2007-11-07 19:54:35 +01:00
|
|
|
/****************************************************************************
|
2014-06-26 21:02:08 +02:00
|
|
|
* net/tcp/tcp_send.c
|
2007-11-07 19:54:35 +01:00
|
|
|
*
|
2019-08-26 18:16:43 +02:00
|
|
|
* Copyright (C) 2007-2010, 2012, 2015, 2018-2019 Gregory Nutt. All rights
|
2018-06-24 22:46:12 +02:00
|
|
|
* reserved.
|
2012-02-23 16:53:27 +01:00
|
|
|
* Author: Gregory Nutt <gnutt@nuttx.org>
|
2007-11-07 19:54:35 +01:00
|
|
|
*
|
|
|
|
* Adapted for NuttX from logic in uIP which also has a BSD-like license:
|
|
|
|
*
|
|
|
|
* Original author Adam Dunkels <adam@dunkels.com>
|
|
|
|
* Copyright () 2001-2003, Adam Dunkels.
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
*
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. The name of the author may not be used to endorse or promote
|
|
|
|
* products derived from this software without specific prior
|
|
|
|
* written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS
|
|
|
|
* OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
|
|
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
|
|
|
|
* DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
|
|
|
|
* GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
|
|
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
|
|
|
|
* NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
|
|
|
|
* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Included Files
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#include <nuttx/config.h>
|
2007-11-22 19:36:46 +01:00
|
|
|
#if defined(CONFIG_NET) && defined(CONFIG_NET_TCP)
|
2007-11-07 19:54:35 +01:00
|
|
|
|
2021-06-01 10:03:57 +02:00
|
|
|
#include <assert.h>
|
2009-12-15 15:53:45 +01:00
|
|
|
#include <stdint.h>
|
2007-12-11 15:27:11 +01:00
|
|
|
#include <string.h>
|
2007-11-07 19:54:35 +01:00
|
|
|
#include <debug.h>
|
|
|
|
|
2014-06-24 16:53:28 +02:00
|
|
|
#include <nuttx/net/netconfig.h>
|
2014-06-24 17:28:44 +02:00
|
|
|
#include <nuttx/net/netdev.h>
|
2014-06-26 17:32:39 +02:00
|
|
|
#include <nuttx/net/netstats.h>
|
2014-07-05 03:13:08 +02:00
|
|
|
#include <nuttx/net/ip.h>
|
2014-07-06 20:34:27 +02:00
|
|
|
#include <nuttx/net/tcp.h>
|
2024-08-22 15:35:16 +02:00
|
|
|
#include <nuttx/wqueue.h>
|
2007-11-07 19:54:35 +01:00
|
|
|
|
2021-06-01 10:03:57 +02:00
|
|
|
#include "netdev/netdev.h"
|
2014-06-29 02:07:02 +02:00
|
|
|
#include "devif/devif.h"
|
2017-08-07 21:03:23 +02:00
|
|
|
#include "inet/inet.h"
|
2014-07-06 20:34:27 +02:00
|
|
|
#include "tcp/tcp.h"
|
2014-06-28 01:51:32 +02:00
|
|
|
#include "utils/utils.h"
|
2007-11-07 19:54:35 +01:00
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Private Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
2015-01-18 15:56:05 +01:00
|
|
|
* Name: tcp_header
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Get the length of the IP header
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2015-01-18 15:56:05 +01:00
|
|
|
* dev - The device driver structure to use in the send operation
|
|
|
|
*
|
2018-02-01 17:00:02 +01:00
|
|
|
* Returned Value:
|
2015-01-18 15:56:05 +01:00
|
|
|
* The length of the IP header (IPv4_HDRLEN or IPv6_HDRLEN)
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static inline FAR struct tcp_hdr_s *tcp_header(FAR struct net_driver_s *dev)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
if (IFF_IS_IPv6(dev->d_flags))
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
return TCPIPv6BUF;
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_IPv6 */
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
return TCPIPv4BUF;
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_IPv4 */
|
|
|
|
}
|
|
|
|
|
2007-11-07 19:54:35 +01:00
|
|
|
/****************************************************************************
|
2014-06-25 02:12:49 +02:00
|
|
|
* Name: tcp_sendcommon
|
2007-11-07 19:54:35 +01:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* We're done with the input processing. We are now ready to send a reply
|
|
|
|
* Our job is to fill in all the fields of the TCP and IP headers before
|
|
|
|
* calculating the checksum and finally send the packet.
