tcpsock.c

Go to the documentation of this file.
00001 /*
00002  * Copyright (C) 2001-2005 by egnite Software GmbH. All rights reserved.
00003  *
00004  * Redistribution and use in source and binary forms, with or without
00005  * modification, are permitted provided that the following conditions
00006  * are met:
00007  *
00008  * 1. Redistributions of source code must retain the above copyright
00009  *    notice, this list of conditions and the following disclaimer.
00010  * 2. Redistributions in binary form must reproduce the above copyright
00011  *    notice, this list of conditions and the following disclaimer in the
00012  *    documentation and/or other materials provided with the distribution.
00013  * 3. Neither the name of the copyright holders nor the names of
00014  *    contributors may be used to endorse or promote products derived
00015  *    from this software without specific prior written permission.
00016  *
00017  * THIS SOFTWARE IS PROVIDED BY EGNITE SOFTWARE GMBH AND CONTRIBUTORS
00018  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
00019  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
00020  * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL EGNITE
00021  * SOFTWARE GMBH OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
00022  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
00023  * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
00024  * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
00025  * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
00026  * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
00027  * THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
00028  * SUCH DAMAGE.
00029  *
00030  * For additional information see http://www.ethernut.de/
00031  *
00032  * -
00033  * Portions Copyright (C) 2000 David J. Hudson <dave@humbug.demon.co.uk>
00034  *
00035  * This file is distributed in the hope that it will be useful, but WITHOUT
00036  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
00037  * FITNESS FOR A PARTICULAR PURPOSE.
00038  *
00039  * You can redistribute this file and/or modify it under the terms of the GNU
00040  * General Public License (GPL) as published by the Free Software Foundation;
00041  * either version 2 of the License, or (at your discretion) any later version.
00042  * See the accompanying file "copying-gpl.txt" for more details.
00043  *
00044  * As a special exception to the GPL, permission is granted for additional
00045  * uses of the text contained in this file.  See the accompanying file
00046  * "copying-liquorice.txt" for details.
00047  * -
00048  * Portions Copyright (c) 1983, 1993 by
00049  *  The Regents of the University of California.  All rights reserved.
00050  *
00051  * Redistribution and use in source and binary forms, with or without
00052  * modification, are permitted provided that the following conditions
00053  * are met:
00054  * 1. Redistributions of source code must retain the above copyright
00055  *    notice, this list of conditions and the following disclaimer.
00056  * 2. Redistributions in binary form must reproduce the above copyright
00057  *    notice, this list of conditions and the following disclaimer in the
00058  *    documentation and/or other materials provided with the distribution.
00059  * 3. Neither the name of the University nor the names of its contributors
00060  *    may be used to endorse or promote products derived from this software
00061  *    without specific prior written permission.
00062  *
00063  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
00064  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
00065  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
00066  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
00067  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
00068  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
00069  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
00070  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
00071  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
00072  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
00073  * SUCH DAMAGE.
00074  * -
00075  * Portions Copyright (c) 1993 by Digital Equipment Corporation.
00076  *
00077  * Permission to use, copy, modify, and distribute this software for any
00078  * purpose with or without fee is hereby granted, provided that the above
00079  * copyright notice and this permission notice appear in all copies, and that
00080  * the name of Digital Equipment Corporation not be used in advertising or
00081  * publicity pertaining to distribution of the document or software without
00082  * specific, written prior permission.
00083  * 
00084  * THE SOFTWARE IS PROVIDED "AS IS" AND DIGITAL EQUIPMENT CORP. DISCLAIMS ALL
00085  * WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES
00086  * OF MERCHANTABILITY AND FITNESS.   IN NO EVENT SHALL DIGITAL EQUIPMENT
00087  * CORPORATION BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
00088  * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
00089  * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
00090  * ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
00091  * SOFTWARE.
