r
+ * This macro closes a protosocket and can only be called from within the\r
+ * protothread in which the protosocket lives.\r
+ *\r
+ * \param psock (struct psock *) A pointer to the protosocket that is to\r
+ * be closed.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define PSOCK_CLOSE(psock) uip_close()\r
+\r
+PT_THREAD(psock_readbuf(struct psock *psock));\r
+/**\r
+ * Read data until the buffer is full.\r
+ *\r
+ * This macro will block waiting for data and read the data into the\r
+ * input buffer specified with the call to PSOCK_INIT(). Data is read\r
+ * until the buffer is full..\r
+ *\r
+ * \param psock (struct psock *) A pointer to the protosocket from which\r
+ * data should be read.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define PSOCK_READBUF(psock) \\r
+ PT_WAIT_THREAD(&((psock)->pt), psock_readbuf(psock))\r
+\r
+PT_THREAD(psock_readto(struct psock *psock, unsigned char c));\r
+/**\r
+ * Read data up to a specified character.\r
+ *\r
+ * This macro will block waiting for data and read the data into the\r
+ * input buffer specified with the call to PSOCK_INIT(). Data is only\r
+ * read until the specifieed character appears in the data stream.\r
+ *\r
+ * \param psock (struct psock *) A pointer to the protosocket from which\r
+ * data should be read.\r
+ *\r
+ * \param c (char) The character at which to stop reading.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define PSOCK_READTO(psock, c) \\r
+ PT_WAIT_THREAD(&((psock)->pt), psock_readto(psock, c))\r
+\r
+/**\r
+ * The length of the data that was previously read.\r
+ *\r
+ * This macro returns the length of the data that was previously read\r
+ * using PSOCK_READTO() or PSOCK_READ().\r
+ *\r
+ * \param psock (struct psock *) A pointer to the protosocket holding the data.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define PSOCK_DATALEN(psock) psock_datalen(psock)\r
+\r
+u16_t psock_datalen(struct psock *psock);\r
+\r
+/**\r
+ * Exit the protosocket's protothread.\r
+ *\r
+ * This macro terminates the protothread of the protosocket and should\r
+ * almost always be used in conjunction with PSOCK_CLOSE().\r
+ *\r
+ * \sa PSOCK_CLOSE_EXIT()\r
+ *\r
+ * \param psock (struct psock *) A pointer to the protosocket.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define PSOCK_EXIT(psock) PT_EXIT(&((psock)->pt))\r
+\r
+/**\r
+ * Close a protosocket and exit the protosocket's protothread.\r
+ *\r
+ * This macro closes a protosocket and exits the protosocket's protothread.\r
+ *\r
+ * \param psock (struct psock *) A pointer to the protosocket.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define PSOCK_CLOSE_EXIT(psock) \\r
+ do { \\r
+ PSOCK_CLOSE(psock); \\r
+ PSOCK_EXIT(psock); \\r
+ } while(0)\r
+\r
+/**\r
+ * Declare the end of a protosocket's protothread.\r
+ *\r
+ * This macro is used for declaring that the protosocket's protothread\r
+ * ends. It must always be used together with a matching PSOCK_BEGIN()\r
+ * macro.\r
+ *\r
+ * \param psock (struct psock *) A pointer to the protosocket.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define PSOCK_END(psock) PT_END(&((psock)->pt))\r
+\r
+char psock_newdata(struct psock *s);\r
+\r
+/**\r
+ * Check if new data has arrived on a protosocket.\r
+ *\r
+ * This macro is used in conjunction with the PSOCK_WAIT_UNTIL()\r
+ * macro to check if data has arrived on a protosocket.\r
+ *\r
+ * \param psock (struct psock *) A pointer to the protosocket.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define PSOCK_NEWDATA(psock) psock_newdata(psock)\r
+\r
+/**\r
+ * Wait until a condition is true.\r
+ *\r
+ * This macro blocks the protothread until the specified condition is\r
+ * true. The macro PSOCK_NEWDATA() can be used to check if new data\r
+ * arrives when the protosocket is waiting.\r
+ *\r
+ * Typically, this macro is used as follows:\r
+ *\r
+ \code\r
+ PT_THREAD(thread(struct psock *s, struct timer *t))\r
+ {\r
+ PSOCK_BEGIN(s);\r
+\r
+ PSOCK_WAIT_UNTIL(s, PSOCK_NEWADATA(s) || timer_expired(t));\r
+ \r
+ if(PSOCK_NEWDATA(s)) {\r
+ PSOCK_READTO(s, '\n');\r
+ } else {\r
+ handle_timed_out(s);\r
+ }\r
+ \r
+ PSOCK_END(s);\r
+ }\r
+ \endcode\r
+ *\r
+ * \param psock (struct psock *) A pointer to the protosocket.\r
+ * \param condition The condition to wait for.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define PSOCK_WAIT_UNTIL(psock, condition) \\r
+ PT_WAIT_UNTIL(&((psock)->pt), (condition));\r
+\r
+#define PSOCK_WAIT_THREAD(psock, condition) \\r
+ PT_WAIT_THREAD(&((psock)->pt), (condition))\r
+\r
+#endif /* __PSOCK_H__ */\r
+\r
+/** @} */\r
--- /dev/null
+/*\r
+ * Copyright (c) 2004-2005, Swedish Institute of Computer Science.\r
+ * All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ * 3. Neither the name of the Institute nor the names of its contributors\r
+ * may be used to endorse or promote products derived from this software\r
+ * without specific prior written permission.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND\r
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\r
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE\r
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS\r
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\r
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT\r
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY\r
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF\r
+ * SUCH DAMAGE.\r
+ *\r
+ * This file is part of the uIP TCP/IP stack\r
+ *\r
+ * Author: Adam Dunkels <adam@sics.se>\r
+ *\r
+ * $Id: pt.h,v 1.2 2006/06/12 08:00:30 adam Exp $\r
+ */\r
+\r
+/**\r
+ * \addtogroup pt\r
+ * @{\r
+ */\r
+\r
+/**\r
+ * \file\r
+ * Protothreads implementation.\r
+ * \author\r
+ * Adam Dunkels <adam@sics.se>\r
+ *\r
+ */\r
+\r
+#ifndef __PT_H__\r
+#define __PT_H__\r
+\r
+#include "lc.h"\r
+\r
+struct pt {\r
+ lc_t lc;\r
+};\r
+\r
+#define PT_WAITING 0\r
+#define PT_EXITED 1\r
+#define PT_ENDED 2\r
+#define PT_YIELDED 3\r
+\r
+/**\r
+ * \name Initialization\r
+ * @{\r
+ */\r
+\r
+/**\r
+ * Initialize a protothread.\r
+ *\r
+ * Initializes a protothread. Initialization must be done prior to\r
+ * starting to execute the protothread.\r
+ *\r
+ * \param pt A pointer to the protothread control structure.\r
+ *\r
+ * \sa PT_SPAWN()\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define PT_INIT(pt) LC_INIT((pt)->lc)\r
+\r
+/** @} */\r
+\r
+/**\r
+ * \name Declaration and definition\r
+ * @{\r
+ */\r
+\r
+/**\r
+ * Declaration of a protothread.\r
+ *\r
+ * This macro is used to declare a protothread. All protothreads must\r
+ * be declared with this macro.\r
+ *\r
+ * \param name_args The name and arguments of the C function\r
+ * implementing the protothread.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define PT_THREAD(name_args) char name_args\r
+\r
+/**\r
+ * Declare the start of a protothread inside the C function\r
+ * implementing the protothread.\r
+ *\r
+ * This macro is used to declare the starting point of a\r
+ * protothread. It should be placed at the start of the function in\r
+ * which the protothread runs. All C statements above the PT_BEGIN()\r
+ * invokation will be executed each time the protothread is scheduled.\r
+ *\r
+ * \param pt A pointer to the protothread control structure.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define PT_BEGIN(pt) { char PT_YIELD_FLAG = 1; LC_RESUME((pt)->lc)\r
+\r
+/**\r
+ * Declare the end of a protothread.\r
+ *\r
+ * This macro is used for declaring that a protothread ends. It must\r
+ * always be used together with a matching PT_BEGIN() macro.\r
+ *\r
+ * \param pt A pointer to the protothread control structure.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define PT_END(pt) LC_END((pt)->lc); PT_YIELD_FLAG = 0; \\r
+ PT_INIT(pt); return PT_ENDED; }\r
+\r
+/** @} */\r
+\r
+/**\r
+ * \name Blocked wait\r
+ * @{\r
+ */\r
+\r
+/**\r
+ * Block and wait until condition is true.\r
+ *\r
+ * This macro blocks the protothread until the specified condition is\r
+ * true.\r
+ *\r
+ * \param pt A pointer to the protothread control structure.\r
+ * \param condition The condition.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define PT_WAIT_UNTIL(pt, condition) \\r
+ do { \\r
+ LC_SET((pt)->lc); \\r
+ if(!(condition)) { \\r
+ return PT_WAITING; \\r
+ } \\r
+ } while(0)\r
+\r
+/**\r
+ * Block and wait while condition is true.\r
+ *\r
+ * This function blocks and waits while condition is true. See\r
+ * PT_WAIT_UNTIL().\r
+ *\r
+ * \param pt A pointer to the protothread control structure.\r
+ * \param cond The condition.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define PT_WAIT_WHILE(pt, cond) PT_WAIT_UNTIL((pt), !(cond))\r
+\r
+/** @} */\r
+\r
+/**\r
+ * \name Hierarchical protothreads\r
+ * @{\r
+ */\r
+\r
+/**\r
+ * Block and wait until a child protothread completes.\r
+ *\r
+ * This macro schedules a child protothread. The current protothread\r
+ * will block until the child protothread completes.\r
+ *\r
+ * \note The child protothread must be manually initialized with the\r
+ * PT_INIT() function before this function is used.\r
+ *\r
+ * \param pt A pointer to the protothread control structure.\r
+ * \param thread The child protothread with arguments\r
+ *\r
+ * \sa PT_SPAWN()\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define PT_WAIT_THREAD(pt, thread) PT_WAIT_WHILE((pt), PT_SCHEDULE(thread))\r
+\r
+/**\r
+ * Spawn a child protothread and wait until it exits.\r
+ *\r
+ * This macro spawns a child protothread and waits until it exits. The\r
+ * macro can only be used within a protothread.\r
+ *\r
+ * \param pt A pointer to the protothread control structure.\r
+ * \param child A pointer to the child protothread's control structure.\r
+ * \param thread The child protothread with arguments\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define PT_SPAWN(pt, child, thread) \\r
+ do { \\r
+ PT_INIT((child)); \\r
+ PT_WAIT_THREAD((pt), (thread)); \\r
+ } while(0)\r
+\r
+/** @} */\r
+\r
+/**\r
+ * \name Exiting and restarting\r
+ * @{\r
+ */\r
+\r
+/**\r
+ * Restart the protothread.\r
+ *\r
+ * This macro will block and cause the running protothread to restart\r
+ * its execution at the place of the PT_BEGIN() call.\r
+ *\r
+ * \param pt A pointer to the protothread control structure.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define PT_RESTART(pt) \\r
+ do { \\r
+ PT_INIT(pt); \\r
+ return PT_WAITING; \\r
+ } while(0)\r
+\r
+/**\r
+ * Exit the protothread.\r
+ *\r
+ * This macro causes the protothread to exit. If the protothread was\r
+ * spawned by another protothread, the parent protothread will become\r
+ * unblocked and can continue to run.\r
+ *\r
+ * \param pt A pointer to the protothread control structure.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define PT_EXIT(pt) \\r
+ do { \\r
+ PT_INIT(pt); \\r
+ return PT_EXITED; \\r
+ } while(0)\r
+\r
+/** @} */\r
+\r
+/**\r
+ * \name Calling a protothread\r
+ * @{\r
+ */\r
+\r
+/**\r
+ * Schedule a protothread.\r
+ *\r
+ * This function shedules a protothread. The return value of the\r
+ * function is non-zero if the protothread is running or zero if the\r
+ * protothread has exited.\r
+ *\r
+ * \param f The call to the C function implementing the protothread to\r
+ * be scheduled\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define PT_SCHEDULE(f) ((f) == PT_WAITING)\r
+\r
+/** @} */\r
+\r
+/**\r
+ * \name Yielding from a protothread\r
+ * @{\r
+ */\r
+\r
+/**\r
+ * Yield from the current protothread.\r
+ *\r
+ * This function will yield the protothread, thereby allowing other\r
+ * processing to take place in the system.\r
+ *\r
+ * \param pt A pointer to the protothread control structure.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define PT_YIELD(pt) \\r
+ do { \\r
+ PT_YIELD_FLAG = 0; \\r
+ LC_SET((pt)->lc); \\r
+ if(PT_YIELD_FLAG == 0) { \\r
+ return PT_YIELDED; \\r
+ } \\r
+ } while(0)\r
+\r
+/**\r
+ * \brief Yield from the protothread until a condition occurs.\r
+ * \param pt A pointer to the protothread control structure.\r
+ * \param cond The condition.\r
+ *\r
+ * This function will yield the protothread, until the\r
+ * specified condition evaluates to true.\r
+ *\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define PT_YIELD_UNTIL(pt, cond) \\r
+ do { \\r
+ PT_YIELD_FLAG = 0; \\r
+ LC_SET((pt)->lc); \\r
+ if((PT_YIELD_FLAG == 0) || !(cond)) { \\r
+ return PT_YIELDED; \\r
+ } \\r
+ } while(0)\r
+\r
+/** @} */\r
+\r
+#endif /* __PT_H__ */\r
+\r
+/** @} */\r
--- /dev/null
+/**\r
+ * \addtogroup timer\r
+ * @{\r
+ */\r
+\r
+/**\r
+ * \file\r
+ * Timer library implementation.\r
+ * \author\r
+ * Adam Dunkels <adam@sics.se>\r
+ */\r
+\r
+/*\r
+ * Copyright (c) 2004, Swedish Institute of Computer Science.\r
+ * All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ * 3. Neither the name of the Institute nor the names of its contributors\r
+ * may be used to endorse or promote products derived from this software\r
+ * without specific prior written permission.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND\r
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\r
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE\r
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS\r
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\r
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT\r
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY\r
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF\r
+ * SUCH DAMAGE.\r
+ *\r
+ * This file is part of the uIP TCP/IP stack\r
+ *\r
+ * Author: Adam Dunkels <adam@sics.se>\r
+ *\r
+ * $Id: timer.c,v 1.2 2006/06/12 08:00:30 adam Exp $\r
+ */\r
+\r
+#include "clock.h"\r
+#include "uip_timer.h"\r
+\r
+/*---------------------------------------------------------------------------*/\r
+/**\r
+ * Set a timer.\r
+ *\r
+ * This function is used to set a timer for a time sometime in the\r
+ * future. The function timer_expired() will evaluate to true after\r
+ * the timer has expired.\r
+ *\r
+ * \param t A pointer to the timer\r
+ * \param interval The interval before the timer expires.\r
+ *\r
+ */\r
+void\r
+timer_set(struct timer *t, clock_time_t interval)\r
+{\r
+ t->interval = interval;\r
+ t->start = clock_time();\r
+}\r
+/*---------------------------------------------------------------------------*/\r
+/**\r
+ * Reset the timer with the same interval.\r
+ *\r
+ * This function resets the timer with the same interval that was\r
+ * given to the timer_set() function. The start point of the interval\r
+ * is the exact time that the timer last expired. Therefore, this\r
+ * function will cause the timer to be stable over time, unlike the\r
+ * timer_rester() function.\r
+ *\r
+ * \param t A pointer to the timer.\r
+ *\r
+ * \sa timer_restart()\r
+ */\r
+void\r
+timer_reset(struct timer *t)\r
+{\r
+ t->start += t->interval;\r
+}\r
+/*---------------------------------------------------------------------------*/\r
+/**\r
+ * Restart the timer from the current point in time\r
+ *\r
+ * This function restarts a timer with the same interval that was\r
+ * given to the timer_set() function. The timer will start at the\r
+ * current time.\r
+ *\r
+ * \note A periodic timer will drift if this function is used to reset\r
+ * it. For preioric timers, use the timer_reset() function instead.\r
+ *\r
+ * \param t A pointer to the timer.\r
+ *\r
+ * \sa timer_reset()\r
+ */\r
+void\r
+timer_restart(struct timer *t)\r
+{\r
+ t->start = clock_time();\r
+}\r
+/*---------------------------------------------------------------------------*/\r
+/**\r
+ * Check if a timer has expired.\r
+ *\r
+ * This function tests if a timer has expired and returns true or\r
+ * false depending on its status.\r
+ *\r
+ * \param t A pointer to the timer\r
+ *\r
+ * \return Non-zero if the timer has expired, zero otherwise.\r
+ *\r
+ */\r
+int\r
+timer_expired(struct timer *t)\r
+{\r
+ return (clock_time_t)(clock_time() - t->start) >= (clock_time_t)t->interval;\r
+}\r
+/*---------------------------------------------------------------------------*/\r
+\r
+/** @} */\r
--- /dev/null
+/**\r
+ * \defgroup timer Timer library\r
+ *\r
+ * The timer library provides functions for setting, resetting and\r
+ * restarting timers, and for checking if a timer has expired. An\r
+ * application must "manually" check if its timers have expired; this\r
+ * is not done automatically.\r
+ *\r
+ * A timer is declared as a \c struct \c timer and all access to the\r
+ * timer is made by a pointer to the declared timer.\r
+ *\r
+ * \note The timer library uses the \ref clock "Clock library" to\r
+ * measure time. Intervals should be specified in the format used by\r
+ * the clock library.\r
+ *\r
+ * @{\r
+ */\r
+\r
+\r
+/**\r
+ * \file\r
+ * Timer library header file.\r
+ * \author\r
+ * Adam Dunkels <adam@sics.se>\r
+ */\r
+\r
+/*\r
+ * Copyright (c) 2004, Swedish Institute of Computer Science.\r
+ * All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ * 3. Neither the name of the Institute nor the names of its contributors\r
+ * may be used to endorse or promote products derived from this software\r
+ * without specific prior written permission.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND\r
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\r
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE\r
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS\r
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\r
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT\r
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY\r
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF\r
+ * SUCH DAMAGE.\r
+ *\r
+ * This file is part of the uIP TCP/IP stack\r
+ *\r
+ * Author: Adam Dunkels <adam@sics.se>\r
+ *\r
+ * $Id: timer.h,v 1.3 2006/06/11 21:46:39 adam Exp $\r
+ */\r
+#ifndef __TIMER_H__\r
+#define __TIMER_H__\r
+\r
+#include "clock.h"\r
+\r
+/**\r
+ * A timer.\r
+ *\r
+ * This structure is used for declaring a timer. The timer must be set\r
+ * with timer_set() before it can be used.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+struct timer {\r
+ clock_time_t start;\r
+ clock_time_t interval;\r
+};\r
+\r
+void timer_set(struct timer *t, clock_time_t interval);\r
+void timer_reset(struct timer *t);\r
+void timer_restart(struct timer *t);\r
+int timer_expired(struct timer *t);\r
+\r
+#endif /* __TIMER_H__ */\r
+\r
+/** @} */\r
--- /dev/null
+/**\r
+ * \addtogroup uipfw\r
+ * @{\r
+ */\r
+\r
+/**\r
+ * \file\r
+ * uIP packet forwarding header file.\r
+ * \author Adam Dunkels <adam@sics.se>\r
+ */\r
+\r
+/*\r
+ * Copyright (c) 2004, Swedish Institute of Computer Science.\r
+ * All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ * 3. Neither the name of the Institute nor the names of its contributors\r
+ * may be used to endorse or promote products derived from this software\r
+ * without specific prior written permission.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND\r
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\r
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE\r
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS\r
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\r
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT\r
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY\r
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF\r
+ * SUCH DAMAGE.\r
+ *\r
+ * This file is part of the uIP TCP/IP stack\r
+ *\r
+ * Author: Adam Dunkels <adam@sics.se>\r
+ *\r
+ * $Id: uip-fw.h,v 1.2 2006/06/12 08:00:30 adam Exp $\r
+ */\r
+#ifndef __UIP_FW_H__\r
+#define __UIP_FW_H__\r
+\r
+#include "uip.h"\r
+\r
+/**\r
+ * Representation of a uIP network interface.\r
+ */\r
+struct uip_fw_netif {\r
+ struct uip_fw_netif *next; /**< Pointer to the next interface when\r
+ linked in a list. */\r
+ u16_t ipaddr[2]; /**< The IP address of this interface. */\r
+ u16_t netmask[2]; /**< The netmask of the interface. */\r
+ u8_t (* output)(void);\r
+ /**< A pointer to the function that\r
+ sends a packet. */\r
+};\r
+\r
+/**\r
+ * Intantiating macro for a uIP network interface.\r
+ *\r
+ * Example:\r
+ \code\r
+ struct uip_fw_netif slipnetif =\r
+ {UIP_FW_NETIF(192,168,76,1, 255,255,255,0, slip_output)};\r
+ \endcode\r
+ * \param ip1,ip2,ip3,ip4 The IP address of the network interface.\r
+ *\r
+ * \param nm1,nm2,nm3,nm4 The netmask of the network interface.\r
+ *\r
+ * \param outputfunc A pointer to the output function of the network interface.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define UIP_FW_NETIF(ip1,ip2,ip3,ip4, nm1,nm2,nm3,nm4, outputfunc) \\r
+ NULL, \\r
+ {HTONS((ip1 << 8) | ip2), HTONS((ip3 << 8) | ip4)}, \\r
+ {HTONS((nm1 << 8) | nm2), HTONS((nm3 << 8) | nm4)}, \\r
+ outputfunc\r
+\r
+/**\r
+ * Set the IP address of a network interface.\r
+ *\r
+ * \param netif A pointer to the uip_fw_netif structure for the network interface.\r
+ *\r
+ * \param addr A pointer to an IP address.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_fw_setipaddr(netif, addr) \\r
+ do { (netif)->ipaddr[0] = ((u16_t *)(addr))[0]; \\r
+ (netif)->ipaddr[1] = ((u16_t *)(addr))[1]; } while(0)\r
+/**\r
+ * Set the netmask of a network interface.\r
+ *\r
+ * \param netif A pointer to the uip_fw_netif structure for the network interface.\r
+ *\r
+ * \param addr A pointer to an IP address representing the netmask.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_fw_setnetmask(netif, addr) \\r
+ do { (netif)->netmask[0] = ((u16_t *)(addr))[0]; \\r
+ (netif)->netmask[1] = ((u16_t *)(addr))[1]; } while(0)\r
+\r
+void uip_fw_init(void);\r
+u8_t uip_fw_forward(void);\r
+u8_t uip_fw_output(void);\r
+void uip_fw_register(struct uip_fw_netif *netif);\r
+void uip_fw_default(struct uip_fw_netif *netif);\r
+void uip_fw_periodic(void);\r
+\r
+\r
+/**\r
+ * A non-error message that indicates that a packet should be\r
+ * processed locally.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define UIP_FW_LOCAL 0\r
+\r
+/**\r
+ * A non-error message that indicates that something went OK.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define UIP_FW_OK 0\r
+\r
+/**\r
+ * A non-error message that indicates that a packet was forwarded.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define UIP_FW_FORWARDED 1\r
+\r
+/**\r
+ * A non-error message that indicates that a zero-length packet\r
+ * transmission was attempted, and that no packet was sent.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define UIP_FW_ZEROLEN 2\r
+\r
+/**\r
+ * An error message that indicates that a packet that was too large\r
+ * for the outbound network interface was detected.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define UIP_FW_TOOLARGE 3\r
+\r
+/**\r
+ * An error message that indicates that no suitable interface could be\r
