ソースの整理中ですが、利用はできます。

Dependencies:   EthernetInterface HttpServer TextLCD mbed-rpc mbed-rtos mbed Socket lwip-eth lwip-sys lwip

Committer:
yueee_yt
Date:
Wed Mar 12 04:19:54 2014 +0000
Revision:
0:7766f6712673
???????????????

Who changed what in which revision?

UserRevisionLine numberNew contents of line
yueee_yt 0:7766f6712673 1 /**
yueee_yt 0:7766f6712673 2 * @file
yueee_yt 0:7766f6712673 3 * This is the IPv4 layer implementation for incoming and outgoing IP traffic.
yueee_yt 0:7766f6712673 4 *
yueee_yt 0:7766f6712673 5 * @see ip_frag.c
yueee_yt 0:7766f6712673 6 *
yueee_yt 0:7766f6712673 7 */
yueee_yt 0:7766f6712673 8
yueee_yt 0:7766f6712673 9 /*
yueee_yt 0:7766f6712673 10 * Copyright (c) 2001-2004 Swedish Institute of Computer Science.
yueee_yt 0:7766f6712673 11 * All rights reserved.
yueee_yt 0:7766f6712673 12 *
yueee_yt 0:7766f6712673 13 * Redistribution and use in source and binary forms, with or without modification,
yueee_yt 0:7766f6712673 14 * are permitted provided that the following conditions are met:
yueee_yt 0:7766f6712673 15 *
yueee_yt 0:7766f6712673 16 * 1. Redistributions of source code must retain the above copyright notice,
yueee_yt 0:7766f6712673 17 * this list of conditions and the following disclaimer.
yueee_yt 0:7766f6712673 18 * 2. Redistributions in binary form must reproduce the above copyright notice,
yueee_yt 0:7766f6712673 19 * this list of conditions and the following disclaimer in the documentation
yueee_yt 0:7766f6712673 20 * and/or other materials provided with the distribution.
yueee_yt 0:7766f6712673 21 * 3. The name of the author may not be used to endorse or promote products
yueee_yt 0:7766f6712673 22 * derived from this software without specific prior written permission.
yueee_yt 0:7766f6712673 23 *
yueee_yt 0:7766f6712673 24 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED
yueee_yt 0:7766f6712673 25 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
yueee_yt 0:7766f6712673 26 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
yueee_yt 0:7766f6712673 27 * SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
yueee_yt 0:7766f6712673 28 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT
yueee_yt 0:7766f6712673 29 * OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
yueee_yt 0:7766f6712673 30 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
yueee_yt 0:7766f6712673 31 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
yueee_yt 0:7766f6712673 32 * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY
yueee_yt 0:7766f6712673 33 * OF SUCH DAMAGE.
yueee_yt 0:7766f6712673 34 *
yueee_yt 0:7766f6712673 35 * This file is part of the lwIP TCP/IP stack.
