2006-06-18 00:41:10 +02:00
|
|
|
/*
|
|
|
|
* Copyright (c) 2004, Swedish Institute of Computer Science.
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. Neither the name of the Institute nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
* This file is part of the Contiki operating system.
|
2008-10-14 11:40:56 +02:00
|
|
|
*/
|
2011-12-02 17:07:27 +01:00
|
|
|
|
2008-10-14 11:40:56 +02:00
|
|
|
/**
|
|
|
|
* \file
|
|
|
|
* Code for tunnelling uIP packets over the Rime mesh routing module
|
2008-10-15 09:59:34 +02:00
|
|
|
*
|
2008-10-14 11:40:56 +02:00
|
|
|
* \author Adam Dunkels <adam@sics.se>\author
|
|
|
|
* \author Mathilde Durvy <mdurvy@cisco.com> (IPv6 related code)
|
|
|
|
* \author Julien Abeille <jabeille@cisco.com> (IPv6 related code)
|
2006-06-18 00:41:10 +02:00
|
|
|
*/
|
|
|
|
|
2011-12-02 17:07:27 +01:00
|
|
|
#include "contiki-net.h"
|
2013-11-22 09:17:54 +01:00
|
|
|
#include "net/ip/uip-split.h"
|
|
|
|
#include "net/ip/uip-packetqueue.h"
|
2010-10-29 07:36:07 +02:00
|
|
|
|
2014-12-01 21:02:57 +01:00
|
|
|
#if NETSTACK_CONF_WITH_IPV6
|
2013-11-22 09:17:54 +01:00
|
|
|
#include "net/ipv6/uip-nd6.h"
|
|
|
|
#include "net/ipv6/uip-ds6.h"
|
2008-10-14 11:40:56 +02:00
|
|
|
#endif
|
|
|
|
|
2016-02-01 18:02:33 +01:00
|
|
|
#if UIP_CONF_IPV6_RPL
|
|
|
|
#include "net/rpl/rpl.h"
|
|
|
|
#include "net/rpl/rpl-private.h"
|
|
|
|
#endif
|
|
|
|
|
2011-12-02 17:07:27 +01:00
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
#define DEBUG DEBUG_NONE
|
2013-11-22 09:17:54 +01:00
|
|
|
#include "net/ip/uip-debug.h"
|
2008-10-14 11:40:56 +02:00
|
|
|
|
|
|
|
#if UIP_LOGGING
|
|
|
|
#include <stdio.h>
|
|
|
|
void uip_log(char *msg);
|
|
|
|
#define UIP_LOG(m) uip_log(m)
|
|
|
|
#else
|
|
|
|
#define UIP_LOG(m)
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#define UIP_ICMP_BUF ((struct uip_icmp_hdr *)&uip_buf[UIP_LLIPH_LEN + uip_ext_len])
|
|
|
|
#define UIP_IP_BUF ((struct uip_ip_hdr *)&uip_buf[UIP_LLH_LEN])
|
2010-02-09 13:58:53 +01:00
|
|
|
#define UIP_TCP_BUF ((struct uip_tcpip_hdr *)&uip_buf[UIP_LLH_LEN])
|
2008-10-14 11:40:56 +02:00
|
|
|
|
2010-03-16 16:35:03 +01:00
|
|
|
#ifdef UIP_FALLBACK_INTERFACE
|
2010-03-16 16:41:00 +01:00
|
|
|
extern struct uip_fallback_interface UIP_FALLBACK_INTERFACE;
|
2010-03-16 16:35:03 +01:00
|
|
|
#endif
|
2011-12-02 15:54:49 +01:00
|
|
|
|
2010-05-01 15:04:31 +02:00
|
|
|
#if UIP_CONF_IPV6_RPL
|
2011-12-02 15:54:49 +01:00
|
|
|
#include "rpl/rpl.h"
|
|
|
|
#endif
|
|
|
|
|
2006-06-18 00:41:10 +02:00
|
|
|
process_event_t tcpip_event;
|
2010-02-05 13:43:36 +01:00
|
|
|
#if UIP_CONF_ICMP6
|
|
|
|
process_event_t tcpip_icmp6_event;
|
|
|
|
#endif /* UIP_CONF_ICMP6 */
|
2006-06-18 00:41:10 +02:00
|
|
|
|
2011-12-02 17:07:27 +01:00
|
|
|
/* Periodic check of active connections. */
|
2008-10-14 11:40:56 +02:00
|
|
|
static struct etimer periodic;
|
|
|
|
|
2014-12-01 21:02:57 +01:00
|
|
|
#if NETSTACK_CONF_WITH_IPV6 && UIP_CONF_IPV6_REASSEMBLY
|
2011-12-02 17:07:27 +01:00
|
|
|
/* Timer for reassembly. */
|
2008-10-14 11:40:56 +02:00
|
|
|
extern struct etimer uip_reass_timer;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if UIP_TCP
|
2006-06-18 00:41:10 +02:00
|
|
|
/**
|
|
|
|
* \internal Structure for holding a TCP port and a process ID.
|
|
|
|
*/
|
|
|
|
struct listenport {
|
2012-02-17 23:45:13 +01:00
|
|
|
uint16_t port;
|
2006-06-18 00:41:10 +02:00
|
|
|
struct process *p;
|
|
|
|
};
|
|
|
|
|
|
|
|
static struct internal_state {
|
|
|
|
struct listenport listenports[UIP_LISTENPORTS];
|
|
|
|
struct process *p;
|
|
|
|
} s;
|
2008-10-14 11:40:56 +02:00
|
|
|
#endif
|
2006-06-18 00:41:10 +02:00
|
|
|
|
|
|
|
enum {
|
|
|
|
TCP_POLL,
|
|
|
|
UDP_POLL,
|
|
|
|
PACKET_INPUT
|
|
|
|
};
|
|
|
|
|
2008-10-14 11:40:56 +02:00
|
|
|
/* Called on IP packet output. */
|
2014-12-01 21:02:57 +01:00
|
|
|
#if NETSTACK_CONF_WITH_IPV6
|
2009-02-20 22:21:56 +01:00
|
|
|
|
2013-11-16 14:42:57 +01:00
|
|
|
static uint8_t (* outputfunc)(const uip_lladdr_t *a);
|
2009-02-20 22:21:56 +01:00
|
|
|
|
2012-02-17 23:45:13 +01:00
|
|
|
uint8_t
|
2013-11-16 14:42:57 +01:00
|
|
|
tcpip_output(const uip_lladdr_t *a)
|
2009-02-20 22:21:56 +01:00
|
|
|
{
|
2010-01-25 14:37:05 +01:00
|
|
|
int ret;
|
2009-02-20 22:21:56 +01:00
|
|
|
if(outputfunc != NULL) {
|
2010-01-25 14:37:05 +01:00
|
|
|
ret = outputfunc(a);
|
|
|
|
return ret;
|
2009-02-20 22:21:56 +01:00
|
|
|
}
|
|
|
|
UIP_LOG("tcpip_output: Use tcpip_set_outputfunc() to set an output function");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2013-11-16 14:42:57 +01:00