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2014-04-12 20:13:01 +02:00
|
|
|
* dev - The device driver structure to use in the send operation
|
|
|
|
* conn - The TCP connection structure holding connection information
|
2007-11-07 19:54:35 +01:00
|
|
|
*
|
2018-02-01 17:00:02 +01:00
|
|
|
* Returned Value:
|
2007-11-07 19:54:35 +01:00
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2017-03-28 22:08:54 +02:00
|
|
|
* Called with the network locked.
|
2007-11-07 19:54:35 +01:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2014-06-28 00:48:12 +02:00
|
|
|
static void tcp_sendcommon(FAR struct net_driver_s *dev,
|
2015-01-18 15:56:05 +01:00
|
|
|
FAR struct tcp_conn_s *conn,
|
|
|
|
FAR struct tcp_hdr_s *tcp)
|
2007-11-07 19:54:35 +01:00
|
|
|
{
|
2015-01-18 15:56:05 +01:00
|
|
|
/* Set TCP sequence numbers and port numbers */
|
|
|
|
|
|
|
|
memcpy(tcp->ackno, conn->rcvseq, 4);
|
|
|
|
memcpy(tcp->seqno, conn->sndseq, 4);
|
2007-11-07 19:54:35 +01:00
|
|
|
|
2015-01-18 15:56:05 +01:00
|
|
|
tcp->srcport = conn->lport;
|
|
|
|
tcp->destport = conn->rport;
|
|
|
|
|
|
|
|
/* Set the TCP window */
|
2007-11-07 19:54:35 +01:00
|
|
|
|
2014-07-07 00:10:26 +02:00
|
|
|
if (conn->tcpstateflags & TCP_STOPPED)
|
2007-11-07 19:54:35 +01:00
|
|
|
{
|
2014-07-07 00:10:26 +02:00
|
|
|
/* If the connection has issued TCP_STOPPED, we advertise a zero
|
2007-11-07 19:54:35 +01:00
|
|
|
* window so that the remote host will stop sending data.
|
|
|
|
*/
|
|
|
|
|
2015-01-18 15:56:05 +01:00
|
|
|
tcp->wnd[0] = 0;
|
|
|
|
tcp->wnd[1] = 0;
|
2007-11-07 19:54:35 +01:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2024-08-22 15:35:16 +02:00
|
|
|
if (work_available(&conn->work) && conn->tx_unacked != 0)
|
|
|
|
{
|
|
|
|
conn->timeout = false;
|
|
|
|
tcp_update_retrantimer(conn, conn->rto);
|
|
|
|
}
|
|
|
|
|
2018-07-01 04:50:07 +02:00
|
|
|
/* Update the TCP received window based on I/O buffer availability */
|
|
|
|
|
2021-06-01 09:57:00 +02:00
|
|
|
uint32_t rcvseq = tcp_getsequence(conn->rcvseq);
|
2021-07-07 06:01:25 +02:00
|
|
|
uint32_t recvwndo = tcp_get_recvwindow(dev, conn);
|
2018-07-01 04:50:07 +02:00
|
|
|
|
2021-07-05 11:28:11 +02:00
|
|
|
/* Update the Receiver Window */
|
|
|
|
|
|
|
|
conn->rcv_adv = rcvseq + recvwndo;
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_TCP_WINDOW_SCALE
|
|
|
|
recvwndo >>= conn->rcv_scale;
|
|
|
|
#endif
|
|
|
|
|
2018-07-01 04:50:07 +02:00
|
|
|
/* Set the TCP Window */
|
|
|
|
|
2018-07-01 15:59:33 +02:00
|
|
|
tcp->wnd[0] = recvwndo >> 8;
|
|
|
|
tcp->wnd[1] = recvwndo & 0xff;
|
2007-11-07 19:54:35 +01:00
|
|
|
}
|
|
|
|
|
2022-11-29 04:23:43 +01:00
|
|
|
tcp->urgp[0] = 0;
|
|
|
|
tcp->urgp[1] = 0;
|
|
|
|
|
2022-11-23 12:39:40 +01:00
|
|
|
/* Update device buffer length before setup the IP header */
|
|
|
|
|
2023-05-17 10:11:21 +02:00
|
|
|
iob_update_pktlen(dev->d_iob, dev->d_len, false);
|
2022-11-23 12:39:40 +01:00
|
|
|
|
2022-11-29 04:23:43 +01:00
|
|
|
/* Calculate chk & build L3 header */
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
if (IFF_IS_IPv6(dev->d_flags))
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
ninfo("do IPv6 IP header build!\n");
|
|
|
|
ipv6_build_header(IPv6BUF, dev->d_len - IPv6_HDRLEN,