yueee_yt 0:7766f6712673 36 *
yueee_yt 0:7766f6712673 37 * Author: Adam Dunkels <adam@sics.se>
yueee_yt 0:7766f6712673 38 *
yueee_yt 0:7766f6712673 39 */
yueee_yt 0:7766f6712673 40
yueee_yt 0:7766f6712673 41 #include "lwip/opt.h"
yueee_yt 0:7766f6712673 42 #include "lwip/ip.h"
yueee_yt 0:7766f6712673 43 #include "lwip/def.h"
yueee_yt 0:7766f6712673 44 #include "lwip/mem.h"
yueee_yt 0:7766f6712673 45 #include "lwip/ip_frag.h"
yueee_yt 0:7766f6712673 46 #include "lwip/inet_chksum.h"
yueee_yt 0:7766f6712673 47 #include "lwip/netif.h"
yueee_yt 0:7766f6712673 48 #include "lwip/icmp.h"
yueee_yt 0:7766f6712673 49 #include "lwip/igmp.h"
yueee_yt 0:7766f6712673 50 #include "lwip/raw.h"
yueee_yt 0:7766f6712673 51 #include "lwip/udp.h"
yueee_yt 0:7766f6712673 52 #include "lwip/tcp_impl.h"
yueee_yt 0:7766f6712673 53 #include "lwip/snmp.h"
yueee_yt 0:7766f6712673 54 #include "lwip/dhcp.h"
yueee_yt 0:7766f6712673 55 #include "lwip/autoip.h"
yueee_yt 0:7766f6712673 56 #include "lwip/stats.h"
yueee_yt 0:7766f6712673 57 #include "arch/perf.h"
yueee_yt 0:7766f6712673 58
yueee_yt 0:7766f6712673 59 #include <string.h>
yueee_yt 0:7766f6712673 60
yueee_yt 0:7766f6712673 61 /** Set this to 0 in the rare case of wanting to call an extra function to
yueee_yt 0:7766f6712673 62 * generate the IP checksum (in contrast to calculating it on-the-fly). */
yueee_yt 0:7766f6712673 63 #ifndef LWIP_INLINE_IP_CHKSUM
yueee_yt 0:7766f6712673 64 #define LWIP_INLINE_IP_CHKSUM 1
yueee_yt 0:7766f6712673 65 #endif
yueee_yt 0:7766f6712673 66 #if LWIP_INLINE_IP_CHKSUM && CHECKSUM_GEN_IP
yueee_yt 0:7766f6712673 67 #define CHECKSUM_GEN_IP_INLINE 1
yueee_yt 0:7766f6712673 68 #else
yueee_yt 0:7766f6712673 69 #define CHECKSUM_GEN_IP_INLINE 0
yueee_yt 0:7766f6712673 70 #endif
yueee_yt 0:7766f6712673 71
yueee_yt 0:7766f6712673 72 #if LWIP_DHCP || defined(LWIP_IP_ACCEPT_UDP_PORT)
yueee_yt 0:7766f6712673 73 #define IP_ACCEPT_LINK_LAYER_ADDRESSING 1
yueee_yt 0:7766f6712673 74
yueee_yt 0:7766f6712673 75 /** Some defines for DHCP to let link-layer-addressed packets through while the
yueee_yt 0:7766f6712673 76 * netif is down.
yueee_yt 0:7766f6712673 77 * To use this in your own application/protocol, define LWIP_IP_ACCEPT_UDP_PORT
yueee_yt 0:7766f6712673 78 * to return 1 if the port is accepted and 0 if the port is not accepted.
yueee_yt 0:7766f6712673 79 */
yueee_yt 0:7766f6712673 80 #if LWIP_DHCP && defined(LWIP_IP_ACCEPT_UDP_PORT)
yueee_yt 0:7766f6712673 81 /* accept DHCP client port and custom port */
yueee_yt 0:7766f6712673 82 #define IP_ACCEPT_LINK_LAYER_ADDRESSED_PORT(port) (((port) == PP_NTOHS(DHCP_CLIENT_PORT)) \
yueee_yt 0:7766f6712673 83 || (LWIP_IP_ACCEPT_UDP_PORT(port)))
yueee_yt 0:7766f6712673 84 #elif defined(LWIP_IP_ACCEPT_UDP_PORT) /* LWIP_DHCP && defined(LWIP_IP_ACCEPT_UDP_PORT) */
yueee_yt 0:7766f6712673 85 /* accept custom port only */
yueee_yt 0:7766f6712673 86 #define IP_ACCEPT_LINK_LAYER_ADDRESSED_PORT(port) (LWIP_IP_ACCEPT_UDP_PORT(dst_port))
yueee_yt 0:7766f6712673 87 #else /* LWIP_DHCP && defined(LWIP_IP_ACCEPT_UDP_PORT) */
yueee_yt 0:7766f6712673 88 /* accept DHCP client port only */
yueee_yt 0:7766f6712673 89 #define IP_ACCEPT_LINK_LAYER_ADDRESSED_PORT(port) ((port) == PP_NTOHS(DHCP_CLIENT_PORT))
yueee_yt 0:7766f6712673 90 #endif /* LWIP_DHCP && defined(LWIP_IP_ACCEPT_UDP_PORT) */
yueee_yt 0:7766f6712673 91
yueee_yt 0:7766f6712673 92 #else /* LWIP_DHCP */
yueee_yt 0:7766f6712673 93 #define IP_ACCEPT_LINK_LAYER_ADDRESSING 0
yueee_yt 0:7766f6712673 94 #endif /* LWIP_DHCP */
yueee_yt 0:7766f6712673 95
yueee_yt 0:7766f6712673 96 /**
yueee_yt 0:7766f6712673 97 * The interface that provided the packet for the current callback
yueee_yt 0:7766f6712673 98 * invocation.