00092  */
00093 
00094 /*
00095  * $Log: tcpsock.c,v $
00096  * Revision 1.19  2006/10/08 16:48:22  haraldkipp
00097  * Documentation fixed
00098  *
00099  * Revision 1.18  2006/03/21 21:22:20  drsung
00100  * Enhancement made to TCP state machine. Now TCP options
00101  * are read from peer and at least the maximum segment size is stored.
00102  *
00103  * Revision 1.17  2005/10/24 11:00:16  haraldkipp
00104  * Integer division hack for ARM without CRT removed again.
00105  *
00106  * Revision 1.16  2005/08/02 17:47:03  haraldkipp
00107  * Major API documentation update.
00108  *
00109  * Revision 1.15  2005/04/30 16:42:42  chaac
00110  * Fixed bug in handling of NUTDEBUG. Added include for cfg/os.h. If NUTDEBUG
00111  * is defined in NutConf, it will make effect where it is used.
00112  *
00113  * Revision 1.14  2005/04/08 14:40:36  freckle
00114  * added <sys/types.h> (__APPLE__) and <netinet/in.h> (__linux__) for htons
00115  *
00116  * Revision 1.13  2005/04/05 17:58:02  haraldkipp
00117  * Avoid integer division on ARM platform as long as we run without crtlib.
00118  *
00119  * Revision 1.12  2005/02/04 17:16:45  haraldkipp
00120  * Stop searching when listening socket found
00121  *
00122  * Revision 1.11  2005/01/03 08:44:15  haraldkipp
00123  * Simplyfied NutTcpSend().
00124  *
00125  * Revision 1.10  2004/10/14 16:43:07  drsung
00126  * Fixed compiler warning "comparison between signed and unsigned"
00127  *
00128  * Revision 1.9  2004/07/30 19:54:46  drsung
00129  * Some code of TCP stack redesigned. Round trip time calculation is now
00130  * supported. Fixed several bugs in TCP state machine. Now TCP connections
00131  * should be more reliable under heavy traffic or poor physical connections.
00132  *
00133  * Revision 1.8  2004/03/16 16:48:45  haraldkipp
00134  * Added Jan Dubiec's H8/300 port.
00135  *
00136  * Revision 1.7  2004/01/28 12:11:57  drsung
00137  * Bugfix for ICCAVR ... again
00138  *
00139  * Revision 1.6  2004/01/28 07:11:38  drsung
00140  * Bugfix for ICCAVR
00141  *
00142  * Revision 1.5  2004/01/14 19:34:08  drsung
00143  * New TCP output buffer handling
00144  *
00145  * Revision 1.4  2003/11/04 17:58:18  haraldkipp
00146  * Removed volatile attibute from socket list
00147  *
00148  * Revision 1.3  2003/08/14 15:08:36  haraldkipp
00149  * Bugfix, TCP may reuse socket ports because of wrong byte order during compare.
00150  *
00151  * Revision 1.2  2003/07/13 19:23:59  haraldkipp
00152  * TCP transfer speed increased by changing the character receive buffer
00153  * in TCPSOCKET to a NETBUF queue.