|
2023-08-25 11:37:11 +02:00
|
|
|
IP_PROTO_TCP,
|
2023-12-13 10:06:13 +01:00
|
|
|
netdev_ipv6_srcaddr(dev, conn->u.ipv6.laddr),
|
2023-08-25 11:37:11 +02:00
|
|
|
conn->u.ipv6.raddr,
|
2024-05-29 13:35:34 +02:00
|
|
|
conn->sconn.s_ttl, conn->sconn.s_tclass);
|
2022-11-29 04:23:43 +01:00
|
|
|
|
|
|
|
/* Calculate TCP checksum. */
|
|
|
|
|
|
|
|
tcp->tcpchksum = 0;
|
2024-04-24 05:06:52 +02:00
|
|
|
|
|
|
|
#ifdef CONFIG_NET_TCP_CHECKSUMS
|
2022-11-29 04:23:43 +01:00
|
|
|
tcp->tcpchksum = ~tcp_ipv6_chksum(dev);
|
2024-04-24 05:06:52 +02:00
|
|
|
#endif
|
|
|
|
|
2022-11-29 04:23:43 +01:00
|
|
|
#ifdef CONFIG_NET_STATISTICS
|
|
|
|
g_netstats.ipv6.sent++;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_IPv6 */
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
ninfo("do IPv4 IP header build!\n");
|
|
|
|
ipv4_build_header(IPv4BUF, dev->d_len, IP_PROTO_TCP,
|
|
|
|
&dev->d_ipaddr, &conn->u.ipv4.raddr,
|
2024-05-29 13:35:34 +02:00
|
|
|
conn->sconn.s_ttl, conn->sconn.s_tos, NULL);
|
2022-11-29 04:23:43 +01:00
|
|
|
|
|
|
|
/* Calculate TCP checksum. */
|
|
|
|
|
|
|
|
tcp->tcpchksum = 0;
|
2024-04-24 05:06:52 +02:00
|
|
|
|
|
|
|
#ifdef CONFIG_NET_TCP_CHECKSUMS
|
2022-11-29 04:23:43 +01:00
|
|
|
tcp->tcpchksum = ~tcp_ipv4_chksum(dev);
|
2024-04-24 05:06:52 +02:00
|
|
|
#endif
|
|
|
|
|
2022-11-29 04:23:43 +01:00
|
|
|
#ifdef CONFIG_NET_STATISTICS
|
|
|
|
g_netstats.ipv4.sent++;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_IPv4 */
|
2007-11-07 19:54:35 +01:00
|
|
|
|
2022-11-29 04:23:43 +01:00
|
|
|
ninfo("Outgoing TCP packet length: %d bytes\n", dev->d_len);
|
|
|
|
#ifdef CONFIG_NET_STATISTICS
|
|
|
|
g_netstats.tcp.sent++;
|
|
|
|
#endif
|
2022-01-02 16:53:43 +01:00
|
|
|
|
|
|
|
#if !defined(CONFIG_NET_TCP_WRITE_BUFFERS)
|
|
|
|
if ((tcp->flags & (TCP_SYN | TCP_FIN)) != 0)
|
|
|
|
{
|
|
|
|
/* Remember sndseq that will be used in case of a possible
|
|
|
|
* SYN or FIN retransmission
|
|
|
|
*/
|
|
|
|
|
|
|
|
conn->rexmit_seq = tcp_getsequence(conn->sndseq);
|
|
|
|
|
|
|
|
/* Advance sndseq by +1 because SYN and FIN occupy
|
|
|
|
* one sequence number (RFC 793)
|
|
|
|
*/
|
|
|
|
|
|
|
|
net_incr32(conn->sndseq, 1);
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
/* REVISIT for the buffered mode */
|
|
|
|
#endif
|
2007-11-07 19:54:35 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Public Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
2014-06-25 02:12:49 +02:00
|
|
|
* Name: tcp_send
|
2007-11-07 19:54:35 +01:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Setup to send a TCP packet
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2007-11-07 19:54:35 +01:00
|
|
|
* dev - The device driver structure to use in the send operation
|
|
|
|
* conn - The TCP connection structure holding connection information
|
|
|
|
* flags - flags to apply to the TCP header
|
2015-01-22 19:10:16 +01:00
|
|
|
* len - length of the message (includes the length of the IP and TCP
|
|
|
|
* headers)
|
2007-11-07 19:54:35 +01:00
|
|
|
*
|
2018-02-01 17:00:02 +01:00
|
|
|
* Returned Value:
|
2007-11-07 19:54:35 +01:00
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2017-03-28 22:08:54 +02:00
|
|
|
* Called with the network locked.
