2007-11-07 00:38:14 +01:00
|
|
|
/****************************************************************************
|
2014-06-18 18:50:09 +02:00
|
|
|
* net/udp/udp_input.c
|
2024-09-11 14:39:39 +02:00
|
|
|
*
|
|
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
2007-11-07 00:38:14 +01:00
|
|
|
*
|
2019-08-31 20:25:30 +02:00
|
|
|
* Copyright (C) 2007-2009, 2011, 2018-2019 Gregory Nutt. All rights
|
|
|
|
* reserved.
|
2012-09-13 20:32:24 +02:00
|
|
|
* Author: Gregory Nutt <gnutt@nuttx.org>
|
2007-11-07 00:38:14 +01:00
|
|
|
*
|
|
|
|
* Adapted for NuttX from logic in uIP which also has a BSD-like license:
|
|
|
|
*
|
|
|
|
* Original author Adam Dunkels <adam@dunkels.com>
|
|
|
|
* Copyright () 2001-2003, Adam Dunkels.
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
*
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. The name of the author may not be used to endorse or promote
|
|
|
|
* products derived from this software without specific prior
|
|
|
|
* written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS
|
|
|
|
* OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
|
|
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
|
|
|
|
* DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
|
|
|
|
* GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
|
|
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
|
|
|
|
* NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
|
|
|
|
* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Included Files
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#include <nuttx/config.h>
|
|
|
|
#if defined(CONFIG_NET) && defined(CONFIG_NET_UDP)
|
|
|
|
|
|
|
|
#include <debug.h>
|
|
|
|
|
2014-06-24 16:53:28 +02:00
|
|
|
#include <nuttx/net/netconfig.h>
|
2014-06-24 17:28:44 +02:00
|
|
|
#include <nuttx/net/netdev.h>
|
2014-06-26 17:32:39 +02:00
|
|
|
#include <nuttx/net/udp.h>
|
|
|
|
#include <nuttx/net/netstats.h>
|
2007-11-07 00:38:14 +01:00
|
|
|
|
2014-06-29 02:07:02 +02:00
|
|
|
#include "devif/devif.h"
|
2014-06-28 01:51:32 +02:00
|
|
|
#include "utils/utils.h"
|
2014-06-25 02:55:01 +02:00
|
|
|
#include "udp/udp.h"
|
2021-11-25 15:03:33 +01:00
|
|
|
#include "icmp/icmp.h"
|
|
|
|
#include "icmpv6/icmpv6.h"
|
2007-11-07 00:38:14 +01:00
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Private Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
2024-04-23 06:20:22 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: udp_is_broadcast
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Check if the destination address is a broadcast/multicast address.
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* dev - The device driver structure containing the received UDP packet
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* True if the destination address is a broadcast/multicast address
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2024-09-03 08:25:38 +02:00
|
|
|
#ifdef CONFIG_NET_BROADCAST
|
2024-04-23 06:20:22 +02:00
|
|
|
static bool udp_is_broadcast(FAR struct net_driver_s *dev)
|
|
|
|
{
|
|
|
|
/* Check if the destination address is a broadcast/multicast address */
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
# ifdef CONFIG_NET_IPv6
|
|
|
|
if (IFF_IS_IPv4(dev->d_flags))
|
|
|
|
# endif
|
|
|
|
{
|
|
|
|
FAR struct ipv4_hdr_s *ipv4 = IPv4BUF;
|
|
|
|
in_addr_t destipaddr = net_ip4addr_conv32(ipv4->destipaddr);
|
|
|
|
|
|
|
|
return net_ipv4addr_cmp(destipaddr, INADDR_BROADCAST) ||
|
|
|
|
IN_MULTICAST(NTOHL(destipaddr)) ||
|
|
|
|
(net_ipv4addr_maskcmp(destipaddr, dev->d_ipaddr, dev->d_netmask)
|
|
|
|
&& net_ipv4addr_broadcast(destipaddr, dev->d_netmask));
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
# ifdef CONFIG_NET_IPv4
|
|
|
|
else
|
|
|
|
# endif
|
|
|
|
{
|
|
|
|
FAR struct ipv6_hdr_s *ipv6 = IPv6BUF;
|
|
|
|
return net_is_addr_mcast(ipv6->destipaddr);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2024-03-27 10:15:44 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: udp_input_conn
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Handle incoming UDP input for the case where there is an active
|
|
|
|
* connection.