+ * found for an outbound packet.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define UIP_FW_NOROUTE 4\r
+\r
+/**\r
+ * An error message that indicates that a packet that should be\r
+ * forwarded or output was dropped.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define UIP_FW_DROPPED 5\r
+\r
+\r
+#endif /* __UIP_FW_H__ */\r
+\r
+/** @} */\r
--- /dev/null
+/*\r
+ * Copyright (c) 2006, Swedish Institute of Computer Science.\r
+ * All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ * 3. Neither the name of the Institute nor the names of its contributors\r
+ * may be used to endorse or promote products derived from this software\r
+ * without specific prior written permission.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND\r
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\r
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE\r
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS\r
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\r
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT\r
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY\r
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF\r
+ * SUCH DAMAGE.\r
+ *\r
+ * This file is part of the uIP TCP/IP stack\r
+ *\r
+ * $Id: uip-neighbor.h,v 1.2 2006/06/12 08:00:30 adam Exp $\r
+ */\r
+\r
+/**\r
+ * \file\r
+ * Header file for database of link-local neighbors, used by\r
+ * IPv6 code and to be used by future ARP code.\r
+ * \author\r
+ * Adam Dunkels <adam@sics.se>\r
+ */\r
+\r
+#ifndef __UIP_NEIGHBOR_H__\r
+#define __UIP_NEIGHBOR_H__\r
+\r
+#include "uip.h"\r
+\r
+struct uip_neighbor_addr {\r
+#if UIP_NEIGHBOR_CONF_ADDRTYPE\r
+ UIP_NEIGHBOR_CONF_ADDRTYPE addr;\r
+#else\r
+ struct uip_eth_addr addr;\r
+#endif\r
+};\r
+\r
+void uip_neighbor_init(void);\r
+void uip_neighbor_add(uip_ipaddr_t ipaddr, struct uip_neighbor_addr *addr);\r
+void uip_neighbor_update(uip_ipaddr_t ipaddr);\r
+struct uip_neighbor_addr *uip_neighbor_lookup(uip_ipaddr_t ipaddr);\r
+void uip_neighbor_periodic(void);\r
+\r
+#endif /* __UIP-NEIGHBOR_H__ */\r
--- /dev/null
+/*\r
+ * Copyright (c) 2004, Swedish Institute of Computer Science.\r
+ * All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ * 3. Neither the name of the Institute nor the names of its contributors\r
+ * may be used to endorse or promote products derived from this software\r
+ * without specific prior written permission.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND\r
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\r
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE\r
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS\r
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\r
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT\r
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY\r
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF\r
+ * SUCH DAMAGE.\r
+ *\r
+ * This file is part of the uIP TCP/IP stack\r
+ *\r
+ * Author: Adam Dunkels <adam@sics.se>\r
+ *\r
+ * $Id: uip-split.c,v 1.2 2006/06/12 08:00:30 adam Exp $\r
+ */\r
+\r
+#include <string.h>\r
+\r
+#include "uip-split.h"\r
+#include "uip.h"\r
+#include "uip-fw.h"\r
+#include "uip_arch.h"\r
+\r
+\r
+\r
+#define BUF ((struct uip_tcpip_hdr *)&uip_buf[UIP_LLH_LEN])\r
+\r
+/*-----------------------------------------------------------------------------*/\r
+void\r
+uip_split_output(void)\r
+{\r
+ u16_t tcplen, len1, len2;\r
+\r
+ /* We only try to split maximum sized TCP segments. */\r
+ if(BUF->proto == UIP_PROTO_TCP &&\r
+ uip_len == UIP_BUFSIZE - UIP_LLH_LEN) {\r
+\r
+ tcplen = uip_len - UIP_TCPIP_HLEN;\r
+ /* Split the segment in two. If the original packet length was\r
+ odd, we make the second packet one byte larger. */\r
+ len1 = len2 = tcplen / 2;\r
+ if(len1 + len2 < tcplen) {\r
+ ++len2;\r
+ }\r
+\r
+ /* Create the first packet. This is done by altering the length\r
+ field of the IP header and updating the checksums. */\r
+ uip_len = len1 + UIP_TCPIP_HLEN;\r
+#if UIP_CONF_IPV6\r
+ /* For IPv6, the IP length field does not include the IPv6 IP header\r
+ length. */\r
+ BUF->len[0] = ((uip_len - UIP_IPH_LEN) >> 8);\r
+ BUF->len[1] = ((uip_len - UIP_IPH_LEN) & 0xff);\r
+#else /* UIP_CONF_IPV6 */\r
+ BUF->len[0] = uip_len >> 8;\r
+ BUF->len[1] = uip_len & 0xff;\r
+#endif /* UIP_CONF_IPV6 */\r
+\r
+ /* Recalculate the TCP checksum. */\r
+ BUF->tcpchksum = 0;\r
+ BUF->tcpchksum = ~(uip_tcpchksum());\r
+\r
+#if !UIP_CONF_IPV6\r
+ /* Recalculate the IP checksum. */\r
+ BUF->ipchksum = 0;\r
+ BUF->ipchksum = ~(uip_ipchksum());\r
+#endif /* UIP_CONF_IPV6 */\r
+\r
+ /* Transmit the first packet. */\r
+ /* uip_fw_output();*/\r
+// tcpip_output();\r
+\r
+ /* Now, create the second packet. To do this, it is not enough to\r
+ just alter the length field, but we must also update the TCP\r
+ sequence number and point the uip_appdata to a new place in\r
+ memory. This place is detemined by the length of the first\r
+ packet (len1). */\r
+ uip_len = len2 + UIP_TCPIP_HLEN;\r
+#if UIP_CONF_IPV6\r
+ /* For IPv6, the IP length field does not include the IPv6 IP header\r
+ length. */\r
+ BUF->len[0] = ((uip_len - UIP_IPH_LEN) >> 8);\r
+ BUF->len[1] = ((uip_len - UIP_IPH_LEN) & 0xff);\r
+#else /* UIP_CONF_IPV6 */\r
+ BUF->len[0] = uip_len >> 8;\r
+ BUF->len[1] = uip_len & 0xff;\r
+#endif /* UIP_CONF_IPV6 */\r
+\r
+ /* uip_appdata += len1;*/\r
+ memcpy(uip_appdata, (u8_t *)uip_appdata + len1, len2);\r
+\r
+ uip_add32(BUF->seqno, len1);\r
+ BUF->seqno[0] = uip_acc32[0];\r
+ BUF->seqno[1] = uip_acc32[1];\r
+ BUF->seqno[2] = uip_acc32[2];\r
+ BUF->seqno[3] = uip_acc32[3];\r
+\r
+ /* Recalculate the TCP checksum. */\r
+ BUF->tcpchksum = 0;\r
+ BUF->tcpchksum = ~(uip_tcpchksum());\r
+\r
+#if !UIP_CONF_IPV6\r
+ /* Recalculate the IP checksum. */\r
+ BUF->ipchksum = 0;\r
+ BUF->ipchksum = ~(uip_ipchksum());\r
+#endif /* UIP_CONF_IPV6 */\r
+\r
+ /* Transmit the second packet. */\r
+ /* uip_fw_output();*/\r
+// tcpip_output();\r
+ } else {\r
+ /* uip_fw_output();*/\r
+// tcpip_output();\r
+ }\r
+\r
+}\r
+/*-----------------------------------------------------------------------------*/\r
--- /dev/null
+/*\r
+ * Copyright (c) 2004, Swedish Institute of Computer Science.\r
+ * All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ * 3. Neither the name of the Institute nor the names of its contributors\r
+ * may be used to endorse or promote products derived from this software\r
+ * without specific prior written permission.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND\r
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\r
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE\r
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS\r
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\r
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT\r
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY\r
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF\r
+ * SUCH DAMAGE.\r
+ *\r
+ * This file is part of the uIP TCP/IP stack\r
+ *\r
+ * Author: Adam Dunkels <adam@sics.se>\r
+ *\r
+ * $Id: uip-split.h,v 1.2 2006/06/12 08:00:30 adam Exp $\r
+ */\r
+/**\r
+ * \addtogroup uip\r
+ * @{\r
+ */\r
+\r
+/**\r
+ * \defgroup uipsplit uIP TCP throughput booster hack\r
+ * @{\r
+ *\r
+ * The basic uIP TCP implementation only allows each TCP connection to\r
+ * have a single TCP segment in flight at any given time. Because of\r
+ * the delayed ACK algorithm employed by most TCP receivers, uIP's\r
+ * limit on the amount of in-flight TCP segments seriously reduces the\r
+ * maximum achievable throughput for sending data from uIP.\r
+ *\r
+ * The uip-split module is a hack which tries to remedy this\r
+ * situation. By splitting maximum sized outgoing TCP segments into\r
+ * two, the delayed ACK algorithm is not invoked at TCP\r
+ * receivers. This improves the throughput when sending data from uIP\r
+ * by orders of magnitude.\r
+ *\r
+ * The uip-split module uses the uip-fw module (uIP IP packet\r
+ * forwarding) for sending packets. Therefore, the uip-fw module must\r
+ * be set up with the appropriate network interfaces for this module\r
+ * to work.\r
+ */\r
+\r
+\r
+/**\r
+ * \file\r
+ * Module for splitting outbound TCP segments in two to avoid the\r
+ * delayed ACK throughput degradation.\r
+ * \author\r
+ * Adam Dunkels <adam@sics.se>\r
+ *\r
+ */\r
+\r
+#ifndef __UIP_SPLIT_H__\r
+#define __UIP_SPLIT_H__\r
+\r
+/**\r
+ * Handle outgoing packets.\r
+ *\r
+ * This function inspects an outgoing packet in the uip_buf buffer and\r
+ * sends it out using the uip_fw_output() function. If the packet is a\r
+ * full-sized TCP segment it will be split into two segments and\r
+ * transmitted separately. This function should be called instead of\r
+ * the actual device driver output function, or the uip_fw_output()\r
+ * function.\r
+ *\r
+ * The headers of the outgoing packet is assumed to be in the uip_buf\r
+ * buffer and the payload is assumed to be wherever uip_appdata\r
+ * points. The length of the outgoing packet is assumed to be in the\r
+ * uip_len variable.\r
+ *\r
+ */\r
+void uip_split_output(void);\r
+\r
+#endif /* __UIP_SPLIT_H__ */\r
+\r
+/** @} */\r
+/** @} */\r
--- /dev/null
+#define DEBUG_PRINTF(...) /*printf(__VA_ARGS__)*/\r
+\r
+/**\r
+ * \defgroup uip The uIP TCP/IP stack\r
+ * @{\r
+ *\r
+ * uIP is an implementation of the TCP/IP protocol stack intended for\r
+ * small 8-bit and 16-bit microcontrollers.\r
+ *\r
+ * uIP provides the necessary protocols for Internet communication,\r
+ * with a very small code footprint and RAM requirements - the uIP\r
+ * code size is on the order of a few kilobytes and RAM usage is on\r
+ * the order of a few hundred bytes.\r
+ */\r
+\r
+/**\r
+ * \file\r
+ * The uIP TCP/IP stack code.\r
+ * \author Adam Dunkels <adam@dunkels.com>\r
+ */\r
+\r
+/*\r
+ * Copyright (c) 2001-2003, Adam Dunkels.\r
+ * All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ * 3. The name of the author may not be used to endorse or promote\r
+ * products derived from this software without specific prior\r
+ * written permission.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS\r
+ * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED\r
+ * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY\r
+ * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE\r
+ * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS\r
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\r
+ * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING\r
+ * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS\r
+ * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\r
+ *\r
+ * This file is part of the uIP TCP/IP stack.\r
+ *\r
+ * $Id: uip.c,v 1.65 2006/06/11 21:46:39 adam Exp $\r
+ *\r
+ */\r
+\r
+/*\r
+ * uIP is a small implementation of the IP, UDP and TCP protocols (as\r
+ * well as some basic ICMP stuff). The implementation couples the IP,\r
+ * UDP, TCP and the application layers very tightly. To keep the size\r
+ * of the compiled code down, this code frequently uses the goto\r
+ * statement. While it would be possible to break the uip_process()\r
+ * function into many smaller functions, this would increase the code\r
+ * size because of the overhead of parameter passing and the fact that\r
+ * the optimier would not be as efficient.\r
+ *\r
+ * The principle is that we have a small buffer, called the uip_buf,\r
+ * in which the device driver puts an incoming packet. The TCP/IP\r
+ * stack parses the headers in the packet, and calls the\r
+ * application. If the remote host has sent data to the application,\r
+ * this data is present in the uip_buf and the application read the\r
+ * data from there. It is up to the application to put this data into\r
+ * a byte stream if needed. The application will not be fed with data\r
+ * that is out of sequence.\r
+ *\r
+ * If the application whishes to send data to the peer, it should put\r
+ * its data into the uip_buf. The uip_appdata pointer points to the\r
+ * first available byte. The TCP/IP stack will calculate the\r
+ * checksums, and fill in the necessary header fields and finally send\r
+ * the packet back to the peer.\r
+*/\r
+\r
+#include "uip.h"\r
+#include "uipopt.h"\r
+#include "uip_arch.h"\r
+\r
+#if UIP_CONF_IPV6\r
+#include "uip-neighbor.h"\r
+#endif /* UIP_CONF_IPV6 */\r
+\r
+#include <string.h>\r
+\r
+/*---------------------------------------------------------------------------*/\r
+/* Variable definitions. */\r
+\r
+\r
+/* The IP address of this host. If it is defined to be fixed (by\r
+ setting UIP_FIXEDADDR to 1 in uipopt.h), the address is set\r
+ here. Otherwise, the address */\r
+#if UIP_FIXEDADDR > 0\r
+const uip_ipaddr_t uip_hostaddr =\r
+ {HTONS((UIP_IPADDR0 << 8) | UIP_IPADDR1),\r
+ HTONS((UIP_IPADDR2 << 8) | UIP_IPADDR3)};\r
+const uip_ipaddr_t uip_draddr =\r
+ {HTONS((UIP_DRIPADDR0 << 8) | UIP_DRIPADDR1),\r
+ HTONS((UIP_DRIPADDR2 << 8) | UIP_DRIPADDR3)};\r
+const uip_ipaddr_t uip_netmask =\r
+ {HTONS((UIP_NETMASK0 << 8) | UIP_NETMASK1),\r
+ HTONS((UIP_NETMASK2 << 8) | UIP_NETMASK3)};\r
+#else\r
+uip_ipaddr_t uip_hostaddr, uip_draddr, uip_netmask;\r
+#endif /* UIP_FIXEDADDR */\r
+\r
+static const uip_ipaddr_t all_ones_addr =\r
+#if UIP_CONF_IPV6\r
+ {0xffff,0xffff,0xffff,0xffff,0xffff,0xffff,0xffff,0xffff};\r
+#else /* UIP_CONF_IPV6 */\r
+ {0xffff,0xffff};\r
+#endif /* UIP_CONF_IPV6 */\r
+static const uip_ipaddr_t all_zeroes_addr =\r
+#if UIP_CONF_IPV6\r
+ {0x0000,0x0000,0x0000,0x0000,0x0000,0x0000,0x0000,0x0000};\r
+#else /* UIP_CONF_IPV6 */\r
+ {0x0000,0x0000};\r
+#endif /* UIP_CONF_IPV6 */\r
+\r
+#if UIP_FIXEDETHADDR\r
+const struct uip_eth_addr uip_ethaddr = {{UIP_ETHADDR0,\r
+ UIP_ETHADDR1,\r
+ UIP_ETHADDR2,\r
+ UIP_ETHADDR3,\r
+ UIP_ETHADDR4,\r
+ UIP_ETHADDR5}};\r
+#else\r
+struct uip_eth_addr uip_ethaddr = {{0,0,0,0,0,0}};\r
+#endif\r
+\r
+#ifndef UIP_CONF_EXTERNAL_BUFFER\r
+\r
+#ifdef __ICCARM__\r
+ #pragma data_alignment=4\r
+ u8_t uip_buf[UIP_BUFSIZE + 2]; /* The packet buffer that contains incoming packets. */\r
+#else\r
+ u8_t uip_buf[UIP_BUFSIZE + 2] ALIGN_STRUCT_END; /* The packet buffer that contains incoming packets. */\r
+#endif\r
+ \r
+#endif /* UIP_CONF_EXTERNAL_BUFFER */\r
+\r
+void *uip_appdata; /* The uip_appdata pointer points to\r
+ application data. */\r
+void *uip_sappdata; /* The uip_appdata pointer points to\r
+ the application data which is to\r
+ be sent. */\r
+#if UIP_URGDATA > 0\r
+void *uip_urgdata; /* The uip_urgdata pointer points to\r
+ urgent data (out-of-band data), if\r
+ present. */\r
+u16_t uip_urglen, uip_surglen;\r
+#endif /* UIP_URGDATA > 0 */\r
+\r
+u16_t uip_len, uip_slen;\r
+ /* The uip_len is either 8 or 16 bits,\r
+ depending on the maximum packet\r
+ size. */\r
+\r
+u8_t uip_flags; /* The uip_flags variable is used for\r
+ communication between the TCP/IP stack\r
+ and the application program. */\r
+struct uip_conn *uip_conn; /* uip_conn always points to the current\r
+ connection. */\r
+\r
+struct uip_conn uip_conns[UIP_CONNS];\r
+ /* The uip_conns array holds all TCP\r
+ connections. */\r
+u16_t uip_listenports[UIP_LISTENPORTS];\r
+ /* The uip_listenports list all currently\r
+ listning ports. */\r
+#if UIP_UDP\r
+struct uip_udp_conn *uip_udp_conn;\r
+struct uip_udp_conn uip_udp_conns[UIP_UDP_CONNS];\r
+#endif /* UIP_UDP */\r
+\r
+static u16_t ipid; /* Ths ipid variable is an increasing\r
+ number that is used for the IP ID\r
+ field. */\r
+\r
+void uip_setipid(u16_t id) { ipid = id; }\r
+\r
+static u8_t iss[4]; /* The iss variable is used for the TCP\r
+ initial sequence number. */\r
+\r
+#if UIP_ACTIVE_OPEN\r
+static u16_t lastport; /* Keeps track of the last port used for\r
+ a new connection. */\r
+#endif /* UIP_ACTIVE_OPEN */\r
+\r
+/* Temporary variables. */\r
+u8_t uip_acc32[4];\r
+static u8_t c, opt;\r
+static u16_t tmp16;\r
+\r
+/* Structures and definitions. */\r
+#define TCP_FIN 0x01\r
+#define TCP_SYN 0x02\r
+#define TCP_RST 0x04\r
+#define TCP_PSH 0x08\r
+#define TCP_ACK 0x10\r
+#define TCP_URG 0x20\r
+#define TCP_CTL 0x3f\r
+\r
+#define TCP_OPT_END 0 /* End of TCP options list */\r
+#define TCP_OPT_NOOP 1 /* "No-operation" TCP option */\r
+#define TCP_OPT_MSS 2 /* Maximum segment size TCP option */\r
+\r
+#define TCP_OPT_MSS_LEN 4 /* Length of TCP MSS option. */\r
+\r
+#define ICMP_ECHO_REPLY 0\r
+#define ICMP_ECHO 8\r
+\r
+#define ICMP6_ECHO_REPLY 129\r
+#define ICMP6_ECHO 128\r
+#define ICMP6_NEIGHBOR_SOLICITATION 135\r
+#define ICMP6_NEIGHBOR_ADVERTISEMENT 136\r
+\r
+#define ICMP6_FLAG_S (1 << 6)\r
+\r
+#define ICMP6_OPTION_SOURCE_LINK_ADDRESS 1\r
+#define ICMP6_OPTION_TARGET_LINK_ADDRESS 2\r
+\r
+\r
+/* Macros. */\r
+#define BUF ((struct uip_tcpip_hdr *)&uip_buf[UIP_LLH_LEN])\r
+#define FBUF ((struct uip_tcpip_hdr *)&uip_reassbuf[0])\r
+#define ICMPBUF ((struct uip_icmpip_hdr *)&uip_buf[UIP_LLH_LEN])\r
+#define UDPBUF ((struct uip_udpip_hdr *)&uip_buf[UIP_LLH_LEN])\r
+\r
+\r
+#if UIP_STATISTICS == 1\r
+struct uip_stats uip_stat;\r
+#define UIP_STAT(s) s\r
+#else\r
+#define UIP_STAT(s)\r
+#endif /* UIP_STATISTICS == 1 */\r
+\r
+#if UIP_LOGGING == 1\r
+#include <stdio.h>\r
+void uip_log(char *msg);\r
+#define UIP_LOG(m) uip_log(m)\r
+#else\r
+#define UIP_LOG(m)\r
+#endif /* UIP_LOGGING == 1 */\r
+\r
+#if ! UIP_ARCH_ADD32\r
+void\r
+uip_add32(u8_t *op32, u16_t op16)\r
+{\r
+ uip_acc32[3] = op32[3] + (op16 & 0xff);\r
+ uip_acc32[2] = op32[2] + (op16 >> 8);\r
+ uip_acc32[1] = op32[1];\r
+ uip_acc32[0] = op32[0];\r
+\r
+ if(uip_acc32[2] < (op16 >> 8)) {\r
+ ++uip_acc32[1];\r
+ if(uip_acc32[1] == 0) {\r
+ ++uip_acc32[0];\r
+ }\r
+ }\r
+\r
+\r
+ if(uip_acc32[3] < (op16 & 0xff)) {\r
+ ++uip_acc32[2];\r
+ if(uip_acc32[2] == 0) {\r
+ ++uip_acc32[1];\r
+ if(uip_acc32[1] == 0) {\r
+ ++uip_acc32[0];\r
+ }\r
+ }\r
+ }\r
+}\r
+\r
+#endif /* UIP_ARCH_ADD32 */\r
+\r
+#if ! UIP_ARCH_CHKSUM\r
+/*---------------------------------------------------------------------------*/\r
+static u16_t\r
+chksum(u16_t sum, const u8_t *data, u16_t len)\r
+{\r
+ u16_t t;\r
+ const u8_t *dataptr;\r
+ const u8_t *last_byte;\r
+\r
+ dataptr = data;\r
+ last_byte = data + len - 1;\r
+\r
+ while(dataptr < last_byte) { /* At least two more bytes */\r
+ t = (dataptr[0] << 8) + dataptr[1];\r
+ sum += t;\r
+ if(sum < t) {\r
+ sum++; /* carry */\r
+ }\r
+ dataptr += 2;\r
+ }\r
+\r
+ if(dataptr == last_byte) {\r
+ t = (dataptr[0] << 8) + 0;\r
+ sum += t;\r
+ if(sum < t) {\r
+ sum++; /* carry */\r
+ }\r
+ }\r
+\r
+ /* Return sum in host byte order. */\r
+ return sum;\r
+}\r
+/*---------------------------------------------------------------------------*/\r
+u16_t\r
+uip_chksum(u16_t *data, u16_t len)\r
+{\r
+ return htons(chksum(0, (u8_t *)data, len));\r
+}\r
+/*---------------------------------------------------------------------------*/\r
+#ifndef UIP_ARCH_IPCHKSUM\r
+u16_t\r
+uip_ipchksum(void)\r
+{\r
+ u16_t sum;\r
+\r
+ sum = chksum(0, &uip_buf[UIP_LLH_LEN], UIP_IPH_LEN);\r
+ DEBUG_PRINTF("uip_ipchksum: sum 0x%04x\n", sum);\r
+ return (sum == 0) ? 0xffff : htons(sum);\r
+}\r
+#endif\r
+/*---------------------------------------------------------------------------*/\r
+static u16_t\r
+upper_layer_chksum(u8_t proto)\r
+{\r
+ u16_t upper_layer_len;\r
+ u16_t sum;\r
+\r
+#if UIP_CONF_IPV6\r
+ upper_layer_len = (((u16_t)(BUF->len[0]) << 8) + BUF->len[1]);\r
+#else /* UIP_CONF_IPV6 */\r
+ upper_layer_len = (((u16_t)(BUF->len[0]) << 8) + BUF->len[1]) - UIP_IPH_LEN;\r
+#endif /* UIP_CONF_IPV6 */\r
+\r
+ /* First sum pseudoheader. */\r
+\r
+ /* IP protocol and length fields. This addition cannot carry. */\r
+ sum = upper_layer_len + proto;\r
+ /* Sum IP source and destination addresses. */\r
+ sum = chksum(sum, (u8_t *)&BUF->srcipaddr[0], 2 * sizeof(uip_ipaddr_t));\r
+\r
+ /* Sum TCP header and data. */\r
+ sum = chksum(sum, &uip_buf[UIP_IPH_LEN + UIP_LLH_LEN],\r
+ upper_layer_len);\r
+\r
+ return (sum == 0) ? 0xffff : htons(sum);\r
+}\r
+/*---------------------------------------------------------------------------*/\r
+#if UIP_CONF_IPV6\r
+u16_t\r
+uip_icmp6chksum(void)\r
+{\r
+ return upper_layer_chksum(UIP_PROTO_ICMP6);\r
+\r
+}\r
+#endif /* UIP_CONF_IPV6 */\r
+/*---------------------------------------------------------------------------*/\r
+u16_t\r
+uip_tcpchksum(void)\r
+{\r
+ return upper_layer_chksum(UIP_PROTO_TCP);\r
+}\r
+/*---------------------------------------------------------------------------*/\r
+#if UIP_UDP_CHECKSUMS\r
+u16_t\r
+uip_udpchksum(void)\r
+{\r
+ return upper_layer_chksum(UIP_PROTO_UDP);\r
+}\r
+#endif /* UIP_UDP_CHECKSUMS */\r
+#endif /* UIP_ARCH_CHKSUM */\r
+/*---------------------------------------------------------------------------*/\r
+void\r
+uip_init(void)\r
+{\r
+ for(c = 0; c < UIP_LISTENPORTS; ++c) {\r
+ uip_listenports[c] = 0;\r
+ }\r
+ for(c = 0; c < UIP_CONNS; ++c) {\r
+ uip_conns[c].tcpstateflags = UIP_CLOSED;\r
+ }\r
+#if UIP_ACTIVE_OPEN\r
+ lastport = 1024;\r
+#endif /* UIP_ACTIVE_OPEN */\r
+\r
+#if UIP_UDP\r
+ for(c = 0; c < UIP_UDP_CONNS; ++c) {\r
+ uip_udp_conns[c].lport = 0;\r
+ }\r
+#endif /* UIP_UDP */\r
+\r
+\r
+ /* IPv4 initialization. */\r
+#if UIP_FIXEDADDR == 0\r
+ /* uip_hostaddr[0] = uip_hostaddr[1] = 0;*/\r
+#endif /* UIP_FIXEDADDR */\r
+\r
+}\r
+/*---------------------------------------------------------------------------*/\r
+#if UIP_ACTIVE_OPEN\r
+struct uip_conn *\r
+uip_connect(uip_ipaddr_t *ripaddr, u16_t rport)\r
+{\r
+ register struct uip_conn *conn, *cconn;\r
+\r
+ /* Find an unused local port. */\r
+ again:\r
+ ++lastport;\r
+\r
+ if(lastport >= 32000) {\r
+ lastport = 4096;\r
+ }\r
+\r
+ /* Check if this port is already in use, and if so try to find\r
+ another one. */\r
+ for(c = 0; c < UIP_CONNS; ++c) {\r
+ conn = &uip_conns[c];\r
+ if(conn->tcpstateflags != UIP_CLOSED &&\r
+ conn->lport == htons(lastport)) {\r
+ goto again;\r
+ }\r
+ }\r
+\r
+ conn = 0;\r
+ for(c = 0; c < UIP_CONNS; ++c) {\r
+ cconn = &uip_conns[c];\r
+ if(cconn->tcpstateflags == UIP_CLOSED) {\r
+ conn = cconn;\r
+ break;\r
+ }\r
+ if(cconn->tcpstateflags == UIP_TIME_WAIT) {\r
+ if(conn == 0 ||\r
+ cconn->timer > conn->timer) {\r
+ conn = cconn;\r
+ }\r
+ }\r
+ }\r
+\r
+ if(conn == 0) {\r
+ return 0;\r
+ }\r
+\r
+ conn->tcpstateflags = UIP_SYN_SENT;\r
+\r
+ conn->snd_nxt[0] = iss[0];\r
+ conn->snd_nxt[1] = iss[1];\r
+ conn->snd_nxt[2] = iss[2];\r
+ conn->snd_nxt[3] = iss[3];\r
+\r
+ conn->initialmss = conn->mss = UIP_TCP_MSS;\r
+\r
+ conn->len = 1; /* TCP length of the SYN is one. */\r
+ conn->nrtx = 0;\r
+ conn->timer = 1; /* Send the SYN next time around. */\r
+ conn->rto = UIP_RTO;\r
+ conn->sa = 0;\r
+ conn->sv = 16; /* Initial value of the RTT variance. */\r
+ conn->lport = htons(lastport);\r
+ conn->rport = rport;\r
+ uip_ipaddr_copy(&conn->ripaddr, ripaddr);\r
+\r
+ return conn;\r
+}\r
+#endif /* UIP_ACTIVE_OPEN */\r
+/*---------------------------------------------------------------------------*/\r
