tcpsock.c

Go to the documentation of this file.
00001 /*
00002  * Copyright (C) 2001-2005 by egnite Software GmbH. All rights reserved.
00003  *
00004  * Redistribution and use in source and binary forms, with or without
00005  * modification, are permitted provided that the following conditions
00006  * are met:
00007  *
00008  * 1. Redistributions of source code must retain the above copyright
00009  *    notice, this list of conditions and the following disclaimer.
00010  * 2. Redistributions in binary form must reproduce the above copyright
00011  *    notice, this list of conditions and the following disclaimer in the
00012  *    documentation and/or other materials provided with the distribution.
00013  * 3. Neither the name of the copyright holders nor the names of
00014  *    contributors may be used to endorse or promote products derived
00015  *    from this software without specific prior written permission.
00016  *
00017  * THIS SOFTWARE IS PROVIDED BY EGNITE SOFTWARE GMBH AND CONTRIBUTORS
00018  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
00019  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
00020  * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL EGNITE
00021  * SOFTWARE GMBH OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
00022  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
00023  * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
00024  * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
00025  * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
00026  * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
00027  * THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
00028  * SUCH DAMAGE.
00029  *
00030  * For additional information see http://www.ethernut.de/
00031  *
00032  * -
00033  * Portions Copyright (C) 2000 David J. Hudson <dave@humbug.demon.co.uk>
00034  *
00035  * This file is distributed in the hope that it will be useful, but WITHOUT
00036  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
00037  * FITNESS FOR A PARTICULAR PURPOSE.
00038  *
00039  * You can redistribute this file and/or modify it under the terms of the GNU
00040  * General Public License (GPL) as published by the Free Software Foundation;
00041  * either version 2 of the License, or (at your discretion) any later version.
00042  * See the accompanying file "copying-gpl.txt" for more details.
00043  *
00044  * As a special exception to the GPL, permission is granted for additional
00045  * uses of the text contained in this file.  See the accompanying file
00046  * "copying-liquorice.txt" for details.
00047  * -
00048  * Portions Copyright (c) 1983, 1993 by
00049  *  The Regents of the University of California.  All rights reserved.
00050  *
00051  * Redistribution and use in source and binary forms, with or without
00052  * modification, are permitted provided that the following conditions
00053  * are met:
00054  * 1. Redistributions of source code must retain the above copyright
00055  *    notice, this list of conditions and the following disclaimer.
00056  * 2. Redistributions in binary form must reproduce the above copyright
00057  *    notice, this list of conditions and the following disclaimer in the
00058  *    documentation and/or other materials provided with the distribution.
00059  * 3. Neither the name of the University nor the names of its contributors
00060  *    may be used to endorse or promote products derived from this software
00061  *    without specific prior written permission.
00062  *
00063  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
00064  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
00065  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
00066  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
00067  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
00068  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
00069  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
00070  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
00071  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
00072  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
00073  * SUCH DAMAGE.
00074  * -
00075  * Portions Copyright (c) 1993 by Digital Equipment Corporation.
00076  *
00077  * Permission to use, copy, modify, and distribute this software for any
00078  * purpose with or without fee is hereby granted, provided that the above
00079  * copyright notice and this permission notice appear in all copies, and that
00080  * the name of Digital Equipment Corporation not be used in advertising or
00081  * publicity pertaining to distribution of the document or software without
00082  * specific, written prior permission.
00083  * 
00084  * THE SOFTWARE IS PROVIDED "AS IS" AND DIGITAL EQUIPMENT CORP. DISCLAIMS ALL
00085  * WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES
00086  * OF MERCHANTABILITY AND FITNESS.   IN NO EVENT SHALL DIGITAL EQUIPMENT
00087  * CORPORATION BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
00088  * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
00089  * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
00090  * ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
00091  * SOFTWARE.