|
2007-11-07 19:54:35 +01:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2014-06-28 00:48:12 +02:00
|
|
|
void tcp_send(FAR struct net_driver_s *dev, FAR struct tcp_conn_s *conn,
|
2014-06-25 02:12:49 +02:00
|
|
|
uint16_t flags, uint16_t len)
|
2007-11-07 19:54:35 +01:00
|
|
|
{
|
2022-11-23 12:39:40 +01:00
|
|
|
FAR struct tcp_hdr_s *tcp;
|
2009-03-08 15:42:36 +01:00
|
|
|
|
2022-11-23 12:39:40 +01:00
|
|
|
if (dev->d_iob == NULL)
|
|
|
|
{
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2023-01-10 06:41:02 +01:00
|
|
|
tcp = tcp_header(dev);
|
|
|
|
tcp->flags = flags;
|
|
|
|
dev->d_len = len;
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_TCP_SELECTIVE_ACK
|
|
|
|
if ((conn->flags & TCP_SACK) && (flags == TCP_ACK) && conn->nofosegs > 0)
|
|
|
|
{
|
|
|
|
int optlen = conn->nofosegs * sizeof(struct tcp_sack_s);
|
|
|
|
int i;
|
|
|
|
|
|
|
|
tcp->optdata[0] = TCP_OPT_NOOP;
|
|
|
|
tcp->optdata[1] = TCP_OPT_NOOP;
|
|
|
|
tcp->optdata[2] = TCP_OPT_SACK;
|
|
|
|
tcp->optdata[3] = TCP_OPT_SACK_PERM_LEN + optlen;
|
|
|
|
|
|
|
|
optlen += 4;
|
|
|
|
|
|
|
|
for (i = 0; i < conn->nofosegs; i++)
|
|
|
|
{
|
|
|
|
ninfo("TCP SACK [%d]"
|
|
|
|
"[%" PRIu32 " : %" PRIu32 " : %" PRIu32 "]\n", i,
|
|
|
|
conn->ofosegs[i].left, conn->ofosegs[i].right,
|
|
|
|
TCP_SEQ_SUB(conn->ofosegs[i].right, conn->ofosegs[i].left));
|
|
|
|
tcp_setsequence(&tcp->optdata[4 + i * 2 * sizeof(uint32_t)],
|
|
|
|
conn->ofosegs[i].left);
|
|
|
|
tcp_setsequence(&tcp->optdata[4 + (i * 2 + 1) * sizeof(uint32_t)],
|
|
|
|
conn->ofosegs[i].right);
|
|
|
|
}
|
|
|
|
|
|
|
|
dev->d_len += optlen;
|
|
|
|
tcp->tcpoffset = ((TCP_HDRLEN + optlen) / 4) << 4;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif /* CONFIG_NET_TCP_SELECTIVE_ACK */
|
|
|
|
{
|
|
|
|
tcp->tcpoffset = (TCP_HDRLEN / 4) << 4;
|
|
|
|
}
|
|
|
|
|
2015-01-18 15:56:05 +01:00
|
|
|
tcp_sendcommon(dev, conn, tcp);
|
2023-01-17 12:52:02 +01:00
|
|
|
|
|
|
|
#if defined(CONFIG_NET_STATISTICS) && \
|
|
|
|
defined(CONFIG_NET_TCP_DEBUG_DROP_SEND)
|
|
|
|
|
|
|
|
#pragma message \
|
|
|
|
"CONFIG_NET_TCP_DEBUG_DROP_SEND is selected, this is debug " \
|
|
|
|
"feature to drop the tcp send packet on the floor, " \
|
|
|
|
"please confirm the configuration again if you do not want " \
|
|
|
|
"debug the TCP stack."
|
|
|
|
|
|
|
|
/* Debug feature to drop the tcp received packet on the floor */
|
|
|
|
|
|
|
|
if ((flags & TCP_PSH) != 0)
|
|
|
|
{
|
|
|
|
if ((g_netstats.tcp.sent %
|
|
|
|
CONFIG_NET_TCP_DEBUG_DROP_SEND_PROBABILITY) == 0)
|
|
|
|
{
|
|
|
|
uint32_t seq = tcp_getsequence(tcp->seqno);
|
|
|
|
|
|
|
|
ninfo("TCP DROP SNDPKT: "
|
|
|
|
"[%d][%" PRIu32 " : %" PRIu32 " : %d]\n",
|
|
|
|
g_netstats.tcp.sent, seq, TCP_SEQ_ADD(seq, dev->d_sndlen),
|
|
|
|
dev->d_sndlen);
|
|
|
|
|
|
|
|
dev->d_len = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
2007-11-07 19:54:35 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
2014-06-25 02:12:49 +02:00
|
|
|
* Name: tcp_reset
|
2007-11-07 19:54:35 +01:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Send a TCP reset (no-data) message
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2007-11-07 19:54:35 +01:00
|
|
|
* dev - The device driver structure to use in the send operation
|
|
|
|
*
|
2018-02-01 17:00:02 +01:00
|
|
|
* Returned Value:
|
2007-11-07 19:54:35 +01:00
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2017-03-28 22:08:54 +02:00
|
|
|
* Called with the network locked.