+#if UIP_UDP\r
+struct uip_udp_conn *\r
+uip_udp_new(uip_ipaddr_t *ripaddr, u16_t rport)\r
+{\r
+ register struct uip_udp_conn *conn;\r
+\r
+ /* Find an unused local port. */\r
+ again:\r
+ ++lastport;\r
+\r
+ if(lastport >= 32000) {\r
+ lastport = 4096;\r
+ }\r
+\r
+ for(c = 0; c < UIP_UDP_CONNS; ++c) {\r
+ if(uip_udp_conns[c].lport == htons(lastport)) {\r
+ goto again;\r
+ }\r
+ }\r
+\r
+\r
+ conn = 0;\r
+ for(c = 0; c < UIP_UDP_CONNS; ++c) {\r
+ if(uip_udp_conns[c].lport == 0) {\r
+ conn = &uip_udp_conns[c];\r
+ break;\r
+ }\r
+ }\r
+\r
+ if(conn == 0) {\r
+ return 0;\r
+ }\r
+\r
+ conn->lport = HTONS(lastport);\r
+ conn->rport = rport;\r
+ if(ripaddr == NULL) {\r
+ memset(conn->ripaddr, 0, sizeof(uip_ipaddr_t));\r
+ } else {\r
+ uip_ipaddr_copy(&conn->ripaddr, ripaddr);\r
+ }\r
+ conn->ttl = UIP_TTL;\r
+\r
+ return conn;\r
+}\r
+#endif /* UIP_UDP */\r
+/*---------------------------------------------------------------------------*/\r
+void\r
+uip_unlisten(u16_t port)\r
+{\r
+ for(c = 0; c < UIP_LISTENPORTS; ++c) {\r
+ if(uip_listenports[c] == port) {\r
+ uip_listenports[c] = 0;\r
+ return;\r
+ }\r
+ }\r
+}\r
+/*---------------------------------------------------------------------------*/\r
+void\r
+uip_listen(u16_t port)\r
+{\r
+ for(c = 0; c < UIP_LISTENPORTS; ++c) {\r
+ if(uip_listenports[c] == 0) {\r
+ uip_listenports[c] = port;\r
+ return;\r
+ }\r
+ }\r
+}\r
+/*---------------------------------------------------------------------------*/\r
+/* XXX: IP fragment reassembly: not well-tested. */\r
+\r
+#if UIP_REASSEMBLY && !UIP_CONF_IPV6\r
+#define UIP_REASS_BUFSIZE (UIP_BUFSIZE - UIP_LLH_LEN)\r
+static u8_t uip_reassbuf[UIP_REASS_BUFSIZE];\r
+static u8_t uip_reassbitmap[UIP_REASS_BUFSIZE / (8 * 8)];\r
+static const u8_t bitmap_bits[8] = {0xff, 0x7f, 0x3f, 0x1f,\r
+ 0x0f, 0x07, 0x03, 0x01};\r
+static u16_t uip_reasslen;\r
+static u8_t uip_reassflags;\r
+#define UIP_REASS_FLAG_LASTFRAG 0x01\r
+static u8_t uip_reasstmr;\r
+\r
+#define IP_MF 0x20\r
+\r
+static u8_t\r
+uip_reass(void)\r
+{\r
+ u16_t offset, len;\r
+ u16_t i;\r
+\r
+ /* If ip_reasstmr is zero, no packet is present in the buffer, so we\r
+ write the IP header of the fragment into the reassembly\r
+ buffer. The timer is updated with the maximum age. */\r
+ if(uip_reasstmr == 0) {\r
+ memcpy(uip_reassbuf, &BUF->vhl, UIP_IPH_LEN);\r
+ uip_reasstmr = UIP_REASS_MAXAGE;\r
+ uip_reassflags = 0;\r
+ /* Clear the bitmap. */\r
+ memset(uip_reassbitmap, 0, sizeof(uip_reassbitmap));\r
+ }\r
+\r
+ /* Check if the incoming fragment matches the one currently present\r
+ in the reasembly buffer. If so, we proceed with copying the\r
+ fragment into the buffer. */\r
+ if(BUF->srcipaddr[0] == FBUF->srcipaddr[0] &&\r
+ BUF->srcipaddr[1] == FBUF->srcipaddr[1] &&\r
+ BUF->destipaddr[0] == FBUF->destipaddr[0] &&\r
+ BUF->destipaddr[1] == FBUF->destipaddr[1] &&\r
+ BUF->ipid[0] == FBUF->ipid[0] &&\r
+ BUF->ipid[1] == FBUF->ipid[1]) {\r
+\r
+ len = (BUF->len[0] << 8) + BUF->len[1] - (BUF->vhl & 0x0f) * 4;\r
+ offset = (((BUF->ipoffset[0] & 0x3f) << 8) + BUF->ipoffset[1]) * 8;\r
+\r
+ /* If the offset or the offset + fragment length overflows the\r
+ reassembly buffer, we discard the entire packet. */\r
+ if(offset > UIP_REASS_BUFSIZE ||\r
+ offset + len > UIP_REASS_BUFSIZE) {\r
+ uip_reasstmr = 0;\r
+ goto nullreturn;\r
+ }\r
+\r
+ /* Copy the fragment into the reassembly buffer, at the right\r
+ offset. */\r
+ memcpy(&uip_reassbuf[UIP_IPH_LEN + offset],\r
+ (char *)BUF + (int)((BUF->vhl & 0x0f) * 4),\r
+ len);\r
+\r
+ /* Update the bitmap. */\r
+ if(offset / (8 * 8) == (offset + len) / (8 * 8)) {\r
+ /* If the two endpoints are in the same byte, we only update\r
+ that byte. */\r
+ \r
+ uip_reassbitmap[offset / (8 * 8)] |=\r
+ bitmap_bits[(offset / 8 ) & 7] &\r
+ ~bitmap_bits[((offset + len) / 8 ) & 7];\r
+ } else {\r
+ /* If the two endpoints are in different bytes, we update the\r
+ bytes in the endpoints and fill the stuff inbetween with\r
+ 0xff. */\r
+ uip_reassbitmap[offset / (8 * 8)] |=\r
+ bitmap_bits[(offset / 8 ) & 7];\r
+ for(i = 1 + offset / (8 * 8); i < (offset + len) / (8 * 8); ++i) {\r
+ uip_reassbitmap[i] = 0xff;\r
+ }\r
+ uip_reassbitmap[(offset + len) / (8 * 8)] |=\r
+ ~bitmap_bits[((offset + len) / 8 ) & 7];\r
+ }\r
+\r
+ /* If this fragment has the More Fragments flag set to zero, we\r
+ know that this is the last fragment, so we can calculate the\r
+ size of the entire packet. We also set the\r
+ IP_REASS_FLAG_LASTFRAG flag to indicate that we have received\r
+ the final fragment. */\r
+\r
+ if((BUF->ipoffset[0] & IP_MF) == 0) {\r
+ uip_reassflags |= UIP_REASS_FLAG_LASTFRAG;\r
+ uip_reasslen = offset + len;\r
+ }\r
+\r
+ /* Finally, we check if we have a full packet in the buffer. We do\r
+ this by checking if we have the last fragment and if all bits\r
+ in the bitmap are set. */\r
+ if(uip_reassflags & UIP_REASS_FLAG_LASTFRAG) {\r
+ /* Check all bytes up to and including all but the last byte in\r
+ the bitmap. */\r
+ for(i = 0; i < uip_reasslen / (8 * 8) - 1; ++i) {\r
+ if(uip_reassbitmap[i] != 0xff) {\r
+ goto nullreturn;\r
+ }\r
+ }\r
+ /* Check the last byte in the bitmap. It should contain just the\r
+ right amount of bits. */\r
+ if(uip_reassbitmap[uip_reasslen / (8 * 8)] !=\r
+ (u8_t)~bitmap_bits[uip_reasslen / 8 & 7]) {\r
+ goto nullreturn;\r
+ }\r
+\r
+ /* If we have come this far, we have a full packet in the\r
+ buffer, so we allocate a pbuf and copy the packet into it. We\r
+ also reset the timer. */\r
+ uip_reasstmr = 0;\r
+ memcpy(BUF, FBUF, uip_reasslen);\r
+\r
+ /* Pretend to be a "normal" (i.e., not fragmented) IP packet\r
+ from now on. */\r
+ BUF->ipoffset[0] = BUF->ipoffset[1] = 0;\r
+ BUF->len[0] = uip_reasslen >> 8;\r
+ BUF->len[1] = uip_reasslen & 0xff;\r
+ BUF->ipchksum = 0;\r
+ BUF->ipchksum = ~(uip_ipchksum());\r
+\r
+ return uip_reasslen;\r
+ }\r
+ }\r
+\r
+ nullreturn:\r
+ return 0;\r
+}\r
+#endif /* UIP_REASSEMBLY */\r
+/*---------------------------------------------------------------------------*/\r
+static void\r
+uip_add_rcv_nxt(u16_t n)\r
+{\r
+ uip_add32(uip_conn->rcv_nxt, n);\r
+ uip_conn->rcv_nxt[0] = uip_acc32[0];\r
+ uip_conn->rcv_nxt[1] = uip_acc32[1];\r
+ uip_conn->rcv_nxt[2] = uip_acc32[2];\r
+ uip_conn->rcv_nxt[3] = uip_acc32[3];\r
+}\r
+/*---------------------------------------------------------------------------*/\r
+void\r
+uip_process(u8_t flag)\r
+{\r
+ register struct uip_conn *uip_connr = uip_conn;\r
+\r
+#if UIP_UDP\r
+ if(flag == UIP_UDP_SEND_CONN) {\r
+ goto udp_send;\r
+ }\r
+#endif /* UIP_UDP */\r
+\r
+ uip_sappdata = uip_appdata = &uip_buf[UIP_IPTCPH_LEN + UIP_LLH_LEN];\r
+\r
+ /* Check if we were invoked because of a poll request for a\r
+ particular connection. */\r
+ if(flag == UIP_POLL_REQUEST) {\r
+ if((uip_connr->tcpstateflags & UIP_TS_MASK) == UIP_ESTABLISHED &&\r
+ !uip_outstanding(uip_connr)) {\r
+ uip_flags = UIP_POLL;\r
+ UIP_APPCALL();\r
+ goto appsend;\r
+ }\r
+ goto drop;\r
+\r
+ /* Check if we were invoked because of the perodic timer fireing. */\r
+ } else if(flag == UIP_TIMER) {\r
+#if UIP_REASSEMBLY\r
+ if(uip_reasstmr != 0) {\r
+ --uip_reasstmr;\r
+ }\r
+#endif /* UIP_REASSEMBLY */\r
+ /* Increase the initial sequence number. */\r
+ if(++iss[3] == 0) {\r
+ if(++iss[2] == 0) {\r
+ if(++iss[1] == 0) {\r
+ ++iss[0];\r
+ }\r
+ }\r
+ }\r
+\r
+ /* Reset the length variables. */\r
+ uip_len = 0;\r
+ uip_slen = 0;\r
+\r
+ /* Check if the connection is in a state in which we simply wait\r
+ for the connection to time out. If so, we increase the\r
+ connection's timer and remove the connection if it times\r
+ out. */\r
+ if(uip_connr->tcpstateflags == UIP_TIME_WAIT ||\r
+ uip_connr->tcpstateflags == UIP_FIN_WAIT_2) {\r
+ ++(uip_connr->timer);\r
+ if(uip_connr->timer == UIP_TIME_WAIT_TIMEOUT) {\r
+ uip_connr->tcpstateflags = UIP_CLOSED;\r
+ }\r
+ } else if(uip_connr->tcpstateflags != UIP_CLOSED) {\r
+ /* If the connection has outstanding data, we increase the\r
+ connection's timer and see if it has reached the RTO value\r
+ in which case we retransmit. */\r
+ if(uip_outstanding(uip_connr)) {\r
+ uip_connr->timer = uip_connr->timer - 1;\r
+ if(uip_connr->timer == 0) {\r
+ if(uip_connr->nrtx == UIP_MAXRTX ||\r
+ ((uip_connr->tcpstateflags == UIP_SYN_SENT ||\r
+ uip_connr->tcpstateflags == UIP_SYN_RCVD) &&\r
+ uip_connr->nrtx == UIP_MAXSYNRTX)) {\r
+ uip_connr->tcpstateflags = UIP_CLOSED;\r
+\r
+ /* We call UIP_APPCALL() with uip_flags set to\r
+ UIP_TIMEDOUT to inform the application that the\r
+ connection has timed out. */\r
+ uip_flags = UIP_TIMEDOUT;\r
+ UIP_APPCALL();\r
+\r
+ /* We also send a reset packet to the remote host. */\r
+ BUF->flags = TCP_RST | TCP_ACK;\r
+ goto tcp_send_nodata;\r
+ }\r
+\r
+ /* Exponential backoff. */\r
+ uip_connr->timer = UIP_RTO << (uip_connr->nrtx > 4?\r
+ 4:\r
+ uip_connr->nrtx);\r
+ ++(uip_connr->nrtx);\r
+ \r
+ /* Ok, so we need to retransmit. We do this differently\r
+ depending on which state we are in. In ESTABLISHED, we\r
+ call upon the application so that it may prepare the\r
+ data for the retransmit. In SYN_RCVD, we resend the\r
+ SYNACK that we sent earlier and in LAST_ACK we have to\r
+ retransmit our FINACK. */\r
+ UIP_STAT(++uip_stat.tcp.rexmit);\r
+ switch(uip_connr->tcpstateflags & UIP_TS_MASK) {\r
+ case UIP_SYN_RCVD:\r
+ /* In the SYN_RCVD state, we should retransmit our\r
+ SYNACK. */\r
+ goto tcp_send_synack;\r
+ \r
+#if UIP_ACTIVE_OPEN\r
+ case UIP_SYN_SENT:\r
+ /* In the SYN_SENT state, we retransmit out SYN. */\r
+ BUF->flags = 0;\r
+ goto tcp_send_syn;\r
+#endif /* UIP_ACTIVE_OPEN */\r
+ \r
+ case UIP_ESTABLISHED:\r
+ /* In the ESTABLISHED state, we call upon the application\r
+ to do the actual retransmit after which we jump into\r
+ the code for sending out the packet (the apprexmit\r
+ label). */\r
+ uip_flags = UIP_REXMIT;\r
+ UIP_APPCALL();\r
+ goto apprexmit;\r
+ \r
+ case UIP_FIN_WAIT_1:\r
+ case UIP_CLOSING:\r
+ case UIP_LAST_ACK:\r
+ /* In all these states we should retransmit a FINACK. */\r
+ goto tcp_send_finack;\r
+ \r
+ }\r
+ }\r
+ } else if((uip_connr->tcpstateflags & UIP_TS_MASK) == UIP_ESTABLISHED) {\r
+ /* If there was no need for a retransmission, we poll the\r
+ application for new data. */\r
+ uip_flags = UIP_POLL;\r
+ UIP_APPCALL();\r
+ goto appsend;\r
+ }\r
+ }\r
+ goto drop;\r
+ }\r
+#if UIP_UDP\r
+ if(flag == UIP_UDP_TIMER) {\r
+ if(uip_udp_conn->lport != 0) {\r
+ uip_conn = NULL;\r
+ uip_sappdata = uip_appdata = &uip_buf[UIP_LLH_LEN + UIP_IPUDPH_LEN];\r
+ uip_len = uip_slen = 0;\r
+ uip_flags = UIP_POLL;\r
+ UIP_UDP_APPCALL();\r
+ goto udp_send;\r
+ } else {\r
+ goto drop;\r
+ }\r
+ }\r
+#endif\r
+\r
+ /* This is where the input processing starts. */\r
+ UIP_STAT(++uip_stat.ip.recv);\r
+\r
+ /* Start of IP input header processing code. */\r
+\r
+#if UIP_CONF_IPV6\r
+ /* Check validity of the IP header. */\r
+ if((BUF->vtc & 0xf0) != 0x60) { /* IP version and header length. */\r
+ UIP_STAT(++uip_stat.ip.drop);\r
+ UIP_STAT(++uip_stat.ip.vhlerr);\r
+ UIP_LOG("ipv6: invalid version.");\r
+ goto drop;\r
+ }\r
+#else /* UIP_CONF_IPV6 */\r
+ /* Check validity of the IP header. */\r
+ if(BUF->vhl != 0x45) { /* IP version and header length. */\r
+ UIP_STAT(++uip_stat.ip.drop);\r
+ UIP_STAT(++uip_stat.ip.vhlerr);\r
+ UIP_LOG("ip: invalid version or header length.");\r
+ goto drop;\r
+ }\r
+#endif /* UIP_CONF_IPV6 */\r
+\r
+ /* Check the size of the packet. If the size reported to us in\r
+ uip_len is smaller the size reported in the IP header, we assume\r
+ that the packet has been corrupted in transit. If the size of\r
+ uip_len is larger than the size reported in the IP packet header,\r
+ the packet has been padded and we set uip_len to the correct\r
+ value.. */\r
+\r
+ if((BUF->len[0] << 8) + BUF->len[1] <= uip_len) {\r
+ uip_len = (BUF->len[0] << 8) + BUF->len[1];\r
+#if UIP_CONF_IPV6\r
+ uip_len += 40; /* The length reported in the IPv6 header is the\r
+ length of the payload that follows the\r
+ header. However, uIP uses the uip_len variable\r
+ for holding the size of the entire packet,\r
+ including the IP header. For IPv4 this is not a\r
+ problem as the length field in the IPv4 header\r
+ contains the length of the entire packet. But\r
+ for IPv6 we need to add the size of the IPv6\r
+ header (40 bytes). */\r
+#endif /* UIP_CONF_IPV6 */\r
+ } else {\r
+ UIP_LOG("ip: packet shorter than reported in IP header.");\r
+ goto drop;\r
+ }\r
+\r
+#if !UIP_CONF_IPV6\r
+ /* Check the fragment flag. */\r
+ if((BUF->ipoffset[0] & 0x3f) != 0 ||\r
+ BUF->ipoffset[1] != 0) {\r
+#if UIP_REASSEMBLY\r
+ uip_len = uip_reass();\r
+ if(uip_len == 0) {\r
+ goto drop;\r
+ }\r
+#else /* UIP_REASSEMBLY */\r
+ UIP_STAT(++uip_stat.ip.drop);\r
+ UIP_STAT(++uip_stat.ip.fragerr);\r
+ UIP_LOG("ip: fragment dropped.");\r
+ goto drop;\r
+#endif /* UIP_REASSEMBLY */\r
+ }\r
+#endif /* UIP_CONF_IPV6 */\r
+\r
+ if(uip_ipaddr_cmp(uip_hostaddr, all_zeroes_addr)) {\r
+ /* If we are configured to use ping IP address configuration and\r
+ hasn't been assigned an IP address yet, we accept all ICMP\r
+ packets. */\r
+#if UIP_PINGADDRCONF && !UIP_CONF_IPV6\r
+ if(BUF->proto == UIP_PROTO_ICMP) {\r
+ UIP_LOG("ip: possible ping config packet received.");\r
+ goto icmp_input;\r
+ } else {\r
+ UIP_LOG("ip: packet dropped since no address assigned.");\r
+ goto drop;\r
+ }\r
+#endif /* UIP_PINGADDRCONF */\r
+\r
+ } else {\r
+ /* If IP broadcast support is configured, we check for a broadcast\r
+ UDP packet, which may be destined to us. */\r
+#if UIP_BROADCAST\r
+ DEBUG_PRINTF("UDP IP checksum 0x%04x\n", uip_ipchksum());\r
+ if(BUF->proto == UIP_PROTO_UDP &&\r
+ uip_ipaddr_cmp(BUF->destipaddr, all_ones_addr)\r
+ /*&&\r
+ uip_ipchksum() == 0xffff*/) {\r
+ goto udp_input;\r
+ }\r
+#endif /* UIP_BROADCAST */\r
+\r
+ /* Check if the packet is destined for our IP address. */\r
+#if !UIP_CONF_IPV6\r
+ if(!uip_ipaddr_cmp(BUF->destipaddr, uip_hostaddr)) {\r
+ UIP_STAT(++uip_stat.ip.drop);\r
+ goto drop;\r
+ }\r
+#else /* UIP_CONF_IPV6 */\r
+ /* For IPv6, packet reception is a little trickier as we need to\r
+ make sure that we listen to certain multicast addresses (all\r
+ hosts multicast address, and the solicited-node multicast\r
+ address) as well. However, we will cheat here and accept all\r
+ multicast packets that are sent to the ff02::/16 addresses. */\r
+ if(!uip_ipaddr_cmp(BUF->destipaddr, uip_hostaddr) &&\r
+ BUF->destipaddr[0] != HTONS(0xff02)) {\r
+ UIP_STAT(++uip_stat.ip.drop);\r
+ goto drop;\r
+ }\r
+#endif /* UIP_CONF_IPV6 */\r
+ }\r
+\r
+#if !UIP_CONF_IPV6\r
+ if(uip_ipchksum() != 0xffff) { /* Compute and check the IP header\r
+ checksum. */\r
+ UIP_STAT(++uip_stat.ip.drop);\r
+ UIP_STAT(++uip_stat.ip.chkerr);\r
+ UIP_LOG("ip: bad checksum.");\r
+ goto drop;\r
+ }\r
+#endif /* UIP_CONF_IPV6 */\r
+\r
+ if(BUF->proto == UIP_PROTO_TCP) { /* Check for TCP packet. If so,\r
+ proceed with TCP input\r
+ processing. */\r
+ goto tcp_input;\r
+ }\r
+\r
+#if UIP_UDP\r
+ if(BUF->proto == UIP_PROTO_UDP) {\r
+ goto udp_input;\r
+ }\r
+#endif /* UIP_UDP */\r
+\r
+#if !UIP_CONF_IPV6\r
+ /* ICMPv4 processing code follows. */\r
+ if(BUF->proto != UIP_PROTO_ICMP) { /* We only allow ICMP packets from\r
+ here. */\r
+ UIP_STAT(++uip_stat.ip.drop);\r
+ UIP_STAT(++uip_stat.ip.protoerr);\r
+ UIP_LOG("ip: neither tcp nor icmp.");\r
+ goto drop;\r
+ }\r
+\r
+#if UIP_PINGADDRCONF\r
+ icmp_input:\r
+#endif /* UIP_PINGADDRCONF */\r
+ UIP_STAT(++uip_stat.icmp.recv);\r
+\r
+ /* ICMP echo (i.e., ping) processing. This is simple, we only change\r
+ the ICMP type from ECHO to ECHO_REPLY and adjust the ICMP\r
+ checksum before we return the packet. */\r
+ if(ICMPBUF->type != ICMP_ECHO) {\r
+ UIP_STAT(++uip_stat.icmp.drop);\r
+ UIP_STAT(++uip_stat.icmp.typeerr);\r
+ UIP_LOG("icmp: not icmp echo.");\r
+ goto drop;\r
+ }\r
+\r
+ /* If we are configured to use ping IP address assignment, we use\r
+ the destination IP address of this ping packet and assign it to\r
+ ourself. */\r
+#if UIP_PINGADDRCONF\r
+ if((uip_hostaddr[0] | uip_hostaddr[1]) == 0) {\r
+ uip_hostaddr[0] = BUF->destipaddr[0];\r
+ uip_hostaddr[1] = BUF->destipaddr[1];\r
+ }\r
+#endif /* UIP_PINGADDRCONF */\r
+\r
+ ICMPBUF->type = ICMP_ECHO_REPLY;\r
+\r
+ if(ICMPBUF->icmpchksum >= HTONS(0xffff - (ICMP_ECHO << 8))) {\r
+ ICMPBUF->icmpchksum += HTONS(ICMP_ECHO << 8) + 1;\r
+ } else {\r
+ ICMPBUF->icmpchksum += HTONS(ICMP_ECHO << 8);\r
+ }\r
+\r
+ /* Swap IP addresses. */\r
+ uip_ipaddr_copy(BUF->destipaddr, BUF->srcipaddr);\r
+ uip_ipaddr_copy(BUF->srcipaddr, uip_hostaddr);\r
+\r
+ UIP_STAT(++uip_stat.icmp.sent);\r
+ goto send;\r
+\r
+ /* End of IPv4 input header processing code. */\r
+#else /* !UIP_CONF_IPV6 */\r
+\r
+ /* This is IPv6 ICMPv6 processing code. */\r
+ DEBUG_PRINTF("icmp6_input: length %d\n", uip_len);\r
+\r
+ if(BUF->proto != UIP_PROTO_ICMP6) { /* We only allow ICMPv6 packets from\r
+ here. */\r
+ UIP_STAT(++uip_stat.ip.drop);\r
+ UIP_STAT(++uip_stat.ip.protoerr);\r
+ UIP_LOG("ip: neither tcp nor icmp6.");\r
+ goto drop;\r
+ }\r
+\r
+ UIP_STAT(++uip_stat.icmp.recv);\r
+\r
+ /* If we get a neighbor solicitation for our address we should send\r
+ a neighbor advertisement message back. */\r
+ if(ICMPBUF->type == ICMP6_NEIGHBOR_SOLICITATION) {\r
+ if(uip_ipaddr_cmp(ICMPBUF->icmp6data, uip_hostaddr)) {\r
+\r
+ if(ICMPBUF->options[0] == ICMP6_OPTION_SOURCE_LINK_ADDRESS) {\r
+ /* Save the sender's address in our neighbor list. */\r
+ uip_neighbor_add(ICMPBUF->srcipaddr, &(ICMPBUF->options[2]));\r
+ }\r
+\r
+ /* We should now send a neighbor advertisement back to where the\r
+ neighbor solicication came from. */\r
+ ICMPBUF->type = ICMP6_NEIGHBOR_ADVERTISEMENT;\r
+ ICMPBUF->flags = ICMP6_FLAG_S; /* Solicited flag. */\r
+\r
+ ICMPBUF->reserved1 = ICMPBUF->reserved2 = ICMPBUF->reserved3 = 0;\r
+\r
+ uip_ipaddr_copy(ICMPBUF->destipaddr, ICMPBUF->srcipaddr);\r
+ uip_ipaddr_copy(ICMPBUF->srcipaddr, uip_hostaddr);\r
+ ICMPBUF->options[0] = ICMP6_OPTION_TARGET_LINK_ADDRESS;\r
+ ICMPBUF->options[1] = 1; /* Options length, 1 = 8 bytes. */\r
+ memcpy(&(ICMPBUF->options[2]), &uip_ethaddr, sizeof(uip_ethaddr));\r
+ ICMPBUF->icmpchksum = 0;\r
+ ICMPBUF->icmpchksum = ~uip_icmp6chksum();\r
+ goto send;\r
+\r
+ }\r
+ goto drop;\r
+ } else if(ICMPBUF->type == ICMP6_ECHO) {\r
+ /* ICMP echo (i.e., ping) processing. This is simple, we only\r
+ change the ICMP type from ECHO to ECHO_REPLY and update the\r
+ ICMP checksum before we return the packet. */\r
+\r
+ ICMPBUF->type = ICMP6_ECHO_REPLY;\r
+\r
+ uip_ipaddr_copy(BUF->destipaddr, BUF->srcipaddr);\r
+ uip_ipaddr_copy(BUF->srcipaddr, uip_hostaddr);\r
+ ICMPBUF->icmpchksum = 0;\r
+ ICMPBUF->icmpchksum = ~uip_icmp6chksum();\r
+\r
+ UIP_STAT(++uip_stat.icmp.sent);\r
+ goto send;\r
+ } else {\r
+ DEBUG_PRINTF("Unknown icmp6 message type %d\n", ICMPBUF->type);\r
+ UIP_STAT(++uip_stat.icmp.drop);\r
+ UIP_STAT(++uip_stat.icmp.typeerr);\r
+ UIP_LOG("icmp: unknown ICMP message.");\r
+ goto drop;\r
+ }\r
+\r
+ /* End of IPv6 ICMP processing. */\r
+\r
+#endif /* !UIP_CONF_IPV6 */\r
+\r
+#if UIP_UDP\r
+ /* UDP input processing. */\r
+ udp_input:\r
+ /* UDP processing is really just a hack. We don't do anything to the\r
+ UDP/IP headers, but let the UDP application do all the hard\r
+ work. If the application sets uip_slen, it has a packet to\r
+ send. */\r
+#if UIP_UDP_CHECKSUMS\r
+ uip_len = uip_len - UIP_IPUDPH_LEN;\r
+ uip_appdata = &uip_buf[UIP_LLH_LEN + UIP_IPUDPH_LEN];\r
+ if(UDPBUF->udpchksum != 0 && uip_udpchksum() != 0xffff) {\r
+ UIP_STAT(++uip_stat.udp.drop);\r
+ UIP_STAT(++uip_stat.udp.chkerr);\r
+ UIP_LOG("udp: bad checksum.");\r
+ goto drop;\r
+ }\r
+#else /* UIP_UDP_CHECKSUMS */\r
+ uip_len = uip_len - UIP_IPUDPH_LEN;\r
+#endif /* UIP_UDP_CHECKSUMS */\r
+\r
+ /* Demultiplex this UDP packet between the UDP "connections". */\r
+ for(uip_udp_conn = &uip_udp_conns[0];\r
+ uip_udp_conn < &uip_udp_conns[UIP_UDP_CONNS];\r
+ ++uip_udp_conn) {\r
+ /* If the local UDP port is non-zero, the connection is considered\r
+ to be used. If so, the local port number is checked against the\r
+ destination port number in the received packet. If the two port\r
+ numbers match, the remote port number is checked if the\r
+ connection is bound to a remote port. Finally, if the\r
+ connection is bound to a remote IP address, the source IP\r
+ address of the packet is checked. */\r
+ if(uip_udp_conn->lport != 0 &&\r
+ UDPBUF->destport == uip_udp_conn->lport &&\r
+ (uip_udp_conn->rport == 0 ||\r
+ UDPBUF->srcport == uip_udp_conn->rport) &&\r
+ (uip_ipaddr_cmp(uip_udp_conn->ripaddr, all_zeroes_addr) ||\r
+ uip_ipaddr_cmp(uip_udp_conn->ripaddr, all_ones_addr) ||\r
+ uip_ipaddr_cmp(BUF->srcipaddr, uip_udp_conn->ripaddr))) {\r
+ goto udp_found;\r
+ }\r
+ }\r
+ UIP_LOG("udp: no matching connection found");\r
+ goto drop;\r
+\r
+ udp_found:\r
+ UIP_STAT(++uip_stat.udp.recv);\r
+ uip_conn = NULL;\r
+ uip_flags = UIP_NEWDATA;\r
+ uip_sappdata = uip_appdata = &uip_buf[UIP_LLH_LEN + UIP_IPUDPH_LEN];\r
+ uip_slen = 0;\r
+ UIP_UDP_APPCALL();\r
+ udp_send:\r
+ if(uip_slen == 0) {\r
+ goto drop;\r
+ }\r
+ uip_len = uip_slen + UIP_IPUDPH_LEN;\r
+\r
+#if UIP_CONF_IPV6\r
+ /* For IPv6, the IP length field does not include the IPv6 IP header\r
+ length. */\r
+ BUF->len[0] = ((uip_len - UIP_IPH_LEN) >> 8);\r
+ BUF->len[1] = ((uip_len - UIP_IPH_LEN) & 0xff);\r
+#else /* UIP_CONF_IPV6 */\r
+ BUF->len[0] = (uip_len >> 8);\r
+ BUF->len[1] = (uip_len & 0xff);\r
+#endif /* UIP_CONF_IPV6 */\r
+\r
+ BUF->ttl = uip_udp_conn->ttl;\r
+ BUF->proto = UIP_PROTO_UDP;\r
+\r
+ UDPBUF->udplen = HTONS(uip_slen + UIP_UDPH_LEN);\r
+ UDPBUF->udpchksum = 0;\r
+\r
+ BUF->srcport = uip_udp_conn->lport;\r
+ BUF->destport = uip_udp_conn->rport;\r
+\r
+ uip_ipaddr_copy(BUF->srcipaddr, uip_hostaddr);\r
+ uip_ipaddr_copy(BUF->destipaddr, uip_udp_conn->ripaddr);\r
+\r
+ uip_appdata = &uip_buf[UIP_LLH_LEN + UIP_IPTCPH_LEN];\r
+\r
+#if UIP_UDP_CHECKSUMS\r
+ /* Calculate UDP checksum. */\r
+ UDPBUF->udpchksum = ~(uip_udpchksum());\r
+ if(UDPBUF->udpchksum == 0) {\r
+ UDPBUF->udpchksum = 0xffff;\r
+ }\r
+#endif /* UIP_UDP_CHECKSUMS */\r
+ UIP_STAT(++uip_stat.udp.sent);\r
+ goto ip_send_nolen;\r
+#endif /* UIP_UDP */\r
+\r
+ /* TCP input processing. */\r
+ tcp_input:\r
+ UIP_STAT(++uip_stat.tcp.recv);\r
+\r
+ /* Start of TCP input header processing code. */\r
+\r
+ if(uip_tcpchksum() != 0xffff) { /* Compute and check the TCP\r
+ checksum. */\r
+ UIP_STAT(++uip_stat.tcp.drop);\r
+ UIP_STAT(++uip_stat.tcp.chkerr);\r
+ UIP_LOG("tcp: bad checksum.");\r
+ goto drop;\r
+ }\r
+\r
+\r
+ /* Demultiplex this segment. */\r
+ /* First check any active connections. */\r
+ for(uip_connr = &uip_conns[0]; uip_connr <= &uip_conns[UIP_CONNS - 1];\r
+ ++uip_connr) {\r
+ if(uip_connr->tcpstateflags != UIP_CLOSED &&\r
+ BUF->destport == uip_connr->lport &&\r
+ BUF->srcport == uip_connr->rport &&\r