00092  */
00093 
00094 /*
00095  * $Log: tcpsock.c,v $
00096  * Revision 1.20  2008/04/18 13:32:00  haraldkipp
00097  * Changed size parameter from u_short to int, which is easier to handle
00098  * for 32-bit targets. You need to recompile your ARM code. No impact on
00099  * AVR expected
00100  * I changed u_int to int at some places to avoid some warnings during
00101  * compilation of Nut/Net.
00102  * libs.
00103  *
00104  * Revision 1.19  2006/10/08 16:48:22  haraldkipp
00105  * Documentation fixed
00106  *
00107  * Revision 1.18  2006/03/21 21:22:20  drsung
00108  * Enhancement made to TCP state machine. Now TCP options
00109  * are read from peer and at least the maximum segment size is stored.
00110  *
00111  * Revision 1.17  2005/10/24 11:00:16  haraldkipp
00112  * Integer division hack for ARM without CRT removed again.
00113  *
00114  * Revision 1.16  2005/08/02 17:47:03  haraldkipp
00115  * Major API documentation update.
00116  *
00117  * Revision 1.15  2005/04/30 16:42:42  chaac
00118  * Fixed bug in handling of NUTDEBUG. Added include for cfg/os.h. If NUTDEBUG
00119  * is defined in NutConf, it will make effect where it is used.
00120  *
00121  * Revision 1.14  2005/04/08 14:40:36  freckle
00122  * added <sys/types.h> (__APPLE__) and <netinet/in.h> (__linux__) for htons
00123  *
00124  * Revision 1.13  2005/04/05 17:58:02  haraldkipp
00125  * Avoid integer division on ARM platform as long as we run without crtlib.
00126  *
00127  * Revision 1.12  2005/02/04 17:16:45  haraldkipp
00128  * Stop searching when listening socket found
00129  *
00130  * Revision 1.11  2005/01/03 08:44:15  haraldkipp
00131  * Simplyfied NutTcpSend().
00132  *
00133  * Revision 1.10  2004/10/14 16:43:07  drsung
00134  * Fixed compiler warning "comparison between signed and unsigned"
00135  *
00136  * Revision 1.9  2004/07/30 19:54:46  drsung
00137  * Some code of TCP stack redesigned. Round trip time calculation is now
00138  * supported. Fixed several bugs in TCP state machine. Now TCP connections
00139  * should be more reliable under heavy traffic or poor physical connections.
00140  *
00141  * Revision 1.8  2004/03/16 16:48:45  haraldkipp
00142  * Added Jan Dubiec's H8/300 port.
00143  *
00144  * Revision 1.7  2004/01/28 12:11:57  drsung
00145  * Bugfix for ICCAVR ... again
00146  *
00147  * Revision 1.6  2004/01/28 07:11:38  drsung
00148  * Bugfix for ICCAVR
00149  *
00150  * Revision 1.5  2004/01/14 19:34:08  drsung
00151  * New TCP output buffer handling
00152  *
00153  * Revision 1.4  2003/11/04 17:58:18  haraldkipp
00154  * Removed volatile attibute from socket list
00155  *
00156  * Revision 1.3  2003/08/14 15:08:36  haraldkipp
00157  * Bugfix, TCP may reuse socket ports because of wrong byte order during compare.
00158  *
00159  * Revision 1.2  2003/07/13 19:23:59  haraldkipp
00160  * TCP transfer speed increased by changing the character receive buffer
00161  * in TCPSOCKET to a NETBUF queue.