yueee_yt 0:7766f6712673 99 */
yueee_yt 0:7766f6712673 100 struct netif *current_netif;
yueee_yt 0:7766f6712673 101
yueee_yt 0:7766f6712673 102 /**
yueee_yt 0:7766f6712673 103 * Header of the input packet currently being processed.
yueee_yt 0:7766f6712673 104 */
yueee_yt 0:7766f6712673 105 const struct ip_hdr *current_header;
yueee_yt 0:7766f6712673 106 /** Source IP address of current_header */
yueee_yt 0:7766f6712673 107 ip_addr_t current_iphdr_src;
yueee_yt 0:7766f6712673 108 /** Destination IP address of current_header */
yueee_yt 0:7766f6712673 109 ip_addr_t current_iphdr_dest;
yueee_yt 0:7766f6712673 110
yueee_yt 0:7766f6712673 111 /** The IP header ID of the next outgoing IP packet */
yueee_yt 0:7766f6712673 112 static u16_t ip_id;
yueee_yt 0:7766f6712673 113
yueee_yt 0:7766f6712673 114 /**
yueee_yt 0:7766f6712673 115 * Finds the appropriate network interface for a given IP address. It
yueee_yt 0:7766f6712673 116 * searches the list of network interfaces linearly. A match is found
yueee_yt 0:7766f6712673 117 * if the masked IP address of the network interface equals the masked
yueee_yt 0:7766f6712673 118 * IP address given to the function.
yueee_yt 0:7766f6712673 119 *
yueee_yt 0:7766f6712673 120 * @param dest the destination IP address for which to find the route
yueee_yt 0:7766f6712673 121 * @return the netif on which to send to reach dest
yueee_yt 0:7766f6712673 122 */
yueee_yt 0:7766f6712673 123 struct netif *
yueee_yt 0:7766f6712673 124 ip_route(ip_addr_t *dest)
yueee_yt 0:7766f6712673 125 {
yueee_yt 0:7766f6712673 126 struct netif *netif;
yueee_yt 0:7766f6712673 127
yueee_yt 0:7766f6712673 128 /* iterate through netifs */
yueee_yt 0:7766f6712673 129 for(netif = netif_list; netif != NULL; netif = netif->next) {
yueee_yt 0:7766f6712673 130 /* network mask matches? */
yueee_yt 0:7766f6712673 131 if (netif_is_up(netif)) {
yueee_yt 0:7766f6712673 132 if (ip_addr_netcmp(dest, &(netif->ip_addr), &(netif->netmask))) {
yueee_yt 0:7766f6712673 133 /* return netif on which to forward IP packet */
yueee_yt 0:7766f6712673 134 return netif;
yueee_yt 0:7766f6712673 135 }
yueee_yt 0:7766f6712673 136 }
yueee_yt 0:7766f6712673 137 }
yueee_yt 0:7766f6712673 138 if ((netif_default == NULL) || (!netif_is_up(netif_default))) {
yueee_yt 0:7766f6712673 139 LWIP_DEBUGF(IP_DEBUG | LWIP_DBG_LEVEL_SERIOUS, ("ip_route: No route to %"U16_F".%"U16_F".%"U16_F".%"U16_F"\n",
yueee_yt 0:7766f6712673 140 ip4_addr1_16(dest), ip4_addr2_16(dest), ip4_addr3_16(dest), ip4_addr4_16(dest)));
yueee_yt 0:7766f6712673 141 IP_STATS_INC(ip.rterr);
yueee_yt 0:7766f6712673 142 snmp_inc_ipoutnoroutes();
yueee_yt 0:7766f6712673 143 return NULL;
yueee_yt 0:7766f6712673 144 }
yueee_yt 0:7766f6712673 145 /* no matching netif found, use default netif */
yueee_yt 0:7766f6712673 146 return netif_default;
yueee_yt 0:7766f6712673 147 }
yueee_yt 0:7766f6712673 148
yueee_yt 0:7766f6712673 149 #if IP_FORWARD
yueee_yt 0:7766f6712673 150 /**
yueee_yt 0:7766f6712673 151 * Forwards an IP packet. It finds an appropriate route for the
yueee_yt 0:7766f6712673 152 * packet, decrements the TTL value of the packet, adjusts the
yueee_yt 0:7766f6712673 153 * checksum and outputs the packet on the appropriate interface.