|
|
|
tcpip_set_outputfunc(uint8_t (*f)(const uip_lladdr_t *))
|
2009-02-20 22:21:56 +01:00
|
|
|
{
|
|
|
|
outputfunc = f;
|
|
|
|
}
|
2008-10-14 11:40:56 +02:00
|
|
|
#else
|
2009-02-20 22:21:56 +01:00
|
|
|
|
2012-02-17 23:45:13 +01:00
|
|
|
static uint8_t (* outputfunc)(void);
|
|
|
|
uint8_t
|
2009-02-20 22:21:56 +01:00
|
|
|
tcpip_output(void)
|
2008-11-10 22:00:53 +01:00
|
|
|
{
|
2009-02-20 22:21:56 +01:00
|
|
|
if(outputfunc != NULL) {
|
|
|
|
return outputfunc();
|
|
|
|
}
|
|
|
|
UIP_LOG("tcpip_output: Use tcpip_set_outputfunc() to set an output function");
|
2008-11-10 22:00:53 +01:00
|
|
|
return 0;
|
|
|
|
}
|
2009-02-20 22:21:56 +01:00
|
|
|
|
|
|
|
void
|
2012-02-17 23:45:13 +01:00
|
|
|
tcpip_set_outputfunc(uint8_t (*f)(void))
|
2009-02-20 22:21:56 +01:00
|
|
|
{
|
|
|
|
outputfunc = f;
|
|
|
|
}
|
2008-10-14 11:40:56 +02:00
|
|
|
#endif
|
2007-05-20 23:29:39 +02:00
|
|
|
|
2008-05-14 21:19:28 +02:00
|
|
|
#if UIP_CONF_IP_FORWARD
|
2007-05-08 10:28:59 +02:00
|
|
|
unsigned char tcpip_is_forwarding; /* Forwarding right now? */
|
2008-05-14 21:19:28 +02:00
|
|
|
#endif /* UIP_CONF_IP_FORWARD */
|
2006-06-18 00:41:10 +02:00
|
|
|
|
|
|
|
PROCESS(tcpip_process, "TCP/IP stack");
|
|
|
|
|
2010-02-09 13:58:53 +01:00
|
|
|
/*---------------------------------------------------------------------------*/
|
2015-07-16 11:20:36 +02:00
|
|
|
#if UIP_TCP || UIP_CONF_IP_FORWARD
|
2010-02-09 13:58:53 +01:00
|
|
|
static void
|
|
|
|
start_periodic_tcp_timer(void)
|
|
|
|
{
|
|
|
|
if(etimer_expired(&periodic)) {
|
|
|
|
etimer_restart(&periodic);
|
|
|
|
}
|
|
|
|
}
|
2015-07-16 11:20:36 +02:00
|
|
|
#endif /* UIP_TCP || UIP_CONF_IP_FORWARD */
|
2010-02-09 13:58:53 +01:00
|
|
|
/*---------------------------------------------------------------------------*/
|
|
|
|
static void
|
|
|
|
check_for_tcp_syn(void)
|
|
|
|
{
|
2013-05-15 12:07:57 +02:00
|
|
|
#if UIP_TCP || UIP_CONF_IP_FORWARD
|
2010-02-09 13:58:53 +01:00
|
|
|
/* This is a hack that is needed to start the periodic TCP timer if
|
|
|
|
an incoming packet contains a SYN: since uIP does not inform the
|
|
|
|
application if a SYN arrives, we have no other way of starting
|
|
|
|
this timer. This function is called for every incoming IP packet
|
|
|
|
to check for such SYNs. */
|
|
|
|
#define TCP_SYN 0x02
|
|
|
|
if(UIP_IP_BUF->proto == UIP_PROTO_TCP &&
|
|
|
|
(UIP_TCP_BUF->flags & TCP_SYN) == TCP_SYN) {
|
|
|
|
start_periodic_tcp_timer();
|
|
|
|
}
|
2013-05-15 12:07:57 +02:00
|
|
|
#endif /* UIP_TCP || UIP_CONF_IP_FORWARD */
|
2010-02-09 13:58:53 +01:00
|
|
|
}
|
2006-06-18 00:41:10 +02:00
|
|
|
/*---------------------------------------------------------------------------*/
|
|
|
|
static void
|
|
|
|
packet_input(void)
|
|
|
|
{
|
|
|
|
if(uip_len > 0) {
|
2015-09-14 15:11:00 +02:00
|
|
|
|
|
|
|
#if UIP_CONF_IP_FORWARD
|
2008-03-29 16:19:25 +01:00
|
|
|
tcpip_is_forwarding = 1;
|
2015-09-14 15:11:00 +02:00
|
|
|
if(uip_fw_forward() != UIP_FW_LOCAL) {
|
2007-05-08 10:28:59 +02:00
|
|
|
tcpip_is_forwarding = 0;
|
2015-09-14 15:11:00 +02:00
|
|
|
return;
|
2006-06-18 00:41:10 +02:00
|
|
|
}
|
2008-03-29 16:19:25 +01:00
|
|
|
tcpip_is_forwarding = 0;
|
2015-09-14 15:11:00 +02:00
|
|
|
#endif /* UIP_CONF_IP_FORWARD */
|
|
|
|
|
2010-02-09 13:58:53 +01:00
|
|
|
check_for_tcp_syn();
|
2008-03-29 16:19:25 +01:00
|
|
|
uip_input();
|
|
|
|
if(uip_len > 0) {
|
|
|
|
#if UIP_CONF_TCP_SPLIT
|
|
|
|
uip_split_output();
|
|
|
|
#else /* UIP_CONF_TCP_SPLIT */
|
2014-12-01 21:02:57 +01:00
|
|
|
#if NETSTACK_CONF_WITH_IPV6
|
2008-10-14 11:40:56 +02:00
|
|
|
tcpip_ipv6_output();
|
2015-09-14 15:11:00 +02:00
|
|
|
#else /* NETSTACK_CONF_WITH_IPV6 */
|
2008-11-09 13:29:24 +01:00
|
|
|
PRINTF("tcpip packet_input output len %d\n", uip_len);
|
2008-03-29 16:19:25 +01:00
|
|
|
tcpip_output();
|
2015-09-14 15:11:00 +02:00
|
|
|
#endif /* NETSTACK_CONF_WITH_IPV6 */
|
2008-03-29 16:19:25 +01:00
|
|
|
#endif /* UIP_CONF_TCP_SPLIT */
|
|
|
|
}
|
2006-06-18 00:41:10 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
/*---------------------------------------------------------------------------*/
|
2008-10-14 11:40:56 +02:00
|
|
|
#if UIP_TCP
|
2007-12-09 00:06:02 +01:00
|
|
|
#if UIP_ACTIVE_OPEN
|
2006-06-18 00:41:10 +02:00
|
|
|
struct uip_conn *
|
2015-03-26 08:18:09 +01:00
|
|
|
tcp_connect(const uip_ipaddr_t *ripaddr, uint16_t port, void *appstate)
|
2006-06-18 00:41:10 +02:00
|
|
|
{
|
|
|
|
struct uip_conn *c;
|
2016-04-22 21:41:03 +02:00
|
|
|
|
2006-08-10 18:43:32 +02:00
|
|
|
c = uip_connect(ripaddr, port);