00162  *
00163  * Revision 1.1.1.1  2003/05/09 14:41:44  haraldkipp
00164  * Initial using 3.2.1
00165  *
00166  * Revision 1.18  2003/02/04 18:14:57  harald
00167  * Version 3 released
00168  *
00169  * Revision 1.17  2002/09/15 17:07:05  harald
00170  * Allow application to read buffered data during close wait
00171  *
00172  * Revision 1.16  2002/09/03 17:43:15  harald
00173  * Configurable receive buffer size
00174  *
00175  * Revision 1.15  2002/08/16 17:54:57  harald
00176  * Count out of sequence drops
00177  *
00178  * Revision 1.14  2002/08/11 12:26:21  harald
00179  * ICC mods
00180  *
00181  * Revision 1.13  2002/06/26 17:29:36  harald
00182  * First pre-release with 2.4 stack
00183  *
00184  */
00185 
00186 #include <cfg/os.h>
00187 #include <sys/types.h>
00188 #include <string.h>
00189 
00190 #include <sys/atom.h>
00191 #include <sys/heap.h>
00192 #include <sys/thread.h>
00193 #include <sys/event.h>
00194 #include <sys/timer.h>
00195 
00196 #include <net/errno.h>
00197 #include <net/route.h>
00198 #include <netinet/in.h>
00199 #include <netinet/ip.h>
00200 #include <netinet/icmp.h>
00201 #include <netinet/ip_icmp.h>
00202 #include <netinet/ipcsum.h>
00203 #include <sys/socket.h>
00204 #include <netinet/tcp.h>
00205 #include <stdio.h>
00206 #include <io.h>
00207 
00208 #ifdef NUTDEBUG
00209 #include <net/netdebug.h>
00210 #endif
00211 
00212 #define TICK_RATE   1
00213 
00218 
00219 TCPSOCKET *tcpSocketList = 0;   
00221 static volatile u_short last_local_port = 4096; /* Unassigned local port. */
00222 
00223 static u_char tcpStateRunning = 0;
00224 
00225 void NutTcpDiscardBuffers(TCPSOCKET * sock)
00226 {
00227     NETBUF *nb;
00228     while ((nb = sock->so_rx_buf) != 0) {
00229         sock->so_rx_buf = nb->nb_next;
00230         NutNetBufFree(nb);
00231     }
00232     while ((nb = sock->so_tx_nbq) != 0) {
00233         sock->so_tx_nbq = nb->nb_next;
00234         NutNetBufFree(nb);
00235     }
00236     while ((nb = sock->so_rx_nbq) != 0) {
00237         sock->so_rx_nbq = nb->nb_next;
00238         NutNetBufFree(nb);
00239     }
00240 }
00241 
00242 
00254 void NutTcpDestroySocket(TCPSOCKET * sock)
00255 {
00256     TCPSOCKET *sp;
00257     TCPSOCKET *volatile *spp;
00258     
00259     //@@@printf ("[%04X] Calling destroy.\n", (u_short) sock);
00260 
00261     /*
00262      * Remove socket from the list.
00263      */
00264     sp = tcpSocketList;
00265     spp = &tcpSocketList;
00266     while (sp) {
00267         if (sp == sock) {
00268             *spp = sp->so_next;
00269             break;
00270         }
00271         spp = &sp->so_next;
00272         sp = sp->so_next;
00273     }
00274 
00275     /*
00276      * Free all memory occupied by the socket.
00277      */
00278     if (sp) {
00279         NutTcpDiscardBuffers(sock);
00280         if (sock->so_devocnt)
00281         {
00282             NutHeapFree(sock->so_devobuf);
00283             sock->so_devocnt = 0;
00284         }
00285         memset(sock, 0, sizeof(TCPSOCKET));
00286         NutHeapFree(sock);
00287     }
00288 }
00289 
00304 TCPSOCKET *NutTcpFindSocket(u_short lport, u_short rport, u_long raddr)
00305 {
00306     TCPSOCKET *sp;
00307     TCPSOCKET *sock = 0;
00308 
00309     /*
00310      * Try to find an exact match for the remote
00311      * address and port first.
00312      */
00313     for (sp = tcpSocketList; sp; sp = sp->so_next) {
00314         if (sp->so_local_port == lport) {
00315             if (sp->so_remote_addr == raddr && sp->so_remote_port == rport && sp->so_state != TCPS_CLOSED) {
00316                 sock = sp;
00317                 break;
00318             }
00319         }
00320     }
00321 
00322     /*
00323      * If no exact match exists, try a listening socket.