yueee_yt 0:7766f6712673 154 *
yueee_yt 0:7766f6712673 155 * @param p the packet to forward (p->payload points to IP header)
yueee_yt 0:7766f6712673 156 * @param iphdr the IP header of the input packet
yueee_yt 0:7766f6712673 157 * @param inp the netif on which this packet was received
yueee_yt 0:7766f6712673 158 */
yueee_yt 0:7766f6712673 159 static void
yueee_yt 0:7766f6712673 160 ip_forward(struct pbuf *p, struct ip_hdr *iphdr, struct netif *inp)
yueee_yt 0:7766f6712673 161 {
yueee_yt 0:7766f6712673 162 struct netif *netif;
yueee_yt 0:7766f6712673 163
yueee_yt 0:7766f6712673 164 PERF_START;
yueee_yt 0:7766f6712673 165
yueee_yt 0:7766f6712673 166 /* RFC3927 2.7: do not forward link-local addresses */
yueee_yt 0:7766f6712673 167 if (ip_addr_islinklocal(&current_iphdr_dest)) {
yueee_yt 0:7766f6712673 168 LWIP_DEBUGF(IP_DEBUG, ("ip_forward: not forwarding LLA %"U16_F".%"U16_F".%"U16_F".%"U16_F"\n",
yueee_yt 0:7766f6712673 169 ip4_addr1_16(&current_iphdr_dest), ip4_addr2_16(&current_iphdr_dest),
yueee_yt 0:7766f6712673 170 ip4_addr3_16(&current_iphdr_dest), ip4_addr4_16(&current_iphdr_dest)));
yueee_yt 0:7766f6712673 171 goto return_noroute;
yueee_yt 0:7766f6712673 172 }
yueee_yt 0:7766f6712673 173
yueee_yt 0:7766f6712673 174 /* Find network interface where to forward this IP packet to. */
yueee_yt 0:7766f6712673 175 netif = ip_route(&current_iphdr_dest);
yueee_yt 0:7766f6712673 176 if (netif == NULL) {
yueee_yt 0:7766f6712673 177 LWIP_DEBUGF(IP_DEBUG, ("ip_forward: no forwarding route for %"U16_F".%"U16_F".%"U16_F".%"U16_F" found\n",
yueee_yt 0:7766f6712673 178 ip4_addr1_16(&current_iphdr_dest), ip4_addr2_16(&current_iphdr_dest),
yueee_yt 0:7766f6712673 179 ip4_addr3_16(&current_iphdr_dest), ip4_addr4_16(&current_iphdr_dest)));
yueee_yt 0:7766f6712673 180 goto return_noroute;
yueee_yt 0:7766f6712673 181 }
yueee_yt 0:7766f6712673 182 /* Do not forward packets onto the same network interface on which
yueee_yt 0:7766f6712673 183 * they arrived. */
yueee_yt 0:7766f6712673 184 if (netif == inp) {
yueee_yt 0:7766f6712673 185 LWIP_DEBUGF(IP_DEBUG, ("ip_forward: not bouncing packets back on incoming interface.\n"));
yueee_yt 0:7766f6712673 186 goto return_noroute;
yueee_yt 0:7766f6712673 187 }
yueee_yt 0:7766f6712673 188
yueee_yt 0:7766f6712673 189 /* decrement TTL */
yueee_yt 0:7766f6712673 190 IPH_TTL_SET(iphdr, IPH_TTL(iphdr) - 1);
yueee_yt 0:7766f6712673 191 /* send ICMP if TTL == 0 */