|
2006-06-18 00:41:10 +02:00
|
|
|
if(c == NULL) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
c->appstate.p = PROCESS_CURRENT();
|
|
|
|
c->appstate.state = appstate;
|
2016-04-22 21:41:03 +02:00
|
|
|
|
2006-06-18 00:41:10 +02:00
|
|
|
tcpip_poll_tcp(c);
|
2016-04-22 21:41:03 +02:00
|
|
|
|
2006-06-18 00:41:10 +02:00
|
|
|
return c;
|
|
|
|
}
|
2007-12-09 00:06:02 +01:00
|
|
|
#endif /* UIP_ACTIVE_OPEN */
|
2006-06-18 00:41:10 +02:00
|
|
|
/*---------------------------------------------------------------------------*/
|
|
|
|
void
|
2012-02-17 23:45:13 +01:00
|
|
|
tcp_unlisten(uint16_t port)
|
2006-06-18 00:41:10 +02:00
|
|
|
{
|
2015-08-12 17:51:26 +02:00
|
|
|
unsigned char i;
|
2006-06-18 00:41:10 +02:00
|
|
|
struct listenport *l;
|
|
|
|
|
|
|
|
l = s.listenports;
|
|
|
|
for(i = 0; i < UIP_LISTENPORTS; ++i) {
|
|
|
|
if(l->port == port &&
|
|
|
|
l->p == PROCESS_CURRENT()) {
|
|
|
|
l->port = 0;
|
|
|
|
uip_unlisten(port);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
++l;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/*---------------------------------------------------------------------------*/
|
|
|
|
void
|
2012-02-17 23:45:13 +01:00
|
|
|
tcp_listen(uint16_t port)
|
2006-06-18 00:41:10 +02:00
|
|
|
{
|
2015-08-12 17:51:26 +02:00
|
|
|
unsigned char i;
|
2006-06-18 00:41:10 +02:00
|
|
|
struct listenport *l;
|
|
|
|
|
|
|
|
l = s.listenports;
|
|
|
|
for(i = 0; i < UIP_LISTENPORTS; ++i) {
|
|
|
|
if(l->port == 0) {
|
|
|
|
l->port = port;
|
|
|
|
l->p = PROCESS_CURRENT();
|
|
|
|
uip_listen(port);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
++l;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/*---------------------------------------------------------------------------*/
|
|
|
|
void
|
|
|
|
tcp_attach(struct uip_conn *conn,
|
|
|
|
void *appstate)
|
|
|
|
{
|
2013-03-06 14:32:36 +01:00
|
|
|
uip_tcp_appstate_t *s;
|
2006-06-18 00:41:10 +02:00
|
|
|
|
|
|
|
s = &conn->appstate;
|
|
|
|
s->p = PROCESS_CURRENT();
|
|
|
|
s->state = appstate;
|
|
|
|
}
|
2008-10-14 11:40:56 +02:00
|
|
|
|
|
|
|
#endif /* UIP_TCP */
|
|
|
|
/*---------------------------------------------------------------------------*/
|
2007-09-29 05:54:18 +02:00
|
|
|
#if UIP_UDP
|
2006-06-18 00:41:10 +02:00
|
|
|
void
|
|
|
|
udp_attach(struct uip_udp_conn *conn,
|
|
|
|
void *appstate)
|
|
|
|
{
|
2013-03-06 14:32:36 +01:00
|
|
|
uip_udp_appstate_t *s;
|
2006-06-18 00:41:10 +02:00
|
|
|
|
|
|
|
s = &conn->appstate;
|
|
|
|
s->p = PROCESS_CURRENT();
|
|
|
|
s->state = appstate;
|
|
|
|
}
|
|
|
|
/*---------------------------------------------------------------------------*/
|
|
|
|
struct uip_udp_conn *
|
2012-02-17 23:45:13 +01:00
|
|
|
udp_new(const uip_ipaddr_t *ripaddr, uint16_t port, void *appstate)
|
2006-06-18 00:41:10 +02:00
|
|
|
{
|
|
|
|
struct uip_udp_conn *c;
|
|
|
|
uip_udp_appstate_t *s;
|
2016-04-22 21:41:03 +02:00
|
|
|
|
2006-08-09 18:13:39 +02:00
|
|
|
c = uip_udp_new(ripaddr, port);
|
2006-06-18 00:41:10 +02:00
|
|
|
if(c == NULL) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
s = &c->appstate;
|
|
|
|
s->p = PROCESS_CURRENT();
|
|
|
|
s->state = appstate;
|
|
|
|
|
|
|
|
return c;
|
|
|
|
}
|
|
|
|
/*---------------------------------------------------------------------------*/
|
|
|
|
struct uip_udp_conn *
|
2012-02-17 23:45:13 +01:00
|
|
|
udp_broadcast_new(uint16_t port, void *appstate)
|
2006-06-18 00:41:10 +02:00
|
|
|
{
|
|
|
|
uip_ipaddr_t addr;
|
|
|
|
struct uip_udp_conn *conn;
|
2009-04-13 21:54:07 +02:00
|
|
|
|
2014-12-01 21:02:57 +01:00
|
|
|
#if NETSTACK_CONF_WITH_IPV6
|
2009-04-13 21:54:07 +02:00
|
|
|
uip_create_linklocal_allnodes_mcast(&addr);
|
|
|
|
#else
|
2006-08-09 18:13:39 +02:00
|
|
|
uip_ipaddr(&addr, 255,255,255,255);
|
2014-12-01 21:02:57 +01:00
|
|
|
#endif /* NETSTACK_CONF_WITH_IPV6 */
|
2006-08-09 18:13:39 +02:00
|
|
|
conn = udp_new(&addr, port, appstate);
|
2006-06-18 00:41:10 +02:00
|
|
|
if(conn != NULL) {
|
|
|
|
udp_bind(conn, port);
|
|
|
|
}
|
|
|
|
return conn;
|
|
|
|
}
|
2007-09-29 05:54:18 +02:00
|
|
|
#endif /* UIP_UDP */
|
2008-10-14 11:40:56 +02:00
|
|
|
/*---------------------------------------------------------------------------*/
|
|
|
|
#if UIP_CONF_ICMP6
|
2012-02-17 23:45:13 +01:00
|
|
|
uint8_t
|
2008-10-14 11:40:56 +02:00
|
|
|
icmp6_new(void *appstate) {
|
|
|
|
if(uip_icmp6_conns.appstate.p == PROCESS_NONE) {
|
|
|
|
uip_icmp6_conns.appstate.p = PROCESS_CURRENT();
|
|
|
|
uip_icmp6_conns.appstate.state = appstate;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2010-01-25 14:37:05 +01:00