00324      * This part had been totally wrong, because it
00325      * didn't check the local port number and accepted
00326      * incoming requests on any port. Thanks to
00327      * Alejandro Lopez, who pointed this out.
00328      */
00329     if (sock == 0) {
00330         for (sp = tcpSocketList; sp; sp = sp->so_next) {
00331             if (sp->so_state == TCPS_LISTEN && sp->so_local_port == lport) {
00332                 sock = sp;
00333                 break;
00334             }
00335         }
00336     }
00337 
00338     return sock;
00339 }
00340 
00341 
00356 TCPSOCKET *NutTcpCreateSocket(void)
00357 {
00358     TCPSOCKET *sock = 0;
00359 
00360     if (tcpStateRunning || (tcpStateRunning = (NutTcpInitStateMachine() == 0))) {
00361 
00362         if ((sock = NutHeapAllocClear(sizeof(TCPSOCKET))) != 0) {
00363             sock->so_state = TCPS_CLOSED;
00364 
00365             /*
00366              * Initialize the virtual device interface.
00367              */
00368             sock->so_devtype = IFTYP_TCPSOCK;
00369             sock->so_devread = NutTcpDeviceRead;
00370             sock->so_devwrite = NutTcpDeviceWrite;
00371 #ifdef __HARVARD_ARCH__
00372             sock->so_devwrite_P = NutTcpDeviceWrite_P;
00373 #endif
00374             sock->so_devioctl = NutTcpDeviceIOCtl;
00375 
00376             sock->so_tx_isn = NutGetTickCount();  /* Generate the ISN from the nut_ticks counter */
00377             sock->so_tx_una = sock->so_tx_isn;
00378             sock->so_tx_nxt = sock->so_tx_isn;
00379             sock->so_rx_bsz = sock->so_rx_win = TCP_WINSIZE;
00380 
00381             sock->so_mss = TCP_MSS;
00382             sock->so_rtto = 1000; /* Initial retransmission time out */
00383 
00384             sock->so_next = tcpSocketList;
00385 
00386             sock->so_devobsz = TCP_MSS; /* Default output buffer size is TCP_MSS bytes */
00387 
00388             tcpSocketList = sock;
00389         }
00390     }
00391     return sock;
00392 }
00393 
00413 int NutTcpSetSockOpt(TCPSOCKET * sock, int optname, CONST void *optval, int optlen)
00414 {
00415     int rc = -1;
00416 
00417     if (sock == 0)
00418         return -1;
00419     switch (optname) {
00420 
00421     case TCP_MAXSEG:
00422         if (optval == 0 || optlen != sizeof(u_short))
00423             sock->so_last_error = EINVAL;
00424         else if (sock->so_state != TCPS_CLOSED) 
00425             sock->so_last_error = EISCONN;
00426         else {
00427             sock->so_mss = *((u_short *) optval);
00428             rc = 0;
00429         }
00430         break;
00431 
00432     case SO_RCVBUF:
00433         if (optval == 0 || optlen != sizeof(u_short))
00434             sock->so_last_error = EINVAL;
00435         else {
00436             sock->so_rx_bsz = *((u_short *) optval);
00437             sock->so_rx_win = sock->so_rx_bsz;
00438             rc = 0;
00439         }
00440         break;
00441 
00442     case SO_SNDTIMEO:
00443         if (optval == 0 || optlen != sizeof(u_long))
00444             sock->so_last_error = EINVAL;
00445         else {
00446             sock->so_write_to = *((u_long *) optval);
00447             rc = 0;
00448         }
00449         break;
00450 
00451     case SO_RCVTIMEO:
00452         if (optval == 0 || optlen != sizeof(u_long))
00453             sock->so_last_error = EINVAL;
00454         else {
00455             sock->so_read_to = *((u_long *) optval);
00456             rc = 0;
00457         }
00458         break;
00459 
00460     case SO_SNDBUF:
00461         if (optval == 0 || optlen != sizeof(u_short))