|
2007-11-07 19:54:35 +01:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2022-12-21 05:40:42 +01:00
|
|
|
void tcp_reset(FAR struct net_driver_s *dev, FAR struct tcp_conn_s *conn)
|
2007-11-07 19:54:35 +01:00
|
|
|
{
|
2022-11-23 12:39:40 +01:00
|
|
|
FAR struct tcp_hdr_s *tcp;
|
2019-08-26 18:16:43 +02:00
|
|
|
uint32_t ackno;
|
2009-12-15 15:53:45 +01:00
|
|
|
uint16_t tmp16;
|
2019-08-26 18:16:43 +02:00
|
|
|
uint16_t acklen = 0;
|
2014-04-12 20:13:01 +02:00
|
|
|
uint8_t seqbyte;
|
2007-11-07 19:54:35 +01:00
|
|
|
|
2022-11-23 12:39:40 +01:00
|
|
|
if (dev->d_iob == NULL)
|
|
|
|
{
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2007-11-07 19:54:35 +01:00
|
|
|
#ifdef CONFIG_NET_STATISTICS
|
2014-06-26 17:32:39 +02:00
|
|
|
g_netstats.tcp.rst++;
|
2007-11-07 19:54:35 +01:00
|
|
|
#endif
|
|
|
|
|
2015-01-18 15:56:05 +01:00
|
|
|
/* TCP setup */
|
|
|
|
|
2022-11-23 12:39:40 +01:00
|
|
|
tcp = tcp_header(dev);
|
|
|
|
|
2019-08-26 18:16:43 +02:00
|
|
|
if ((tcp->flags & TCP_SYN) != 0 || (tcp->flags & TCP_FIN) != 0)
|
|
|
|
{
|
|
|
|
acklen++;
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
2019-08-28 00:20:39 +02:00
|
|
|
if (IFF_IS_IPv6(dev->d_flags))
|
2019-08-26 18:16:43 +02:00
|
|
|
#endif
|
|
|
|
{
|
|
|
|
FAR struct ipv6_hdr_s *ip = IPv6BUF;
|
2022-11-23 12:39:40 +01:00
|
|
|
|
2019-08-26 18:16:43 +02:00
|
|
|
acklen += (ip->len[0] << 8 | ip->len[1]);
|
2022-11-23 12:39:40 +01:00
|
|
|
|
|
|
|
/* Set the packet length to the size of the IPv6 + TCP headers */
|
|
|
|
|
|
|
|
dev->d_len = IPv6TCP_HDRLEN;
|
2019-08-26 18:16:43 +02:00
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_IPv6 */
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
FAR struct ipv4_hdr_s *ip = IPv4BUF;
|
2022-11-23 12:39:40 +01:00
|
|
|
|
2019-08-26 18:16:43 +02:00
|
|
|
acklen += (ip->len[0] << 8) + ip->len[1] - (ip->vhl & 0x0f) * 4;
|
2022-11-23 12:39:40 +01:00
|
|
|
|
|
|
|
/* Set the packet length to the size of the IPv4 + TCP headers */
|
|
|
|
|
|
|
|
dev->d_len = IPv4TCP_HDRLEN;
|
2019-08-26 18:16:43 +02:00
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_IPv4 */
|
|
|
|
|
|
|
|
acklen -= (tcp->tcpoffset >> 4) << 2;
|
|
|
|
|
2015-01-18 15:56:05 +01:00
|
|
|
tcp->flags = TCP_RST | TCP_ACK;
|
|
|
|
tcp->tcpoffset = 5 << 4;
|
2007-11-07 19:54:35 +01:00
|
|
|
|
|
|
|
/* Flip the seqno and ackno fields in the TCP header. */
|
|
|
|
|
2015-01-18 15:56:05 +01:00
|
|
|
seqbyte = tcp->seqno[3];
|
|
|
|
tcp->seqno[3] = tcp->ackno[3];
|
|
|
|
tcp->ackno[3] = seqbyte;
|
2007-11-07 19:54:35 +01:00
|
|
|
|
2015-01-18 15:56:05 +01:00
|
|
|
seqbyte = tcp->seqno[2];
|
|
|
|
tcp->seqno[2] = tcp->ackno[2];
|
|
|
|
tcp->ackno[2] = seqbyte;
|
2007-11-07 19:54:35 +01:00
|
|
|
|
2015-01-18 15:56:05 +01:00
|
|
|
seqbyte = tcp->seqno[1];
|
|
|
|
tcp->seqno[1] = tcp->ackno[1];
|
|
|
|
tcp->ackno[1] = seqbyte;
|
2007-11-07 19:54:35 +01:00
|
|
|
|
2015-01-18 15:56:05 +01:00
|
|
|
seqbyte = tcp->seqno[0];
|
|
|
|
tcp->seqno[0] = tcp->ackno[0];
|
|
|
|
tcp->ackno[0] = seqbyte;
|
2007-11-07 19:54:35 +01:00
|
|
|
|
|
|
|
/* We also have to increase the sequence number we are
|
|
|
|
* acknowledging. If the least significant byte overflowed, we need
|
|
|
|
* to propagate the carry to the other bytes as well.