00154  *
00155  * Revision 1.1.1.1  2003/05/09 14:41:44  haraldkipp
00156  * Initial using 3.2.1
00157  *
00158  * Revision 1.18  2003/02/04 18:14:57  harald
00159  * Version 3 released
00160  *
00161  * Revision 1.17  2002/09/15 17:07:05  harald
00162  * Allow application to read buffered data during close wait
00163  *
00164  * Revision 1.16  2002/09/03 17:43:15  harald
00165  * Configurable receive buffer size
00166  *
00167  * Revision 1.15  2002/08/16 17:54:57  harald
00168  * Count out of sequence drops
00169  *
00170  * Revision 1.14  2002/08/11 12:26:21  harald
00171  * ICC mods
00172  *
00173  * Revision 1.13  2002/06/26 17:29:36  harald
00174  * First pre-release with 2.4 stack
00175  *
00176  */
00177 
00178 #include <cfg/os.h>
00179 #include <sys/types.h>
00180 #include <string.h>
00181 
00182 #include <sys/atom.h>
00183 #include <sys/heap.h>
00184 #include <sys/thread.h>
00185 #include <sys/event.h>
00186 #include <sys/timer.h>
00187 
00188 #include <net/errno.h>
00189 #include <net/route.h>
00190 #include <netinet/in.h>
00191 #include <netinet/ip.h>
00192 #include <netinet/icmp.h>
00193 #include <netinet/ip_icmp.h>
00194 #include <netinet/ipcsum.h>
00195 #include <sys/socket.h>
00196 #include <netinet/tcp.h>
00197 #include <stdio.h>
00198 #include <io.h>
00199 
00200 #ifdef NUTDEBUG
00201 #include <net/netdebug.h>
00202 #endif
00203 
00204 #define TICK_RATE   1
00205 
00210 
00211 TCPSOCKET *tcpSocketList = 0;   
00213 static volatile u_short last_local_port = 4096; /* Unassigned local port. */
00214 
00215 static u_char tcpStateRunning = 0;
00216 
00217 void NutTcpDiscardBuffers(TCPSOCKET * sock)
00218 {
00219     NETBUF *nb;
00220     while ((nb = sock->so_rx_buf) != 0) {
00221         sock->so_rx_buf = nb->nb_next;
00222         NutNetBufFree(nb);
00223     }
00224     while ((nb = sock->so_tx_nbq) != 0) {
00225         sock->so_tx_nbq = nb->nb_next;
00226         NutNetBufFree(nb);
00227     }
00228     while ((nb = sock->so_rx_nbq) != 0) {
00229         sock->so_rx_nbq = nb->nb_next;
00230         NutNetBufFree(nb);
00231     }
00232 }
00233 
00234 
00246 void NutTcpDestroySocket(TCPSOCKET * sock)
00247 {
00248     TCPSOCKET *sp;
00249     TCPSOCKET *volatile *spp;
00250     
00251     //@@@printf ("[%04X] Calling destroy.\n", (u_short) sock);
00252 
00253     /*
00254      * Remove socket from the list.
00255      */
00256     sp = tcpSocketList;
00257     spp = &tcpSocketList;
00258     while (sp) {
00259         if (sp == sock) {
00260             *spp = sp->so_next;
00261             break;
00262         }
00263         spp = &sp->so_next;
00264         sp = sp->so_next;
00265     }
00266 
00267     /*
00268      * Free all memory occupied by the socket.
00269      */
00270     if (sp) {
00271         NutTcpDiscardBuffers(sock);
00272         if (sock->so_devocnt)
00273         {
00274             NutHeapFree(sock->so_devobuf);
00275             sock->so_devocnt = 0;
00276         }
00277         memset(sock, 0, sizeof(TCPSOCKET));
00278         NutHeapFree(sock);
00279     }
00280 }
00281 
00296 TCPSOCKET *NutTcpFindSocket(u_short lport, u_short rport, u_long raddr)
00297 {
00298     TCPSOCKET *sp;
00299     TCPSOCKET *sock = 0;
00300 
00301     /*
00302      * Try to find an exact match for the remote
00303      * address and port first.
00304      */
00305     for (sp = tcpSocketList; sp; sp = sp->so_next) {
00306         if (sp->so_local_port == lport) {
00307             if (sp->so_remote_addr == raddr && sp->so_remote_port == rport && sp->so_state != TCPS_CLOSED) {
00308                 sock = sp;
00309                 break;
00310             }
00311         }
00312     }
00313 
00314     /*
00315      * If no exact match exists, try a listening socket.
00316      * This part had been totally wrong, because it
00317      * didn't check the local port number and accepted
00318      * incoming requests on any port. Thanks to
00319      * Alejandro Lopez, who pointed this out.