+ uip_ipaddr_cmp(BUF->srcipaddr, uip_connr->ripaddr)) {\r
+ goto found;\r
+ }\r
+ }\r
+\r
+ /* If we didn't find and active connection that expected the packet,\r
+ either this packet is an old duplicate, or this is a SYN packet\r
+ destined for a connection in LISTEN. If the SYN flag isn't set,\r
+ it is an old packet and we send a RST. */\r
+ if((BUF->flags & TCP_CTL) != TCP_SYN) {\r
+ goto reset;\r
+ }\r
+\r
+ tmp16 = BUF->destport;\r
+ /* Next, check listening connections. */\r
+ for(c = 0; c < UIP_LISTENPORTS; ++c) {\r
+ if(tmp16 == uip_listenports[c])\r
+ goto found_listen;\r
+ }\r
+\r
+ /* No matching connection found, so we send a RST packet. */\r
+ UIP_STAT(++uip_stat.tcp.synrst);\r
+ reset:\r
+\r
+ /* We do not send resets in response to resets. */\r
+ if(BUF->flags & TCP_RST) {\r
+ goto drop;\r
+ }\r
+\r
+ UIP_STAT(++uip_stat.tcp.rst);\r
+\r
+ BUF->flags = TCP_RST | TCP_ACK;\r
+ uip_len = UIP_IPTCPH_LEN;\r
+ BUF->tcpoffset = 5 << 4;\r
+\r
+ /* Flip the seqno and ackno fields in the TCP header. */\r
+ c = BUF->seqno[3];\r
+ BUF->seqno[3] = BUF->ackno[3];\r
+ BUF->ackno[3] = c;\r
+\r
+ c = BUF->seqno[2];\r
+ BUF->seqno[2] = BUF->ackno[2];\r
+ BUF->ackno[2] = c;\r
+\r
+ c = BUF->seqno[1];\r
+ BUF->seqno[1] = BUF->ackno[1];\r
+ BUF->ackno[1] = c;\r
+\r
+ c = BUF->seqno[0];\r
+ BUF->seqno[0] = BUF->ackno[0];\r
+ BUF->ackno[0] = c;\r
+\r
+ /* We also have to increase the sequence number we are\r
+ acknowledging. If the least significant byte overflowed, we need\r
+ to propagate the carry to the other bytes as well. */\r
+ if(++BUF->ackno[3] == 0) {\r
+ if(++BUF->ackno[2] == 0) {\r
+ if(++BUF->ackno[1] == 0) {\r
+ ++BUF->ackno[0];\r
+ }\r
+ }\r
+ }\r
+\r
+ /* Swap port numbers. */\r
+ tmp16 = BUF->srcport;\r
+ BUF->srcport = BUF->destport;\r
+ BUF->destport = tmp16;\r
+\r
+ /* Swap IP addresses. */\r
+ uip_ipaddr_copy(BUF->destipaddr, BUF->srcipaddr);\r
+ uip_ipaddr_copy(BUF->srcipaddr, uip_hostaddr);\r
+\r
+ /* And send out the RST packet! */\r
+ goto tcp_send_noconn;\r
+\r
+ /* This label will be jumped to if we matched the incoming packet\r
+ with a connection in LISTEN. In that case, we should create a new\r
+ connection and send a SYNACK in return. */\r
+ found_listen:\r
+ /* First we check if there are any connections avaliable. Unused\r
+ connections are kept in the same table as used connections, but\r
+ unused ones have the tcpstate set to CLOSED. Also, connections in\r
+ TIME_WAIT are kept track of and we'll use the oldest one if no\r
+ CLOSED connections are found. Thanks to Eddie C. Dost for a very\r
+ nice algorithm for the TIME_WAIT search. */\r
+ uip_connr = 0;\r
+ for(c = 0; c < UIP_CONNS; ++c) {\r
+ if(uip_conns[c].tcpstateflags == UIP_CLOSED) {\r
+ uip_connr = &uip_conns[c];\r
+ break;\r
+ }\r
+ if(uip_conns[c].tcpstateflags == UIP_TIME_WAIT) {\r
+ if(uip_connr == 0 ||\r
+ uip_conns[c].timer > uip_connr->timer) {\r
+ uip_connr = &uip_conns[c];\r
+ }\r
+ }\r
+ }\r
+\r
+ if(uip_connr == 0) {\r
+ /* All connections are used already, we drop packet and hope that\r
+ the remote end will retransmit the packet at a time when we\r
+ have more spare connections. */\r
+ UIP_STAT(++uip_stat.tcp.syndrop);\r
+ UIP_LOG("tcp: found no unused connections.");\r
+ goto drop;\r
+ }\r
+ uip_conn = uip_connr;\r
+\r
+ /* Fill in the necessary fields for the new connection. */\r
+ uip_connr->rto = uip_connr->timer = UIP_RTO;\r
+ uip_connr->sa = 0;\r
+ uip_connr->sv = 4;\r
+ uip_connr->nrtx = 0;\r
+ uip_connr->lport = BUF->destport;\r
+ uip_connr->rport = BUF->srcport;\r
+ uip_ipaddr_copy(uip_connr->ripaddr, BUF->srcipaddr);\r
+ uip_connr->tcpstateflags = UIP_SYN_RCVD;\r
+\r
+ uip_connr->snd_nxt[0] = iss[0];\r
+ uip_connr->snd_nxt[1] = iss[1];\r
+ uip_connr->snd_nxt[2] = iss[2];\r
+ uip_connr->snd_nxt[3] = iss[3];\r
+ uip_connr->len = 1;\r
+\r
+ /* rcv_nxt should be the seqno from the incoming packet + 1. */\r
+ uip_connr->rcv_nxt[3] = BUF->seqno[3];\r
+ uip_connr->rcv_nxt[2] = BUF->seqno[2];\r
+ uip_connr->rcv_nxt[1] = BUF->seqno[1];\r
+ uip_connr->rcv_nxt[0] = BUF->seqno[0];\r
+ uip_add_rcv_nxt(1);\r
+\r
+ /* Parse the TCP MSS option, if present. */\r
+ if((BUF->tcpoffset & 0xf0) > 0x50) {\r
+ for(c = 0; c < ((BUF->tcpoffset >> 4) - 5) << 2 ;) {\r
+ opt = uip_buf[UIP_TCPIP_HLEN + UIP_LLH_LEN + c];\r
+ if(opt == TCP_OPT_END) {\r
+ /* End of options. */\r
+ break;\r
+ } else if(opt == TCP_OPT_NOOP) {\r
+ ++c;\r
+ /* NOP option. */\r
+ } else if(opt == TCP_OPT_MSS &&\r
+ uip_buf[UIP_TCPIP_HLEN + UIP_LLH_LEN + 1 + c] == TCP_OPT_MSS_LEN) {\r
+ /* An MSS option with the right option length. */\r
+ tmp16 = ((u16_t)uip_buf[UIP_TCPIP_HLEN + UIP_LLH_LEN + 2 + c] << 8) |\r
+ (u16_t)uip_buf[UIP_IPTCPH_LEN + UIP_LLH_LEN + 3 + c];\r
+ uip_connr->initialmss = uip_connr->mss =\r
+ tmp16 > UIP_TCP_MSS? UIP_TCP_MSS: tmp16;\r
+ \r
+ /* And we are done processing options. */\r
+ break;\r
+ } else {\r
+ /* All other options have a length field, so that we easily\r
+ can skip past them. */\r
+ if(uip_buf[UIP_TCPIP_HLEN + UIP_LLH_LEN + 1 + c] == 0) {\r
+ /* If the length field is zero, the options are malformed\r
+ and we don't process them further. */\r
+ break;\r
+ }\r
+ c += uip_buf[UIP_TCPIP_HLEN + UIP_LLH_LEN + 1 + c];\r
+ }\r
+ }\r
+ }\r
+\r
+ /* Our response will be a SYNACK. */\r
+#if UIP_ACTIVE_OPEN\r
+ tcp_send_synack:\r
+ BUF->flags = TCP_ACK;\r
+\r
+ tcp_send_syn:\r
+ BUF->flags |= TCP_SYN;\r
+#else /* UIP_ACTIVE_OPEN */\r
+ tcp_send_synack:\r
+ BUF->flags = TCP_SYN | TCP_ACK;\r
+#endif /* UIP_ACTIVE_OPEN */\r
+\r
+ /* We send out the TCP Maximum Segment Size option with our\r
+ SYNACK. */\r
+ BUF->optdata[0] = TCP_OPT_MSS;\r
+ BUF->optdata[1] = TCP_OPT_MSS_LEN;\r
+ BUF->optdata[2] = (UIP_TCP_MSS) / 256;\r
+ BUF->optdata[3] = (UIP_TCP_MSS) & 255;\r
+ uip_len = UIP_IPTCPH_LEN + TCP_OPT_MSS_LEN;\r
+ BUF->tcpoffset = ((UIP_TCPH_LEN + TCP_OPT_MSS_LEN) / 4) << 4;\r
+ goto tcp_send;\r
+\r
+ /* This label will be jumped to if we found an active connection. */\r
+ found:\r
+ uip_conn = uip_connr;\r
+ uip_flags = 0;\r
+ /* We do a very naive form of TCP reset processing; we just accept\r
+ any RST and kill our connection. We should in fact check if the\r
+ sequence number of this reset is wihtin our advertised window\r
+ before we accept the reset. */\r
+ if(BUF->flags & TCP_RST) {\r
+ uip_connr->tcpstateflags = UIP_CLOSED;\r
+ UIP_LOG("tcp: got reset, aborting connection.");\r
+ uip_flags = UIP_ABORT;\r
+ UIP_APPCALL();\r
+ goto drop;\r
+ }\r
+ /* Calculated the length of the data, if the application has sent\r
+ any data to us. */\r
+ c = (BUF->tcpoffset >> 4) << 2;\r
+ /* uip_len will contain the length of the actual TCP data. This is\r
+ calculated by subtracing the length of the TCP header (in\r
+ c) and the length of the IP header (20 bytes). */\r
+ uip_len = uip_len - c - UIP_IPH_LEN;\r
+\r
+ /* First, check if the sequence number of the incoming packet is\r
+ what we're expecting next. If not, we send out an ACK with the\r
+ correct numbers in. */\r
+ if(!(((uip_connr->tcpstateflags & UIP_TS_MASK) == UIP_SYN_SENT) &&\r
+ ((BUF->flags & TCP_CTL) == (TCP_SYN | TCP_ACK)))) {\r
+ if((uip_len > 0 || ((BUF->flags & (TCP_SYN | TCP_FIN)) != 0)) &&\r
+ (BUF->seqno[0] != uip_connr->rcv_nxt[0] ||\r
+ BUF->seqno[1] != uip_connr->rcv_nxt[1] ||\r
+ BUF->seqno[2] != uip_connr->rcv_nxt[2] ||\r
+ BUF->seqno[3] != uip_connr->rcv_nxt[3])) {\r
+ goto tcp_send_ack;\r
+ }\r
+ }\r
+\r
+ /* Next, check if the incoming segment acknowledges any outstanding\r
+ data. If so, we update the sequence number, reset the length of\r
+ the outstanding data, calculate RTT estimations, and reset the\r
+ retransmission timer. */\r
+ if((BUF->flags & TCP_ACK) && uip_outstanding(uip_connr)) {\r
+ uip_add32(uip_connr->snd_nxt, uip_connr->len);\r
+\r
+ if(BUF->ackno[0] == uip_acc32[0] &&\r
+ BUF->ackno[1] == uip_acc32[1] &&\r
+ BUF->ackno[2] == uip_acc32[2] &&\r
+ BUF->ackno[3] == uip_acc32[3]) {\r
+ /* Update sequence number. */\r
+ uip_connr->snd_nxt[0] = uip_acc32[0];\r
+ uip_connr->snd_nxt[1] = uip_acc32[1];\r
+ uip_connr->snd_nxt[2] = uip_acc32[2];\r
+ uip_connr->snd_nxt[3] = uip_acc32[3];\r
+ \r
+\r
+ /* Do RTT estimation, unless we have done retransmissions. */\r
+ if(uip_connr->nrtx == 0) {\r
+ signed char m;\r
+ m = uip_connr->rto - uip_connr->timer;\r
+ /* This is taken directly from VJs original code in his paper */\r
+ m = m - (uip_connr->sa >> 3);\r
+ uip_connr->sa += m;\r
+ if(m < 0) {\r
+ m = -m;\r
+ }\r
+ m = m - (uip_connr->sv >> 2);\r
+ uip_connr->sv += m;\r
+ uip_connr->rto = (uip_connr->sa >> 3) + uip_connr->sv;\r
+\r
+ }\r
+ /* Set the acknowledged flag. */\r
+ uip_flags = UIP_ACKDATA;\r
+ /* Reset the retransmission timer. */\r
+ uip_connr->timer = uip_connr->rto;\r
+\r
+ /* Reset length of outstanding data. */\r
+ uip_connr->len = 0;\r
+ }\r
+\r
+ }\r
+\r
+ /* Do different things depending on in what state the connection is. */\r
+ switch(uip_connr->tcpstateflags & UIP_TS_MASK) {\r
+ /* CLOSED and LISTEN are not handled here. CLOSE_WAIT is not\r
+ implemented, since we force the application to close when the\r
+ peer sends a FIN (hence the application goes directly from\r
+ ESTABLISHED to LAST_ACK). */\r
+ case UIP_SYN_RCVD:\r
+ /* In SYN_RCVD we have sent out a SYNACK in response to a SYN, and\r
+ we are waiting for an ACK that acknowledges the data we sent\r
+ out the last time. Therefore, we want to have the UIP_ACKDATA\r
+ flag set. If so, we enter the ESTABLISHED state. */\r
+ if(uip_flags & UIP_ACKDATA) {\r
+ uip_connr->tcpstateflags = UIP_ESTABLISHED;\r
+ uip_flags = UIP_CONNECTED;\r
+ uip_connr->len = 0;\r
+ if(uip_len > 0) {\r
+ uip_flags |= UIP_NEWDATA;\r
+ uip_add_rcv_nxt(uip_len);\r
+ }\r
+ uip_slen = 0;\r
+ UIP_APPCALL();\r
+ goto appsend;\r
+ }\r
+ goto drop;\r
+#if UIP_ACTIVE_OPEN\r
+ case UIP_SYN_SENT:\r
+ /* In SYN_SENT, we wait for a SYNACK that is sent in response to\r
+ our SYN. The rcv_nxt is set to sequence number in the SYNACK\r
+ plus one, and we send an ACK. We move into the ESTABLISHED\r
+ state. */\r
+ if((uip_flags & UIP_ACKDATA) &&\r
+ (BUF->flags & TCP_CTL) == (TCP_SYN | TCP_ACK)) {\r
+\r
+ /* Parse the TCP MSS option, if present. */\r
+ if((BUF->tcpoffset & 0xf0) > 0x50) {\r
+ for(c = 0; c < ((BUF->tcpoffset >> 4) - 5) << 2 ;) {\r
+ opt = uip_buf[UIP_IPTCPH_LEN + UIP_LLH_LEN + c];\r
+ if(opt == TCP_OPT_END) {\r
+ /* End of options. */\r
+ break;\r
+ } else if(opt == TCP_OPT_NOOP) {\r
+ ++c;\r
+ /* NOP option. */\r
+ } else if(opt == TCP_OPT_MSS &&\r
+ uip_buf[UIP_TCPIP_HLEN + UIP_LLH_LEN + 1 + c] == TCP_OPT_MSS_LEN) {\r
+ /* An MSS option with the right option length. */\r
+ tmp16 = (uip_buf[UIP_TCPIP_HLEN + UIP_LLH_LEN + 2 + c] << 8) |\r
+ uip_buf[UIP_TCPIP_HLEN + UIP_LLH_LEN + 3 + c];\r
+ uip_connr->initialmss =\r
+ uip_connr->mss = tmp16 > UIP_TCP_MSS? UIP_TCP_MSS: tmp16;\r
+\r
+ /* And we are done processing options. */\r
+ break;\r
+ } else {\r
+ /* All other options have a length field, so that we easily\r
+ can skip past them. */\r
+ if(uip_buf[UIP_TCPIP_HLEN + UIP_LLH_LEN + 1 + c] == 0) {\r
+ /* If the length field is zero, the options are malformed\r
+ and we don't process them further. */\r
+ break;\r
+ }\r
+ c += uip_buf[UIP_TCPIP_HLEN + UIP_LLH_LEN + 1 + c];\r
+ }\r
+ }\r
+ }\r
+ uip_connr->tcpstateflags = UIP_ESTABLISHED;\r
+ uip_connr->rcv_nxt[0] = BUF->seqno[0];\r
+ uip_connr->rcv_nxt[1] = BUF->seqno[1];\r
+ uip_connr->rcv_nxt[2] = BUF->seqno[2];\r
+ uip_connr->rcv_nxt[3] = BUF->seqno[3];\r
+ uip_add_rcv_nxt(1);\r
+ uip_flags = UIP_CONNECTED | UIP_NEWDATA;\r
+ uip_connr->len = 0;\r
+ uip_len = 0;\r
+ uip_slen = 0;\r
+ UIP_APPCALL();\r
+ goto appsend;\r
+ }\r
+ /* Inform the application that the connection failed */\r
+ uip_flags = UIP_ABORT;\r
+ UIP_APPCALL();\r
+ /* The connection is closed after we send the RST */\r
+ uip_conn->tcpstateflags = UIP_CLOSED;\r
+ goto reset;\r
+#endif /* UIP_ACTIVE_OPEN */\r
+\r
+ case UIP_ESTABLISHED:\r
+ /* In the ESTABLISHED state, we call upon the application to feed\r
+ data into the uip_buf. If the UIP_ACKDATA flag is set, the\r
+ application should put new data into the buffer, otherwise we are\r
+ retransmitting an old segment, and the application should put that\r
+ data into the buffer.\r
+\r
+ If the incoming packet is a FIN, we should close the connection on\r
+ this side as well, and we send out a FIN and enter the LAST_ACK\r
+ state. We require that there is no outstanding data; otherwise the\r
+ sequence numbers will be screwed up. */\r
+\r
+ if(BUF->flags & TCP_FIN && !(uip_connr->tcpstateflags & UIP_STOPPED)) {\r
+ if(uip_outstanding(uip_connr)) {\r
+ goto drop;\r
+ }\r
+ uip_add_rcv_nxt(1 + uip_len);\r
+ uip_flags |= UIP_CLOSE;\r
+ if(uip_len > 0) {\r
+ uip_flags |= UIP_NEWDATA;\r
+ }\r
+ UIP_APPCALL();\r
+ uip_connr->len = 1;\r
+ uip_connr->tcpstateflags = UIP_LAST_ACK;\r
+ uip_connr->nrtx = 0;\r
+ tcp_send_finack:\r
+ BUF->flags = TCP_FIN | TCP_ACK;\r
+ goto tcp_send_nodata;\r
+ }\r
+\r
+ /* Check the URG flag. If this is set, the segment carries urgent\r
+ data that we must pass to the application. */\r
+ if((BUF->flags & TCP_URG) != 0) {\r
+#if UIP_URGDATA > 0\r
+ uip_urglen = (BUF->urgp[0] << 8) | BUF->urgp[1];\r
+ if(uip_urglen > uip_len) {\r
+ /* There is more urgent data in the next segment to come. */\r
+ uip_urglen = uip_len;\r
+ }\r
+ uip_add_rcv_nxt(uip_urglen);\r
+ uip_len -= uip_urglen;\r
+ uip_urgdata = uip_appdata;\r
+ uip_appdata += uip_urglen;\r
+ } else {\r
+ uip_urglen = 0;\r
+#else /* UIP_URGDATA > 0 */\r
+ uip_appdata = ((char *)uip_appdata) + ((BUF->urgp[0] << 8) | BUF->urgp[1]);\r
+ uip_len -= (BUF->urgp[0] << 8) | BUF->urgp[1];\r
+#endif /* UIP_URGDATA > 0 */\r
+ }\r
+\r
+ /* If uip_len > 0 we have TCP data in the packet, and we flag this\r
+ by setting the UIP_NEWDATA flag and update the sequence number\r
+ we acknowledge. If the application has stopped the dataflow\r
+ using uip_stop(), we must not accept any data packets from the\r
+ remote host. */\r
+ if(uip_len > 0 && !(uip_connr->tcpstateflags & UIP_STOPPED)) {\r
+ uip_flags |= UIP_NEWDATA;\r
+ uip_add_rcv_nxt(uip_len);\r
+ }\r
+\r
+ /* Check if the available buffer space advertised by the other end\r
+ is smaller than the initial MSS for this connection. If so, we\r
+ set the current MSS to the window size to ensure that the\r
+ application does not send more data than the other end can\r
+ handle.\r
+\r
+ If the remote host advertises a zero window, we set the MSS to\r
+ the initial MSS so that the application will send an entire MSS\r
+ of data. This data will not be acknowledged by the receiver,\r
+ and the application will retransmit it. This is called the\r
+ "persistent timer" and uses the retransmission mechanim.\r
+ */\r
+ tmp16 = ((u16_t)BUF->wnd[0] << 8) + (u16_t)BUF->wnd[1];\r
+ if(tmp16 > ( uip_connr->initialmss * FRAME_MULTIPLE ) ||\r
+ tmp16 == 0) {\r
+ tmp16 = uip_connr->initialmss * FRAME_MULTIPLE;\r
+ }\r
+ uip_connr->mss = tmp16;\r
+\r
+ /* If this packet constitutes an ACK for outstanding data (flagged\r
+ by the UIP_ACKDATA flag, we should call the application since it\r
+ might want to send more data. If the incoming packet had data\r
+ from the peer (as flagged by the UIP_NEWDATA flag), the\r
+ application must also be notified.\r
+\r
+ When the application is called, the global variable uip_len\r
+ contains the length of the incoming data. The application can\r
+ access the incoming data through the global pointer\r
+ uip_appdata, which usually points UIP_IPTCPH_LEN + UIP_LLH_LEN\r
+ bytes into the uip_buf array.\r
+\r
+ If the application wishes to send any data, this data should be\r
+ put into the uip_appdata and the length of the data should be\r
+ put into uip_len. If the application don't have any data to\r
+ send, uip_len must be set to 0. */\r
+ if(uip_flags & (UIP_NEWDATA | UIP_ACKDATA)) {\r
+ uip_slen = 0;\r
+ UIP_APPCALL();\r
+\r
+ appsend:\r
+\r
+ if(uip_flags & UIP_ABORT) {\r
+ uip_slen = 0;\r
+ uip_connr->tcpstateflags = UIP_CLOSED;\r
+ BUF->flags = TCP_RST | TCP_ACK;\r
+ goto tcp_send_nodata;\r
+ }\r
+\r
+ if(uip_flags & UIP_CLOSE) {\r
+ uip_slen = 0;\r
+ uip_connr->len = 1;\r
+ uip_connr->tcpstateflags = UIP_FIN_WAIT_1;\r
+ uip_connr->nrtx = 0;\r
+ BUF->flags = TCP_FIN | TCP_ACK;\r
+ goto tcp_send_nodata;\r
+ }\r
+\r
+ /* If uip_slen > 0, the application has data to be sent. */\r
+ if(uip_slen > 0) {\r
+\r
+ /* If the connection has acknowledged data, the contents of\r
+ the ->len variable should be discarded. */\r
+ if((uip_flags & UIP_ACKDATA) != 0) {\r
+ uip_connr->len = 0;\r
+ }\r
+\r
+ /* If the ->len variable is non-zero the connection has\r
+ already data in transit and cannot send anymore right\r
+ now. */\r
+ if(uip_connr->len == 0) {\r
+\r
+ /* The application cannot send more than what is allowed by\r
+ the mss (the minumum of the MSS and the available\r
+ window). */\r
+ if(uip_slen > uip_connr->mss) {\r
+ uip_slen = uip_connr->mss;\r
+ }\r
+\r
+ /* Remember how much data we send out now so that we know\r
+ when everything has been acknowledged. */\r
+ uip_connr->len = uip_slen;\r
+ } else {\r
+\r
+ /* If the application already had unacknowledged data, we\r
+ make sure that the application does not send (i.e.,\r
+ retransmit) out more than it previously sent out. */\r
+ uip_slen = uip_connr->len;\r
+ }\r
+ }\r
+ uip_connr->nrtx = 0;\r
+ apprexmit:\r
+ uip_appdata = uip_sappdata;\r
+\r
+ /* If the application has data to be sent, or if the incoming\r
+ packet had new data in it, we must send out a packet. */\r
+ if(uip_slen > 0 && uip_connr->len > 0) {\r
+ /* Add the length of the IP and TCP headers. */\r
+ uip_len = uip_connr->len + UIP_TCPIP_HLEN;\r
+ /* We always set the ACK flag in response packets. */\r
+ BUF->flags = TCP_ACK | TCP_PSH;\r
+ /* Send the packet. */\r
+ goto tcp_send_noopts;\r
+ }\r
+ /* If there is no data to send, just send out a pure ACK if\r
+ there is newdata. */\r
+ if(uip_flags & UIP_NEWDATA) {\r
+ uip_len = UIP_TCPIP_HLEN;\r
+ BUF->flags = TCP_ACK;\r
+ goto tcp_send_noopts;\r
+ }\r
+ }\r
+ goto drop;\r
+ case UIP_LAST_ACK:\r
+ /* We can close this connection if the peer has acknowledged our\r
+ FIN. This is indicated by the UIP_ACKDATA flag. */\r
+ if(uip_flags & UIP_ACKDATA) {\r
+ uip_connr->tcpstateflags = UIP_CLOSED;\r
+ uip_flags = UIP_CLOSE;\r
+ UIP_APPCALL();\r
+ }\r
+ break;\r
+\r
+ case UIP_FIN_WAIT_1:\r
+ /* The application has closed the connection, but the remote host\r
+ hasn't closed its end yet. Thus we do nothing but wait for a\r
+ FIN from the other side. */\r
+ if(uip_len > 0) {\r
+ uip_add_rcv_nxt(uip_len);\r
+ }\r
+ if(BUF->flags & TCP_FIN) {\r
+ if(uip_flags & UIP_ACKDATA) {\r
+ uip_connr->tcpstateflags = UIP_TIME_WAIT;\r
+ uip_connr->timer = 0;\r
+ uip_connr->len = 0;\r
+ } else {\r
+ uip_connr->tcpstateflags = UIP_CLOSING;\r
+ }\r
+ uip_add_rcv_nxt(1);\r
+ uip_flags = UIP_CLOSE;\r
+ UIP_APPCALL();\r
+ goto tcp_send_ack;\r
+ } else if(uip_flags & UIP_ACKDATA) {\r
+ uip_connr->tcpstateflags = UIP_FIN_WAIT_2;\r
+ uip_connr->len = 0;\r
+ goto drop;\r
+ }\r
+ if(uip_len > 0) {\r
+ goto tcp_send_ack;\r
+ }\r
+ goto drop;\r
+\r
+ case UIP_FIN_WAIT_2:\r
+ if(uip_len > 0) {\r
+ uip_add_rcv_nxt(uip_len);\r
+ }\r
+ if(BUF->flags & TCP_FIN) {\r
+ uip_connr->tcpstateflags = UIP_TIME_WAIT;\r
+ uip_connr->timer = 0;\r
+ uip_add_rcv_nxt(1);\r
+ uip_flags = UIP_CLOSE;\r
+ UIP_APPCALL();\r
+ goto tcp_send_ack;\r
+ }\r
+ if(uip_len > 0) {\r
+ goto tcp_send_ack;\r
+ }\r
+ goto drop;\r
+\r
+ case UIP_TIME_WAIT:\r
+ goto tcp_send_ack;\r
+\r
+ case UIP_CLOSING:\r
+ if(uip_flags & UIP_ACKDATA) {\r
+ uip_connr->tcpstateflags = UIP_TIME_WAIT;\r
+ uip_connr->timer = 0;\r
+ }\r
+ }\r
+ goto drop;\r
+\r
+\r
+ /* We jump here when we are ready to send the packet, and just want\r
+ to set the appropriate TCP sequence numbers in the TCP header. */\r
+ tcp_send_ack:\r
+ BUF->flags = TCP_ACK;\r
+ tcp_send_nodata:\r
+ uip_len = UIP_IPTCPH_LEN;\r
+ tcp_send_noopts:\r
+ BUF->tcpoffset = (UIP_TCPH_LEN / 4) << 4;\r
+ tcp_send:\r
+ /* We're done with the input processing. We are now ready to send a\r
+ reply. Our job is to fill in all the fields of the TCP and IP\r
+ headers before calculating the checksum and finally send the\r
+ packet. */\r
+ BUF->ackno[0] = uip_connr->rcv_nxt[0];\r
+ BUF->ackno[1] = uip_connr->rcv_nxt[1];\r
+ BUF->ackno[2] = uip_connr->rcv_nxt[2];\r
+ BUF->ackno[3] = uip_connr->rcv_nxt[3];\r
+\r
+ BUF->seqno[0] = uip_connr->snd_nxt[0];\r
+ BUF->seqno[1] = uip_connr->snd_nxt[1];\r
+ BUF->seqno[2] = uip_connr->snd_nxt[2];\r
+ BUF->seqno[3] = uip_connr->snd_nxt[3];\r
+\r
+ BUF->proto = UIP_PROTO_TCP;\r
+\r
+ BUF->srcport = uip_connr->lport;\r
+ BUF->destport = uip_connr->rport;\r
+\r
+ uip_ipaddr_copy(BUF->srcipaddr, uip_hostaddr);\r
+ uip_ipaddr_copy(BUF->destipaddr, uip_connr->ripaddr);\r
+\r
+ if(uip_connr->tcpstateflags & UIP_STOPPED) {\r
+ /* If the connection has issued uip_stop(), we advertise a zero\r
+ window so that the remote host will stop sending data. */\r
+ BUF->wnd[0] = BUF->wnd[1] = 0;\r
+ } else {\r
+ BUF->wnd[0] = ((UIP_RECEIVE_WINDOW) >> 8);\r
+ BUF->wnd[1] = ((UIP_RECEIVE_WINDOW) & 0xff);\r
+ }\r
+\r
+ tcp_send_noconn:\r
+ BUF->ttl = UIP_TTL;\r
+#if UIP_CONF_IPV6\r
+ /* For IPv6, the IP length field does not include the IPv6 IP header\r
+ length. */\r
+ BUF->len[0] = ((uip_len - UIP_IPH_LEN) >> 8);\r
+ BUF->len[1] = ((uip_len - UIP_IPH_LEN) & 0xff);\r
+#else /* UIP_CONF_IPV6 */\r
+ BUF->len[0] = (uip_len >> 8);\r
+ BUF->len[1] = (uip_len & 0xff);\r
+#endif /* UIP_CONF_IPV6 */\r
+\r
+ BUF->urgp[0] = BUF->urgp[1] = 0;\r
+\r
+ /* Calculate TCP checksum. */\r
+ BUF->tcpchksum = 0;\r
+ BUF->tcpchksum = ~(uip_tcpchksum());\r
+\r
+#if UIP_UDP\r
+ ip_send_nolen:\r
+#endif\r
+ \r
+#if UIP_CONF_IPV6\r
+ BUF->vtc = 0x60;\r
+ BUF->tcflow = 0x00;\r
+ BUF->flow = 0x00;\r
+#else /* UIP_CONF_IPV6 */\r
+ BUF->vhl = 0x45;\r
+ BUF->tos = 0;\r
+ BUF->ipoffset[0] = BUF->ipoffset[1] = 0;\r
+ ++ipid;\r
+ BUF->ipid[0] = ipid >> 8;\r
+ BUF->ipid[1] = ipid & 0xff;\r
+ /* Calculate IP checksum. */\r
+ BUF->ipchksum = 0;\r
+ BUF->ipchksum = ~(uip_ipchksum());\r
+ DEBUG_PRINTF("uip ip_send_nolen: chkecum 0x%04x\n", uip_ipchksum());\r
+#endif /* UIP_CONF_IPV6 */\r
+\r
+ UIP_STAT(++uip_stat.tcp.sent);\r
+ send:\r
+ DEBUG_PRINTF("Sending packet with length %d (%d)\n", uip_len,\r
+ (BUF->len[0] << 8) | BUF->len[1]);\r
+\r
+ UIP_STAT(++uip_stat.ip.sent);\r
+ /* Return and let the caller do the actual transmission. */\r
+ uip_flags = 0;\r
+ return;\r
+ drop:\r
+ uip_len = 0;\r
+ uip_flags = 0;\r
+ return;\r
+}\r
+/*---------------------------------------------------------------------------*/\r
+u16_t\r
+htons(u16_t val)\r
+{\r
+ return HTONS(val);\r
+}\r
+/*---------------------------------------------------------------------------*/\r
+void\r
+uip_send(const void *data, int len)\r
+{\r
+ if(len > 0) {\r