|
|
|
|
*/
|
|
|
|
|
2019-08-26 18:16:43 +02:00
|
|
|
ackno = tcp_addsequence(tcp->ackno, acklen);
|
|
|
|
|
|
|
|
tcp_setsequence(tcp->ackno, ackno);
|
2007-11-07 19:54:35 +01:00
|
|
|
|
|
|
|
/* Swap port numbers. */
|
|
|
|
|
2015-01-18 15:56:05 +01:00
|
|
|
tmp16 = tcp->srcport;
|
|
|
|
tcp->srcport = tcp->destport;
|
|
|
|
tcp->destport = tmp16;
|
2007-11-07 19:54:35 +01:00
|
|
|
|
2021-06-29 15:49:39 +02:00
|
|
|
/* Initialize the rest of the tcp header to sane values.
|
|
|
|
*/
|
|
|
|
|
|
|
|
tcp->wnd[0] = 0;
|
|
|
|
tcp->wnd[1] = 0;
|
2022-11-29 04:23:43 +01:00
|
|
|
tcp->urgp[0] = 0;
|
|
|
|
tcp->urgp[0] = 0;
|
2021-06-29 15:49:39 +02:00
|
|
|
|
2022-11-23 12:39:40 +01:00
|
|
|
/* Update device buffer length before setup the IP header */
|
|
|
|
|
2023-05-17 10:11:21 +02:00
|
|
|
iob_update_pktlen(dev->d_iob, dev->d_len, false);
|
2022-11-23 12:39:40 +01:00
|
|
|
|
2022-11-29 04:23:43 +01:00
|
|
|
/* Calculate chk & build L3 header */
|
2007-11-07 19:54:35 +01:00
|
|
|
|
2015-01-18 15:56:05 +01:00
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
if (IFF_IS_IPv6(dev->d_flags))
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
FAR struct ipv6_hdr_s *ipv6 = IPv6BUF;
|
|
|
|
|
2022-11-29 04:23:43 +01:00
|
|
|
ipv6_build_header(ipv6, dev->d_len - IPv6_HDRLEN,
|
2023-08-25 11:37:11 +02:00
|
|
|
IP_PROTO_TCP,
|
2023-12-13 10:06:13 +01:00
|
|
|
netdev_ipv6_srcaddr(dev, ipv6->destipaddr),
|
2023-08-25 11:37:11 +02:00
|
|
|
ipv6->srcipaddr,
|
2024-05-29 13:35:34 +02:00
|
|
|
conn ? conn->sconn.s_ttl : IP_TTL_DEFAULT,
|
2023-05-12 08:25:33 +02:00
|
|
|
conn ? conn->sconn.s_tos : 0);
|
2022-11-29 04:23:43 +01:00
|
|
|
tcp->tcpchksum = 0;
|
2024-04-24 05:06:52 +02:00
|
|
|
|
|
|
|
#ifdef CONFIG_NET_TCP_CHECKSUMS
|
2022-11-29 04:23:43 +01:00
|
|
|
tcp->tcpchksum = ~tcp_ipv6_chksum(dev);
|
2024-04-24 05:06:52 +02:00
|
|
|
#endif
|
2015-01-18 15:56:05 +01:00
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_IPv6 */
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
FAR struct ipv4_hdr_s *ipv4 = IPv4BUF;
|
|
|
|
|
2022-11-29 04:23:43 +01:00
|
|
|
ipv4_build_header(IPv4BUF, dev->d_len, IP_PROTO_TCP,
|
|
|
|
&dev->d_ipaddr, (FAR in_addr_t *)ipv4->srcipaddr,
|
2024-05-29 13:35:34 +02:00
|
|
|
conn ? conn->sconn.s_ttl : IP_TTL_DEFAULT,
|
2023-05-12 08:25:33 +02:00
|
|
|
conn ? conn->sconn.s_tos : 0, NULL);
|
2015-01-18 15:56:05 +01:00
|
|
|
|
2022-11-29 04:23:43 +01:00
|
|
|
tcp->tcpchksum = 0;
|
2024-04-24 05:06:52 +02:00
|
|
|
|
|
|
|
#ifdef CONFIG_NET_TCP_CHECKSUMS
|
2022-11-29 04:23:43 +01:00
|
|
|
tcp->tcpchksum = ~tcp_ipv4_chksum(dev);
|
2024-04-24 05:06:52 +02:00
|
|
|
#endif
|
2015-01-18 15:56:05 +01:00
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_IPv4 */
|
2007-11-07 19:54:35 +01:00
|
|
|
}
|
|
|
|
|
2021-06-01 11:43:24 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_rx_mss
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Return the MSS to advertize to the peer.