00320      */
00321     if (sock == 0) {
00322         for (sp = tcpSocketList; sp; sp = sp->so_next) {
00323             if (sp->so_state == TCPS_LISTEN && sp->so_local_port == lport) {
00324                 sock = sp;
00325                 break;
00326             }
00327         }
00328     }
00329 
00330     return sock;
00331 }
00332 
00333 
00348 TCPSOCKET *NutTcpCreateSocket(void)
00349 {
00350     TCPSOCKET *sock = 0;
00351 
00352     if (tcpStateRunning || (tcpStateRunning = (NutTcpInitStateMachine() == 0))) {
00353 
00354         if ((sock = NutHeapAllocClear(sizeof(TCPSOCKET))) != 0) {
00355             sock->so_state = TCPS_CLOSED;
00356 
00357             /*
00358              * Initialize the virtual device interface.
00359              */
00360             sock->so_devtype = IFTYP_TCPSOCK;
00361             sock->so_devread = NutTcpDeviceRead;
00362             sock->so_devwrite = NutTcpDeviceWrite;
00363 #ifdef __HARVARD_ARCH__
00364             sock->so_devwrite_P = NutTcpDeviceWrite_P;
00365 #endif
00366             sock->so_devioctl = NutTcpDeviceIOCtl;
00367 
00368             sock->so_tx_isn = NutGetTickCount();  /* Generate the ISN from the nut_ticks counter */
00369             sock->so_tx_una = sock->so_tx_isn;
00370             sock->so_tx_nxt = sock->so_tx_isn;
00371             sock->so_rx_bsz = sock->so_rx_win = TCP_WINSIZE;
00372 
00373             sock->so_mss = TCP_MSS;
00374             sock->so_rtto = 1000; /* Initial retransmission time out */
00375 
00376             sock->so_next = tcpSocketList;
00377 
00378             sock->so_devobsz = TCP_MSS; /* Default output buffer size is TCP_MSS bytes */
00379 
00380             tcpSocketList = sock;
00381         }
00382     }
00383     return sock;
00384 }
00385 
00405 int NutTcpSetSockOpt(TCPSOCKET * sock, int optname, CONST void *optval, int optlen)
00406 {
00407     int rc = -1;
00408 
00409     if (sock == 0)
00410         return -1;
00411     switch (optname) {
00412 
00413     case TCP_MAXSEG:
00414         if (optval == 0 || optlen != sizeof(u_short))
00415             sock->so_last_error = EINVAL;
00416         else if (sock->so_state != TCPS_CLOSED) 
00417             sock->so_last_error = EISCONN;
00418         else {
00419             sock->so_mss = *((u_short *) optval);
00420             rc = 0;
00421         }
00422         break;
00423 
00424     case SO_RCVBUF:
00425         if (optval == 0 || optlen != sizeof(u_short))
00426             sock->so_last_error = EINVAL;
00427         else {
00428             sock->so_rx_bsz = *((u_short *) optval);
00429             sock->so_rx_win = sock->so_rx_bsz;
00430             rc = 0;
00431         }
00432         break;
00433 
00434     case SO_SNDTIMEO:
00435         if (optval == 0 || optlen != sizeof(u_long))
00436             sock->so_last_error = EINVAL;
00437         else {
00438             sock->so_write_to = *((u_long *) optval);
00439             rc = 0;
00440         }
00441         break;
00442 
00443     case SO_RCVTIMEO:
00444         if (optval == 0 || optlen != sizeof(u_long))
00445             sock->so_last_error = EINVAL;
00446         else {
00447             sock->so_read_to = *((u_long *) optval);
00448             rc = 0;
00449         }
00450         break;
00451 
00452     case SO_SNDBUF:
00453         if (optval == 0 || optlen != sizeof(u_short))
00454             sock->so_last_error = EINVAL;
00455         else {
00456             NutTcpDeviceWrite(sock, 0, 0);
00457             sock->so_devobsz = *((u_short *) optval);
00458             rc = 0;
00459         }
00460         break;
00461 
00462     default:
00463         sock->so_last_error = ENOPROTOOPT;
00464         break;
00465     }
00466     return rc;
00467 }
00468 
00488 int NutTcpGetSockOpt(TCPSOCKET * sock, int optname, void *optval, int optlen)
00489 {
00490     int rc = -1;
00491 
00492     if (sock == 0)
00493         return -1;
00494     switch (optname) {
00495 
00496     case TCP_MAXSEG:
00497         if (optval == 0 || optlen != sizeof(u_short))
00498             sock->so_last_error = EINVAL;
00499         else {
00500             *((u_short *) optval) = sock->so_mss;
00501             rc = 0;
00502         }
00503         break;
00504 
00505     case SO_RCVBUF:
00506         if (optval == 0 || optlen != sizeof(u_short))
00507             sock->so_last_error = EINVAL;
00508         else {
00509             *((u_short *) optval) = sock->so_rx_bsz;
00510             rc = 0;
00511         }
00512         break;
00513 
00514     case SO_SNDTIMEO:
00515         if (optval == 0 || optlen != sizeof(u_long))
00516             sock->so_last_error = EINVAL;
00517         else {
00518             *((u_long *) optval) = sock->so_write_to;
00519             rc = 0;
00520         }
00521         break;
00522 
00523     case SO_RCVTIMEO:
00524         if (optval == 0 || optlen != sizeof(u_long))
00525             sock->so_last_error = EINVAL;
00526         else {
00527             *((u_long *) optval) = sock->so_read_to;
00528             rc = 0;
00529         }
00530         break;
00531 
00532     case SO_SNDBUF:
00533         if (optval == 0 || optlen != sizeof(u_short))
00534             sock->so_last_error = EINVAL;
00535         else {
00536             *((u_short *) optval) = sock->so_devobsz;
00537             rc = 0;
00538         }
00539         break;
00540     default:
00541         sock->so_last_error = ENOPROTOOPT;
00542         break;
00543     }
00544     return rc;
00545 }
00546 
00565 int NutTcpConnect(TCPSOCKET * sock, u_long addr, u_short port)
00566 {
00567     TCPSOCKET *sp;
00568     NUTDEVICE *dev;
00569 
00570     if (sock == 0)
00571         return -1;
00572     /*
00573      * Despite RFC793 we do not allow a passive
00574      * open to become active.
00575      */
00576     if (sock->so_state == TCPS_LISTEN) {
00577         sock->so_last_error = EOPNOTSUPP;
00578         return -1;
00579     } else if (sock->so_state != TCPS_CLOSED) {
00580         sock->so_last_error = EISCONN;
00581         return -1;
00582     }
00583 
00584     /*
00585      * Find an unused local port.
00586      */
00587     do {
00588         if (++last_local_port == 0)
00589             last_local_port = 4096;
00590 
00591         sp = tcpSocketList;
00592         while (sp) {
00593             /* Thanks to Ralph Mason for fixing the byte order bug. */
00594             if (sp->so_local_port == htons(last_local_port))
00595                 break;
00596             sp = sp->so_next;
00597         }
00598     } while (sp);
00599 
00600     /*
00601      * OK - we've got a new port. Now fill
00602      * remaining parts of the socket structure.
00603      */
00604     sock->so_local_port = htons(last_local_port);
00605     sock->so_remote_port = htons(port);
00606     sock->so_remote_addr = addr;
00607 
00608     /*
00609      * Get local address for this destination.
00610      */
00611     if ((dev = NutIpRouteQuery(addr, 0)) != 0) {
00612         IFNET *nif = dev->dev_icb;
00613         sock->so_local_addr = nif->if_local_ip;
00614     } else {
00615         sock->so_last_error = EHOSTUNREACH;
00616         return -1;
00617     }
00618 
00619     /*
00620      * Trigger active open event for the state machine.