|
|
|
void
|
2012-02-17 23:45:13 +01:00
|
|
|
tcpip_icmp6_call(uint8_t type)
|
2010-01-25 14:37:05 +01:00
|
|
|
{
|
|
|
|
if(uip_icmp6_conns.appstate.p != PROCESS_NONE) {
|
2010-02-05 13:43:36 +01:00
|
|
|
/* XXX: This is a hack that needs to be updated. Passing a pointer (&type)
|
|
|
|
like this only works with process_post_synch. */
|
|
|
|
process_post_synch(uip_icmp6_conns.appstate.p, tcpip_icmp6_event, &type);
|
2010-01-25 14:37:05 +01:00
|
|
|
}
|
2008-10-14 11:40:56 +02:00
|
|
|
return;
|
|
|
|
}
|
2010-01-25 14:37:05 +01:00
|
|
|
#endif /* UIP_CONF_ICMP6 */
|
2006-06-18 00:41:10 +02:00
|
|
|
/*---------------------------------------------------------------------------*/
|
|
|
|
static void
|
|
|
|
eventhandler(process_event_t ev, process_data_t data)
|
|
|
|
{
|
2008-10-15 09:59:34 +02:00
|
|
|
#if UIP_TCP
|
2015-08-12 17:51:26 +02:00
|
|
|
unsigned char i;
|
2006-06-18 00:41:10 +02:00
|
|
|
register struct listenport *l;
|
2008-10-15 09:59:34 +02:00
|
|
|
#endif /*UIP_TCP*/
|
2006-06-18 00:41:10 +02:00
|
|
|
struct process *p;
|
2012-11-26 19:47:11 +01:00
|
|
|
|
2006-06-18 00:41:10 +02:00
|
|
|
switch(ev) {
|
2016-04-22 21:41:03 +02:00
|
|
|
case PROCESS_EVENT_EXITED:
|
|
|
|
/* This is the event we get if a process has exited. We go through
|
2008-10-14 11:40:56 +02:00
|
|
|
the TCP/IP tables to see if this process had any open
|
|
|
|
connections or listening TCP ports. If so, we'll close those
|
|
|
|
connections. */
|
|
|
|
|
2016-04-22 21:41:03 +02:00
|
|
|
p = (struct process *)data;
|
2008-10-15 09:59:34 +02:00
|
|
|
#if UIP_TCP
|
2016-04-22 21:41:03 +02:00
|
|
|
l = s.listenports;
|
|
|
|
for(i = 0; i < UIP_LISTENPORTS; ++i) {
|
|
|
|
if(l->p == p) {
|
|
|
|
uip_unlisten(l->port);
|
|
|
|
l->port = 0;
|
|
|
|
l->p = PROCESS_NONE;
|
2006-06-18 00:41:10 +02:00
|
|
|
}
|
2016-04-22 21:41:03 +02:00
|
|
|
++l;
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
struct uip_conn *cptr;
|
|
|
|
|
|
|
|
for(cptr = &uip_conns[0]; cptr < &uip_conns[UIP_CONNS]; ++cptr) {
|
|
|
|
if(cptr->appstate.p == p) {
|
|
|
|
cptr->appstate.p = PROCESS_NONE;
|
|
|
|
cptr->tcpstateflags = UIP_CLOSED;
|
2008-10-14 11:40:56 +02:00
|
|
|
}
|
2006-06-18 00:41:10 +02:00
|
|
|
}
|
2016-04-22 21:41:03 +02:00
|
|
|
}
|
2008-10-15 09:59:34 +02:00
|
|
|
#endif /* UIP_TCP */
|
2006-06-18 00:41:10 +02:00
|
|
|
#if UIP_UDP
|
2016-04-22 21:41:03 +02:00
|
|
|
{
|
|
|
|
struct uip_udp_conn *cptr;
|
2011-12-02 17:07:27 +01:00
|
|
|
|
2016-04-22 21:41:03 +02:00
|
|
|
for(cptr = &uip_udp_conns[0];
|
|
|
|
cptr < &uip_udp_conns[UIP_UDP_CONNS]; ++cptr) {
|
|
|
|
if(cptr->appstate.p == p) {
|
|
|
|
cptr->lport = 0;
|
2008-10-14 11:40:56 +02:00
|
|
|
}
|
|
|
|
}
|
2016-04-22 21:41:03 +02:00
|
|
|
}
|
2006-06-18 00:41:10 +02:00
|
|
|
#endif /* UIP_UDP */
|
2016-04-22 21:41:03 +02:00
|
|
|
break;
|
2008-10-14 11:40:56 +02:00
|
|
|
|
2016-04-22 21:41:03 +02:00
|
|
|
case PROCESS_EVENT_TIMER:
|
|
|
|
/* We get this event if one of our timers have expired. */
|
|
|
|
{
|
|
|
|
/* Check the clock so see if we should call the periodic uIP
|
2008-10-15 09:59:34 +02:00
|
|
|
processing. */
|
2016-04-22 21:41:03 +02:00
|
|
|
if(data == &periodic &&
|
|
|
|
etimer_expired(&periodic)) {
|
2008-10-14 11:40:56 +02:00
|
|
|
#if UIP_TCP
|
2016-04-22 21:41:03 +02:00
|
|
|
for(i = 0; i < UIP_CONNS; ++i) {
|
|
|
|
if(uip_conn_active(i)) {
|
|
|
|
/* Only restart the timer if there are active
|
2008-10-14 11:40:56 +02:00
|
|
|
connections. */
|
2016-04-22 21:41:03 +02:00
|
|
|
etimer_restart(&periodic);
|
|
|
|
uip_periodic(i);
|
2014-12-01 21:02:57 +01:00
|
|
|
#if NETSTACK_CONF_WITH_IPV6
|
2016-04-22 21:41:03 +02:00
|
|
|
tcpip_ipv6_output();
|
2008-10-14 11:40:56 +02:00
|
|
|
#else
|
2016-04-22 21:41:03 +02:00
|
|
|
if(uip_len > 0) {
|
|
|
|
PRINTF("tcpip_output from periodic len %d\n", uip_len);
|
|
|
|
tcpip_output();
|
|
|
|
PRINTF("tcpip_output after periodic len %d\n", uip_len);
|
2008-10-14 11:40:56 +02:00
|
|
|
}
|
2016-04-22 21:41:03 +02:00
|
|
|
#endif /* NETSTACK_CONF_WITH_IPV6 */
|
|
|
|
}
|
|
|
|
}
|
2008-10-15 09:59:34 +02:00
|
|
|
#endif /* UIP_TCP */
|
2008-05-14 21:19:28 +02:00
|
|
|
#if UIP_CONF_IP_FORWARD
|
2016-04-22 21:41:03 +02:00
|
|
|
uip_fw_periodic();
|
2008-05-14 21:19:28 +02:00
|
|
|
#endif /* UIP_CONF_IP_FORWARD */
|
2016-04-22 21:41:03 +02:00
|
|
|
}
|
|
|
|
|
2014-12-01 21:02:57 +01:00
|
|
|
#if NETSTACK_CONF_WITH_IPV6
|
2008-10-14 11:40:56 +02:00
|
|
|
#if UIP_CONF_IPV6_REASSEMBLY
|
2016-04-22 21:41:03 +02:00
|
|
|
/*
|
|
|
|