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* dev - The device driver structure
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* The MSS value.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
uint16_t tcp_rx_mss(FAR struct net_driver_s *dev)
|
|
|
|
{
|
|
|
|
uint16_t tcp_mss;
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
if (IFF_IS_IPv6(dev->d_flags))
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
tcp_mss = TCP_IPv6_MSS(dev);
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_IPv6 */
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
tcp_mss = TCP_IPv4_MSS(dev);
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_IPv4 */
|
|
|
|
|
|
|
|
return tcp_mss;
|
|
|
|
}
|
|
|
|
|
2007-11-07 19:54:35 +01:00
|
|
|
/****************************************************************************
|
2019-12-08 20:13:51 +01:00
|
|
|
* Name: tcp_synack
|
2007-11-07 19:54:35 +01:00
|
|
|
*
|
|
|
|
* Description:
|
2019-12-08 20:13:51 +01:00
|
|
|
* Send the SYN, ACK, or SYNACK response.
|
2007-11-07 19:54:35 +01:00
|
|
|
*
|
2019-12-11 18:19:32 +01:00
|
|
|
* - SYN and SYNACK are sent only from the TCP state machine.
|
|
|
|
* - ACK may be sent alone only if delayed ACKs are enabled and the ACK
|
|
|
|
* delay timeout occurs.
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2014-04-12 20:13:01 +02:00
|
|
|
* dev - The device driver structure to use in the send operation
|
|
|
|
* conn - The TCP connection structure holding connection information
|
|
|
|
* ack - The ACK response to send
|
2007-11-07 19:54:35 +01:00
|
|
|
*
|
2018-02-01 17:00:02 +01:00
|
|
|
* Returned Value:
|
2007-11-07 19:54:35 +01:00
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2017-03-28 22:08:54 +02:00
|
|
|
* Called with the network locked.
|
2007-11-07 19:54:35 +01:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2019-12-08 20:13:51 +01:00
|
|
|
void tcp_synack(FAR struct net_driver_s *dev, FAR struct tcp_conn_s *conn,
|
|
|
|
uint8_t ack)
|
2007-11-07 19:54:35 +01:00
|
|
|
{
|
2022-01-17 23:09:14 +01:00
|
|
|
FAR struct tcp_hdr_s *tcp;
|
2015-01-18 15:56:05 +01:00
|
|
|
uint16_t tcp_mss;
|
2021-07-05 11:03:15 +02:00
|
|
|
int16_t optlen = 0;
|
2015-01-18 15:56:05 +01:00
|
|
|
|
2022-11-23 12:39:40 +01:00
|
|
|
if (dev->d_iob == NULL)
|
|
|
|
{
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2023-01-29 06:11:57 +01:00
|
|
|
/* Get the offset TCP header address for this packet */
|
2015-01-18 15:56:05 +01:00
|
|
|
|
2023-01-29 06:11:57 +01:00
|
|
|
tcp = tcp_header(dev);
|
2015-01-18 15:56:05 +01:00
|
|
|
|
2023-01-29 06:11:57 +01:00
|
|
|
/* Set the packet length for the TCP Maximum Segment Size */
|
2015-01-18 15:56:05 +01:00
|
|
|
|
2023-01-29 06:11:57 +01:00
|
|
|
dev->d_len = tcpip_hdrsize(conn);
|
2015-01-18 15:56:05 +01:00
|
|
|
|
2023-01-29 06:11:57 +01:00
|
|
|
/* Set the packet length for the TCP Maximum Segment Size */
|
2009-03-08 15:42:36 +01:00
|
|
|
|
2023-03-08 16:43:38 +01:00
|
|
|
#ifdef CONFIG_NET_TCPPROTO_OPTIONS
|
|
|
|
if (conn->user_mss != 0 && conn->user_mss < tcp_rx_mss(dev))
|
|
|
|
{
|
|
|
|
tcp_mss = conn->user_mss;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
tcp_mss = tcp_rx_mss(dev);
|
|
|
|
}
|
2021-06-01 11:43:24 +02:00
|
|
|
|
2007-11-07 19:54:35 +01:00
|
|
|
/* Save the ACK bits */
|
|
|
|
|
2023-01-29 06:11:57 +01:00
|
|
|
tcp->flags = ack;
|
2007-11-07 19:54:35 +01:00
|
|
|
|
2019-12-08 20:13:51 +01:00
|
|
|
/* We send out the TCP Maximum Segment Size option with our ACK. */
|
2007-11-07 19:54:35 +01:00
|
|
|
|
2021-07-05 11:03:15 +02:00
|
|
|
tcp->optdata[optlen++] = TCP_OPT_MSS;
|
|
|
|
tcp->optdata[optlen++] = TCP_OPT_MSS_LEN;
|
|