00462             sock->so_last_error = EINVAL;
00463         else {
00464             NutTcpDeviceWrite(sock, 0, 0);
00465             sock->so_devobsz = *((u_short *) optval);
00466             rc = 0;
00467         }
00468         break;
00469 
00470     default:
00471         sock->so_last_error = ENOPROTOOPT;
00472         break;
00473     }
00474     return rc;
00475 }
00476 
00496 int NutTcpGetSockOpt(TCPSOCKET * sock, int optname, void *optval, int optlen)
00497 {
00498     int rc = -1;
00499 
00500     if (sock == 0)
00501         return -1;
00502     switch (optname) {
00503 
00504     case TCP_MAXSEG:
00505         if (optval == 0 || optlen != sizeof(u_short))
00506             sock->so_last_error = EINVAL;
00507         else {
00508             *((u_short *) optval) = sock->so_mss;
00509             rc = 0;
00510         }
00511         break;
00512 
00513     case SO_RCVBUF:
00514         if (optval == 0 || optlen != sizeof(u_short))
00515             sock->so_last_error = EINVAL;
00516         else {
00517             *((u_short *) optval) = sock->so_rx_bsz;
00518             rc = 0;
00519         }
00520         break;
00521 
00522     case SO_SNDTIMEO:
00523         if (optval == 0 || optlen != sizeof(u_long))
00524             sock->so_last_error = EINVAL;
00525         else {
00526             *((u_long *) optval) = sock->so_write_to;
00527             rc = 0;
00528         }
00529         break;
00530 
00531     case SO_RCVTIMEO:
00532         if (optval == 0 || optlen != sizeof(u_long))
00533             sock->so_last_error = EINVAL;
00534         else {
00535             *((u_long *) optval) = sock->so_read_to;
00536             rc = 0;
00537         }
00538         break;
00539 
00540     case SO_SNDBUF:
00541         if (optval == 0 || optlen != sizeof(u_short))
00542             sock->so_last_error = EINVAL;
00543         else {
00544             *((u_short *) optval) = sock->so_devobsz;
00545             rc = 0;
00546         }
00547         break;
00548     default:
00549         sock->so_last_error = ENOPROTOOPT;
00550         break;
00551     }
00552     return rc;
00553 }
00554 
00573 int NutTcpConnect(TCPSOCKET * sock, u_long addr, u_short port)
00574 {
00575     TCPSOCKET *sp;
00576     NUTDEVICE *dev;
00577 
00578     if (sock == 0)
00579         return -1;
00580     /*
00581      * Despite RFC793 we do not allow a passive
00582      * open to become active.
00583      */
00584     if (sock->so_state == TCPS_LISTEN) {
00585         sock->so_last_error = EOPNOTSUPP;
00586         return -1;
00587     } else if (sock->so_state != TCPS_CLOSED) {
00588         sock->so_last_error = EISCONN;
00589         return -1;
00590     }
00591 
00592     /*
00593      * Find an unused local port.
00594      */
00595     do {
00596         if (++last_local_port == 0)
00597             last_local_port = 4096;
00598 
00599         sp = tcpSocketList;
00600         while (sp) {
00601             /* Thanks to Ralph Mason for fixing the byte order bug. */
00602             if (sp->so_local_port == htons(last_local_port))
00603                 break;
00604             sp = sp->so_next;
00605         }
00606     } while (sp);
00607 
00608     /*
00609      * OK - we've got a new port. Now fill
00610      * remaining parts of the socket structure.
00611      */
00612     sock->so_local_port = htons(last_local_port);
00613     sock->so_remote_port = htons(port);
00614     sock->so_remote_addr = addr;
00615 
00616     /*
00617      * Get local address for this destination.