yueee_yt 0:7766f6712673 192 if (IPH_TTL(iphdr) == 0) {
yueee_yt 0:7766f6712673 193 snmp_inc_ipinhdrerrors();
yueee_yt 0:7766f6712673 194 #if LWIP_ICMP
yueee_yt 0:7766f6712673 195 /* Don't send ICMP messages in response to ICMP messages */
yueee_yt 0:7766f6712673 196 if (IPH_PROTO(iphdr) != IP_PROTO_ICMP) {
yueee_yt 0:7766f6712673 197 icmp_time_exceeded(p, ICMP_TE_TTL);
yueee_yt 0:7766f6712673 198 }
yueee_yt 0:7766f6712673 199 #endif /* LWIP_ICMP */
yueee_yt 0:7766f6712673 200 return;
yueee_yt 0:7766f6712673 201 }
yueee_yt 0:7766f6712673 202
yueee_yt 0:7766f6712673 203 /* Incrementally update the IP checksum. */
yueee_yt 0:7766f6712673 204 if (IPH_CHKSUM(iphdr) >= PP_HTONS(0xffffU - 0x100)) {
yueee_yt 0:7766f6712673 205 IPH_CHKSUM_SET(iphdr, IPH_CHKSUM(iphdr) + PP_HTONS(0x100) + 1);
yueee_yt 0:7766f6712673 206 } else {
yueee_yt 0:7766f6712673 207 IPH_CHKSUM_SET(iphdr, IPH_CHKSUM(iphdr) + PP_HTONS(0x100));
yueee_yt 0:7766f6712673 208 }
yueee_yt 0:7766f6712673 209
yueee_yt 0:7766f6712673 210 LWIP_DEBUGF(IP_DEBUG, ("ip_forward: forwarding packet to %"U16_F".%"U16_F".%"U16_F".%"U16_F"\n",
yueee_yt 0:7766f6712673 211 ip4_addr1_16(&current_iphdr_dest), ip4_addr2_16(&current_iphdr_dest),
yueee_yt 0:7766f6712673 212 ip4_addr3_16(&current_iphdr_dest), ip4_addr4_16(&current_iphdr_dest)));
yueee_yt 0:7766f6712673 213
yueee_yt 0:7766f6712673 214 IP_STATS_INC(ip.fw);
yueee_yt 0:7766f6712673 215 IP_STATS_INC(ip.xmit);
yueee_yt 0:7766f6712673 216 snmp_inc_ipforwdatagrams();
yueee_yt 0:7766f6712673 217
yueee_yt 0:7766f6712673 218 PERF_STOP("ip_forward");
yueee_yt 0:7766f6712673 219 /* transmit pbuf on chosen interface */
yueee_yt 0:7766f6712673 220 netif->output(netif, p, &current_iphdr_dest);
yueee_yt 0:7766f6712673 221 return;
yueee_yt 0:7766f6712673 222 return_noroute:
yueee_yt 0:7766f6712673 223 snmp_inc_ipoutnoroutes();
yueee_yt 0:7766f6712673 224 }
yueee_yt 0:7766f6712673 225 #endif /* IP_FORWARD */
yueee_yt 0:7766f6712673 226
yueee_yt 0:7766f6712673 227 /**
yueee_yt 0:7766f6712673 228 * This function is called by the network interface device driver when
yueee_yt 0:7766f6712673 229 * an IP packet is received. The function does the basic checks of the
yueee_yt 0:7766f6712673 230 * IP header such as packet size being at least larger than the header
yueee_yt 0:7766f6712673 231 * size etc. If the packet was not destined for us, the packet is
yueee_yt 0:7766f6712673 232 * forwarded (using ip_forward). The IP checksum is always checked.