+ uip_slen = len;\r
+ if(data != uip_sappdata) {\r
+ memcpy(uip_sappdata, (data), uip_slen);\r
+ }\r
+ }\r
+}\r
+/** @} */\r
--- /dev/null
+\r
+/**\r
+ * \addtogroup uip\r
+ * @{\r
+ */\r
+\r
+/**\r
+ * \file\r
+ * Header file for the uIP TCP/IP stack.\r
+ * \author Adam Dunkels <adam@dunkels.com>\r
+ *\r
+ * The uIP TCP/IP stack header file contains definitions for a number\r
+ * of C macros that are used by uIP programs as well as internal uIP\r
+ * structures, TCP/IP header structures and function declarations.\r
+ *\r
+ */\r
+\r
+\r
+/*\r
+ * Copyright (c) 2001-2003, Adam Dunkels.\r
+ * All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ * 3. The name of the author may not be used to endorse or promote\r
+ * products derived from this software without specific prior\r
+ * written permission.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS\r
+ * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED\r
+ * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY\r
+ * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE\r
+ * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS\r
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\r
+ * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING\r
+ * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS\r
+ * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\r
+ *\r
+ * This file is part of the uIP TCP/IP stack.\r
+ *\r
+ * $Id: uip.h,v 1.40 2006/06/08 07:12:07 adam Exp $\r
+ *\r
+ */\r
+\r
+#ifndef __UIP_H__\r
+#define __UIP_H__\r
+\r
+#include "uipopt.h"\r
+\r
+/**\r
+ * Repressentation of an IP address.\r
+ *\r
+ */\r
+typedef u16_t uip_ip4addr_t[2];\r
+typedef u16_t uip_ip6addr_t[8];\r
+#if UIP_CONF_IPV6\r
+typedef uip_ip6addr_t uip_ipaddr_t;\r
+#else /* UIP_CONF_IPV6 */\r
+typedef uip_ip4addr_t uip_ipaddr_t;\r
+#endif /* UIP_CONF_IPV6 */\r
+\r
+/*---------------------------------------------------------------------------*/\r
+/* First, the functions that should be called from the\r
+ * system. Initialization, the periodic timer and incoming packets are\r
+ * handled by the following three functions.\r
+ */\r
+\r
+/**\r
+ * \defgroup uipconffunc uIP configuration functions\r
+ * @{\r
+ *\r
+ * The uIP configuration functions are used for setting run-time\r
+ * parameters in uIP such as IP addresses.\r
+ */\r
+\r
+/**\r
+ * Set the IP address of this host.\r
+ *\r
+ * The IP address is represented as a 4-byte array where the first\r
+ * octet of the IP address is put in the first member of the 4-byte\r
+ * array.\r
+ *\r
+ * Example:\r
+ \code\r
+\r
+ uip_ipaddr_t addr;\r
+\r
+ uip_ipaddr(&addr, 192,168,1,2);\r
+ uip_sethostaddr(&addr);\r
+\r
+ \endcode\r
+ * \param addr A pointer to an IP address of type uip_ipaddr_t;\r
+ *\r
+ * \sa uip_ipaddr()\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_sethostaddr(addr) uip_ipaddr_copy(uip_hostaddr, (addr))\r
+\r
+/**\r
+ * Get the IP address of this host.\r
+ *\r
+ * The IP address is represented as a 4-byte array where the first\r
+ * octet of the IP address is put in the first member of the 4-byte\r
+ * array.\r
+ *\r
+ * Example:\r
+ \code\r
+ uip_ipaddr_t hostaddr;\r
+\r
+ uip_gethostaddr(&hostaddr);\r
+ \endcode\r
+ * \param addr A pointer to a uip_ipaddr_t variable that will be\r
+ * filled in with the currently configured IP address.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_gethostaddr(addr) uip_ipaddr_copy((addr), uip_hostaddr)\r
+\r
+/**\r
+ * Set the default router's IP address.\r
+ *\r
+ * \param addr A pointer to a uip_ipaddr_t variable containing the IP\r
+ * address of the default router.\r
+ *\r
+ * \sa uip_ipaddr()\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_setdraddr(addr) uip_ipaddr_copy(uip_draddr, (addr))\r
+\r
+/**\r
+ * Set the netmask.\r
+ *\r
+ * \param addr A pointer to a uip_ipaddr_t variable containing the IP\r
+ * address of the netmask.\r
+ *\r
+ * \sa uip_ipaddr()\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_setnetmask(addr) uip_ipaddr_copy(uip_netmask, (addr))\r
+\r
+\r
+/**\r
+ * Get the default router's IP address.\r
+ *\r
+ * \param addr A pointer to a uip_ipaddr_t variable that will be\r
+ * filled in with the IP address of the default router.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_getdraddr(addr) uip_ipaddr_copy((addr), uip_draddr)\r
+\r
+/**\r
+ * Get the netmask.\r
+ *\r
+ * \param addr A pointer to a uip_ipaddr_t variable that will be\r
+ * filled in with the value of the netmask.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_getnetmask(addr) uip_ipaddr_copy((addr), uip_netmask)\r
+\r
+/** @} */\r
+\r
+/**\r
+ * \defgroup uipinit uIP initialization functions\r
+ * @{\r
+ *\r
+ * The uIP initialization functions are used for booting uIP.\r
+ */\r
+\r
+/**\r
+ * uIP initialization function.\r
+ *\r
+ * This function should be called at boot up to initilize the uIP\r
+ * TCP/IP stack.\r
+ */\r
+void uip_init(void);\r
+\r
+/**\r
+ * uIP initialization function.\r
+ *\r
+ * This function may be used at boot time to set the initial ip_id.\r
+ */\r
+void uip_setipid(u16_t id);\r
+\r
+/** @} */\r
+\r
+/**\r
+ * \defgroup uipdevfunc uIP device driver functions\r
+ * @{\r
+ *\r
+ * These functions are used by a network device driver for interacting\r
+ * with uIP.\r
+ */\r
+\r
+/**\r
+ * Process an incoming packet.\r
+ *\r
+ * This function should be called when the device driver has received\r
+ * a packet from the network. The packet from the device driver must\r
+ * be present in the uip_buf buffer, and the length of the packet\r
+ * should be placed in the uip_len variable.\r
+ *\r
+ * When the function returns, there may be an outbound packet placed\r
+ * in the uip_buf packet buffer. If so, the uip_len variable is set to\r
+ * the length of the packet. If no packet is to be sent out, the\r
+ * uip_len variable is set to 0.\r
+ *\r
+ * The usual way of calling the function is presented by the source\r
+ * code below.\r
+ \code\r
+ uip_len = devicedriver_poll();\r
+ if(uip_len > 0) {\r
+ uip_input();\r
+ if(uip_len > 0) {\r
+ devicedriver_send();\r
+ }\r
+ }\r
+ \endcode\r
+ *\r
+ * \note If you are writing a uIP device driver that needs ARP\r
+ * (Address Resolution Protocol), e.g., when running uIP over\r
+ * Ethernet, you will need to call the uIP ARP code before calling\r
+ * this function:\r
+ \code\r
+ #define BUF ((struct uip_eth_hdr *)&uip_buf[0])\r
+ uip_len = ethernet_devicedrver_poll();\r
+ if(uip_len > 0) {\r
+ if(BUF->type == HTONS(UIP_ETHTYPE_IP)) {\r
+ uip_arp_ipin();\r
+ uip_input();\r
+ if(uip_len > 0) {\r
+ uip_arp_out();\r
+ ethernet_devicedriver_send();\r
+ }\r
+ } else if(BUF->type == HTONS(UIP_ETHTYPE_ARP)) {\r
+ uip_arp_arpin();\r
+ if(uip_len > 0) {\r
+ ethernet_devicedriver_send();\r
+ }\r
+ }\r
+ \endcode\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_input() uip_process(UIP_DATA)\r
+\r
+/**\r
+ * Periodic processing for a connection identified by its number.\r
+ *\r
+ * This function does the necessary periodic processing (timers,\r
+ * polling) for a uIP TCP conneciton, and should be called when the\r
+ * periodic uIP timer goes off. It should be called for every\r
+ * connection, regardless of whether they are open of closed.\r
+ *\r
+ * When the function returns, it may have an outbound packet waiting\r
+ * for service in the uIP packet buffer, and if so the uip_len\r
+ * variable is set to a value larger than zero. The device driver\r
+ * should be called to send out the packet.\r
+ *\r
+ * The ususal way of calling the function is through a for() loop like\r
+ * this:\r
+ \code\r
+ for(i = 0; i < UIP_CONNS; ++i) {\r
+ uip_periodic(i);\r
+ if(uip_len > 0) {\r
+ devicedriver_send();\r
+ }\r
+ }\r
+ \endcode\r
+ *\r
+ * \note If you are writing a uIP device driver that needs ARP\r
+ * (Address Resolution Protocol), e.g., when running uIP over\r
+ * Ethernet, you will need to call the uip_arp_out() function before\r
+ * calling the device driver:\r
+ \code\r
+ for(i = 0; i < UIP_CONNS; ++i) {\r
+ uip_periodic(i);\r
+ if(uip_len > 0) {\r
+ uip_arp_out();\r
+ ethernet_devicedriver_send();\r
+ }\r
+ }\r
+ \endcode\r
+ *\r
+ * \param conn The number of the connection which is to be periodically polled.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_periodic(conn) do { uip_conn = &uip_conns[conn]; \\r
+ uip_process(UIP_TIMER); } while (0)\r
+\r
+/**\r
+ *\r
+ *\r
+ */\r
+#define uip_conn_active(conn) (uip_conns[conn].tcpstateflags != UIP_CLOSED)\r
+\r
+/**\r
+ * Perform periodic processing for a connection identified by a pointer\r
+ * to its structure.\r
+ *\r
+ * Same as uip_periodic() but takes a pointer to the actual uip_conn\r
+ * struct instead of an integer as its argument. This function can be\r
+ * used to force periodic processing of a specific connection.\r
+ *\r
+ * \param conn A pointer to the uip_conn struct for the connection to\r
+ * be processed.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_periodic_conn(conn) do { uip_conn = conn; \\r
+ uip_process(UIP_TIMER); } while (0)\r
+\r
+/**\r
+ * Reuqest that a particular connection should be polled.\r
+ *\r
+ * Similar to uip_periodic_conn() but does not perform any timer\r
+ * processing. The application is polled for new data.\r
+ *\r
+ * \param conn A pointer to the uip_conn struct for the connection to\r
+ * be processed.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_poll_conn(conn) do { uip_conn = conn; \\r
+ uip_process(UIP_POLL_REQUEST); } while (0)\r
+\r
+\r
+#if UIP_UDP\r
+/**\r
+ * Periodic processing for a UDP connection identified by its number.\r
+ *\r
+ * This function is essentially the same as uip_periodic(), but for\r
+ * UDP connections. It is called in a similar fashion as the\r
+ * uip_periodic() function:\r
+ \code\r
+ for(i = 0; i < UIP_UDP_CONNS; i++) {\r
+ uip_udp_periodic(i);\r
+ if(uip_len > 0) {\r
+ devicedriver_send();\r
+ }\r
+ }\r
+ \endcode\r
+ *\r
+ * \note As for the uip_periodic() function, special care has to be\r
+ * taken when using uIP together with ARP and Ethernet:\r
+ \code\r
+ for(i = 0; i < UIP_UDP_CONNS; i++) {\r
+ uip_udp_periodic(i);\r
+ if(uip_len > 0) {\r
+ uip_arp_out();\r
+ ethernet_devicedriver_send();\r
+ }\r
+ }\r
+ \endcode\r
+ *\r
+ * \param conn The number of the UDP connection to be processed.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_udp_periodic(conn) do { uip_udp_conn = &uip_udp_conns[conn]; \\r
+ uip_process(UIP_UDP_TIMER); } while (0)\r
+\r
+/**\r
+ * Periodic processing for a UDP connection identified by a pointer to\r
+ * its structure.\r
+ *\r
+ * Same as uip_udp_periodic() but takes a pointer to the actual\r
+ * uip_conn struct instead of an integer as its argument. This\r
+ * function can be used to force periodic processing of a specific\r
+ * connection.\r
+ *\r
+ * \param conn A pointer to the uip_udp_conn struct for the connection\r
+ * to be processed.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_udp_periodic_conn(conn) do { uip_udp_conn = conn; \\r
+ uip_process(UIP_UDP_TIMER); } while (0)\r
+\r
+\r
+#endif /* UIP_UDP */\r
+\r
+/**\r
+ * The uIP packet buffer.\r
+ *\r
+ * The uip_buf array is used to hold incoming and outgoing\r
+ * packets. The device driver should place incoming data into this\r
+ * buffer. When sending data, the device driver should read the link\r
+ * level headers and the TCP/IP headers from this buffer. The size of\r
+ * the link level headers is configured by the UIP_LLH_LEN define.\r
+ *\r
+ * \note The application data need not be placed in this buffer, so\r
+ * the device driver must read it from the place pointed to by the\r
+ * uip_appdata pointer as illustrated by the following example:\r
+ \code\r
+ void\r
+ devicedriver_send(void)\r
+ {\r
+ hwsend(&uip_buf[0], UIP_LLH_LEN);\r
+ if(uip_len <= UIP_LLH_LEN + UIP_TCPIP_HLEN) {\r
+ hwsend(&uip_buf[UIP_LLH_LEN], uip_len - UIP_LLH_LEN);\r
+ } else {\r
+ hwsend(&uip_buf[UIP_LLH_LEN], UIP_TCPIP_HLEN);\r
+ hwsend(uip_appdata, uip_len - UIP_TCPIP_HLEN - UIP_LLH_LEN);\r
+ }\r
+ }\r
+ \endcode\r
+ */\r
+#ifndef UIP_CONF_EXTERNAL_BUFFER\r
+ extern u8_t uip_buf[UIP_BUFSIZE+2];\r
+#else\r
+ extern unsigned char *uip_buf;\r
+#endif\r
+\r
+/** @} */\r
+\r
+/*---------------------------------------------------------------------------*/\r
+/* Functions that are used by the uIP application program. Opening and\r
+ * closing connections, sending and receiving data, etc. is all\r
+ * handled by the functions below.\r
+*/\r
+/**\r
+ * \defgroup uipappfunc uIP application functions\r
+ * @{\r
+ *\r
+ * Functions used by an application running of top of uIP.\r
+ */\r
+\r
+/**\r
+ * Start listening to the specified port.\r
+ *\r
+ * \note Since this function expects the port number in network byte\r
+ * order, a conversion using HTONS() or htons() is necessary.\r
+ *\r
+ \code\r
+ uip_listen(HTONS(80));\r
+ \endcode\r
+ *\r
+ * \param port A 16-bit port number in network byte order.\r
+ */\r
+void uip_listen(u16_t port);\r
+\r
+/**\r
+ * Stop listening to the specified port.\r
+ *\r
+ * \note Since this function expects the port number in network byte\r
+ * order, a conversion using HTONS() or htons() is necessary.\r
+ *\r
+ \code\r
+ uip_unlisten(HTONS(80));\r
+ \endcode\r
+ *\r
+ * \param port A 16-bit port number in network byte order.\r
+ */\r
+void uip_unlisten(u16_t port);\r
+\r
+/**\r
+ * Connect to a remote host using TCP.\r
+ *\r
+ * This function is used to start a new connection to the specified\r
+ * port on the specied host. It allocates a new connection identifier,\r
+ * sets the connection to the SYN_SENT state and sets the\r
+ * retransmission timer to 0. This will cause a TCP SYN segment to be\r
+ * sent out the next time this connection is periodically processed,\r
+ * which usually is done within 0.5 seconds after the call to\r
+ * uip_connect().\r
+ *\r
+ * \note This function is avaliable only if support for active open\r
+ * has been configured by defining UIP_ACTIVE_OPEN to 1 in uipopt.h.\r
+ *\r
+ * \note Since this function requires the port number to be in network\r
+ * byte order, a conversion using HTONS() or htons() is necessary.\r
+ *\r
+ \code\r
+ uip_ipaddr_t ipaddr;\r
+\r
+ uip_ipaddr(&ipaddr, 192,168,1,2);\r
+ uip_connect(&ipaddr, HTONS(80));\r
+ \endcode\r
+ *\r
+ * \param ripaddr The IP address of the remote hot.\r
+ *\r
+ * \param port A 16-bit port number in network byte order.\r
+ *\r
+ * \return A pointer to the uIP connection identifier for the new connection,\r
+ * or NULL if no connection could be allocated.\r
+ *\r
+ */\r
+struct uip_conn *uip_connect(uip_ipaddr_t *ripaddr, u16_t port);\r
+\r
+\r
+\r
+/**\r
+ * \internal\r
+ *\r
+ * Check if a connection has outstanding (i.e., unacknowledged) data.\r
+ *\r
+ * \param conn A pointer to the uip_conn structure for the connection.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_outstanding(conn) ((conn)->len)\r
+\r
+/**\r
+ * Send data on the current connection.\r
+ *\r
+ * This function is used to send out a single segment of TCP\r
+ * data. Only applications that have been invoked by uIP for event\r
+ * processing can send data.\r
+ *\r
+ * The amount of data that actually is sent out after a call to this\r
+ * funcion is determined by the maximum amount of data TCP allows. uIP\r
+ * will automatically crop the data so that only the appropriate\r
+ * amount of data is sent. The function uip_mss() can be used to query\r
+ * uIP for the amount of data that actually will be sent.\r
+ *\r
+ * \note This function does not guarantee that the sent data will\r
+ * arrive at the destination. If the data is lost in the network, the\r
+ * application will be invoked with the uip_rexmit() event being\r
+ * set. The application will then have to resend the data using this\r
+ * function.\r
+ *\r
+ * \param data A pointer to the data which is to be sent.\r
+ *\r
+ * \param len The maximum amount of data bytes to be sent.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+void uip_send(const void *data, int len);\r
+\r
+/**\r
+ * The length of any incoming data that is currently avaliable (if avaliable)\r
+ * in the uip_appdata buffer.\r
+ *\r
+ * The test function uip_data() must first be used to check if there\r
+ * is any data available at all.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+/*void uip_datalen(void);*/\r
+#define uip_datalen() uip_len\r
+\r
+/**\r
+ * The length of any out-of-band data (urgent data) that has arrived\r
+ * on the connection.\r
+ *\r
+ * \note The configuration parameter UIP_URGDATA must be set for this\r
+ * function to be enabled.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_urgdatalen() uip_urglen\r
+\r
+/**\r
+ * Close the current connection.\r
+ *\r
+ * This function will close the current connection in a nice way.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_close() (uip_flags = UIP_CLOSE)\r
+\r
+/**\r
+ * Abort the current connection.\r
+ *\r
+ * This function will abort (reset) the current connection, and is\r
+ * usually used when an error has occured that prevents using the\r
+ * uip_close() function.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_abort() (uip_flags = UIP_ABORT)\r
+\r
+/**\r
+ * Tell the sending host to stop sending data.\r
+ *\r
+ * This function will close our receiver's window so that we stop\r
+ * receiving data for the current connection.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_stop() (uip_conn->tcpstateflags |= UIP_STOPPED)\r
+\r
+/**\r
+ * Find out if the current connection has been previously stopped with\r
+ * uip_stop().\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_stopped(conn) ((conn)->tcpstateflags & UIP_STOPPED)\r
+\r
+/**\r
+ * Restart the current connection, if is has previously been stopped\r
+ * with uip_stop().\r
+ *\r
+ * This function will open the receiver's window again so that we\r
+ * start receiving data for the current connection.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_restart() do { uip_flags |= UIP_NEWDATA; \\r
+ uip_conn->tcpstateflags &= ~UIP_STOPPED; \\r
+ } while(0)\r
+\r
+\r
+/* uIP tests that can be made to determine in what state the current\r
+ connection is, and what the application function should do. */\r
+\r
+/**\r
+ * Is the current connection a UDP connection?\r
+ *\r
+ * This function checks whether the current connection is a UDP connection.\r
+ *\r
+ * \hideinitializer\r
+ *\r
+ */\r
+#define uip_udpconnection() (uip_conn == NULL)\r
+\r
+/**\r
+ * Is new incoming data available?\r
+ *\r
+ * Will reduce to non-zero if there is new data for the application\r
+ * present at the uip_appdata pointer. The size of the data is\r
+ * avaliable through the uip_len variable.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_newdata() (uip_flags & UIP_NEWDATA)\r
+\r
+/**\r
+ * Has previously sent data been acknowledged?\r
+ *\r
+ * Will reduce to non-zero if the previously sent data has been\r
+ * acknowledged by the remote host. This means that the application\r
+ * can send new data.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_acked() (uip_flags & UIP_ACKDATA)\r
+\r
+/**\r
+ * Has the connection just been connected?\r
+ *\r
+ * Reduces to non-zero if the current connection has been connected to\r
+ * a remote host. This will happen both if the connection has been\r
+ * actively opened (with uip_connect()) or passively opened (with\r
+ * uip_listen()).\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_connected() (uip_flags & UIP_CONNECTED)\r
+\r
+/**\r
+ * Has the connection been closed by the other end?\r
+ *\r
+ * Is non-zero if the connection has been closed by the remote\r
+ * host. The application may then do the necessary clean-ups.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_closed() (uip_flags & UIP_CLOSE)\r
+\r
+/**\r
+ * Has the connection been aborted by the other end?\r
+ *\r
+ * Non-zero if the current connection has been aborted (reset) by the\r
+ * remote host.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_aborted() (uip_flags & UIP_ABORT)\r
+\r
+/**\r
+ * Has the connection timed out?\r
+ *\r
+ * Non-zero if the current connection has been aborted due to too many\r
+ * retransmissions.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_timedout() (uip_flags & UIP_TIMEDOUT)\r
+\r
+/**\r
+ * Do we need to retransmit previously data?\r
+ *\r
+ * Reduces to non-zero if the previously sent data has been lost in\r
+ * the network, and the application should retransmit it. The\r
+ * application should send the exact same data as it did the last\r
+ * time, using the uip_send() function.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_rexmit() (uip_flags & UIP_REXMIT)\r
+\r
+/**\r
+ * Is the connection being polled by uIP?\r
+ *\r
+ * Is non-zero if the reason the application is invoked is that the\r
+ * current connection has been idle for a while and should be\r
+ * polled.\r
+ *\r
+ * The polling event can be used for sending data without having to\r
+ * wait for the remote host to send data.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_poll() (uip_flags & UIP_POLL)\r
+\r
+/**\r
+ * Get the initial maxium segment size (MSS) of the current\r
+ * connection.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_initialmss() (uip_conn->initialmss)\r
+\r
+/**\r
+ * Get the current maxium segment size that can be sent on the current\r
+ * connection.\r
+ *\r
+ * The current maxiumum segment size that can be sent on the\r
+ * connection is computed from the receiver's window and the MSS of\r
+ * the connection (which also is available by calling\r
+ * uip_initialmss()).\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_mss() (uip_conn->mss)\r
+\r
+/**\r
+ * Set up a new UDP connection.\r
+ *\r
+ * This function sets up a new UDP connection. The function will\r
+ * automatically allocate an unused local port for the new\r
+ * connection. However, another port can be chosen by using the\r
+ * uip_udp_bind() call, after the uip_udp_new() function has been\r
+ * called.\r
+ *\r
+ * Example:\r
+ \code\r
+ uip_ipaddr_t addr;\r
+ struct uip_udp_conn *c;\r
+\r
+ uip_ipaddr(&addr, 192,168,2,1);\r
+ c = uip_udp_new(&addr, HTONS(12345));\r
+ if(c != NULL) {\r
+ uip_udp_bind(c, HTONS(12344));\r
+ }\r
+ \endcode\r
+ * \param ripaddr The IP address of the remote host.\r
+ *\r
+ * \param rport The remote port number in network byte order.\r
+ *\r
+ * \return The uip_udp_conn structure for the new connection or NULL\r
+ * if no connection could be allocated.\r
+ */\r
+struct uip_udp_conn *uip_udp_new(uip_ipaddr_t *ripaddr, u16_t rport);\r
+\r
+/**\r
+ * Removed a UDP connection.\r
+ *\r
+ * \param conn A pointer to the uip_udp_conn structure for the connection.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_udp_remove(conn) (conn)->lport = 0\r
+\r
+/**\r
+ * Bind a UDP connection to a local port.\r