00621      * This will suspend the thread until synchronized.
00622      */
00623     return NutTcpStateActiveOpenEvent(sock);
00624 }
00625 
00641 int NutTcpAccept(TCPSOCKET * sock, u_short port)
00642 {
00643     sock->so_local_port = htons(port);
00644 
00645     return NutTcpStatePassiveOpenEvent(sock);
00646 }
00647 
00664 int NutTcpSend(TCPSOCKET * sock, CONST void *data, u_short len)
00665 {
00666     u_short unacked;
00667 
00668     /*
00669      * Check parameters.
00670      */
00671     NutThreadYield();
00672     
00673     if (sock == 0)
00674         return -1;
00675     if (data == 0 || len == 0)
00676         return 0;
00677 
00678     /*
00679      * Limit the transmission size to our maximum segment size.
00680      */
00681     if (len > sock->so_mss)
00682         len = sock->so_mss;
00683 
00684     for (;;) {
00685         /*
00686          * We can only send on an established connection.
00687          */
00688         if (sock->so_state != TCPS_ESTABLISHED) {
00689             sock->so_last_error = ENOTCONN;
00690             return -1;
00691         }
00692 
00693         /*
00694          * Limit the size of unacknowledged data to four full segments.
00695          * Also wait for peer's window open wide enough to take all our 
00696          * data. This also avoids silly window syndrome on our side.
00697          */
00698         unacked = sock->so_tx_nxt - sock->so_tx_una;
00699         if ((unacked >> 2) < sock->so_mss && len <= sock->so_tx_win - unacked) {
00700             break;
00701         }
00702         if (NutEventWait(&sock->so_tx_tq, sock->so_write_to)) {
00703             return 0;
00704         }
00705     }
00706     /*
00707      * The segment will be automatically retransmitted if not 
00708      * acknowledged in time. If this returns an error, it's a 
00709      * fatal one.
00710      */
00711     sock->so_tx_flags |= SO_ACK;
00712     if (NutTcpOutput(sock, data, len))
00713         return -1;
00714     return len;
00715 }
00716 
00734 int NutTcpReceive(TCPSOCKET * sock, void *data, u_short size)
00735 {
00736     u_short i;
00737 
00738     NutThreadYield();
00739     /*
00740      * Check parameters.
00741      */
00742     if (sock == 0)
00743         return -1;
00744     if (sock->so_state != TCPS_ESTABLISHED && sock->so_state != TCPS_CLOSE_WAIT) {
00745         sock->so_last_error = ENOTCONN;
00746         return -1;
00747     }
00748     if (data == 0 || size == 0)
00749         return 0;
00750 
00751     /*
00752      * Wait until any data arrived, a timeout occurs
00753      * or the connection terminates.
00754      */
00755     while (sock->so_rx_cnt - sock->so_rd_cnt == 0) {
00756         if (sock->so_state != TCPS_ESTABLISHED) {
00757             sock->so_last_error = ENOTCONN;
00758             return -1;
00759         }
00760         if (NutEventWait(&sock->so_rx_tq, sock->so_read_to))
00761             return 0;
00762     }
00763 
00764     if (size > sock->so_rx_cnt - sock->so_rd_cnt)
00765         size = sock->so_rx_cnt - sock->so_rd_cnt;
00766     if (size) {
00767         NETBUF *nb;
00768         u_short rd_cnt;         /* Bytes read from NETBUF. */
00769         u_short nb_cnt;         /* Bytes left in NETBUF. */
00770         u_short ab_cnt;         /* Total bytes in app buffer. */
00771         u_short mv_cnt;         /* Bytes to move to app buffer. */
00772 
00773         rd_cnt = sock->so_rd_cnt;
00774 
00775         ab_cnt = 0;
00776         while (ab_cnt < size) {
00777             nb = sock->so_rx_buf;
00778             nb_cnt = nb->nb_ap.sz - rd_cnt;
00779             mv_cnt = size - ab_cnt;
00780             if (mv_cnt > nb_cnt)
00781                 mv_cnt = nb_cnt;
00782             memcpy((char *) data + ab_cnt, (char *) (nb->nb_ap.vp) + rd_cnt, mv_cnt);
00783             ab_cnt += mv_cnt;
00784             rd_cnt += mv_cnt;
00785             if (mv_cnt >= nb_cnt) {
00786                 sock->so_rx_buf = nb->nb_next;
00787                 sock->so_rx_cnt -= rd_cnt;
00788                 NutNetBufFree(nb);
00789                 nb = sock->so_rx_buf;
00790                 rd_cnt = 0;
00791             }
00792         }
00793         sock->so_rd_cnt = rd_cnt;
00794 
00795         /*
00796          * Update our receive window.