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* dev - The device driver structure containing the received UDP pkt
|
|
|
|
* conn - The UDP connection structure associated with the packet
|
|
|
|
* udpiplen - Length of the IP and UDP headers
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* OK - The packet has been processed
|
|
|
|
* -EAGAIN - Hold the packet and try again later. There is a listening
|
|
|
|
* socket but no receive in place to catch the packet yet. The
|
|
|
|
* device's d_len will be set to zero in this case as there is
|
|
|
|
* no outgoing data.
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* The network is locked.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static int udp_input_conn(FAR struct net_driver_s *dev,
|
|
|
|
FAR struct udp_conn_s *conn, unsigned int udpiplen)
|
|
|
|
{
|
|
|
|
uint16_t flags;
|
|
|
|
|
|
|
|
/* Set-up for the application callback */
|
|
|
|
|
|
|
|
dev->d_appdata = IPBUF(udpiplen);
|
|
|
|
dev->d_sndlen = 0;
|
|
|
|
|
|
|
|
/* Perform the application callback */
|
|
|
|
|
|
|
|
flags = udp_callback(dev, conn, UDP_NEWDATA);
|
|
|
|
|
|
|
|
/* If the operation was successful and the UDP data was "consumed,"
|
|
|
|
* then the UDP_NEWDATA flag will be cleared by logic in
|
|
|
|
* udp_callback(). The packet memory can then be freed by the
|
|
|
|
* network driver. OK will be returned to the network driver to
|
|
|
|
* indicate this case.
|
|
|
|
*
|
|
|
|
* "Consumed" here means that either the received data was (1)
|
|
|
|
* accepted by a socket waiting for data on the port or was (2)
|
|
|
|
* buffered in the UDP socket's read-ahead buffer.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if ((flags & UDP_NEWDATA) != 0)
|
|
|
|
{
|
|
|
|
/* No.. the packet was not processed now. Return -EAGAIN so
|
|
|
|
* that the driver may retry again later. We still need to
|
|
|
|
* set d_len to zero so that the driver is aware that there
|
|
|
|
* is nothing to be sent.
|
|
|
|
*/
|
|
|
|
|
|
|
|
nwarn("WARNING: Packet not processed\n");
|
|
|
|
dev->d_len = 0;
|
|
|
|
return -EAGAIN;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* If the application has data to send, setup the UDP/IP header */
|
|
|
|
|
|
|
|
if (dev->d_sndlen > 0)
|
|
|
|
{
|
|
|
|
udp_send(dev, conn);
|
|
|
|
}
|
|
|
|
|
|
|
|
return OK;
|
|
|
|
}
|
|
|
|
|
2007-11-07 00:38:14 +01:00
|
|
|
/****************************************************************************
|
2014-06-25 02:55:01 +02:00
|
|
|
* Name: udp_input
|
2007-11-07 00:38:14 +01:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Handle incoming UDP input
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2016-06-10 17:36:23 +02:00
|
|
|
* dev - The device driver structure containing the received UDP packet
|
|
|
|
* udp - A pointer to the UDP header in the packet
|
|
|
|
* iplen - Length of the IP and UDP headers
|
2007-11-07 00:38:14 +01:00
|
|
|
*
|
2018-02-01 17:00:02 +01:00
|
|
|
* Returned Value:
|
2019-02-14 22:38:36 +01:00
|
|
|
* OK - The packet has been processed and can be deleted
|
|
|
|
* -EAGAIN - Hold the packet and try again later. There is a listening
|
|
|
|
* socket but no receive in place to catch the packet yet. The
|
|
|
|
* device's d_len will be set to zero in this case as there is
|
|
|
|
* no outgoing data.
|
2007-11-07 00:38:14 +01:00
|
|
|
*
|
|
|
|
* Assumptions:
|
2017-08-29 23:08:38 +02:00
|
|
|
* The network is locked.