+ *\r
+ * \param conn A pointer to the uip_udp_conn structure for the\r
+ * connection.\r
+ *\r
+ * \param port The local port number, in network byte order.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_udp_bind(conn, port) (conn)->lport = port\r
+\r
+/**\r
+ * Send a UDP datagram of length len on the current connection.\r
+ *\r
+ * This function can only be called in response to a UDP event (poll\r
+ * or newdata). The data must be present in the uip_buf buffer, at the\r
+ * place pointed to by the uip_appdata pointer.\r
+ *\r
+ * \param len The length of the data in the uip_buf buffer.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_udp_send(len) uip_send((char *)uip_appdata, len)\r
+\r
+/** @} */\r
+\r
+/* uIP convenience and converting functions. */\r
+\r
+/**\r
+ * \defgroup uipconvfunc uIP conversion functions\r
+ * @{\r
+ *\r
+ * These functions can be used for converting between different data\r
+ * formats used by uIP.\r
+ */\r
+\r
+/**\r
+ * Construct an IP address from four bytes.\r
+ *\r
+ * This function constructs an IP address of the type that uIP handles\r
+ * internally from four bytes. The function is handy for specifying IP\r
+ * addresses to use with e.g. the uip_connect() function.\r
+ *\r
+ * Example:\r
+ \code\r
+ uip_ipaddr_t ipaddr;\r
+ struct uip_conn *c;\r
+\r
+ uip_ipaddr(&ipaddr, 192,168,1,2);\r
+ c = uip_connect(&ipaddr, HTONS(80));\r
+ \endcode\r
+ *\r
+ * \param addr A pointer to a uip_ipaddr_t variable that will be\r
+ * filled in with the IP address.\r
+ *\r
+ * \param addr0 The first octet of the IP address.\r
+ * \param addr1 The second octet of the IP address.\r
+ * \param addr2 The third octet of the IP address.\r
+ * \param addr3 The forth octet of the IP address.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_ipaddr(addr, addr0,addr1,addr2,addr3) do { \\r
+ ((u16_t *)(addr))[0] = HTONS(((addr0) << 8) | (addr1)); \\r
+ ((u16_t *)(addr))[1] = HTONS(((addr2) << 8) | (addr3)); \\r
+ } while(0)\r
+\r
+/**\r
+ * Construct an IPv6 address from eight 16-bit words.\r
+ *\r
+ * This function constructs an IPv6 address.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_ip6addr(addr, addr0,addr1,addr2,addr3,addr4,addr5,addr6,addr7) do { \\r
+ ((u16_t *)(addr))[0] = HTONS((addr0)); \\r
+ ((u16_t *)(addr))[1] = HTONS((addr1)); \\r
+ ((u16_t *)(addr))[2] = HTONS((addr2)); \\r
+ ((u16_t *)(addr))[3] = HTONS((addr3)); \\r
+ ((u16_t *)(addr))[4] = HTONS((addr4)); \\r
+ ((u16_t *)(addr))[5] = HTONS((addr5)); \\r
+ ((u16_t *)(addr))[6] = HTONS((addr6)); \\r
+ ((u16_t *)(addr))[7] = HTONS((addr7)); \\r
+ } while(0)\r
+\r
+/**\r
+ * Copy an IP address to another IP address.\r
+ *\r
+ * Copies an IP address from one place to another.\r
+ *\r
+ * Example:\r
+ \code\r
+ uip_ipaddr_t ipaddr1, ipaddr2;\r
+\r
+ uip_ipaddr(&ipaddr1, 192,16,1,2);\r
+ uip_ipaddr_copy(&ipaddr2, &ipaddr1);\r
+ \endcode\r
+ *\r
+ * \param dest The destination for the copy.\r
+ * \param src The source from where to copy.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#if !UIP_CONF_IPV6\r
+#define uip_ipaddr_copy(dest, src) do { \\r
+ ((u16_t *)dest)[0] = ((u16_t *)src)[0]; \\r
+ ((u16_t *)dest)[1] = ((u16_t *)src)[1]; \\r
+ } while(0)\r
+#else /* !UIP_CONF_IPV6 */\r
+#define uip_ipaddr_copy(dest, src) memcpy(dest, src, sizeof(uip_ip6addr_t))\r
+#endif /* !UIP_CONF_IPV6 */\r
+\r
+/**\r
+ * Compare two IP addresses\r
+ *\r
+ * Compares two IP addresses.\r
+ *\r
+ * Example:\r
+ \code\r
+ uip_ipaddr_t ipaddr1, ipaddr2;\r
+\r
+ uip_ipaddr(&ipaddr1, 192,16,1,2);\r
+ if(uip_ipaddr_cmp(&ipaddr2, &ipaddr1)) {\r
+ printf("They are the same");\r
+ }\r
+ \endcode\r
+ *\r
+ * \param addr1 The first IP address.\r
+ * \param addr2 The second IP address.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#if !UIP_CONF_IPV6\r
+#define uip_ipaddr_cmp(addr1, addr2) (((u16_t *)addr1)[0] == ((u16_t *)addr2)[0] && \\r
+ ((u16_t *)addr1)[1] == ((u16_t *)addr2)[1])\r
+#else /* !UIP_CONF_IPV6 */\r
+#define uip_ipaddr_cmp(addr1, addr2) (memcmp(addr1, addr2, sizeof(uip_ip6addr_t)) == 0)\r
+#endif /* !UIP_CONF_IPV6 */\r
+\r
+/**\r
+ * Compare two IP addresses with netmasks\r
+ *\r
+ * Compares two IP addresses with netmasks. The masks are used to mask\r
+ * out the bits that are to be compared.\r
+ *\r
+ * Example:\r
+ \code\r
+ uip_ipaddr_t ipaddr1, ipaddr2, mask;\r
+\r
+ uip_ipaddr(&mask, 255,255,255,0);\r
+ uip_ipaddr(&ipaddr1, 192,16,1,2);\r
+ uip_ipaddr(&ipaddr2, 192,16,1,3);\r
+ if(uip_ipaddr_maskcmp(&ipaddr1, &ipaddr2, &mask)) {\r
+ printf("They are the same");\r
+ }\r
+ \endcode\r
+ *\r
+ * \param addr1 The first IP address.\r
+ * \param addr2 The second IP address.\r
+ * \param mask The netmask.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_ipaddr_maskcmp(addr1, addr2, mask) \\r
+ (((((u16_t *)addr1)[0] & ((u16_t *)mask)[0]) == \\r
+ (((u16_t *)addr2)[0] & ((u16_t *)mask)[0])) && \\r
+ ((((u16_t *)addr1)[1] & ((u16_t *)mask)[1]) == \\r
+ (((u16_t *)addr2)[1] & ((u16_t *)mask)[1])))\r
+\r
+\r
+/**\r
+ * Mask out the network part of an IP address.\r
+ *\r
+ * Masks out the network part of an IP address, given the address and\r
+ * the netmask.\r
+ *\r
+ * Example:\r
+ \code\r
+ uip_ipaddr_t ipaddr1, ipaddr2, netmask;\r
+\r
+ uip_ipaddr(&ipaddr1, 192,16,1,2);\r
+ uip_ipaddr(&netmask, 255,255,255,0);\r
+ uip_ipaddr_mask(&ipaddr2, &ipaddr1, &netmask);\r
+ \endcode\r
+ *\r
+ * In the example above, the variable "ipaddr2" will contain the IP\r
+ * address 192.168.1.0.\r
+ *\r
+ * \param dest Where the result is to be placed.\r
+ * \param src The IP address.\r
+ * \param mask The netmask.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_ipaddr_mask(dest, src, mask) do { \\r
+ ((u16_t *)dest)[0] = ((u16_t *)src)[0] & ((u16_t *)mask)[0]; \\r
+ ((u16_t *)dest)[1] = ((u16_t *)src)[1] & ((u16_t *)mask)[1]; \\r
+ } while(0)\r
+\r
+/**\r
+ * Pick the first octet of an IP address.\r
+ *\r
+ * Picks out the first octet of an IP address.\r
+ *\r
+ * Example:\r
+ \code\r
+ uip_ipaddr_t ipaddr;\r
+ u8_t octet;\r
+\r
+ uip_ipaddr(&ipaddr, 1,2,3,4);\r
+ octet = uip_ipaddr1(&ipaddr);\r
+ \endcode\r
+ *\r
+ * In the example above, the variable "octet" will contain the value 1.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_ipaddr1(addr) (htons(((u16_t *)(addr))[0]) >> 8)\r
+\r
+/**\r
+ * Pick the second octet of an IP address.\r
+ *\r
+ * Picks out the second octet of an IP address.\r
+ *\r
+ * Example:\r
+ \code\r
+ uip_ipaddr_t ipaddr;\r
+ u8_t octet;\r
+\r
+ uip_ipaddr(&ipaddr, 1,2,3,4);\r
+ octet = uip_ipaddr2(&ipaddr);\r
+ \endcode\r
+ *\r
+ * In the example above, the variable "octet" will contain the value 2.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_ipaddr2(addr) (htons(((u16_t *)(addr))[0]) & 0xff)\r
+\r
+/**\r
+ * Pick the third octet of an IP address.\r
+ *\r
+ * Picks out the third octet of an IP address.\r
+ *\r
+ * Example:\r
+ \code\r
+ uip_ipaddr_t ipaddr;\r
+ u8_t octet;\r
+\r
+ uip_ipaddr(&ipaddr, 1,2,3,4);\r
+ octet = uip_ipaddr3(&ipaddr);\r
+ \endcode\r
+ *\r
+ * In the example above, the variable "octet" will contain the value 3.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_ipaddr3(addr) (htons(((u16_t *)(addr))[1]) >> 8)\r
+\r
+/**\r
+ * Pick the fourth octet of an IP address.\r
+ *\r
+ * Picks out the fourth octet of an IP address.\r
+ *\r
+ * Example:\r
+ \code\r
+ uip_ipaddr_t ipaddr;\r
+ u8_t octet;\r
+\r
+ uip_ipaddr(&ipaddr, 1,2,3,4);\r
+ octet = uip_ipaddr4(&ipaddr);\r
+ \endcode\r
+ *\r
+ * In the example above, the variable "octet" will contain the value 4.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_ipaddr4(addr) (htons(((u16_t *)(addr))[1]) & 0xff)\r
+\r
+/**\r
+ * Convert 16-bit quantity from host byte order to network byte order.\r
+ *\r
+ * This macro is primarily used for converting constants from host\r
+ * byte order to network byte order. For converting variables to\r
+ * network byte order, use the htons() function instead.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#ifndef HTONS\r
+# if UIP_BYTE_ORDER == UIP_BIG_ENDIAN\r
+# define HTONS(n) (n)\r
+# else /* UIP_BYTE_ORDER == UIP_BIG_ENDIAN */\r
+# define HTONS(n) (u16_t)((((u16_t) (n)) << 8) | (((u16_t) (n)) >> 8))\r
+# endif /* UIP_BYTE_ORDER == UIP_BIG_ENDIAN */\r
+#else\r
+#error "HTONS already defined!"\r
+#endif /* HTONS */\r
+\r
+/**\r
+ * Convert 16-bit quantity from host byte order to network byte order.\r
+ *\r
+ * This function is primarily used for converting variables from host\r
+ * byte order to network byte order. For converting constants to\r
+ * network byte order, use the HTONS() macro instead.\r
+ */\r
+#ifndef htons\r
+u16_t htons(u16_t val);\r
+#endif /* htons */\r
+#ifndef ntohs\r
+#define ntohs htons\r
+#endif\r
+\r
+/** @} */\r
+\r
+/**\r
+ * Pointer to the application data in the packet buffer.\r
+ *\r
+ * This pointer points to the application data when the application is\r
+ * called. If the application wishes to send data, the application may\r
+ * use this space to write the data into before calling uip_send().\r
+ */\r
+extern void *uip_appdata;\r
+\r
+#if UIP_URGDATA > 0\r
+/* u8_t *uip_urgdata:\r
+ *\r
+ * This pointer points to any urgent data that has been received. Only\r
+ * present if compiled with support for urgent data (UIP_URGDATA).\r
+ */\r
+extern void *uip_urgdata;\r
+#endif /* UIP_URGDATA > 0 */\r
+\r
+\r
+/**\r
+ * \defgroup uipdrivervars Variables used in uIP device drivers\r
+ * @{\r
+ *\r
+ * uIP has a few global variables that are used in device drivers for\r
+ * uIP.\r
+ */\r
+\r
+/**\r
+ * The length of the packet in the uip_buf buffer.\r
+ *\r
+ * The global variable uip_len holds the length of the packet in the\r
+ * uip_buf buffer.\r
+ *\r
+ * When the network device driver calls the uIP input function,\r
+ * uip_len should be set to the length of the packet in the uip_buf\r
+ * buffer.\r
+ *\r
+ * When sending packets, the device driver should use the contents of\r
+ * the uip_len variable to determine the length of the outgoing\r
+ * packet.\r
+ *\r
+ */\r
+extern u16_t uip_len;\r
+\r
+/** @} */\r
+\r
+#if UIP_URGDATA > 0\r
+extern u16_t uip_urglen, uip_surglen;\r
+#endif /* UIP_URGDATA > 0 */\r
+\r
+\r
+/**\r
+ * Representation of a uIP TCP connection.\r
+ *\r
+ * The uip_conn structure is used for identifying a connection. All\r
+ * but one field in the structure are to be considered read-only by an\r
+ * application. The only exception is the appstate field whos purpose\r
+ * is to let the application store application-specific state (e.g.,\r
+ * file pointers) for the connection. The type of this field is\r
+ * configured in the "uipopt.h" header file.\r
+ */\r
+struct uip_conn {\r
+ uip_ipaddr_t ripaddr; /**< The IP address of the remote host. */\r
+\r
+ u16_t lport; /**< The local TCP port, in network byte order. */\r
+ u16_t rport; /**< The local remote TCP port, in network byte\r
+ order. */\r
+\r
+ u8_t rcv_nxt[4]; /**< The sequence number that we expect to\r
+ receive next. */\r
+ u8_t snd_nxt[4]; /**< The sequence number that was last sent by\r
+ us. */\r
+ u16_t len; /**< Length of the data that was previously sent. */\r
+ u16_t mss; /**< Current maximum segment size for the\r
+ connection. */\r
+ u16_t initialmss; /**< Initial maximum segment size for the\r
+ connection. */\r
+ u8_t sa; /**< Retransmission time-out calculation state\r
+ variable. */\r
+ u8_t sv; /**< Retransmission time-out calculation state\r
+ variable. */\r
+ u8_t rto; /**< Retransmission time-out. */\r
+ u8_t tcpstateflags; /**< TCP state and flags. */\r
+ u8_t timer; /**< The retransmission timer. */\r
+ u8_t nrtx; /**< The number of retransmissions for the last\r
+ segment sent. */\r
+\r
+ /** The application state. */\r
+ uip_tcp_appstate_t appstate;\r
+};\r
+\r
+\r
+/**\r
+ * Pointer to the current TCP connection.\r
+ *\r
+ * The uip_conn pointer can be used to access the current TCP\r
+ * connection.\r
+ */\r
+extern struct uip_conn *uip_conn;\r
+/* The array containing all uIP connections. */\r
+extern struct uip_conn uip_conns[UIP_CONNS];\r
+/**\r
+ * \addtogroup uiparch\r
+ * @{\r
+ */\r
+\r
+/**\r
+ * 4-byte array used for the 32-bit sequence number calculations.\r
+ */\r
+extern u8_t uip_acc32[4];\r
+\r
+/** @} */\r
+\r
+\r
+#if UIP_UDP\r
+/**\r
+ * Representation of a uIP UDP connection.\r
+ */\r
+struct uip_udp_conn {\r
+ uip_ipaddr_t ripaddr; /**< The IP address of the remote peer. */\r
+ u16_t lport; /**< The local port number in network byte order. */\r
+ u16_t rport; /**< The remote port number in network byte order. */\r
+ u8_t ttl; /**< Default time-to-live. */\r
+\r
+ /** The application state. */\r
+ uip_udp_appstate_t appstate;\r
+};\r
+\r
+/**\r
+ * The current UDP connection.\r
+ */\r
+extern struct uip_udp_conn *uip_udp_conn;\r
+extern struct uip_udp_conn uip_udp_conns[UIP_UDP_CONNS];\r
+#endif /* UIP_UDP */\r
+\r
+/**\r
+ * The structure holding the TCP/IP statistics that are gathered if\r
+ * UIP_STATISTICS is set to 1.\r
+ *\r
+ */\r
+struct uip_stats {\r
+ struct {\r
+ uip_stats_t drop; /**< Number of dropped packets at the IP\r
+ layer. */\r
+ uip_stats_t recv; /**< Number of received packets at the IP\r
+ layer. */\r
+ uip_stats_t sent; /**< Number of sent packets at the IP\r
+ layer. */\r
+ uip_stats_t vhlerr; /**< Number of packets dropped due to wrong\r
+ IP version or header length. */\r
+ uip_stats_t hblenerr; /**< Number of packets dropped due to wrong\r
+ IP length, high byte. */\r
+ uip_stats_t lblenerr; /**< Number of packets dropped due to wrong\r
+ IP length, low byte. */\r
+ uip_stats_t fragerr; /**< Number of packets dropped since they\r
+ were IP fragments. */\r
+ uip_stats_t chkerr; /**< Number of packets dropped due to IP\r
+ checksum errors. */\r
+ uip_stats_t protoerr; /**< Number of packets dropped since they\r
+ were neither ICMP, UDP nor TCP. */\r
+ } ip; /**< IP statistics. */\r
+ struct {\r
+ uip_stats_t drop; /**< Number of dropped ICMP packets. */\r
+ uip_stats_t recv; /**< Number of received ICMP packets. */\r
+ uip_stats_t sent; /**< Number of sent ICMP packets. */\r
+ uip_stats_t typeerr; /**< Number of ICMP packets with a wrong\r
+ type. */\r
+ } icmp; /**< ICMP statistics. */\r
+ struct {\r
+ uip_stats_t drop; /**< Number of dropped TCP segments. */\r
+ uip_stats_t recv; /**< Number of recived TCP segments. */\r
+ uip_stats_t sent; /**< Number of sent TCP segments. */\r
+ uip_stats_t chkerr; /**< Number of TCP segments with a bad\r
+ checksum. */\r
+ uip_stats_t ackerr; /**< Number of TCP segments with a bad ACK\r
+ number. */\r
+ uip_stats_t rst; /**< Number of recevied TCP RST (reset) segments. */\r
+ uip_stats_t rexmit; /**< Number of retransmitted TCP segments. */\r
+ uip_stats_t syndrop; /**< Number of dropped SYNs due to too few\r
+ connections was avaliable. */\r
+ uip_stats_t synrst; /**< Number of SYNs for closed ports,\r
+ triggering a RST. */\r
+ } tcp; /**< TCP statistics. */\r
+#if UIP_UDP\r
+ struct {\r
+ uip_stats_t drop; /**< Number of dropped UDP segments. */\r
+ uip_stats_t recv; /**< Number of recived UDP segments. */\r
+ uip_stats_t sent; /**< Number of sent UDP segments. */\r
+ uip_stats_t chkerr; /**< Number of UDP segments with a bad\r
+ checksum. */\r
+ } udp; /**< UDP statistics. */\r
+#endif /* UIP_UDP */\r
+};\r
+\r
+/**\r
+ * The uIP TCP/IP statistics.\r
+ *\r
+ * This is the variable in which the uIP TCP/IP statistics are gathered.\r
+ */\r
+extern struct uip_stats uip_stat;\r
+\r
+\r
+/*---------------------------------------------------------------------------*/\r
+/* All the stuff below this point is internal to uIP and should not be\r
+ * used directly by an application or by a device driver.\r
+ */\r
+/*---------------------------------------------------------------------------*/\r
+/* u8_t uip_flags:\r
+ *\r
+ * When the application is called, uip_flags will contain the flags\r
+ * that are defined in this file. Please read below for more\r
+ * infomation.\r
+ */\r
+extern u8_t uip_flags;\r
+\r
+/* The following flags may be set in the global variable uip_flags\r
+ before calling the application callback. The UIP_ACKDATA,\r
+ UIP_NEWDATA, and UIP_CLOSE flags may both be set at the same time,\r
+ whereas the others are mutualy exclusive. Note that these flags\r
+ should *NOT* be accessed directly, but only through the uIP\r
+ functions/macros. */\r
+\r
+#define UIP_ACKDATA 1 /* Signifies that the outstanding data was\r
+ acked and the application should send\r
+ out new data instead of retransmitting\r
+ the last data. */\r
+#define UIP_NEWDATA 2 /* Flags the fact that the peer has sent\r
+ us new data. */\r
+#define UIP_REXMIT 4 /* Tells the application to retransmit the\r
+ data that was last sent. */\r
+#define UIP_POLL 8 /* Used for polling the application, to\r
+ check if the application has data that\r
+ it wants to send. */\r
+#define UIP_CLOSE 16 /* The remote host has closed the\r
+ connection, thus the connection has\r
+ gone away. Or the application signals\r
+ that it wants to close the\r
+ connection. */\r
+#define UIP_ABORT 32 /* The remote host has aborted the\r
+ connection, thus the connection has\r
+ gone away. Or the application signals\r
+ that it wants to abort the\r
+ connection. */\r
+#define UIP_CONNECTED 64 /* We have got a connection from a remote\r
+ host and have set up a new connection\r
+ for it, or an active connection has\r
+ been successfully established. */\r
+\r
+#define UIP_TIMEDOUT 128 /* The connection has been aborted due to\r
+ too many retransmissions. */\r
+\r
+/* uip_process(flag):\r
+ *\r
+ * The actual uIP function which does all the work.\r
+ */\r
+void uip_process(u8_t flag);\r
+\r
+/* The following flags are passed as an argument to the uip_process()\r
+ function. They are used to distinguish between the two cases where\r
+ uip_process() is called. It can be called either because we have\r
+ incoming data that should be processed, or because the periodic\r
+ timer has fired. These values are never used directly, but only in\r
+ the macrose defined in this file. */\r
+\r
+#define UIP_DATA 1 /* Tells uIP that there is incoming\r
+ data in the uip_buf buffer. The\r
+ length of the data is stored in the\r
+ global variable uip_len. */\r
+#define UIP_TIMER 2 /* Tells uIP that the periodic timer\r
+ has fired. */\r
+#define UIP_POLL_REQUEST 3 /* Tells uIP that a connection should\r
+ be polled. */\r
+#define UIP_UDP_SEND_CONN 4 /* Tells uIP that a UDP datagram\r
+ should be constructed in the\r
+ uip_buf buffer. */\r
+#if UIP_UDP\r
+#define UIP_UDP_TIMER 5\r
+#endif /* UIP_UDP */\r
+\r
+/* The TCP states used in the uip_conn->tcpstateflags. */\r
+#define UIP_CLOSED 0\r
+#define UIP_SYN_RCVD 1\r
+#define UIP_SYN_SENT 2\r
+#define UIP_ESTABLISHED 3\r
+#define UIP_FIN_WAIT_1 4\r
+#define UIP_FIN_WAIT_2 5\r
+#define UIP_CLOSING 6\r
+#define UIP_TIME_WAIT 7\r
+#define UIP_LAST_ACK 8\r
+#define UIP_TS_MASK 15\r
+\r
+#define UIP_STOPPED 16\r
+\r
+/* The TCP and IP headers. */\r
+\r
+#ifdef __ICCARM__\r
+ #pragma pack(1)\r
+#endif\r
+\r
+struct uip_tcpip_hdr {\r
+#if UIP_CONF_IPV6\r
+ /* IPv6 header. */\r
+ u8_t vtc,\r
+ tcflow;\r
+ u16_t flow;\r
+ u8_t len[2];\r
+ u8_t proto, ttl;\r
+ uip_ip6addr_t srcipaddr, destipaddr;\r
+#else /* UIP_CONF_IPV6 */\r
+ /* IPv4 header. */\r
+ u8_t vhl,\r
+ tos,\r
+ len[2],\r
+ ipid[2],\r
+ ipoffset[2],\r
+ ttl,\r
+ proto;\r
+ u16_t ipchksum;\r
+ u16_t srcipaddr[2],\r
+ destipaddr[2];\r
+#endif /* UIP_CONF_IPV6 */\r
+\r
+ /* TCP header. */\r
+ u16_t srcport,\r
+ destport;\r
+ u8_t seqno[4],\r
+ ackno[4],\r
+ tcpoffset,\r
+ flags,\r
+ wnd[2];\r
+ u16_t tcpchksum;\r
+ u8_t urgp[2];\r
+ u8_t optdata[4];\r
+} PACK_STRUCT_END;\r
+\r
+#ifdef __ICCARM__\r
+ #pragma pack()\r
+#endif\r
+\r
+/* The ICMP and IP headers. */\r
+#ifdef __ICCARM__\r
+ #pragma pack(1)\r
+#endif\r
+\r
+struct uip_icmpip_hdr {\r
+#if UIP_CONF_IPV6\r
+ /* IPv6 header. */\r
+ u8_t vtc,\r
+ tcf;\r
+ u16_t flow;\r
+ u8_t len[2];\r
+ u8_t proto, ttl;\r
+ uip_ip6addr_t srcipaddr, destipaddr;\r
+#else /* UIP_CONF_IPV6 */\r
+ /* IPv4 header. */\r
+ u8_t vhl,\r
+ tos,\r
+ len[2],\r
+ ipid[2],\r
+ ipoffset[2],\r
+ ttl,\r
+ proto;\r
+ u16_t ipchksum;\r
+ u16_t srcipaddr[2],\r
+ destipaddr[2];\r
+#endif /* UIP_CONF_IPV6 */\r
+\r
+ /* ICMP (echo) header. */\r
+ u8_t type, icode;\r
+ u16_t icmpchksum;\r
+#if !UIP_CONF_IPV6\r
+ u16_t id, seqno;\r
+#else /* !UIP_CONF_IPV6 */\r
+ u8_t flags, reserved1, reserved2, reserved3;\r
+ u8_t icmp6data[16];\r
+ u8_t options[1];\r
+#endif /* !UIP_CONF_IPV6 */\r
+} PACK_STRUCT_END;\r
+\r
+#ifdef __ICCARM__\r
+ #pragma pack()\r
+#endif\r
+\r
+\r
+/* The UDP and IP headers. */\r
+#ifdef __ICCARM__\r
+ #pragma pack(1)\r
+#endif\r
+\r
+struct uip_udpip_hdr {\r
+#if UIP_CONF_IPV6\r
+ /* IPv6 header. */\r
+ u8_t vtc,\r
+ tcf;\r
+ u16_t flow;\r
+ u8_t len[2];\r
+ u8_t proto, ttl;\r
+ uip_ip6addr_t srcipaddr, destipaddr;\r
+#else /* UIP_CONF_IPV6 */\r
+ /* IP header. */\r
+ u8_t vhl,\r
+ tos,\r
+ len[2],\r
+ ipid[2],\r
+ ipoffset[2],\r
+ ttl,\r
+ proto;\r
+ u16_t ipchksum;\r
+ u16_t srcipaddr[2],\r
+ destipaddr[2];\r
+#endif /* UIP_CONF_IPV6 */\r
+\r
+ /* UDP header. */\r
+ u16_t srcport,\r
+ destport;\r
+ u16_t udplen;\r
+ u16_t udpchksum;\r
+} PACK_STRUCT_END;\r
+\r
+#ifdef __ICCARM__\r
+ #pragma pack()\r
+#endif\r
+\r
+\r
+\r
+/**\r
+ * The buffer size available for user data in the \ref uip_buf buffer.\r
+ *\r
+ * This macro holds the available size for user data in the \ref\r
+ * uip_buf buffer. The macro is intended to be used for checking\r
+ * bounds of available user data.\r
+ *\r
+ * Example:\r
+ \code\r
+ snprintf(uip_appdata, UIP_APPDATA_SIZE, "%u\n", i);\r
+ \endcode\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define UIP_APPDATA_SIZE (UIP_BUFSIZE - UIP_LLH_LEN - UIP_TCPIP_HLEN)\r
+\r
+\r
+#define UIP_PROTO_ICMP 1\r
+#define UIP_PROTO_TCP 6\r
+#define UIP_PROTO_UDP 17\r
+#define UIP_PROTO_ICMP6 58\r
+\r
+/* Header sizes. */\r
+#if UIP_CONF_IPV6\r
+#define UIP_IPH_LEN 40\r
+#else /* UIP_CONF_IPV6 */\r
+#define UIP_IPH_LEN 20 /* Size of IP header */\r
+#endif /* UIP_CONF_IPV6 */\r
+#define UIP_UDPH_LEN 8 /* Size of UDP header */\r
+#define UIP_TCPH_LEN 20 /* Size of TCP header */\r
+#define UIP_IPUDPH_LEN (UIP_UDPH_LEN + UIP_IPH_LEN) /* Size of IP +\r
+ UDP\r
+ header */\r
+#define UIP_IPTCPH_LEN (UIP_TCPH_LEN + UIP_IPH_LEN) /* Size of IP +\r
+ TCP\r
+ header */\r
+#define UIP_TCPIP_HLEN UIP_IPTCPH_LEN\r
+\r
+\r
+#if UIP_FIXEDADDR\r
+extern const uip_ipaddr_t uip_hostaddr, uip_netmask, uip_draddr;\r
+#else /* UIP_FIXEDADDR */\r
+extern uip_ipaddr_t uip_hostaddr, uip_netmask, uip_draddr;\r
+#endif /* UIP_FIXEDADDR */\r
+\r
+\r
+\r
+/**\r
+ * Representation of a 48-bit Ethernet address.\r
+ */\r
+#ifdef __ICCARM__\r
+ #pragma pack(1)\r
+#endif\r
+\r
+struct uip_eth_addr {\r
+ u8_t addr[6];\r