00797          */
00798         if (sock->so_state == TCPS_ESTABLISHED) {
00799             i = sock->so_rx_win;
00800             if ((i += size) > sock->so_rx_bsz)
00801                 i = sock->so_rx_bsz;
00802 
00803             if (sock->so_rx_win <= sock->so_mss && i > sock->so_mss) {
00804                 sock->so_rx_win = i;
00805                 NutTcpStateWindowEvent(sock);
00806             } else {
00807                 sock->so_rx_win = i;
00808             }
00809         }
00810     }
00811     return size;
00812 }
00813 
00826 int NutTcpCloseSocket(TCPSOCKET * sock)
00827 {
00828     /* Flush buffer first */
00829     //@@@printf ("[%04X] Calling close\n", (u_short) sock);
00830     NutTcpDeviceWrite(sock, 0, 0);
00831     return NutTcpStateCloseEvent(sock);
00832 }
00833 
00882 int NutTcpError(TCPSOCKET * sock)
00883 {
00884     if (sock == 0)
00885         return ENOTSOCK;
00886     return sock->so_last_error;
00887 }
00888 
00908 int NutTcpDeviceRead(TCPSOCKET * sock, void *buffer, int size)
00909 {
00910     return NutTcpReceive(sock, buffer, size);
00911 }
00912 
00913 static int SendBuffer(TCPSOCKET * sock, CONST void *buffer, int size)
00914 {
00915     int rc;
00916     int bite;
00917 
00918     for (rc = 0; rc < size; rc += bite) {
00919         if ((bite = NutTcpSend(sock, (u_char *) buffer + rc, size - rc)) <= 0) {
00920             return -1;
00921         }
00922     }
00923     return rc;
00924 }
00925 
00948 int NutTcpDeviceWrite(TCPSOCKET * sock, CONST void *buf, int size)
00949 {
00950     int rc;
00951     u_short sz;
00952     /* hack alert for ICCAVR */
00953     u_char *buffer = (u_char*) buf;
00954 
00955     /*
00956      * Check parameters.