|
2007-11-07 00:38:14 +01:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2015-01-16 22:03:10 +01:00
|
|
|
static int udp_input(FAR struct net_driver_s *dev, unsigned int iplen)
|
2007-11-07 00:38:14 +01:00
|
|
|
{
|
2015-01-16 22:03:10 +01:00
|
|
|
FAR struct udp_hdr_s *udp;
|
2014-06-25 02:55:01 +02:00
|
|
|
FAR struct udp_conn_s *conn;
|
2024-04-23 06:20:22 +02:00
|
|
|
#if defined(CONFIG_NET_SOCKOPTS) && defined(CONFIG_NET_BROADCAST)
|
2024-03-27 10:15:44 +01:00
|
|
|
FAR struct udp_conn_s *nextconn;
|
|
|
|
FAR struct iob_s *iob;
|
|
|
|
#endif
|
2015-01-16 22:03:10 +01:00
|
|
|
unsigned int udpiplen;
|
2015-01-23 18:42:12 +01:00
|
|
|
#ifdef CONFIG_NET_UDP_CHECKSUMS
|
2015-01-23 16:33:18 +01:00
|
|
|
uint16_t chksum;
|
2015-01-23 18:42:12 +01:00
|
|
|
#endif
|
2013-10-11 18:48:00 +02:00
|
|
|
int ret = OK;
|
2007-11-08 17:01:18 +01:00
|
|
|
|
2015-01-15 22:06:46 +01:00
|
|
|
/* Update the count of UDP packets received */
|
|
|
|
|
2011-01-23 18:40:10 +01:00
|
|
|
#ifdef CONFIG_NET_STATISTICS
|
2014-06-26 17:32:39 +02:00
|
|
|
g_netstats.udp.recv++;
|
2011-01-23 18:40:10 +01:00
|
|
|
#endif
|
|
|
|
|
2015-01-16 22:03:10 +01:00
|
|
|
/* Get a pointer to the UDP header. The UDP header lies just after the
|
|
|
|
* the link layer header and the IP header.
|
2007-11-07 00:38:14 +01:00
|
|
|
*/
|
|
|
|
|
2022-10-26 06:35:08 +02:00
|
|
|
udp = IPBUF(iplen);
|
2015-01-16 22:03:10 +01:00
|
|
|
|
|
|
|
/* Get the size of the IP header and the UDP header */
|
|
|
|
|
|
|
|
udpiplen = iplen + UDP_HDRLEN;
|
2015-01-15 22:06:46 +01:00
|
|
|
|
2015-01-16 22:03:10 +01:00
|
|
|
/* UDP processing is really just a hack. We don't do anything to the UDP/IP
|
|
|
|
* headers, but let the UDP application do all the hard work. If the
|
|
|
|
* application sets d_sndlen, it has a packet to send.
|
|
|
|
*/
|
|
|
|
|
2015-01-23 16:33:18 +01:00
|
|
|
dev->d_len -= udpiplen;
|
2022-10-26 06:35:08 +02:00
|
|
|
dev->d_appdata = IPBUF(udpiplen);
|
2015-01-15 22:06:46 +01:00
|
|
|
|
2015-01-23 16:33:18 +01:00
|
|
|
#ifdef CONFIG_NET_UDP_CHECKSUMS
|
|
|
|
chksum = udp->udpchksum;
|
|
|
|
if (chksum != 0)
|
2007-11-07 00:38:14 +01:00
|
|
|
{
|
2015-01-23 16:33:18 +01:00
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
if (IFF_IS_IPv6(dev->d_flags))
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
chksum = ~udp_ipv6_chksum(dev);
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_IPv6 */
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
chksum = ~udp_ipv4_chksum(dev);
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_IPv6 */
|
2019-07-03 02:02:23 +02:00
|
|
|
}
|
2015-01-23 16:33:18 +01:00
|
|
|
|
2019-07-03 02:02:23 +02:00
|
|
|
if (chksum != 0)
|
|
|
|
{
|
2007-11-07 00:38:14 +01:00
|
|
|
#ifdef CONFIG_NET_STATISTICS
|
2014-06-26 17:32:39 +02:00
|
|
|
g_netstats.udp.drop++;
|
|
|
|
g_netstats.udp.chkerr++;
|
2007-11-07 00:38:14 +01:00
|
|
|
#endif
|
2016-06-20 17:37:08 +02:00
|
|
|
nwarn("WARNING: Bad UDP checksum\n");
|
2007-11-07 00:38:14 +01:00
|
|
|
dev->d_len = 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
{
|
2014-11-23 19:52:18 +01:00
|
|
|
/* Demultiplex this UDP packet between the UDP "connections".
|
|
|
|
*
|
2024-03-27 10:15:44 +01:00
|
|
|
* REVISIT: If the callback logic that receives a packet responds with
|
|
|
|
* an outgoing packet, then it may be ignored. recvfrom() will not do
|
|
|
|
* that, however.