+} PACK_STRUCT_END;\r
+\r
+#ifdef __ICCARM__\r
+ #pragma pack()\r
+#endif\r
+\r
+/**\r
+ * Calculate the Internet checksum over a buffer.\r
+ *\r
+ * The Internet checksum is the one's complement of the one's\r
+ * complement sum of all 16-bit words in the buffer.\r
+ *\r
+ * See RFC1071.\r
+ *\r
+ * \param buf A pointer to the buffer over which the checksum is to be\r
+ * computed.\r
+ *\r
+ * \param len The length of the buffer over which the checksum is to\r
+ * be computed.\r
+ *\r
+ * \return The Internet checksum of the buffer.\r
+ */\r
+u16_t uip_chksum(u16_t *buf, u16_t len);\r
+\r
+/**\r
+ * Calculate the IP header checksum of the packet header in uip_buf.\r
+ *\r
+ * The IP header checksum is the Internet checksum of the 20 bytes of\r
+ * the IP header.\r
+ *\r
+ * \return The IP header checksum of the IP header in the uip_buf\r
+ * buffer.\r
+ */\r
+u16_t uip_ipchksum(void);\r
+\r
+/**\r
+ * Calculate the TCP checksum of the packet in uip_buf and uip_appdata.\r
+ *\r
+ * The TCP checksum is the Internet checksum of data contents of the\r
+ * TCP segment, and a pseudo-header as defined in RFC793.\r
+ *\r
+ * \return The TCP checksum of the TCP segment in uip_buf and pointed\r
+ * to by uip_appdata.\r
+ */\r
+u16_t uip_tcpchksum(void);\r
+\r
+/**\r
+ * Calculate the UDP checksum of the packet in uip_buf and uip_appdata.\r
+ *\r
+ * The UDP checksum is the Internet checksum of data contents of the\r
+ * UDP segment, and a pseudo-header as defined in RFC768.\r
+ *\r
+ * \return The UDP checksum of the UDP segment in uip_buf and pointed\r
+ * to by uip_appdata.\r
+ */\r
+u16_t uip_udpchksum(void);\r
+\r
+\r
+#endif /* __UIP_H__ */\r
+\r
+\r
+/** @} */\r
--- /dev/null
+/**\r
+ * \addtogroup uip\r
+ * {@\r
+ */\r
+\r
+/**\r
+ * \defgroup uiparch Architecture specific uIP functions\r
+ * @{\r
+ *\r
+ * The functions in the architecture specific module implement the IP\r
+ * check sum and 32-bit additions.\r
+ *\r
+ * The IP checksum calculation is the most computationally expensive\r
+ * operation in the TCP/IP stack and it therefore pays off to\r
+ * implement this in efficient assembler. The purpose of the uip-arch\r
+ * module is to let the checksum functions to be implemented in\r
+ * architecture specific assembler.\r
+ *\r
+ */\r
+\r
+/**\r
+ * \file\r
+ * Declarations of architecture specific functions.\r
+ * \author Adam Dunkels <adam@dunkels.com>\r
+ */\r
+\r
+/*\r
+ * Copyright (c) 2001, Adam Dunkels.\r
+ * All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ * 3. The name of the author may not be used to endorse or promote\r
+ * products derived from this software without specific prior\r
+ * written permission.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS\r
+ * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED\r
+ * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY\r
+ * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE\r
+ * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS\r
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\r
+ * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING\r
+ * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS\r
+ * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\r
+ *\r
+ * This file is part of the uIP TCP/IP stack.\r
+ *\r
+ * $Id: uip_arch.h,v 1.2 2006/06/07 09:15:19 adam Exp $\r
+ *\r
+ */\r
+\r
+#ifndef __UIP_ARCH_H__\r
+#define __UIP_ARCH_H__\r
+\r
+#include "uip.h"\r
+\r
+/**\r
+ * Carry out a 32-bit addition.\r
+ *\r
+ * Because not all architectures for which uIP is intended has native\r
+ * 32-bit arithmetic, uIP uses an external C function for doing the\r
+ * required 32-bit additions in the TCP protocol processing. This\r
+ * function should add the two arguments and place the result in the\r
+ * global variable uip_acc32.\r
+ *\r
+ * \note The 32-bit integer pointed to by the op32 parameter and the\r
+ * result in the uip_acc32 variable are in network byte order (big\r
+ * endian).\r
+ *\r
+ * \param op32 A pointer to a 4-byte array representing a 32-bit\r
+ * integer in network byte order (big endian).\r
+ *\r
+ * \param op16 A 16-bit integer in host byte order.\r
+ */\r
+void uip_add32(u8_t *op32, u16_t op16);\r
+\r
+/**\r
+ * Calculate the Internet checksum over a buffer.\r
+ *\r
+ * The Internet checksum is the one's complement of the one's\r
+ * complement sum of all 16-bit words in the buffer.\r
+ *\r
+ * See RFC1071.\r
+ *\r
+ * \note This function is not called in the current version of uIP,\r
+ * but future versions might make use of it.\r
+ *\r
+ * \param buf A pointer to the buffer over which the checksum is to be\r
+ * computed.\r
+ *\r
+ * \param len The length of the buffer over which the checksum is to\r
+ * be computed.\r
+ *\r
+ * \return The Internet checksum of the buffer.\r
+ */\r
+u16_t uip_chksum(u16_t *buf, u16_t len);\r
+\r
+/**\r
+ * Calculate the IP header checksum of the packet header in uip_buf.\r
+ *\r
+ * The IP header checksum is the Internet checksum of the 20 bytes of\r
+ * the IP header.\r
+ *\r
+ * \return The IP header checksum of the IP header in the uip_buf\r
+ * buffer.\r
+ */\r
+u16_t uip_ipchksum(void);\r
+\r
+/**\r
+ * Calculate the TCP checksum of the packet in uip_buf and uip_appdata.\r
+ *\r
+ * The TCP checksum is the Internet checksum of data contents of the\r
+ * TCP segment, and a pseudo-header as defined in RFC793.\r
+ *\r
+ * \note The uip_appdata pointer that points to the packet data may\r
+ * point anywhere in memory, so it is not possible to simply calculate\r
+ * the Internet checksum of the contents of the uip_buf buffer.\r
+ *\r
+ * \return The TCP checksum of the TCP segment in uip_buf and pointed\r
+ * to by uip_appdata.\r
+ */\r
+u16_t uip_tcpchksum(void);\r
+\r
+u16_t uip_udpchksum(void);\r
+\r
+/** @} */\r
+/** @} */\r
+\r
+#endif /* __UIP_ARCH_H__ */\r
--- /dev/null
+/**\r
+ * \addtogroup uip\r
+ * @{\r
+ */\r
+\r
+/**\r
+ * \defgroup uiparp uIP Address Resolution Protocol\r
+ * @{\r
+ *\r
+ * The Address Resolution Protocol ARP is used for mapping between IP\r
+ * addresses and link level addresses such as the Ethernet MAC\r
+ * addresses. ARP uses broadcast queries to ask for the link level\r
+ * address of a known IP address and the host which is configured with\r
+ * the IP address for which the query was meant, will respond with its\r
+ * link level address.\r
+ *\r
+ * \note This ARP implementation only supports Ethernet.\r
+ */\r
+\r
+/**\r
+ * \file\r
+ * Implementation of the ARP Address Resolution Protocol.\r
+ * \author Adam Dunkels <adam@dunkels.com>\r
+ *\r
+ */\r
+\r
+/*\r
+ * Copyright (c) 2001-2003, Adam Dunkels.\r
+ * All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ * 3. The name of the author may not be used to endorse or promote\r
+ * products derived from this software without specific prior\r
+ * written permission.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS\r
+ * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED\r
+ * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY\r
+ * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE\r
+ * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS\r
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\r
+ * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING\r
+ * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS\r
+ * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\r
+ *\r
+ * This file is part of the uIP TCP/IP stack.\r
+ *\r
+ * $Id: uip_arp.c,v 1.8 2006/06/02 23:36:21 adam Exp $\r
+ *\r
+ */\r
+\r
+\r
+#include "uip_arp.h"\r
+\r
+#include <string.h>\r
+\r
+#ifdef __ICCARM__\r
+ #pragma pack(1)\r
+#endif\r
+\r
+struct arp_hdr {\r
+ struct uip_eth_hdr ethhdr;\r
+ u16_t hwtype;\r
+ u16_t protocol;\r
+ u8_t hwlen;\r
+ u8_t protolen;\r
+ u16_t opcode;\r
+ struct uip_eth_addr shwaddr;\r
+ u16_t sipaddr[2];\r
+ struct uip_eth_addr dhwaddr;\r
+ u16_t dipaddr[2];\r
+} PACK_STRUCT_END;\r
+\r
+#ifdef __ICCARM__\r
+ #pragma pack()\r
+#endif\r
+\r
+#ifdef __ICCARM__\r
+ #pragma pack(1)\r
+#endif\r
+\r
+struct ethip_hdr {\r
+ struct uip_eth_hdr ethhdr;\r
+ /* IP header. */\r
+ u8_t vhl,\r
+ tos,\r
+ len[2],\r
+ ipid[2],\r
+ ipoffset[2],\r
+ ttl,\r
+ proto;\r
+ u16_t ipchksum;\r
+ u16_t srcipaddr[2],\r
+ destipaddr[2];\r
+} PACK_STRUCT_END;\r
+\r
+#ifdef __ICCARM__\r
+ #pragma pack()\r
+#endif\r
+\r
+#define ARP_REQUEST 1\r
+#define ARP_REPLY 2\r
+\r
+#define ARP_HWTYPE_ETH 1\r
+\r
+struct arp_entry {\r
+ u16_t ipaddr[2];\r
+ struct uip_eth_addr ethaddr;\r
+ u8_t time;\r
+};\r
+\r
+static const struct uip_eth_addr broadcast_ethaddr =\r
+ {{0xff,0xff,0xff,0xff,0xff,0xff}};\r
+static const u16_t broadcast_ipaddr[2] = {0xffff,0xffff};\r
+\r
+static struct arp_entry arp_table[UIP_ARPTAB_SIZE];\r
+static u16_t ipaddr[2];\r
+static u8_t i, c;\r
+\r
+static u8_t arptime;\r
+static u8_t tmpage;\r
+\r
+#define BUF ((struct arp_hdr *)&uip_buf[0])\r
+#define IPBUF ((struct ethip_hdr *)&uip_buf[0])\r
+/*-----------------------------------------------------------------------------------*/\r
+/**\r
+ * Initialize the ARP module.\r
+ *\r
+ */\r
+/*-----------------------------------------------------------------------------------*/\r
+void\r
+uip_arp_init(void)\r
+{\r
+ for(i = 0; i < UIP_ARPTAB_SIZE; ++i) {\r
+ memset(arp_table[i].ipaddr, 0, 4);\r
+ }\r
+}\r
+/*-----------------------------------------------------------------------------------*/\r
+/**\r
+ * Periodic ARP processing function.\r
+ *\r
+ * This function performs periodic timer processing in the ARP module\r
+ * and should be called at regular intervals. The recommended interval\r
+ * is 10 seconds between the calls.\r
+ *\r
+ */\r
+/*-----------------------------------------------------------------------------------*/\r
+void\r
+uip_arp_timer(void)\r
+{\r
+ struct arp_entry *tabptr;\r
+\r
+ ++arptime;\r
+ for(i = 0; i < UIP_ARPTAB_SIZE; ++i) {\r
+ tabptr = &arp_table[i];\r
+ if((tabptr->ipaddr[0] | tabptr->ipaddr[1]) != 0 &&\r
+ arptime - tabptr->time >= UIP_ARP_MAXAGE) {\r
+ memset(tabptr->ipaddr, 0, 4);\r
+ }\r
+ }\r
+\r
+}\r
+/*-----------------------------------------------------------------------------------*/\r
+static void\r
+uip_arp_update(u16_t *ipaddr, struct uip_eth_addr *ethaddr)\r
+{\r
+ register struct arp_entry *tabptr;\r
+ /* Walk through the ARP mapping table and try to find an entry to\r
+ update. If none is found, the IP -> MAC address mapping is\r
+ inserted in the ARP table. */\r
+ for(i = 0; i < UIP_ARPTAB_SIZE; ++i) {\r
+\r
+ tabptr = &arp_table[i];\r
+ /* Only check those entries that are actually in use. */\r
+ if(tabptr->ipaddr[0] != 0 &&\r
+ tabptr->ipaddr[1] != 0) {\r
+\r
+ /* Check if the source IP address of the incoming packet matches\r
+ the IP address in this ARP table entry. */\r
+ if(ipaddr[0] == tabptr->ipaddr[0] &&\r
+ ipaddr[1] == tabptr->ipaddr[1]) {\r
+ \r
+ /* An old entry found, update this and return. */\r
+ memcpy(tabptr->ethaddr.addr, ethaddr->addr, 6);\r
+ tabptr->time = arptime;\r
+\r
+ return;\r
+ }\r
+ }\r
+ }\r
+\r
+ /* If we get here, no existing ARP table entry was found, so we\r
+ create one. */\r
+\r
+ /* First, we try to find an unused entry in the ARP table. */\r
+ for(i = 0; i < UIP_ARPTAB_SIZE; ++i) {\r
+ tabptr = &arp_table[i];\r
+ if(tabptr->ipaddr[0] == 0 &&\r
+ tabptr->ipaddr[1] == 0) {\r
+ break;\r
+ }\r
+ }\r
+\r
+ /* If no unused entry is found, we try to find the oldest entry and\r
+ throw it away. */\r
+ if(i == UIP_ARPTAB_SIZE) {\r
+ tmpage = 0;\r
+ c = 0;\r
+ for(i = 0; i < UIP_ARPTAB_SIZE; ++i) {\r
+ tabptr = &arp_table[i];\r
+ if(arptime - tabptr->time > tmpage) {\r
+ tmpage = arptime - tabptr->time;\r
+ c = i;\r
+ }\r
+ }\r
+ i = c;\r
+ tabptr = &arp_table[i];\r
+ }\r
+\r
+ /* Now, i is the ARP table entry which we will fill with the new\r
+ information. */\r
+ memcpy(tabptr->ipaddr, ipaddr, 4);\r
+ memcpy(tabptr->ethaddr.addr, ethaddr->addr, 6);\r
+ tabptr->time = arptime;\r
+}\r
+/*-----------------------------------------------------------------------------------*/\r
+/**\r
+ * ARP processing for incoming IP packets\r
+ *\r
+ * This function should be called by the device driver when an IP\r
+ * packet has been received. The function will check if the address is\r
+ * in the ARP cache, and if so the ARP cache entry will be\r
+ * refreshed. If no ARP cache entry was found, a new one is created.\r
+ *\r
+ * This function expects an IP packet with a prepended Ethernet header\r
+ * in the uip_buf[] buffer, and the length of the packet in the global\r
+ * variable uip_len.\r
+ */\r
+/*-----------------------------------------------------------------------------------*/\r
+#if 1\r
+void\r
+uip_arp_ipin(void)\r
+{\r
+ uip_len -= sizeof(struct uip_eth_hdr);\r
+ \r
+ /* Only insert/update an entry if the source IP address of the\r
+ incoming IP packet comes from a host on the local network. */\r
+ if((IPBUF->srcipaddr[0] & uip_netmask[0]) !=\r
+ (uip_hostaddr[0] & uip_netmask[0])) {\r
+ return;\r
+ }\r
+ if((IPBUF->srcipaddr[1] & uip_netmask[1]) !=\r
+ (uip_hostaddr[1] & uip_netmask[1])) {\r
+ return;\r
+ }\r
+ uip_arp_update(IPBUF->srcipaddr, &(IPBUF->ethhdr.src));\r
+\r
+ return;\r
+}\r
+#endif /* 0 */\r
+/*-----------------------------------------------------------------------------------*/\r
+/**\r
+ * ARP processing for incoming ARP packets.\r
+ *\r
+ * This function should be called by the device driver when an ARP\r
+ * packet has been received. The function will act differently\r
+ * depending on the ARP packet type: if it is a reply for a request\r
+ * that we previously sent out, the ARP cache will be filled in with\r
+ * the values from the ARP reply. If the incoming ARP packet is an ARP\r
+ * request for our IP address, an ARP reply packet is created and put\r
+ * into the uip_buf[] buffer.\r
+ *\r
+ * When the function returns, the value of the global variable uip_len\r
+ * indicates whether the device driver should send out a packet or\r
+ * not. If uip_len is zero, no packet should be sent. If uip_len is\r
+ * non-zero, it contains the length of the outbound packet that is\r
+ * present in the uip_buf[] buffer.\r
+ *\r
+ * This function expects an ARP packet with a prepended Ethernet\r
+ * header in the uip_buf[] buffer, and the length of the packet in the\r
+ * global variable uip_len.\r
+ */\r
+/*-----------------------------------------------------------------------------------*/\r
+void\r
+uip_arp_arpin(void)\r
+{\r
+\r
+ if(uip_len < sizeof(struct arp_hdr)) {\r
+ uip_len = 0;\r
+ return;\r
+ }\r
+ uip_len = 0;\r
+\r
+ switch(BUF->opcode) {\r
+ case HTONS(ARP_REQUEST):\r
+ /* ARP request. If it asked for our address, we send out a\r
+ reply. */\r
+ if(uip_ipaddr_cmp(BUF->dipaddr, uip_hostaddr)) {\r
+ /* First, we register the one who made the request in our ARP\r
+ table, since it is likely that we will do more communication\r
+ with this host in the future. */\r
+ uip_arp_update(BUF->sipaddr, &BUF->shwaddr);\r
+\r
+ /* The reply opcode is 2. */\r
+ BUF->opcode = HTONS(2);\r
+\r
+ memcpy(BUF->dhwaddr.addr, BUF->shwaddr.addr, 6);\r
+ memcpy(BUF->shwaddr.addr, uip_ethaddr.addr, 6);\r
+ memcpy(BUF->ethhdr.src.addr, uip_ethaddr.addr, 6);\r
+ memcpy(BUF->ethhdr.dest.addr, BUF->dhwaddr.addr, 6);\r
+\r
+ BUF->dipaddr[0] = BUF->sipaddr[0];\r
+ BUF->dipaddr[1] = BUF->sipaddr[1];\r
+ BUF->sipaddr[0] = uip_hostaddr[0];\r
+ BUF->sipaddr[1] = uip_hostaddr[1];\r
+\r
+ BUF->ethhdr.type = HTONS(UIP_ETHTYPE_ARP);\r
+ uip_len = sizeof(struct arp_hdr);\r
+ }\r
+ break;\r
+ case HTONS(ARP_REPLY):\r
+ /* ARP reply. We insert or update the ARP table if it was meant\r
+ for us. */\r
+ if(uip_ipaddr_cmp(BUF->dipaddr, uip_hostaddr)) {\r
+ uip_arp_update(BUF->sipaddr, &BUF->shwaddr);\r
+ }\r
+ break;\r
+ }\r
+\r
+ return;\r
+}\r
+/*-----------------------------------------------------------------------------------*/\r
+/**\r
+ * Prepend Ethernet header to an outbound IP packet and see if we need\r
+ * to send out an ARP request.\r
+ *\r
+ * This function should be called before sending out an IP packet. The\r
+ * function checks the destination IP address of the IP packet to see\r
+ * what Ethernet MAC address that should be used as a destination MAC\r
+ * address on the Ethernet.\r
+ *\r
+ * If the destination IP address is in the local network (determined\r
+ * by logical ANDing of netmask and our IP address), the function\r
+ * checks the ARP cache to see if an entry for the destination IP\r
+ * address is found. If so, an Ethernet header is prepended and the\r
+ * function returns. If no ARP cache entry is found for the\r
+ * destination IP address, the packet in the uip_buf[] is replaced by\r
+ * an ARP request packet for the IP address. The IP packet is dropped\r
+ * and it is assumed that they higher level protocols (e.g., TCP)\r
+ * eventually will retransmit the dropped packet.\r
+ *\r
+ * If the destination IP address is not on the local network, the IP\r
+ * address of the default router is used instead.\r
+ *\r
+ * When the function returns, a packet is present in the uip_buf[]\r
+ * buffer, and the length of the packet is in the global variable\r
+ * uip_len.\r
+ */\r
+/*-----------------------------------------------------------------------------------*/\r
+void\r
+uip_arp_out(void)\r
+{\r
+ struct arp_entry *tabptr;\r
+\r
+ /* Find the destination IP address in the ARP table and construct\r
+ the Ethernet header. If the destination IP addres isn't on the\r
+ local network, we use the default router's IP address instead.\r
+\r
+ If not ARP table entry is found, we overwrite the original IP\r
+ packet with an ARP request for the IP address. */\r
+\r
+ /* First check if destination is a local broadcast. */\r
+ if(uip_ipaddr_cmp(IPBUF->destipaddr, broadcast_ipaddr)) {\r
+ memcpy(IPBUF->ethhdr.dest.addr, broadcast_ethaddr.addr, 6);\r
+ } else {\r
+ /* Check if the destination address is on the local network. */\r
+ if(!uip_ipaddr_maskcmp(IPBUF->destipaddr, uip_hostaddr, uip_netmask)) {\r
+ /* Destination address was not on the local network, so we need to\r
+ use the default router's IP address instead of the destination\r
+ address when determining the MAC address. */\r
+ uip_ipaddr_copy(ipaddr, uip_draddr);\r
+ } else {\r
+ /* Else, we use the destination IP address. */\r
+ uip_ipaddr_copy(ipaddr, IPBUF->destipaddr);\r
+ }\r
+\r
+ for(i = 0; i < UIP_ARPTAB_SIZE; ++i) {\r
+ tabptr = &arp_table[i];\r
+ if(uip_ipaddr_cmp(ipaddr, tabptr->ipaddr)) {\r
+ break;\r
+ }\r
+ }\r
+\r
+ if(i == UIP_ARPTAB_SIZE) {\r
+ /* The destination address was not in our ARP table, so we\r
+ overwrite the IP packet with an ARP request. */\r
+\r
+ memset(BUF->ethhdr.dest.addr, 0xff, 6);\r
+ memset(BUF->dhwaddr.addr, 0x00, 6);\r
+ memcpy(BUF->ethhdr.src.addr, uip_ethaddr.addr, 6);\r
+ memcpy(BUF->shwaddr.addr, uip_ethaddr.addr, 6);\r
+\r
+ uip_ipaddr_copy(BUF->dipaddr, ipaddr);\r
+ uip_ipaddr_copy(BUF->sipaddr, uip_hostaddr);\r
+ BUF->opcode = HTONS(ARP_REQUEST); /* ARP request. */\r
+ BUF->hwtype = HTONS(ARP_HWTYPE_ETH);\r
+ BUF->protocol = HTONS(UIP_ETHTYPE_IP);\r
+ BUF->hwlen = 6;\r
+ BUF->protolen = 4;\r
+ BUF->ethhdr.type = HTONS(UIP_ETHTYPE_ARP);\r
+\r
+ uip_appdata = &uip_buf[UIP_TCPIP_HLEN + UIP_LLH_LEN];\r
+\r
+ uip_len = sizeof(struct arp_hdr);\r
+ return;\r
+ }\r
+\r
+ /* Build an ethernet header. */\r
+ memcpy(IPBUF->ethhdr.dest.addr, tabptr->ethaddr.addr, 6);\r
+ }\r
+ memcpy(IPBUF->ethhdr.src.addr, uip_ethaddr.addr, 6);\r
+\r
+ IPBUF->ethhdr.type = HTONS(UIP_ETHTYPE_IP);\r
+\r
+ uip_len += sizeof(struct uip_eth_hdr);\r
+}\r
+/*-----------------------------------------------------------------------------------*/\r
+\r
+/** @} */\r
+/** @} */\r
--- /dev/null
+/**\r
+ * \addtogroup uip\r
+ * @{\r
+ */\r
+\r
+/**\r
+ * \addtogroup uiparp\r
+ * @{\r
+ */\r
+\r
+/**\r
+ * \file\r
+ * Macros and definitions for the ARP module.\r
+ * \author Adam Dunkels <adam@dunkels.com>\r
+ */\r
+\r
+\r
+/*\r
+ * Copyright (c) 2001-2003, Adam Dunkels.\r
+ * All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ * 3. The name of the author may not be used to endorse or promote\r
+ * products derived from this software without specific prior\r
+ * written permission.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS\r
+ * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED\r
+ * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY\r
+ * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE\r
+ * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS\r
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\r
+ * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING\r
+ * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS\r
+ * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\r
+ *\r
+ * This file is part of the uIP TCP/IP stack.\r
+ *\r
+ * $Id: uip_arp.h,v 1.5 2006/06/11 21:46:39 adam Exp $\r
+ *\r
+ */\r
+\r
+#ifndef __UIP_ARP_H__\r
+#define __UIP_ARP_H__\r
+\r
+#include "uip.h"\r
+\r
+\r
+extern struct uip_eth_addr uip_ethaddr;\r
+\r
+/**\r
+ * The Ethernet header.\r
+ */\r
+#ifdef __ICCARM__\r
+ #pragma pack(1)\r
+#endif\r
+\r
+struct uip_eth_hdr {\r
+ struct uip_eth_addr dest;\r
+ struct uip_eth_addr src;\r
+ u16_t type;\r
+}PACK_STRUCT_END;\r
+\r
+#ifdef __ICCARM__\r
+ #pragma pack()\r
+#endif\r
+\r
+#define UIP_ETHTYPE_ARP 0x0806\r
+#define UIP_ETHTYPE_IP 0x0800\r
+#define UIP_ETHTYPE_IP6 0x86dd\r
+\r
+\r
+/* The uip_arp_init() function must be called before any of the other\r
+ ARP functions. */\r
+void uip_arp_init(void);\r
+\r
+/* The uip_arp_ipin() function should be called whenever an IP packet\r
+ arrives from the Ethernet. This function refreshes the ARP table or\r
+ inserts a new mapping if none exists. The function assumes that an\r
+ IP packet with an Ethernet header is present in the uip_buf buffer\r
+ and that the length of the packet is in the uip_len variable. */\r
+void uip_arp_ipin(void);\r
+//#define uip_arp_ipin()\r
+\r
+/* The uip_arp_arpin() should be called when an ARP packet is received\r
+ by the Ethernet driver. This function also assumes that the\r
+ Ethernet frame is present in the uip_buf buffer. When the\r
+ uip_arp_arpin() function returns, the contents of the uip_buf\r
+ buffer should be sent out on the Ethernet if the uip_len variable\r
+ is > 0. */\r
+void uip_arp_arpin(void);\r
+\r
+/* The uip_arp_out() function should be called when an IP packet\r
+ should be sent out on the Ethernet. This function creates an\r
+ Ethernet header before the IP header in the uip_buf buffer. The\r
+ Ethernet header will have the correct Ethernet MAC destination\r
+ address filled in if an ARP table entry for the destination IP\r
+ address (or the IP address of the default router) is present. If no\r
+ such table entry is found, the IP packet is overwritten with an ARP\r
+ request and we rely on TCP to retransmit the packet that was\r