00618      */
00619     if ((dev = NutIpRouteQuery(addr, 0)) != 0) {
00620         IFNET *nif = dev->dev_icb;
00621         sock->so_local_addr = nif->if_local_ip;
00622     } else {
00623         sock->so_last_error = EHOSTUNREACH;
00624         return -1;
00625     }
00626 
00627     /*
00628      * Trigger active open event for the state machine.
00629      * This will suspend the thread until synchronized.
00630      */
00631     return NutTcpStateActiveOpenEvent(sock);
00632 }
00633 
00649 int NutTcpAccept(TCPSOCKET * sock, u_short port)
00650 {
00651     sock->so_local_port = htons(port);
00652 
00653     return NutTcpStatePassiveOpenEvent(sock);
00654 }
00655 
00672 int NutTcpSend(TCPSOCKET * sock, CONST void *data, int len)
00673 {
00674     u_short unacked;
00675 
00676     /*
00677      * Check parameters.
00678      */
00679     NutThreadYield();
00680     
00681     if (sock == 0)
00682         return -1;
00683     if (data == 0 || len == 0)
00684         return 0;
00685 
00686     /*
00687      * Limit the transmission size to our maximum segment size.
00688      */
00689     if (len > sock->so_mss)
00690         len = sock->so_mss;
00691 
00692     for (;;) {
00693         /*
00694          * We can only send on an established connection.
00695          */
00696         if (sock->so_state != TCPS_ESTABLISHED) {
00697             sock->so_last_error = ENOTCONN;
00698             return -1;
00699         }
00700 
00701         /*
00702          * Limit the size of unacknowledged data to four full segments.
00703          * Also wait for peer's window open wide enough to take all our 
00704          * data. This also avoids silly window syndrome on our side.
00705          */
00706         unacked = sock->so_tx_nxt - sock->so_tx_una;
00707         if ((unacked >> 2) < sock->so_mss && len <= sock->so_tx_win - unacked) {
00708             break;
00709         }
00710         if (NutEventWait(&sock->so_tx_tq, sock->so_write_to)) {
00711             return 0;
00712         }
00713     }
00714     /*
00715      * The segment will be automatically retransmitted if not 
00716      * acknowledged in time. If this returns an error, it's a 
00717      * fatal one.
00718      */
00719     sock->so_tx_flags |= SO_ACK;
00720     if (NutTcpOutput(sock, data, len))
00721         return -1;
00722     return len;
00723 }
00724 
00742 int NutTcpReceive(TCPSOCKET * sock, void *data, int size)
00743 {
00744     int i;
00745 
00746     NutThreadYield();
00747     /*
00748      * Check parameters.
00749      */
00750     if (sock == 0)
00751         return -1;
00752     if (sock->so_state != TCPS_ESTABLISHED && sock->so_state != TCPS_CLOSE_WAIT) {
00753         sock->so_last_error = ENOTCONN;
00754         return -1;
00755     }
00756     if (data == 0 || size == 0)
00757         return 0;
00758 
00759     /*
00760      * Wait until any data arrived, a timeout occurs
00761      * or the connection terminates.
00762      */
00763     while (sock->so_rx_cnt - sock->so_rd_cnt == 0) {
00764         if (sock->so_state != TCPS_ESTABLISHED) {
00765             sock->so_last_error = ENOTCONN;
00766             return -1;
00767         }
00768         if (NutEventWait(&sock->so_rx_tq, sock->so_read_to))
00769             return 0;
00770     }
00771 
00772     if (size > sock->so_rx_cnt - sock->so_rd_cnt)
00773         size = sock->so_rx_cnt - sock->so_rd_cnt;
00774     if (size) {
00775         NETBUF *nb;
00776         u_short rd_cnt;         /* Bytes read from NETBUF. */
00777         u_short nb_cnt;         /* Bytes left in NETBUF. */
00778         u_short ab_cnt;         /* Total bytes in app buffer. */
00779         u_short mv_cnt;         /* Bytes to move to app buffer. */
00780 
00781         rd_cnt = sock->so_rd_cnt;
00782 
00783         ab_cnt = 0;
00784         while (ab_cnt < size) {
00785             nb = sock->so_rx_buf;
00786             nb_cnt = nb->nb_ap.sz - rd_cnt;
00787             mv_cnt = size - ab_cnt;
00788             if (mv_cnt > nb_cnt)
00789                 mv_cnt = nb_cnt;
00790             memcpy((char *) data + ab_cnt, (char *) (nb->nb_ap.vp) + rd_cnt, mv_cnt);
00791             ab_cnt += mv_cnt;
00792             rd_cnt += mv_cnt;
00793             if (mv_cnt >= nb_cnt) {
00794                 sock->so_rx_buf = nb->nb_next;
00795                 sock->so_rx_cnt -= rd_cnt;
00796                 NutNetBufFree(nb);
00797                 nb = sock->so_rx_buf;
00798                 rd_cnt = 0;
00799             }
00800         }
00801         sock->so_rd_cnt = rd_cnt;
00802 
00803         /*
00804          * Update our receive window.