yueee_yt 0:7766f6712673 233 *
yueee_yt 0:7766f6712673 234 * Finally, the packet is sent to the upper layer protocol input function.
yueee_yt 0:7766f6712673 235 *
yueee_yt 0:7766f6712673 236 * @param p the received IP packet (p->payload points to IP header)
yueee_yt 0:7766f6712673 237 * @param inp the netif on which this packet was received
yueee_yt 0:7766f6712673 238 * @return ERR_OK if the packet was processed (could return ERR_* if it wasn't
yueee_yt 0:7766f6712673 239 * processed, but currently always returns ERR_OK)
yueee_yt 0:7766f6712673 240 */
yueee_yt 0:7766f6712673 241 err_t
yueee_yt 0:7766f6712673 242 ip_input(struct pbuf *p, struct netif *inp)
yueee_yt 0:7766f6712673 243 {
yueee_yt 0:7766f6712673 244 struct ip_hdr *iphdr;
yueee_yt 0:7766f6712673 245 struct netif *netif;
yueee_yt 0:7766f6712673 246 u16_t iphdr_hlen;
yueee_yt 0:7766f6712673 247 u16_t iphdr_len;
yueee_yt 0:7766f6712673 248 #if IP_ACCEPT_LINK_LAYER_ADDRESSING
yueee_yt 0:7766f6712673 249 int check_ip_src=1;
yueee_yt 0:7766f6712673 250 #endif /* IP_ACCEPT_LINK_LAYER_ADDRESSING */
yueee_yt 0:7766f6712673 251
yueee_yt 0:7766f6712673 252 IP_STATS_INC(ip.recv);
yueee_yt 0:7766f6712673 253 snmp_inc_ipinreceives();
yueee_yt 0:7766f6712673 254
yueee_yt 0:7766f6712673 255 /* identify the IP header */
yueee_yt 0:7766f6712673 256 iphdr = (struct ip_hdr *)p->payload;
yueee_yt 0:7766f6712673 257 if (IPH_V(iphdr) != 4) {
yueee_yt 0:7766f6712673 258 LWIP_DEBUGF(IP_DEBUG | LWIP_DBG_LEVEL_WARNING, ("IP packet dropped due to bad version number %"U16_F"\n", IPH_V(iphdr)));
yueee_yt 0:7766f6712673 259 ip_debug_print(p);
yueee_yt 0:7766f6712673 260 pbuf_free(p);
yueee_yt 0:7766f6712673 261 IP_STATS_INC(ip.err);
yueee_yt 0:7766f6712673 262 IP_STATS_INC(ip.drop);
yueee_yt 0:7766f6712673 263 snmp_inc_ipinhdrerrors();
yueee_yt 0:7766f6712673 264 return ERR_OK;
yueee_yt 0:7766f6712673 265 }
yueee_yt 0:7766f6712673 266
yueee_yt 0:7766f6712673 267 /* obtain IP header length in number of 32-bit words */
yueee_yt 0:7766f6712673 268 iphdr_hlen = IPH_HL(iphdr);
yueee_yt 0:7766f6712673 269 /* calculate IP header length in bytes */
yueee_yt 0:7766f6712673 270 iphdr_hlen *= 4;
yueee_yt 0:7766f6712673 271 /* obtain ip length in bytes */
yueee_yt 0:7766f6712673 272 iphdr_len = ntohs(IPH_LEN(iphdr));
yueee_yt 0:7766f6712673 273
yueee_yt 0:7766f6712673 274 /* header length exceeds first pbuf length, or ip length exceeds total pbuf length? */
yueee_yt 0:7766f6712673 275 if ((iphdr_hlen > p->len) || (iphdr_len > p->tot_len)) {
yueee_yt 0:7766f6712673 276 if (iphdr_hlen > p->len) {
yueee_yt 0:7766f6712673 277 LWIP_DEBUGF(IP_DEBUG | LWIP_DBG_LEVEL_SERIOUS,
yueee_yt 0:7766f6712673 278 ("IP header (len %"U16_F") does not fit in first pbuf (len %"U16_F"), IP packet dropped.\n",