* check the timer for reassembly
|
|
|
|
*/
|
|
|
|
if(data == &uip_reass_timer &&
|
|
|
|
etimer_expired(&uip_reass_timer)) {
|
|
|
|
uip_reass_over();
|
|
|
|
tcpip_ipv6_output();
|
|
|
|
}
|
2008-10-14 11:40:56 +02:00
|
|
|
#endif /* UIP_CONF_IPV6_REASSEMBLY */
|
2016-04-22 21:41:03 +02:00
|
|
|
/*
|
|
|
|
* check the different timers for neighbor discovery and
|
|
|
|
* stateless autoconfiguration
|
|
|
|
*/
|
|
|
|
/*if(data == &uip_ds6_timer_periodic &&
|
2011-07-11 12:04:52 +02:00
|
|
|
etimer_expired(&uip_ds6_timer_periodic)) {
|
|
|
|
uip_ds6_periodic();
|
2008-10-14 11:40:56 +02:00
|
|
|
tcpip_ipv6_output();
|
2010-03-15 17:41:24 +01:00
|
|
|
}*/
|
2011-12-02 17:07:27 +01:00
|
|
|
#if !UIP_CONF_ROUTER
|
2016-04-22 21:41:03 +02:00
|
|
|
if(data == &uip_ds6_timer_rs &&
|
|
|
|
etimer_expired(&uip_ds6_timer_rs)) {
|
|
|
|
uip_ds6_send_rs();
|
|
|
|
tcpip_ipv6_output();
|
|
|
|
}
|
2010-03-15 17:41:24 +01:00
|
|
|
#endif /* !UIP_CONF_ROUTER */
|
2016-04-22 21:41:03 +02:00
|
|
|
if(data == &uip_ds6_timer_periodic &&
|
|
|
|
etimer_expired(&uip_ds6_timer_periodic)) {
|
|
|
|
uip_ds6_periodic();
|
|
|
|
tcpip_ipv6_output();
|
|
|
|
}
|
2014-12-01 21:02:57 +01:00
|
|
|
#endif /* NETSTACK_CONF_WITH_IPV6 */
|
2016-04-22 21:41:03 +02:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
2008-10-14 11:40:56 +02:00
|
|
|
#if UIP_TCP
|
2016-04-22 21:41:03 +02:00
|
|
|
case TCP_POLL:
|
|
|
|
if(data != NULL) {
|
|
|
|
uip_poll_conn(data);
|
2014-12-01 21:02:57 +01:00
|
|
|
#if NETSTACK_CONF_WITH_IPV6
|
2016-04-22 21:41:03 +02:00
|
|
|
tcpip_ipv6_output();
|
2014-12-01 21:02:57 +01:00
|
|
|
#else /* NETSTACK_CONF_WITH_IPV6 */
|
2016-04-22 21:41:03 +02:00
|
|
|
if(uip_len > 0) {
|
|
|
|
PRINTF("tcpip_output from tcp poll len %d\n", uip_len);
|
|
|
|
tcpip_output();
|
2008-10-14 11:40:56 +02:00
|
|
|
}
|
2016-04-22 21:41:03 +02:00
|
|
|
#endif /* NETSTACK_CONF_WITH_IPV6 */
|
|
|
|
/* Start the periodic polling, if it isn't already active. */
|
|
|
|
start_periodic_tcp_timer();
|
|
|
|
}
|
|
|
|
break;
|
2008-10-14 11:40:56 +02:00
|
|
|
#endif /* UIP_TCP */
|
2007-09-29 05:54:18 +02:00
|
|
|
#if UIP_UDP
|
2016-04-22 21:41:03 +02:00
|
|
|
case UDP_POLL:
|
|
|
|
if(data != NULL) {
|
|
|
|
uip_udp_periodic_conn(data);
|
2014-12-01 21:02:57 +01:00
|
|
|
#if NETSTACK_CONF_WITH_IPV6
|
2016-04-22 21:41:03 +02:00
|
|
|
tcpip_ipv6_output();
|
2008-10-14 11:40:56 +02:00
|
|
|
#else
|
2016-04-22 21:41:03 +02:00
|
|
|
if(uip_len > 0) {
|
|
|
|
tcpip_output();
|
2006-06-18 00:41:10 +02:00
|
|
|
}
|
2016-04-22 21:41:03 +02:00
|
|
|
#endif /* UIP_UDP */
|
|
|
|
}
|
|
|
|
break;
|
2007-09-29 05:54:18 +02:00
|
|
|
#endif /* UIP_UDP */
|
2006-06-18 00:41:10 +02:00
|
|
|
|
2016-04-22 21:41:03 +02:00
|
|
|
case PACKET_INPUT:
|
|
|
|
packet_input();
|
|
|
|
break;
|
2006-06-18 00:41:10 +02:00
|
|
|
};
|
|
|
|
}
|
|
|
|
/*---------------------------------------------------------------------------*/
|
|
|
|
void
|
|
|
|
tcpip_input(void)
|
|
|
|
{
|
|
|
|
process_post_synch(&tcpip_process, PACKET_INPUT, NULL);
|
2015-06-15 10:25:58 +02:00
|
|
|
uip_clear_buf();
|
2006-06-18 00:41:10 +02:00
|
|
|
}
|
|
|
|
/*---------------------------------------------------------------------------*/
|
2014-12-01 21:02:57 +01:00
|
|
|
#if NETSTACK_CONF_WITH_IPV6
|
2008-10-14 11:40:56 +02:00
|
|
|
void
|
|
|
|
tcpip_ipv6_output(void)
|
|
|
|
{
|
2010-03-15 17:41:24 +01:00
|
|
|
uip_ds6_nbr_t *nbr = NULL;
|
2016-02-01 18:02:33 +01:00
|
|
|
uip_ipaddr_t *nexthop = NULL;
|
2011-12-02 17:07:27 +01:00
|
|
|
|
2010-10-24 23:05:42 +02:00
|
|
|
if(uip_len == 0) {
|
2008-10-14 11:40:56 +02:00
|
|
|
return;
|
2010-10-24 23:05:42 +02:00
|
|
|
}
|
2011-12-02 17:07:27 +01:00
|
|
|
|
2010-10-24 23:05:42 +02:00
|
|
|
if(uip_len > UIP_LINK_MTU) {
|
2008-10-14 11:40:56 +02:00
|
|
|
UIP_LOG("tcpip_ipv6_output: Packet to big");
|
2015-06-15 10:25:58 +02:00
|
|
|
uip_clear_buf();
|
2008-10-14 11:40:56 +02:00
|
|
|
return;
|
|
|
|
}
|
2011-12-02 17:07:27 +01:00
|
|
|
|
2008-10-14 11:40:56 +02:00
|
|
|
if(uip_is_addr_unspecified(&UIP_IP_BUF->destipaddr)){
|
|
|
|
UIP_LOG("tcpip_ipv6_output: Destination address unspecified");
|
2015-06-15 10:25:58 +02:00
|
|
|
uip_clear_buf();
|
2008-10-15 09:59:34 +02:00
|
|
|
return;
|
2008-10-14 11:40:56 +02:00
|
|
|
}
|
2011-12-02 17:07:27 +01:00
|
|
|
|
2008-10-14 11:40:56 +02:00
|
|
|
if(!uip_is_addr_mcast(&UIP_IP_BUF->destipaddr)) {
|
2010-03-15 17:41:24 +01:00
|
|
|
/* Next hop determination */
|
2016-02-01 18:02:33 +01:00
|
|
|
|
|
|
|
#if UIP_CONF_IPV6_RPL && RPL_WITH_NON_STORING
|
|
|
|