|
2014-11-23 19:52:18 +01:00
|
|
|
*/
|
2007-11-07 00:38:14 +01:00
|
|
|
|
2024-03-27 10:15:44 +01:00
|
|
|
conn = udp_active(dev, NULL, udp);
|
2007-11-08 17:01:18 +01:00
|
|
|
if (conn)
|
2007-11-07 00:38:14 +01:00
|
|
|
{
|
2024-03-27 10:15:44 +01:00
|
|
|
/* We'll only get multiple conn when we support SO_REUSEADDR */
|
2007-11-07 00:38:14 +01:00
|
|
|
|
2024-04-23 06:20:22 +02:00
|
|
|
#if defined(CONFIG_NET_SOCKOPTS) && defined(CONFIG_NET_BROADCAST)
|
|
|
|
/* Check if the destination is a broadcast/multicast address */
|
2013-10-11 18:48:00 +02:00
|
|
|
|
2024-04-23 06:20:22 +02:00
|
|
|
if (udp_is_broadcast(dev))
|
2013-10-11 18:48:00 +02:00
|
|
|
{
|
2024-04-23 06:20:22 +02:00
|
|
|
/* Do we have second connection that can hold this packet? */
|
2013-10-11 18:48:00 +02:00
|
|
|
|
2024-04-23 06:20:22 +02:00
|
|
|
while ((nextconn = udp_active(dev, conn, udp)) != NULL)
|
2024-03-27 10:15:44 +01:00
|
|
|
{
|
2024-04-23 06:20:22 +02:00
|
|
|
/* Yes... There are multiple listeners on the same port.
|
|
|
|
* We need to clone the packet and deliver it to each
|
|
|
|
* listener.
|
|
|
|
*/
|
|
|
|
|
|
|
|
iob = netdev_iob_clone(dev, true);
|
|
|
|
if (iob == NULL)
|
|
|
|
{
|
|
|
|
nerr("ERROR: IOB clone failed.\n");
|
|
|
|
break; /* We can still process once without clone. */
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = udp_input_conn(dev, conn, udpiplen);
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
nwarn("WARNING: A conn failed to process the pkt %d\n",
|
|
|
|
ret); /* We can still continue for next conn. */
|
|
|
|
}
|
|
|
|
|
|
|
|
netdev_iob_replace(dev, iob);
|
|
|
|
udp = IPBUF(iplen);
|
|
|
|
conn = nextconn;
|
2024-03-27 10:15:44 +01:00
|
|
|
}
|
2007-11-07 00:38:14 +01:00
|
|
|
}
|
2024-03-27 10:15:44 +01:00
|
|
|
#endif
|
|
|
|
|
|
|
|
/* We can deliver the packet directly to the last listener. */
|
|
|
|
|
|
|
|
ret = udp_input_conn(dev, conn, udpiplen);
|
2007-11-07 00:38:14 +01:00
|
|
|
}
|
2024-09-03 08:25:38 +02:00
|
|
|
#ifdef CONFIG_NET_BROADCAST
|
|
|
|
else if (udp_is_broadcast(dev))
|
|
|
|
{
|
|
|
|
/* Due to RFC 1112, Section 7.2, we don't reply ICMP error
|
|
|
|
* message when the destination address is broadcast/multicast.