00805          */
00806         if (sock->so_state == TCPS_ESTABLISHED) {
00807             i = sock->so_rx_win;
00808             if ((i += size) > sock->so_rx_bsz)
00809                 i = sock->so_rx_bsz;
00810 
00811             if (sock->so_rx_win <= sock->so_mss && i > sock->so_mss) {
00812                 sock->so_rx_win = i;
00813                 NutTcpStateWindowEvent(sock);
00814             } else {
00815                 sock->so_rx_win = i;
00816             }
00817         }
00818     }
00819     return size;
00820 }
00821 
00834 int NutTcpCloseSocket(TCPSOCKET * sock)
00835 {
00836     /* Flush buffer first */
00837     //@@@printf ("[%04X] Calling close\n", (u_short) sock);
00838     NutTcpDeviceWrite(sock, 0, 0);
00839     return NutTcpStateCloseEvent(sock);
00840 }
00841 
00890 int NutTcpError(TCPSOCKET * sock)
00891 {
00892     if (sock == 0)
00893         return ENOTSOCK;
00894     return sock->so_last_error;
00895 }
00896 
00916 int NutTcpDeviceRead(TCPSOCKET * sock, void *buffer, int size)
00917 {
00918     return NutTcpReceive(sock, buffer, size);
00919 }
00920 
00921 static int SendBuffer(TCPSOCKET * sock, CONST void *buffer, int size)
00922 {
00923     int rc;
00924     int bite;
00925 
00926     for (rc = 0; rc < size; rc += bite) {
00927         if ((bite = NutTcpSend(sock, (u_char *) buffer + rc, size - rc)) <= 0) {
00928             return -1;
00929         }
00930     }
00931     return rc;
00932 }
00933 
00956 int NutTcpDeviceWrite(TCPSOCKET * sock, CONST void *buf, int size)
00957 {
00958     int rc;
00959     u_short sz;
00960     /* hack alert for ICCAVR */
00961     u_char *buffer = (u_char*) buf;
00962 
00963     /*
00964      * Check parameters.