yueee_yt 0:7766f6712673 279 iphdr_hlen, p->len));
yueee_yt 0:7766f6712673 280 }
yueee_yt 0:7766f6712673 281 if (iphdr_len > p->tot_len) {
yueee_yt 0:7766f6712673 282 LWIP_DEBUGF(IP_DEBUG | LWIP_DBG_LEVEL_SERIOUS,
yueee_yt 0:7766f6712673 283 ("IP (len %"U16_F") is longer than pbuf (len %"U16_F"), IP packet dropped.\n",
yueee_yt 0:7766f6712673 284 iphdr_len, p->tot_len));
yueee_yt 0:7766f6712673 285 }
yueee_yt 0:7766f6712673 286 /* free (drop) packet pbufs */
yueee_yt 0:7766f6712673 287 pbuf_free(p);
yueee_yt 0:7766f6712673 288 IP_STATS_INC(ip.lenerr);
yueee_yt 0:7766f6712673 289 IP_STATS_INC(ip.drop);
yueee_yt 0:7766f6712673 290 snmp_inc_ipindiscards();
yueee_yt 0:7766f6712673 291 return ERR_OK;
yueee_yt 0:7766f6712673 292 }
yueee_yt 0:7766f6712673 293
yueee_yt 0:7766f6712673 294 /* verify checksum */
yueee_yt 0:7766f6712673 295 #if CHECKSUM_CHECK_IP
yueee_yt 0:7766f6712673 296 if (inet_chksum(iphdr, iphdr_hlen) != 0) {
yueee_yt 0:7766f6712673 297
yueee_yt 0:7766f6712673 298 LWIP_DEBUGF(IP_DEBUG | LWIP_DBG_LEVEL_SERIOUS,
yueee_yt 0:7766f6712673 299 ("Checksum (0x%"X16_F") failed, IP packet dropped.\n", inet_chksum(iphdr, iphdr_hlen)));
yueee_yt 0:7766f6712673 300 ip_debug_print(p);
yueee_yt 0:7766f6712673 301 pbuf_free(p);
yueee_yt 0:7766f6712673 302 IP_STATS_INC(ip.chkerr);
yueee_yt 0:7766f6712673 303 IP_STATS_INC(ip.drop);
yueee_yt 0:7766f6712673 304 snmp_inc_ipinhdrerrors();
yueee_yt 0:7766f6712673 305 return ERR_OK;
yueee_yt 0:7766f6712673 306 }
yueee_yt 0:7766f6712673 307 #endif
yueee_yt 0:7766f6712673 308
yueee_yt 0:7766f6712673 309 /* Trim pbuf. This should have been done at the netif layer,
yueee_yt 0:7766f6712673 310 * but we'll do it anyway just to be sure that its done. */
yueee_yt 0:7766f6712673 311 pbuf_realloc(p, iphdr_len);
yueee_yt 0:7766f6712673 312
yueee_yt 0:7766f6712673 313 /* copy IP addresses to aligned ip_addr_t */
yueee_yt 0:7766f6712673 314 ip_addr_copy(current_iphdr_dest, iphdr->dest);
yueee_yt 0:7766f6712673 315 ip_addr_copy(current_iphdr_src, iphdr->src);
yueee_yt 0:7766f6712673 316
yueee_yt 0:7766f6712673 317 /* match packet against an interface, i.e. is this packet for us? */
yueee_yt 0:7766f6712673 318 #if LWIP_IGMP
yueee_yt 0:7766f6712673 319 if (ip_addr_ismulticast(&current_iphdr_dest)) {
yueee_yt 0:7766f6712673 320 if ((inp->flags & NETIF_FLAG_IGMP) && (igmp_lookfor_group(inp, &current_iphdr_dest))) {
yueee_yt 0:7766f6712673 321 netif = inp;
yueee_yt 0:7766f6712673 322 } else {
yueee_yt 0:7766f6712673 323 netif = NULL;
yueee_yt 0:7766f6712673 324 }
yueee_yt 0:7766f6712673 325 } else
yueee_yt 0:7766f6712673 326 #endif /* LWIP_IGMP */
yueee_yt 0:7766f6712673 327 {
yueee_yt 0:7766f6712673 328 /* start trying with inp. if that's not acceptable, start walking the
yueee_yt 0:7766f6712673 329 list of configured netifs.