uip_ipaddr_t ipaddr;
|
|
|
|
/* Look for a RPL Source Route */
|
|
|
|
if(rpl_srh_get_next_hop(&ipaddr)) {
|
|
|
|
nexthop = &ipaddr;
|
|
|
|
}
|
|
|
|
#endif /* UIP_CONF_IPV6_RPL && RPL_WITH_NON_STORING */
|
|
|
|
|
2010-03-15 17:41:24 +01:00
|
|
|
nbr = NULL;
|
2013-08-12 00:18:27 +02:00
|
|
|
|
|
|
|
/* We first check if the destination address is on our immediate
|
|
|
|
link. If so, we simply use the destination address as our
|
|
|
|
nexthop address. */
|
2016-02-01 18:02:33 +01:00
|
|
|
if(nexthop == NULL && uip_ds6_is_addr_onlink(&UIP_IP_BUF->destipaddr)){
|
2010-03-15 17:41:24 +01:00
|
|
|
nexthop = &UIP_IP_BUF->destipaddr;
|
2016-02-01 18:02:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if(nexthop == NULL) {
|
2013-08-12 00:18:27 +02:00
|
|
|
uip_ds6_route_t *route;
|
|
|
|
/* Check if we have a route to the destination address. */
|
|
|
|
route = uip_ds6_route_lookup(&UIP_IP_BUF->destipaddr);
|
|
|
|
|
|
|
|
/* No route was found - we send to the default route instead. */
|
|
|
|
if(route == NULL) {
|
2013-07-03 19:32:26 +02:00
|
|
|
PRINTF("tcpip_ipv6_output: no route found, using default route\n");
|
2013-08-12 00:18:27 +02:00
|
|
|
nexthop = uip_ds6_defrt_choose();
|
|
|
|
if(nexthop == NULL) {
|
2010-03-16 16:35:03 +01:00
|
|
|
#ifdef UIP_FALLBACK_INTERFACE
|
2016-04-22 21:41:03 +02:00
|
|
|
PRINTF("FALLBACK: removing ext hdrs & setting proto %d %d\n",
|
|
|
|
uip_ext_len, *((uint8_t *)UIP_IP_BUF + 40));
|
|
|
|
if(uip_ext_len > 0) {
|
|
|
|
extern void remove_ext_hdr(void);
|
|
|
|
uint8_t proto = *((uint8_t *)UIP_IP_BUF + 40);
|
|
|
|
remove_ext_hdr();
|
|
|
|
/* This should be copied from the ext header... */
|
|
|
|
UIP_IP_BUF->proto = proto;
|
|
|
|
}
|
|
|
|
/* Inform the other end that the destination is not reachable. If it's
|
|
|
|
* not informed routes might get lost unexpectedly until there's a need
|
|
|
|
* to send a new packet to the peer */
|
|
|
|
if(UIP_FALLBACK_INTERFACE.output() < 0) {
|
|
|
|
PRINTF("FALLBACK: output error. Reporting DST UNREACH\n");
|
|
|
|
uip_icmp6_error_output(ICMP6_DST_UNREACH, ICMP6_DST_UNREACH_ADDR, 0);
|
|
|
|
uip_flags = 0;
|
|
|
|
tcpip_ipv6_output();
|
|
|
|
return;
|
|
|
|
}
|
2010-03-16 16:35:03 +01:00
|
|
|
#else
|
2010-03-15 17:41:24 +01:00
|
|
|
PRINTF("tcpip_ipv6_output: Destination off-link but no route\n");
|
2011-12-02 17:07:27 +01:00
|
|
|
#endif /* !UIP_FALLBACK_INTERFACE */
|
2015-06-15 10:25:58 +02:00
|
|
|
uip_clear_buf();
|
2009-04-06 15:18:12 +02:00
|
|
|
return;
|
|
|
|
}
|
2013-08-12 00:18:27 +02:00
|
|
|
|
2010-03-15 17:41:24 +01:00
|
|
|
} else {
|
2013-08-12 00:18:27 +02:00
|
|
|
/* A route was found, so we look up the nexthop neighbor for
|
|
|
|
the route. */
|
|
|
|
nexthop = uip_ds6_route_nexthop(route);
|
|
|
|
|
|
|
|
/* If the nexthop is dead, for example because the neighbor
|
|
|
|
never responded to link-layer acks, we drop its route. */
|
|
|
|
if(nexthop == NULL) {
|
|
|
|
#if UIP_CONF_IPV6_RPL
|
|
|
|
/* If we are running RPL, and if we are the root of the
|
|
|
|
network, we'll trigger a global repair berfore we remove
|
|
|
|
the route. */
|
|
|
|
rpl_dag_t *dag;
|
|
|
|
rpl_instance_t *instance;
|
|
|
|
|
|
|
|
dag = (rpl_dag_t *)route->state.dag;
|
|
|
|
if(dag != NULL) {
|
|
|
|
instance = dag->instance;
|
|
|
|
|
|
|
|
rpl_repair_root(instance->instance_id);
|
|
|
|
}
|
2014-12-02 11:29:49 +01:00
|
|
|
#endif /* UIP_CONF_IPV6_RPL */
|
2013-08-12 00:18:27 +02:00
|
|
|
uip_ds6_route_rm(route);
|
|
|
|
|
|
|
|
/* We don't have a nexthop to send the packet to, so we drop
|
|
|
|
it. */
|
|
|
|
return;
|
|
|
|
}
|
2008-10-15 09:59:34 +02:00
|
|
|
}
|
2013-07-03 19:32:26 +02:00
|
|
|
#if TCPIP_CONF_ANNOTATE_TRANSMISSIONS
|
2013-08-12 00:18:27 +02:00
|
|
|
if(nexthop != NULL) {
|
|
|
|
static uint8_t annotate_last;
|
|
|
|
static uint8_t annotate_has_last = 0;
|
|
|
|
|
|
|
|
if(annotate_has_last) {
|
|
|
|
printf("#L %u 0; red\n", annotate_last);
|
|
|
|
}
|
|
|
|
printf("#L %u 1; red\n", nexthop->u8[sizeof(uip_ipaddr_t) - 1]);
|
|
|
|
annotate_last = nexthop->u8[sizeof(uip_ipaddr_t) - 1];
|
|
|
|
annotate_has_last = 1;
|
2013-07-03 19:32:26 +02:00
|
|
|
}
|
2013-08-12 00:18:27 +02:00
|
|
|
#endif /* TCPIP_CONF_ANNOTATE_TRANSMISSIONS */
|
2008-10-14 11:40:56 +02:00
|
|
|
}
|
2013-08-12 00:18:27 +02:00
|
|
|
|
2011-12-02 17:07:27 +01:00
|
|
|
/* End of next hop determination */
|
2013-08-12 00:18:27 +02:00
|
|
|
|
2011-07-11 16:53:02 +02:00
|
|
|
#if UIP_CONF_IPV6_RPL
|
2016-02-01 18:02:33 +01:00
|
|
|
if(!rpl_finalize_header(nexthop)) {
|
2015-06-15 10:25:58 +02:00