|
|
tcp->optdata[optlen++] = tcp_mss >> 8;
|
|
|
|
tcp->optdata[optlen++] = tcp_mss & 0xff;
|
2021-07-05 11:28:11 +02:00
|
|
|
|
|
|
|
#ifdef CONFIG_NET_TCP_WINDOW_SCALE
|
|
|
|
if (tcp->flags == TCP_SYN ||
|
|
|
|
((tcp->flags == (TCP_ACK | TCP_SYN)) && (conn->flags & TCP_WSCALE)))
|
|
|
|
{
|
|
|
|
tcp->optdata[optlen++] = TCP_OPT_NOOP;
|
|
|
|
tcp->optdata[optlen++] = TCP_OPT_WS;
|
|
|
|
tcp->optdata[optlen++] = TCP_OPT_WS_LEN;
|
|
|
|
tcp->optdata[optlen++] = CONFIG_NET_TCP_WINDOW_SCALE_FACTOR;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2023-01-10 06:41:02 +01:00
|
|
|
#ifdef CONFIG_NET_TCP_SELECTIVE_ACK
|
|
|
|
if (tcp->flags == TCP_SYN ||
|
|
|
|
((tcp->flags == (TCP_ACK | TCP_SYN)) && (conn->flags & TCP_SACK)))
|
|
|
|
{
|
|
|
|
tcp->optdata[optlen++] = TCP_OPT_NOOP;
|
|
|
|
tcp->optdata[optlen++] = TCP_OPT_NOOP;
|
|
|
|
tcp->optdata[optlen++] = TCP_OPT_SACK_PERM;
|
|
|
|
tcp->optdata[optlen++] = TCP_OPT_SACK_PERM_LEN;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2021-07-05 11:03:15 +02:00
|
|
|
tcp->tcpoffset = ((TCP_HDRLEN + optlen) / 4) << 4;
|
|
|
|
dev->d_len += optlen;
|
2007-11-07 19:54:35 +01:00
|
|
|
|
|
|
|
/* Complete the common portions of the TCP message */
|
|
|
|
|
2015-01-18 15:56:05 +01:00
|
|
|
tcp_sendcommon(dev, conn, tcp);
|
2007-11-07 19:54:35 +01:00
|
|
|
}
|
|
|
|
|
2021-06-01 10:03:57 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_send_txnotify
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Notify the appropriate device driver that we are have data ready to
|
|
|
|
* be send (TCP)
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* psock - Socket state structure
|
|
|
|
* conn - The TCP connection structure
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
void tcp_send_txnotify(FAR struct socket *psock,
|
|
|
|
FAR struct tcp_conn_s *conn)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
/* If both IPv4 and IPv6 support are enabled, then we will need to select
|
|
|
|
* the device driver using the appropriate IP domain.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (psock->s_domain == PF_INET)
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
/* Notify the device driver that send data is available */
|
|
|
|
|
|
|
|
netdev_ipv4_txnotify(conn->u.ipv4.laddr, conn->u.ipv4.raddr);
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_IPv4 */
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
else /* if (psock->s_domain == PF_INET6) */
|
|
|
|
#endif /* CONFIG_NET_IPv4 */
|
|
|
|
{
|
|
|
|
/* Notify the device driver that send data is available */
|
|
|
|
|
|
|
|
DEBUGASSERT(psock->s_domain == PF_INET6);
|
|
|
|
netdev_ipv6_txnotify(conn->u.ipv6.laddr, conn->u.ipv6.raddr);
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_IPv6 */
|
|
|
|
}
|
|
|
|
|
2022-11-23 12:39:40 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcpip_hdrsize
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Get the total size of L3 and L4 TCP header
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* conn The connection structure associated with the socket
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* the total size of L3 and L4 TCP header
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
uint16_t tcpip_hdrsize(FAR struct tcp_conn_s *conn)
|
|
|
|
{
|
|
|
|
uint16_t hdrsize = sizeof(struct tcp_hdr_s);
|
|
|
|
|
2023-11-01 08:38:53 +01:00
|
|
|
UNUSED(conn);
|
|
|
|
return net_ip_domain_select(conn->domain,
|
|
|
|
sizeof(struct ipv4_hdr_s) + hdrsize,
|
|
|
|
sizeof(struct ipv6_hdr_s) + hdrsize);
|
2022-11-23 12:39:40 +01:00
|
|
|
}
|
|
|
|
|
2007-11-22 19:36:46 +01:00
|
|
|
#endif /* CONFIG_NET && CONFIG_NET_TCP */
|