00965      */
00966     if (sock == 0)
00967         return -1;
00968     if (sock->so_state != TCPS_ESTABLISHED) {
00969         sock->so_last_error = ENOTCONN;
00970         return -1;
00971     }
00972 
00973     /* Flush buffer? */
00974     if (size == 0) {
00975         if (sock->so_devocnt) {
00976             if (SendBuffer(sock, sock->so_devobuf, sock->so_devocnt) < 0) {
00977                 NutHeapFree(sock->so_devobuf);
00978                 sock->so_devocnt = 0;
00979                 return -1;
00980             }
00981             NutHeapFree(sock->so_devobuf);
00982             sock->so_devocnt = 0;
00983         }
00984         return 0;
00985     }
00986 
00987     /* If we don't have a buffer so far... */
00988     if (sock->so_devocnt == 0) {
00989         /* If new data block is bigger or equal than buffer size
00990          * send first part of data to nic and store remaining
00991          * bytes in buffer
00992          */
00993         if ((u_short) size >= sock->so_devobsz) {
00994             rc = size % sock->so_devobsz;
00995             if (SendBuffer(sock, buffer, size - rc) < 0)
00996                 return -1;
00997             buffer += size - rc;
00998         } else
00999             rc = size;
01000 
01001         /* If there are some remainings bytes, allocate buffer
01002          * and store them
01003          */
01004         if (rc) {
01005             if (!(sock->so_devobuf = NutHeapAlloc(sock->so_devobsz)))
01006                 return -1;
01007             memcpy(sock->so_devobuf, buffer, rc);
01008             sock->so_devocnt = rc;
01009         }
01010         return size;
01011     }
01012 
01013     /* Check if new data fully fits in output buffer */
01014     if (sock->so_devocnt + size < sock->so_devobsz) {
01015         memcpy(sock->so_devobuf + sock->so_devocnt, buffer, size);
01016         sock->so_devocnt += size;
01017         return size;
01018     }
01019 
01020     /* Otherwise store first bytes of new data in buffer and flush
01021      * the buffer
01022      */
01023     sz = sock->so_devobsz - sock->so_devocnt;
01024     memcpy(sock->so_devobuf + sock->so_devocnt, buffer, sz);
01025     buffer += sz;
01026     if (SendBuffer(sock, sock->so_devobuf, sock->so_devobsz) < 0) {
01027         NutHeapFree(sock->so_devobuf);
01028         sock->so_devocnt = 0;
01029         return -1;
01030     }
01031 
01032     /* If remaining data is bigger or equal than buffer size
01033      * send first part of data to nic and later store remaining
01034      * bytes in buffer
01035      */
01036     sz = size - sz;
01037     if (sz >= sock->so_devobsz) {
01038         rc = size % sock->so_devobsz;
01039         if (SendBuffer(sock, buffer, sz - rc) < 0) {
01040             NutHeapFree(sock->so_devobuf);
01041             sock->so_devocnt = 0;
01042             return -1;
01043         }
01044         buffer += sz - rc;
01045     } else
01046         rc = sz;
01047 
01048     /* If there are some remainings bytes, store them in buffer
01049      */
01050     if (rc)
01051         memcpy(sock->so_devobuf, buffer, rc);
01052     else                        /* Otherwise free buffer */
01053         NutHeapFree(sock->so_devobuf);
01054     sock->so_devocnt = rc;
01055 
01056     return size;
01057 }
01058 
01083 #ifdef __HARVARD_ARCH__
01084 int NutTcpDeviceWrite_P(TCPSOCKET * sock, PGM_P buffer, int size)
01085 {
01086     int rc;
01087     char *rp = 0;
01088 
01089     /*
01090      * Hack alert. Neither do we handle out of memory correctly
01091      * nor do we pass the PGM pointer to lower levels.
01092      */
01093     if (size && (rp = NutHeapAlloc(size)) != 0)
01094         memcpy_P(rp, buffer, size);
01095     rc = NutTcpDeviceWrite(sock, rp, size);
01096     if (rp)
01097         NutHeapFree(rp);
01098 
01099     return rc;
01100 }
01101 #endif
01102 
01122 int NutTcpDeviceIOCtl(TCPSOCKET * sock, int cmd, void *param)
01123 {
01124     u_long *lvp = (u_long *) param;
01125     int rc = 0;
01126     
01127     switch (cmd) {
01128     case IOCTL_GETFILESIZE:
01129     case IOCTL_GETINBUFCOUNT:
01130         *lvp = (sock->so_rx_cnt - sock->so_rd_cnt);
01131         break;
01132     case IOCTL_GETOUTBUFCOUNT:
01133         *lvp = (sock->so_devocnt);
01134         break;
01135     default:
01136         rc = -1;
01137     }
01138     
01139     return rc;    
01140 }
01141 

© 2000-2007 by egnite Software GmbH - visit http://www.ethernut.de/