00957      */
00958     if (sock == 0)
00959         return -1;
00960     if (sock->so_state != TCPS_ESTABLISHED) {
00961         sock->so_last_error = ENOTCONN;
00962         return -1;
00963     }
00964 
00965     /* Flush buffer? */
00966     if (size == 0) {
00967         if (sock->so_devocnt) {
00968             if (SendBuffer(sock, sock->so_devobuf, sock->so_devocnt) < 0) {
00969                 NutHeapFree(sock->so_devobuf);
00970                 sock->so_devocnt = 0;
00971                 return -1;
00972             }
00973             NutHeapFree(sock->so_devobuf);
00974             sock->so_devocnt = 0;
00975         }
00976         return 0;
00977     }
00978 
00979     /* If we don't have a buffer so far... */
00980     if (sock->so_devocnt == 0) {
00981         /* If new data block is bigger or equal than buffer size
00982          * send first part of data to nic and store remaining
00983          * bytes in buffer
00984          */
00985         if ((u_short) size >= sock->so_devobsz) {
00986             rc = size % sock->so_devobsz;
00987             if (SendBuffer(sock, buffer, size - rc) < 0)
00988                 return -1;
00989             buffer += size - rc;
00990         } else
00991             rc = size;
00992 
00993         /* If there are some remainings bytes, allocate buffer
00994          * and store them
00995          */
00996         if (rc) {
00997             if (!(sock->so_devobuf = NutHeapAlloc(sock->so_devobsz)))
00998                 return -1;
00999             memcpy(sock->so_devobuf, buffer, rc);
01000             sock->so_devocnt = rc;
01001         }
01002         return size;
01003     }
01004 
01005     /* Check if new data fully fits in output buffer */
01006     if (sock->so_devocnt + size < sock->so_devobsz) {
01007         memcpy(sock->so_devobuf + sock->so_devocnt, buffer, size);
01008         sock->so_devocnt += size;
01009         return size;
01010     }
01011 
01012     /* Otherwise store first bytes of new data in buffer and flush
01013      * the buffer
01014      */
01015     sz = sock->so_devobsz - sock->so_devocnt;
01016     memcpy(sock->so_devobuf + sock->so_devocnt, buffer, sz);
01017     buffer += sz;
01018     if (SendBuffer(sock, sock->so_devobuf, sock->so_devobsz) < 0) {
01019         NutHeapFree(sock->so_devobuf);
01020         sock->so_devocnt = 0;
01021         return -1;
01022     }
01023 
01024     /* If remaining data is bigger or equal than buffer size
01025      * send first part of data to nic and later store remaining
01026      * bytes in buffer
01027      */
01028     sz = size - sz;
01029     if (sz >= sock->so_devobsz) {
01030         rc = size % sock->so_devobsz;
01031         if (SendBuffer(sock, buffer, sz - rc) < 0) {
01032             NutHeapFree(sock->so_devobuf);
01033             sock->so_devocnt = 0;
01034             return -1;
01035         }
01036         buffer += sz - rc;
01037     } else
01038         rc = sz;
01039 
01040     /* If there are some remainings bytes, store them in buffer
01041      */
01042     if (rc)
01043         memcpy(sock->so_devobuf, buffer, rc);
01044     else                        /* Otherwise free buffer */
01045         NutHeapFree(sock->so_devobuf);
01046     sock->so_devocnt = rc;
01047 
01048     return size;
01049 }
01050 
01075 #ifdef __HARVARD_ARCH__
01076 int NutTcpDeviceWrite_P(TCPSOCKET * sock, PGM_P buffer, int size)
01077 {
01078     int rc;
01079     char *rp = 0;
01080 
01081     /*
01082      * Hack alert. Neither do we handle out of memory correctly
01083      * nor do we pass the PGM pointer to lower levels.
01084      */
01085     if (size && (rp = NutHeapAlloc(size)) != 0)
01086         memcpy_P(rp, buffer, size);
01087     rc = NutTcpDeviceWrite(sock, rp, size);
01088     if (rp)
01089         NutHeapFree(rp);
01090 
01091     return rc;
01092 }
01093 #endif
01094 
01114 int NutTcpDeviceIOCtl(TCPSOCKET * sock, int cmd, void *param)
01115 {
01116     u_long *lvp = (u_long *) param;
01117     int rc = 0;
01118     
01119     switch (cmd) {
01120     case IOCTL_GETFILESIZE:
01121     case IOCTL_GETINBUFCOUNT:
01122         *lvp = (sock->so_rx_cnt - sock->so_rd_cnt);
01123         break;
01124     case IOCTL_GETOUTBUFCOUNT:
01125         *lvp = (sock->so_devocnt);
01126         break;
01127     default:
01128         rc = -1;
01129     }
01130     
01131     return rc;    
01132 }
01133 

© 2000-2007 by egnite Software GmbH - visit http://www.ethernut.de/