|
|
|
uip_clear_buf();
|
2011-07-11 16:53:02 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
#endif /* UIP_CONF_IPV6_RPL */
|
2013-08-12 00:18:27 +02:00
|
|
|
nbr = uip_ds6_nbr_lookup(nexthop);
|
|
|
|
if(nbr == NULL) {
|
2013-07-02 13:52:11 +02:00
|
|
|
#if UIP_ND6_SEND_NA
|
2015-09-20 21:17:32 +02:00
|
|
|
if((nbr = uip_ds6_nbr_add(nexthop, NULL, 0, NBR_INCOMPLETE, NBR_TABLE_REASON_IPV6_ND, NULL)) == NULL) {
|
2015-06-15 10:25:58 +02:00
|
|
|
uip_clear_buf();
|
2016-02-01 18:02:33 +01:00
|
|
|
PRINTF("tcpip_ipv6_output: failed to add neighbor to cache\n");
|
2010-03-15 17:41:24 +01:00
|
|
|
return;
|
2008-10-14 11:40:56 +02:00
|
|
|
} else {
|
2008-10-15 09:59:34 +02:00
|
|
|
#if UIP_CONF_IPV6_QUEUE_PKT
|
2011-12-02 17:07:27 +01:00
|
|
|
/* Copy outgoing pkt in the queuing buffer for later transmit. */
|
2010-10-29 07:36:07 +02:00
|
|
|
if(uip_packetqueue_alloc(&nbr->packethandle, UIP_DS6_NBR_PACKET_LIFETIME) != NULL) {
|
|
|
|
memcpy(uip_packetqueue_buf(&nbr->packethandle), UIP_IP_BUF, uip_len);
|
|
|
|
uip_packetqueue_set_buflen(&nbr->packethandle, uip_len);
|
|
|
|
}
|
2008-10-14 11:40:56 +02:00
|
|
|
#endif
|
2016-04-22 21:41:03 +02:00
|
|
|
/* RFC4861, 7.2.2:
|
|
|
|
* "If the source address of the packet prompting the solicitation is the
|
|
|
|
* same as one of the addresses assigned to the outgoing interface, that
|
|
|
|
* address SHOULD be placed in the IP Source Address of the outgoing
|
|
|
|
* solicitation. Otherwise, any one of the addresses assigned to the
|
|
|
|
* interface should be used."*/
|
|
|
|
if(uip_ds6_is_my_addr(&UIP_IP_BUF->srcipaddr)){
|
2010-03-15 17:41:24 +01:00
|
|
|
uip_nd6_ns_output(&UIP_IP_BUF->srcipaddr, NULL, &nbr->ipaddr);
|
|
|
|
} else {
|
|
|
|
uip_nd6_ns_output(NULL, NULL, &nbr->ipaddr);
|
|
|
|
}
|
2008-10-14 11:40:56 +02:00
|
|
|
|
2011-12-02 17:07:27 +01:00
|
|
|
stimer_set(&nbr->sendns, uip_ds6_if.retrans_timer / 1000);
|
2010-03-15 17:41:24 +01:00
|
|
|
nbr->nscount = 1;
|
2015-03-09 19:41:25 +01:00
|
|
|
/* Send the first NS try from here (multicast destination IP address). */
|
2010-03-15 17:41:24 +01:00
|
|
|
}
|
2015-03-09 19:41:25 +01:00
|
|
|
#else /* UIP_ND6_SEND_NA */
|
2016-02-01 18:02:33 +01:00
|
|
|
PRINTF("tcpip_ipv6_output: neighbor not in cache\n");
|
2015-03-09 19:41:25 +01:00
|
|
|
uip_len = 0;
|
|
|
|
return;
|
2013-07-02 13:52:11 +02:00
|
|
|
#endif /* UIP_ND6_SEND_NA */
|
2008-10-14 11:40:56 +02:00
|
|
|
} else {
|
2013-07-02 13:52:11 +02:00
|
|
|
#if UIP_ND6_SEND_NA
|
2010-10-24 23:05:42 +02:00
|
|
|
if(nbr->state == NBR_INCOMPLETE) {
|
2010-03-15 17:41:24 +01:00
|
|
|
PRINTF("tcpip_ipv6_output: nbr cache entry incomplete\n");
|
2008-10-15 09:59:34 +02:00
|
|
|
#if UIP_CONF_IPV6_QUEUE_PKT
|
2011-12-02 17:07:27 +01:00
|
|
|
/* Copy outgoing pkt in the queuing buffer for later transmit and set
|
|
|
|
the destination nbr to nbr. */
|
2010-10-29 07:36:07 +02:00
|
|
|
if(uip_packetqueue_alloc(&nbr->packethandle, UIP_DS6_NBR_PACKET_LIFETIME) != NULL) {
|
|
|
|
memcpy(uip_packetqueue_buf(&nbr->packethandle), UIP_IP_BUF, uip_len);
|
|
|
|
uip_packetqueue_set_buflen(&nbr->packethandle, uip_len);
|
|
|
|
}
|
2008-10-14 11:40:56 +02:00
|
|
|
#endif /*UIP_CONF_IPV6_QUEUE_PKT*/
|
2015-06-15 10:25:58 +02:00
|
|
|
uip_clear_buf();
|
2008-10-14 11:40:56 +02:00
|
|
|
return;
|
|
|
|
}
|
2011-12-02 17:07:27 +01:00
|
|
|
/* Send in parallel if we are running NUD (nbc state is either STALE,
|
2013-09-10 02:48:11 +02:00
|
|
|
DELAY, or PROBE). See RFC 4861, section 7.3.3 on node behavior. */
|
2010-10-24 23:05:42 +02:00
|
|
|
if(nbr->state == NBR_STALE) {
|
2010-03-15 17:41:24 +01:00
|
|
|
nbr->state = NBR_DELAY;
|
2011-12-02 17:07:27 +01:00
|
|
|
stimer_set(&nbr->reachable, UIP_ND6_DELAY_FIRST_PROBE_TIME);
|
2010-03-15 17:41:24 +01:00
|
|
|
nbr->nscount = 0;
|
|
|
|
PRINTF("tcpip_ipv6_output: nbr cache entry stale moving to delay\n");
|
2008-10-14 11:40:56 +02:00
|
|
|
}
|
2013-07-02 13:52:11 +02:00
|
|
|
#endif /* UIP_ND6_SEND_NA */
|
2008-10-14 11:40:56 +02:00
|
|
|
|
2013-07-03 19:32:26 +02:00
|
|
|
tcpip_output(uip_ds6_nbr_get_ll(nbr));
|
2008-10-14 11:40:56 +02:00
|
|
|
|
|
|
|
#if UIP_CONF_IPV6_QUEUE_PKT
|
2011-12-02 17:07:27 +01:00
|
|
|
/*
|
|
|
|
* Send the queued packets from here, may not be 100% perfect though.
|
2008-10-14 11:40:56 +02:00
|
|
|
* This happens in a few cases, for example when instead of receiving a
|
|
|
|
* NA after sendiong a NS, you receive a NS with SLLAO: the entry moves
|
2011-12-02 17:07:27 +01:00
|
|
|
* to STALE, and you must both send a NA and the queued packet.