|
|
|
|
*/
|
|
|
|
|
|
|
|
dev->d_len = 0;
|
|
|
|
}
|
|
|
|
#endif
|
2007-11-07 00:38:14 +01:00
|
|
|
else
|
|
|
|
{
|
2016-06-20 17:37:08 +02:00
|
|
|
nwarn("WARNING: No listener on UDP port\n");
|
2021-11-25 15:03:33 +01:00
|
|
|
|
|
|
|
/* No match was found, send ICMP destination port unreachable
|
|
|
|
* unless destination address was broadcast/multicast.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#if defined(CONFIG_NET_ICMP) || defined(CONFIG_NET_ICMPv6)
|
|
|
|
# ifdef CONFIG_NET_ICMPv6
|
|
|
|
# ifdef CONFIG_NET_ICMP
|
|
|
|
if (IFF_IS_IPv6(dev->d_flags))
|
|
|
|
# endif
|
|
|
|
{
|
|
|
|
icmpv6_reply(dev, ICMPv6_DEST_UNREACHABLE,
|
|
|
|
ICMPv6_PORT_UNREACH, 0);
|
|
|
|
}
|
|
|
|
# endif /* CONFIG_NET_ICMPv6 */
|
|
|
|
|
|
|
|
# ifdef CONFIG_NET_ICMP
|
|
|
|
# ifdef CONFIG_NET_ICMPv6
|
|
|
|
else
|
|
|
|
# endif
|
|
|
|
{
|
|
|
|
icmp_reply(dev, ICMP_DEST_UNREACHABLE, ICMP_PORT_UNREACH);
|
|
|
|
}
|
|
|
|
# endif /* CONFIG_NET_ICMP */
|
|
|
|
#else
|
2007-11-07 00:38:14 +01:00
|
|
|
dev->d_len = 0;
|
2021-11-25 15:03:33 +01:00
|
|
|
#endif /* CONFIG_NET_ICMP || CONFIG_NET_ICMPv6 */
|
2007-11-07 00:38:14 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-09-06 17:18:07 +02:00
|
|
|
return ret;
|
2007-11-07 00:38:14 +01:00
|
|
|
}
|
|
|
|
|
2015-01-15 22:06:46 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Public Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: udp_ipv4_input
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Handle incoming UDP input in an IPv4 packet
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2015-01-15 22:06:46 +01:00
|
|
|
* dev - The device driver structure containing the received UDP packet
|
|
|
|
*
|
2018-02-01 17:00:02 +01:00
|
|
|
* Returned Value:
|
2015-01-15 22:06:46 +01:00
|
|
|
* OK The packet has been processed and can be deleted
|
|
|
|
* ERROR Hold the packet and try again later. There is a listening socket
|
|
|
|
* but no receive in place to catch the packet yet.
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Called from network stack logic with the network stack locked
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
int udp_ipv4_input(FAR struct net_driver_s *dev)
|
|
|
|
{
|
2019-08-31 20:25:30 +02:00
|
|
|
FAR struct ipv4_hdr_s *ipv4 = IPv4BUF;
|
|
|
|
uint16_t iphdrlen;
|
|
|
|
|
2015-01-17 14:42:09 +01:00
|
|
|
/* Configure to receive an UDP IPv4 packet */
|
|
|
|
|
|
|
|
udp_ipv4_select(dev);
|
|
|
|
|
2019-08-31 20:25:30 +02:00
|
|
|
/* Get the IP header length (accounting for possible options). */
|
|
|
|
|
|
|
|
iphdrlen = (ipv4->vhl & IPv4_HLMASK) << 2;
|
|
|
|
|
2015-01-17 14:42:09 +01:00
|
|
|
/* Then process in the UDP IPv4 input */
|
|
|
|
|
2019-08-31 20:25:30 +02:00
|
|
|
return udp_input(dev, iphdrlen);
|
2015-01-15 22:06:46 +01:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: udp_ipv6_input
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Handle incoming UDP input in an IPv6 packet
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2018-11-03 00:50:01 +01:00
|
|
|
* dev - The device driver structure containing the received UDP packet
|
|
|
|
* iplen - The size of the IPv6 header. This may be larger than
|
|
|
|
* IPv6_HDRLEN the IPv6 header if IPv6 extension headers are
|
|
|
|
* present.
|
2015-01-15 22:06:46 +01:00
|
|
|
*
|
2018-02-01 17:00:02 +01:00
|
|
|
* Returned Value:
|
2015-01-15 22:06:46 +01:00
|
|
|
* OK The packet has been processed and can be deleted
|
|
|
|
* ERROR Hold the packet and try again later. There is a listening socket
|
|
|
|
* but no receive in place to catch the packet yet.
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Called from network stack logic with the network stack locked
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
2018-11-03 00:50:01 +01:00
|
|
|
int udp_ipv6_input(FAR struct net_driver_s *dev, unsigned int iplen)
|
2015-01-15 22:06:46 +01:00
|
|
|
{
|
2015-01-17 14:42:09 +01:00
|
|
|
/* Configure to receive an UDP IPv6 packet */
|
|
|
|
|
|
|
|
udp_ipv6_select(dev);
|
|
|
|
|
|
|
|
/* Then process in the UDP IPv6 input */
|
|
|
|
|
2018-11-03 00:50:01 +01:00
|
|
|
return udp_input(dev, iplen);
|
2015-01-15 22:06:46 +01:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2007-11-07 00:38:14 +01:00
|
|
|
#endif /* CONFIG_NET && CONFIG_NET_UDP */
|