+ overwritten. In any case, the uip_len variable holds the length of\r
+ the Ethernet frame that should be transmitted. */\r
+void uip_arp_out(void);\r
+\r
+/* The uip_arp_timer() function should be called every ten seconds. It\r
+ is responsible for flushing old entries in the ARP table. */\r
+void uip_arp_timer(void);\r
+\r
+/** @} */\r
+\r
+/**\r
+ * \addtogroup uipconffunc\r
+ * @{\r
+ */\r
+\r
+\r
+/**\r
+ * Specifiy the Ethernet MAC address.\r
+ *\r
+ * The ARP code needs to know the MAC address of the Ethernet card in\r
+ * order to be able to respond to ARP queries and to generate working\r
+ * Ethernet headers.\r
+ *\r
+ * \note This macro only specifies the Ethernet MAC address to the ARP\r
+ * code. It cannot be used to change the MAC address of the Ethernet\r
+ * card.\r
+ *\r
+ * \param eaddr A pointer to a struct uip_eth_addr containing the\r
+ * Ethernet MAC address of the Ethernet card.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define uip_setethaddr(eaddr) do {uip_ethaddr.addr[0] = eaddr.addr[0]; \\r
+ uip_ethaddr.addr[1] = eaddr.addr[1];\\r
+ uip_ethaddr.addr[2] = eaddr.addr[2];\\r
+ uip_ethaddr.addr[3] = eaddr.addr[3];\\r
+ uip_ethaddr.addr[4] = eaddr.addr[4];\\r
+ uip_ethaddr.addr[5] = eaddr.addr[5];} while(0)\r
+\r
+/** @} */\r
+/** @} */\r
+\r
+#endif /* __UIP_ARP_H__ */\r
--- /dev/null
+/**\r
+ * \defgroup timer Timer library\r
+ *\r
+ * The timer library provides functions for setting, resetting and\r
+ * restarting timers, and for checking if a timer has expired. An\r
+ * application must "manually" check if its timers have expired; this\r
+ * is not done automatically.\r
+ *\r
+ * A timer is declared as a \c struct \c timer and all access to the\r
+ * timer is made by a pointer to the declared timer.\r
+ *\r
+ * \note The timer library uses the \ref clock "Clock library" to\r
+ * measure time. Intervals should be specified in the format used by\r
+ * the clock library.\r
+ *\r
+ * @{\r
+ */\r
+\r
+\r
+/**\r
+ * \file\r
+ * Timer library header file.\r
+ * \author\r
+ * Adam Dunkels <adam@sics.se>\r
+ */\r
+\r
+/*\r
+ * Copyright (c) 2004, Swedish Institute of Computer Science.\r
+ * All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ * 3. Neither the name of the Institute nor the names of its contributors\r
+ * may be used to endorse or promote products derived from this software\r
+ * without specific prior written permission.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND\r
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\r
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE\r
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS\r
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\r
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT\r
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY\r
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF\r
+ * SUCH DAMAGE.\r
+ *\r
+ * This file is part of the uIP TCP/IP stack\r
+ *\r
+ * Author: Adam Dunkels <adam@sics.se>\r
+ *\r
+ * $Id: timer.h,v 1.3 2006/06/11 21:46:39 adam Exp $\r
+ */\r
+#ifndef __TIMER_H__\r
+#define __TIMER_H__\r
+\r
+#include "clock.h"\r
+\r
+/**\r
+ * A timer.\r
+ *\r
+ * This structure is used for declaring a timer. The timer must be set\r
+ * with timer_set() before it can be used.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+struct timer {\r
+ clock_time_t start;\r
+ clock_time_t interval;\r
+};\r
+\r
+void timer_set(struct timer *t, clock_time_t interval);\r
+void timer_reset(struct timer *t);\r
+void timer_restart(struct timer *t);\r
+int timer_expired(struct timer *t);\r
+\r
+#endif /* __TIMER_H__ */\r
+\r
+/** @} */\r
--- /dev/null
+/*\r
+ * Copyright (c) 2004, Adam Dunkels and the Swedish Institute of\r
+ * Computer Science.\r
+ * All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ * 3. The name of the author may not be used to endorse or promote\r
+ * products derived from this software without specific prior\r
+ * written permission.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS\r
+ * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED\r
+ * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY\r
+ * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE\r
+ * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS\r
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\r
+ * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING\r
+ * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS\r
+ * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\r
+ *\r
+ * This file is part of the uIP TCP/IP stack\r
+ *\r
+ * $Id: uiplib.c,v 1.2 2006/06/12 08:00:31 adam Exp $\r
+ *\r
+ */\r
+\r
+\r
+#include "uip.h"\r
+#include "uiplib.h"\r
+\r
+\r
+/*-----------------------------------------------------------------------------------*/\r
+unsigned char\r
+uiplib_ipaddrconv(char *addrstr, unsigned char *ipaddr)\r
+{\r
+ unsigned char tmp;\r
+ char c;\r
+ unsigned char i, j;\r
+\r
+ tmp = 0;\r
+ \r
+ for(i = 0; i < 4; ++i) {\r
+ j = 0;\r
+ do {\r
+ c = *addrstr;\r
+ ++j;\r
+ if(j > 4) {\r
+ return 0;\r
+ }\r
+ if(c == '.' || c == 0) {\r
+ *ipaddr = tmp;\r
+ ++ipaddr;\r
+ tmp = 0;\r
+ } else if(c >= '0' && c <= '9') {\r
+ tmp = (tmp * 10) + (c - '0');\r
+ } else {\r
+ return 0;\r
+ }\r
+ ++addrstr;\r
+ } while(c != '.' && c != 0);\r
+ }\r
+ return 1;\r
+}\r
+\r
+/*-----------------------------------------------------------------------------------*/\r
--- /dev/null
+/**\r
+ * \file\r
+ * Various uIP library functions.\r
+ * \author\r
+ * Adam Dunkels <adam@sics.se>\r
+ *\r
+ */\r
+\r
+/*\r
+ * Copyright (c) 2002, Adam Dunkels.\r
+ * All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above\r
+ * copyright notice, this list of conditions and the following\r
+ * disclaimer in the documentation and/or other materials provided\r
+ * with the distribution.\r
+ * 3. The name of the author may not be used to endorse or promote\r
+ * products derived from this software without specific prior\r
+ * written permission.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS\r
+ * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED\r
+ * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY\r
+ * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE\r
+ * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS\r
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\r
+ * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING\r
+ * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS\r
+ * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\r
+ *\r
+ * This file is part of the uIP TCP/IP stack\r
+ *\r
+ * $Id: uiplib.h,v 1.1 2006/06/07 09:15:19 adam Exp $\r
+ *\r
+ */\r
+#ifndef __UIPLIB_H__\r
+#define __UIPLIB_H__\r
+\r
+/**\r
+ * \addtogroup uipconvfunc\r
+ * @{\r
+ */\r
+\r
+/**\r
+ * Convert a textual representation of an IP address to a numerical representation.\r
+ *\r
+ * This function takes a textual representation of an IP address in\r
+ * the form a.b.c.d and converts it into a 4-byte array that can be\r
+ * used by other uIP functions.\r
+ *\r
+ * \param addrstr A pointer to a string containing the IP address in\r
+ * textual form.\r
+ *\r
+ * \param addr A pointer to a 4-byte array that will be filled in with\r
+ * the numerical representation of the address.\r
+ *\r
+ * \retval 0 If the IP address could not be parsed.\r
+ * \retval Non-zero If the IP address was parsed.\r
+ */\r
+unsigned char uiplib_ipaddrconv(char *addrstr, unsigned char *addr);\r
+\r
+/** @} */\r
+\r
+#endif /* __UIPLIB_H__ */\r
--- /dev/null
+/**\r
+ * \defgroup uipopt Configuration options for uIP\r
+ * @{\r
+ *\r
+ * uIP is configured using the per-project configuration file\r
+ * uipopt.h. This file contains all compile-time options for uIP and\r
+ * should be tweaked to match each specific project. The uIP\r
+ * distribution contains a documented example "uipopt.h" that can be\r
+ * copied and modified for each project.\r
+ *\r
+ * \note Most of the configuration options in the uipopt.h should not\r
+ * be changed, but rather the per-project uip-conf.h file.\r
+ */\r
+\r
+/**\r
+ * \file\r
+ * Configuration options for uIP.\r
+ * \author Adam Dunkels <adam@dunkels.com>\r
+ *\r
+ * This file is used for tweaking various configuration options for\r
+ * uIP. You should make a copy of this file into one of your project's\r
+ * directories instead of editing this example "uipopt.h" file that\r
+ * comes with the uIP distribution.\r
+ */\r
+\r
+/*\r
+ * Copyright (c) 2001-2003, Adam Dunkels.\r
+ * All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ * 3. The name of the author may not be used to endorse or promote\r
+ * products derived from this software without specific prior\r
+ * written permission.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS\r
+ * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED\r
+ * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY\r
+ * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE\r
+ * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS\r
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\r
+ * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING\r
+ * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS\r
+ * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\r
+ *\r
+ * This file is part of the uIP TCP/IP stack.\r
+ *\r
+ * $Id: uipopt.h,v 1.4 2006/06/12 08:00:31 adam Exp $\r
+ *\r
+ */\r
+\r
+#ifndef __UIPOPT_H__\r
+#define __UIPOPT_H__\r
+\r
+#ifndef UIP_LITTLE_ENDIAN\r
+#define UIP_LITTLE_ENDIAN 3412\r
+#endif /* UIP_LITTLE_ENDIAN */\r
+#ifndef UIP_BIG_ENDIAN\r
+#define UIP_BIG_ENDIAN 1234\r
+#endif /* UIP_BIG_ENDIAN */\r
+\r
+#include "uip-conf.h"\r
+\r
+/*------------------------------------------------------------------------------*/\r
+\r
+/**\r
+ * \name Static configuration options\r
+ * @{\r
+ *\r
+ * These configuration options can be used for setting the IP address\r
+ * settings statically, but only if UIP_FIXEDADDR is set to 1. The\r
+ * configuration options for a specific node includes IP address,\r
+ * netmask and default router as well as the Ethernet address. The\r
+ * netmask, default router and Ethernet address are appliciable only\r
+ * if uIP should be run over Ethernet.\r
+ *\r
+ * All of these should be changed to suit your project.\r
+*/\r
+\r
+/**\r
+ * Determines if uIP should use a fixed IP address or not.\r
+ *\r
+ * If uIP should use a fixed IP address, the settings are set in the\r
+ * uipopt.h file. If not, the macros uip_sethostaddr(),\r
+ * uip_setdraddr() and uip_setnetmask() should be used instead.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define UIP_FIXEDADDR 0\r
+\r
+/**\r
+ * Ping IP address asignment.\r
+ *\r
+ * uIP uses a "ping" packets for setting its own IP address if this\r
+ * option is set. If so, uIP will start with an empty IP address and\r
+ * the destination IP address of the first incoming "ping" (ICMP echo)\r
+ * packet will be used for setting the hosts IP address.\r
+ *\r
+ * \note This works only if UIP_FIXEDADDR is 0.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#ifdef UIP_CONF_PINGADDRCONF\r
+#define UIP_PINGADDRCONF UIP_CONF_PINGADDRCONF\r
+#else /* UIP_CONF_PINGADDRCONF */\r
+#define UIP_PINGADDRCONF 0\r
+#endif /* UIP_CONF_PINGADDRCONF */\r
+\r
+\r
+/**\r
+ * Specifies if the uIP ARP module should be compiled with a fixed\r
+ * Ethernet MAC address or not.\r
+ *\r
+ * If this configuration option is 0, the macro uip_setethaddr() can\r
+ * be used to specify the Ethernet address at run-time.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define UIP_FIXEDETHADDR 0\r
+\r
+/** @} */\r
+/*------------------------------------------------------------------------------*/\r
+/**\r
+ * \name IP configuration options\r
+ * @{\r
+ *\r
+ */\r
+/**\r
+ * The IP TTL (time to live) of IP packets sent by uIP.\r
+ *\r
+ * This should normally not be changed.\r
+ */\r
+#define UIP_TTL 64\r
+\r
+/**\r
+ * Turn on support for IP packet reassembly.\r
+ *\r
+ * uIP supports reassembly of fragmented IP packets. This features\r
+ * requires an additonal amount of RAM to hold the reassembly buffer\r
+ * and the reassembly code size is approximately 700 bytes. The\r
+ * reassembly buffer is of the same size as the uip_buf buffer\r
+ * (configured by UIP_BUFSIZE).\r
+ *\r
+ * \note IP packet reassembly is not heavily tested.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define UIP_REASSEMBLY 0\r
+\r
+/**\r
+ * The maximum time an IP fragment should wait in the reassembly\r
+ * buffer before it is dropped.\r
+ *\r
+ */\r
+#define UIP_REASS_MAXAGE 40\r
+\r
+/** @} */\r
+\r
+/*------------------------------------------------------------------------------*/\r
+/**\r
+ * \name UDP configuration options\r
+ * @{\r
+ */\r
+\r
+/**\r
+ * Toggles wether UDP support should be compiled in or not.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#ifdef UIP_CONF_UDP\r
+#define UIP_UDP UIP_CONF_UDP\r
+#else /* UIP_CONF_UDP */\r
+#define UIP_UDP 0\r
+#endif /* UIP_CONF_UDP */\r
+\r
+/**\r
+ * Toggles if UDP checksums should be used or not.\r
+ *\r
+ * \note Support for UDP checksums is currently not included in uIP,\r
+ * so this option has no function.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#ifdef UIP_CONF_UDP_CHECKSUMS\r
+#define UIP_UDP_CHECKSUMS UIP_CONF_UDP_CHECKSUMS\r
+#else\r
+#define UIP_UDP_CHECKSUMS 0\r
+#endif\r
+\r
+/**\r
+ * The maximum amount of concurrent UDP connections.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#ifdef UIP_CONF_UDP_CONNS\r
+#define UIP_UDP_CONNS UIP_CONF_UDP_CONNS\r
+#else /* UIP_CONF_UDP_CONNS */\r
+#define UIP_UDP_CONNS 10\r
+#endif /* UIP_CONF_UDP_CONNS */\r
+\r
+/**\r
+ * The name of the function that should be called when UDP datagrams arrive.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+\r
+\r
+/** @} */\r
+/*------------------------------------------------------------------------------*/\r
+/**\r
+ * \name TCP configuration options\r
+ * @{\r
+ */\r
+\r
+/**\r
+ * Determines if support for opening connections from uIP should be\r
+ * compiled in.\r
+ *\r
+ * If the applications that are running on top of uIP for this project\r
+ * do not need to open outgoing TCP connections, this configration\r
+ * option can be turned off to reduce the code size of uIP.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define UIP_ACTIVE_OPEN 1\r
+\r
+/**\r
+ * The maximum number of simultaneously open TCP connections.\r
+ *\r
+ * Since the TCP connections are statically allocated, turning this\r
+ * configuration knob down results in less RAM used. Each TCP\r
+ * connection requires approximatly 30 bytes of memory.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#ifndef UIP_CONF_MAX_CONNECTIONS\r
+#define UIP_CONNS 10\r
+#else /* UIP_CONF_MAX_CONNECTIONS */\r
+#define UIP_CONNS UIP_CONF_MAX_CONNECTIONS\r
+#endif /* UIP_CONF_MAX_CONNECTIONS */\r
+\r
+\r
+/**\r
+ * The maximum number of simultaneously listening TCP ports.\r
+ *\r
+ * Each listening TCP port requires 2 bytes of memory.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#ifndef UIP_CONF_MAX_LISTENPORTS\r
+#define UIP_LISTENPORTS 20\r
+#else /* UIP_CONF_MAX_LISTENPORTS */\r
+#define UIP_LISTENPORTS UIP_CONF_MAX_LISTENPORTS\r
+#endif /* UIP_CONF_MAX_LISTENPORTS */\r
+\r
+/**\r
+ * Determines if support for TCP urgent data notification should be\r
+ * compiled in.\r
+ *\r
+ * Urgent data (out-of-band data) is a rarely used TCP feature that\r
+ * very seldom would be required.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define UIP_URGDATA 0\r
+\r
+/**\r
+ * The initial retransmission timeout counted in timer pulses.\r
+ *\r
+ * This should not be changed.\r
+ */\r
+#define UIP_RTO 3\r
+\r
+/**\r
+ * The maximum number of times a segment should be retransmitted\r
+ * before the connection should be aborted.\r
+ *\r
+ * This should not be changed.\r
+ */\r
+#define UIP_MAXRTX 8\r
+\r
+/**\r
+ * The maximum number of times a SYN segment should be retransmitted\r
+ * before a connection request should be deemed to have been\r
+ * unsuccessful.\r
+ *\r
+ * This should not need to be changed.\r
+ */\r
+#define UIP_MAXSYNRTX 5\r
+\r
+/**\r
+ * The TCP maximum segment size.\r
+ *\r
+ * This is should not be to set to more than\r
+ * UIP_BUFSIZE - UIP_LLH_LEN - UIP_TCPIP_HLEN.\r
+ */\r
+#define UIP_TCP_MSS (UIP_BUFSIZE - UIP_LLH_LEN - UIP_TCPIP_HLEN)\r
+\r
+/**\r
+ * The size of the advertised receiver's window.\r
+ *\r
+ * Should be set low (i.e., to the size of the uip_buf buffer) is the\r
+ * application is slow to process incoming data, or high (32768 bytes)\r
+ * if the application processes data quickly.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#ifndef UIP_CONF_RECEIVE_WINDOW\r
+#define UIP_RECEIVE_WINDOW UIP_TCP_MSS\r
+#else\r
+#define UIP_RECEIVE_WINDOW UIP_CONF_RECEIVE_WINDOW\r
+#endif\r
+\r
+/**\r
+ * How long a connection should stay in the TIME_WAIT state.\r
+ *\r
+ * This configiration option has no real implication, and it should be\r
+ * left untouched.\r
+ */\r
+#define UIP_TIME_WAIT_TIMEOUT 120\r
+\r
+\r
+/** @} */\r
+/*------------------------------------------------------------------------------*/\r
+/**\r
+ * \name ARP configuration options\r
+ * @{\r
+ */\r
+\r
+/**\r
+ * The size of the ARP table.\r
+ *\r
+ * This option should be set to a larger value if this uIP node will\r
+ * have many connections from the local network.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#ifdef UIP_CONF_ARPTAB_SIZE\r
+#define UIP_ARPTAB_SIZE UIP_CONF_ARPTAB_SIZE\r
+#else\r
+#define UIP_ARPTAB_SIZE 8\r
+#endif\r
+\r
+/**\r
+ * The maxium age of ARP table entries measured in 10ths of seconds.\r
+ *\r
+ * An UIP_ARP_MAXAGE of 120 corresponds to 20 minutes (BSD\r
+ * default).\r
+ */\r
+#define UIP_ARP_MAXAGE 120\r
+\r
+/** @} */\r
+\r
+/*------------------------------------------------------------------------------*/\r
+\r
+/**\r
+ * \name General configuration options\r
+ * @{\r
+ */\r
+\r
+/**\r
+ * The size of the uIP packet buffer.\r
+ *\r
+ * The uIP packet buffer should not be smaller than 60 bytes, and does\r
+ * not need to be larger than 1500 bytes. Lower size results in lower\r
+ * TCP throughput, larger size results in higher TCP throughput.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#ifndef UIP_CONF_BUFFER_SIZE\r
+#define UIP_BUFSIZE 1500\r
+#else /* UIP_CONF_BUFFER_SIZE */\r
+#define UIP_BUFSIZE UIP_CONF_BUFFER_SIZE\r
+#endif /* UIP_CONF_BUFFER_SIZE */\r
+\r
+\r
+/**\r
+ * Determines if statistics support should be compiled in.\r
+ *\r
+ * The statistics is useful for debugging and to show the user.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#ifndef UIP_CONF_STATISTICS\r
+#define UIP_STATISTICS 0\r
+#else /* UIP_CONF_STATISTICS */\r
+#define UIP_STATISTICS UIP_CONF_STATISTICS\r
+#endif /* UIP_CONF_STATISTICS */\r
+\r
+/**\r
+ * Determines if logging of certain events should be compiled in.\r
+ *\r
+ * This is useful mostly for debugging. The function uip_log()\r
+ * must be implemented to suit the architecture of the project, if\r
+ * logging is turned on.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#ifndef UIP_CONF_LOGGING\r
+#define UIP_LOGGING 0\r
+#else /* UIP_CONF_LOGGING */\r
+#define UIP_LOGGING UIP_CONF_LOGGING\r
+#endif /* UIP_CONF_LOGGING */\r
+\r
+/**\r
+ * Broadcast support.\r
+ *\r
+ * This flag configures IP broadcast support. This is useful only\r
+ * together with UDP.\r
+ *\r
+ * \hideinitializer\r
+ *\r
+ */\r
+#ifndef UIP_CONF_BROADCAST\r
+#define UIP_BROADCAST 0\r
+#else /* UIP_CONF_BROADCAST */\r
+#define UIP_BROADCAST UIP_CONF_BROADCAST\r
+#endif /* UIP_CONF_BROADCAST */\r
+\r
+/**\r
+ * Print out a uIP log message.\r
+ *\r
+ * This function must be implemented by the module that uses uIP, and\r
+ * is called by uIP whenever a log message is generated.\r
+ */\r
+void uip_log(char *msg);\r
+\r
+/**\r
+ * The link level header length.\r
+ *\r
+ * This is the offset into the uip_buf where the IP header can be\r
+ * found. For Ethernet, this should be set to 14. For SLIP, this\r
+ * should be set to 0.\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#ifdef UIP_CONF_LLH_LEN\r
+#define UIP_LLH_LEN UIP_CONF_LLH_LEN\r
+#else /* UIP_CONF_LLH_LEN */\r
+#define UIP_LLH_LEN 14\r
+#endif /* UIP_CONF_LLH_LEN */\r
+\r
+/** @} */\r
+/*------------------------------------------------------------------------------*/\r
+/**\r
+ * \name CPU architecture configuration\r
+ * @{\r
+ *\r
+ * The CPU architecture configuration is where the endianess of the\r
+ * CPU on which uIP is to be run is specified. Most CPUs today are\r
+ * little endian, and the most notable exception are the Motorolas\r
+ * which are big endian. The BYTE_ORDER macro should be changed to\r
+ * reflect the CPU architecture on which uIP is to be run.\r
+ */\r
+\r
+/**\r
+ * The byte order of the CPU architecture on which uIP is to be run.\r
+ *\r
+ * This option can be either BIG_ENDIAN (Motorola byte order) or\r
+ * LITTLE_ENDIAN (Intel byte order).\r
+ *\r
+ * \hideinitializer\r
+ */\r
+#define UIP_BYTE_ORDER UIP_CONF_BYTE_ORDER\r
+\r
+/** @} */\r
+/*------------------------------------------------------------------------------*/\r
+\r
+/**\r
+ * \name Appication specific configurations\r
+ * @{\r
+ *\r
+ * An uIP application is implemented using a single application\r
+ * function that is called by uIP whenever a TCP/IP event occurs. The\r
+ * name of this function must be registered with uIP at compile time\r
+ * using the UIP_APPCALL definition.\r
+ *\r
+ * uIP applications can store the application state within the\r
+ * uip_conn structure by specifying the type of the application\r
+ * structure by typedef:ing the type uip_tcp_appstate_t and uip_udp_appstate_t.\r
+ *\r
+ * The file containing the definitions must be included in the\r
+ * uipopt.h file.\r
+ *\r
+ * The following example illustrates how this can look.\r
+ \code\r
+\r
+void httpd_appcall(void);\r
+#define UIP_APPCALL httpd_appcall\r
+\r
+struct httpd_state {\r
+ u8_t state;\r
+ u16_t count;\r
+ char *dataptr;\r
+ char *script;\r
+};\r
+typedef struct httpd_state uip_tcp_appstate_t\r
+ \endcode\r
+ */\r
+\r
+/**\r
+ * \var #define UIP_APPCALL\r
+ *\r
+ * The name of the application function that uIP should call in\r
+ * response to TCP/IP events.\r
+ *\r
+ */\r
+\r
+/**\r
+ * \var typedef uip_tcp_appstate_t\r
+ *\r
+ * The type of the application state that is to be stored in the\r
+ * uip_conn structure. This usually is typedef:ed to a struct holding\r
+ * application state information.\r
+ */\r
+\r
+/**\r
+ * \var typedef uip_udp_appstate_t\r
+ *\r
+ * The type of the application state that is to be stored in the\r
+ * uip_conn structure. This usually is typedef:ed to a struct holding\r
+ * application state information.\r
+ */\r
+/** @} */\r
+/** @} */\r
+\r
+#endif /* __UIPOPT_H__ */\r