|
2008-10-14 11:40:56 +02:00
|
|
|
*/
|
2010-10-29 07:36:07 +02:00
|
|
|
if(uip_packetqueue_buflen(&nbr->packethandle) != 0) {
|
|
|
|
uip_len = uip_packetqueue_buflen(&nbr->packethandle);
|
|
|
|
memcpy(UIP_IP_BUF, uip_packetqueue_buf(&nbr->packethandle), uip_len);
|
|
|
|
uip_packetqueue_free(&nbr->packethandle);
|
2013-07-03 19:32:26 +02:00
|
|
|
tcpip_output(uip_ds6_nbr_get_ll(nbr));
|
2008-10-14 11:40:56 +02:00
|
|
|
}
|
|
|
|
#endif /*UIP_CONF_IPV6_QUEUE_PKT*/
|
|
|
|
|
2015-06-15 10:25:58 +02:00
|
|
|
uip_clear_buf();
|
2008-10-14 11:40:56 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
2011-12-02 17:07:27 +01:00
|
|
|
/* Multicast IP destination address. */
|
2008-10-14 11:40:56 +02:00
|
|
|
tcpip_output(NULL);
|
2015-06-15 10:25:58 +02:00
|
|
|
uip_clear_buf();
|
2008-10-14 11:40:56 +02:00
|
|
|
}
|
2014-12-01 21:02:57 +01:00
|
|
|
#endif /* NETSTACK_CONF_WITH_IPV6 */
|
2008-10-14 11:40:56 +02:00
|
|
|
/*---------------------------------------------------------------------------*/
|
2007-09-29 05:54:18 +02:00
|
|
|
#if UIP_UDP
|
2006-06-18 00:41:10 +02:00
|
|
|
void
|
|
|
|
tcpip_poll_udp(struct uip_udp_conn *conn)
|
|
|
|
{
|
|
|
|
process_post(&tcpip_process, UDP_POLL, conn);
|
|
|
|
}
|
2007-09-29 05:54:18 +02:00
|
|
|
#endif /* UIP_UDP */
|
2006-06-18 00:41:10 +02:00
|
|
|
/*---------------------------------------------------------------------------*/
|
2008-10-14 11:40:56 +02:00
|
|
|
#if UIP_TCP
|
2006-06-18 00:41:10 +02:00
|
|
|
void
|
|
|
|
tcpip_poll_tcp(struct uip_conn *conn)
|
|
|
|
{
|
|
|
|
process_post(&tcpip_process, TCP_POLL, conn);
|
|
|
|
}
|
2008-10-14 11:40:56 +02:00
|
|
|
#endif /* UIP_TCP */
|
2006-06-18 00:41:10 +02:00
|
|
|
/*---------------------------------------------------------------------------*/
|
|
|
|
void
|
|
|
|
tcpip_uipcall(void)
|
|
|
|
{
|
2013-03-06 14:32:36 +01:00
|
|
|
uip_udp_appstate_t *ts;
|
2016-04-22 21:41:03 +02:00
|
|
|
|
2007-09-29 05:54:18 +02:00
|
|
|
#if UIP_UDP
|
2006-06-18 00:41:10 +02:00
|
|
|
if(uip_conn != NULL) {
|
|
|
|
ts = &uip_conn->appstate;
|
|
|
|
} else {
|
|
|
|
ts = &uip_udp_conn->appstate;
|
|
|
|
}
|
2007-09-29 05:54:18 +02:00
|
|
|
#else /* UIP_UDP */
|
|
|
|
ts = &uip_conn->appstate;
|
|
|
|
#endif /* UIP_UDP */
|
2006-06-18 00:41:10 +02:00
|
|
|
|
2008-10-15 09:59:34 +02:00
|
|
|
#if UIP_TCP
|
2016-04-22 21:41:03 +02:00
|
|
|
{
|
|
|
|
unsigned char i;
|
|
|
|
struct listenport *l;
|
2015-08-12 17:51:26 +02:00
|
|
|
|
2016-04-22 21:41:03 +02:00
|
|
|
/* If this is a connection request for a listening port, we must
|
2008-10-15 09:59:34 +02:00
|
|
|
mark the connection with the right process ID. */
|
2016-04-22 21:41:03 +02:00
|
|
|
if(uip_connected()) {
|
|
|
|
l = &s.listenports[0];
|
|
|
|
for(i = 0; i < UIP_LISTENPORTS; ++i) {
|
|
|
|
if(l->port == uip_conn->lport &&
|
|
|
|
l->p != PROCESS_NONE) {
|
|
|
|
ts->p = l->p;
|
|
|
|
ts->state = NULL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
++l;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Start the periodic polling, if it isn't already active. */
|
|
|
|
start_periodic_tcp_timer();
|
|
|
|
}
|
|
|
|
}
|
2010-02-09 13:58:53 +01:00
|
|
|
#endif /* UIP_TCP */
|
2016-04-22 21:41:03 +02:00
|
|
|
|
2006-06-18 00:41:10 +02:00
|
|
|
if(ts->p != NULL) {
|
|
|
|
process_post_synch(ts->p, tcpip_event, ts->state);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/*---------------------------------------------------------------------------*/
|
|
|
|
PROCESS_THREAD(tcpip_process, ev, data)
|
|
|
|
{
|
|
|
|
PROCESS_BEGIN();
|
2015-08-12 17:51:26 +02:00
|
|
|
|
2008-10-14 11:40:56 +02:00
|
|
|
#if UIP_TCP
|
2016-04-22 21:41:03 +02:00
|
|
|
{
|
|
|
|
unsigned char i;
|
|
|
|
|
|
|
|
for(i = 0; i < UIP_LISTENPORTS; ++i) {
|
|
|
|
s.listenports[i].port = 0;
|
|
|
|
}
|
|
|
|
s.p = PROCESS_CURRENT();
|
|
|
|
}
|
2008-10-14 11:40:56 +02:00
|
|
|
#endif
|
2009-02-20 22:21:56 +01:00
|
|
|
|
2006-06-18 00:41:10 +02:00
|
|
|
tcpip_event = process_alloc_event();
|
2010-02-05 13:43:36 +01:00
|
|
|
#if UIP_CONF_ICMP6
|
|
|
|
tcpip_icmp6_event = process_alloc_event();
|
|
|
|
#endif /* UIP_CONF_ICMP6 */
|
2010-02-09 13:58:53 +01:00
|
|
|
etimer_set(&periodic, CLOCK_SECOND / 2);
|
2006-06-18 00:41:10 +02:00
|
|
|
|
|
|
|
uip_init();
|
2010-03-16 16:35:03 +01:00
|
|
|
#ifdef UIP_FALLBACK_INTERFACE
|
|
|
|
UIP_FALLBACK_INTERFACE.init();
|
|
|
|
#endif
|
2016-04-22 21:41:03 +02:00
|
|
|
/* initialize RPL if configured for using RPL */
|
2014-12-01 21:02:57 +01:00
|
|
|
#if NETSTACK_CONF_WITH_IPV6 && UIP_CONF_IPV6_RPL
|
2010-05-01 15:04:31 +02:00
|
|
|
rpl_init();
|
|
|
|
#endif /* UIP_CONF_IPV6_RPL */
|
|
|
|
|
2006-06-18 00:41:10 +02:00
|
|
|
while(1) {
|
|
|
|
PROCESS_YIELD();
|
|
|
|
eventhandler(ev, data);
|
|
|
|
}
|
2016-04-22 21:41:03 +02:00
|
|
|
|
2006-06-18 00:41:10 +02:00
|
|
|
PROCESS_END();
|
|
|
|
}
|
2008-11-09 13:29:24 +01:00
|
|
|
/*---------------------------------------------------------------------------*/
|