yueee_yt 0:7766f6712673 330 'first' is used as a boolean to mark whether we started walking the list */
yueee_yt 0:7766f6712673 331 int first = 1;
yueee_yt 0:7766f6712673 332 netif = inp;
yueee_yt 0:7766f6712673 333 do {
yueee_yt 0:7766f6712673 334 LWIP_DEBUGF(IP_DEBUG, ("ip_input: iphdr->dest 0x%"X32_F" netif->ip_addr 0x%"X32_F" (0x%"X32_F", 0x%"X32_F", 0x%"X32_F")\n",
yueee_yt 0:7766f6712673 335 ip4_addr_get_u32(&iphdr->dest), ip4_addr_get_u32(&netif->ip_addr),
yueee_yt 0:7766f6712673 336 ip4_addr_get_u32(&iphdr->dest) & ip4_addr_get_u32(&netif->netmask),
yueee_yt 0:7766f6712673 337 ip4_addr_get_u32(&netif->ip_addr) & ip4_addr_get_u32(&netif->netmask),
yueee_yt 0:7766f6712673 338 ip4_addr_get_u32(&iphdr->dest) & ~ip4_addr_get_u32(&netif->netmask)));
yueee_yt 0:7766f6712673 339
yueee_yt 0:7766f6712673 340 /* interface is up and configured? */
yueee_yt 0:7766f6712673 341 if ((netif_is_up(netif)) && (!ip_addr_isany(&(netif->ip_addr)))) {
yueee_yt 0:7766f6712673 342 /* unicast to this interface address? */
yueee_yt 0:7766f6712673 343 if (ip_addr_cmp(&current_iphdr_dest, &(netif->ip_addr)) ||
yueee_yt 0:7766f6712673 344 /* or broadcast on this interface network address? */
yueee_yt 0:7766f6712673 345 ip_addr_isbroadcast(&current_iphdr_dest, netif)) {
yueee_yt 0:7766f6712673 346 LWIP_DEBUGF(IP_DEBUG, ("ip_input: packet accepted on interface %c%c\n",
yueee_yt 0:7766f6712673 347 netif->name[0], netif->name[1]));
yueee_yt 0:7766f6712673 348 /* break out of for loop */
yueee_yt 0:7766f6712673 349 break;
yueee_yt 0:7766f6712673 350 }
yueee_yt 0:7766f6712673 351 #if LWIP_AUTOIP
yueee_yt 0:7766f6712673 352 /* connections to link-local addresses must persist after changing
yueee_yt 0:7766f6712673 353 the netif's address (RFC3927 ch. 1.9) */
yueee_yt 0:7766f6712673 354 if ((netif->autoip != NULL) &&
yueee_yt 0:7766f6712673 355 ip_addr_cmp(&current_iphdr_dest, &(netif->autoip->llipaddr))) {
yueee_yt 0:7766f6712673 356 LWIP_DEBUGF(IP_DEBUG, ("ip_input: LLA packet accepted on interface %c%c\n",
yueee_yt 0:7766f6712673 357 netif->name[0], netif->name[1]));
yueee_yt 0:7766f6712673 358 /* break out of for loop */
yueee_yt 0:7766f6712673 359 break;
yueee_yt 0:7766f6712673 360 }
yueee_yt 0:7766f6712673 361 #endif /* LWIP_AUTOIP */
yueee_yt 0:7766f6712673 362 }
yueee_yt 0:7766f6712673 363 if (first) {
yueee_yt 0:7766f6712673 364 first = 0;
yueee_yt 0:7766f6712673 365 netif = netif_list;
yueee_yt 0:7766f6712673 366 } else {
yueee_yt 0:7766f6712673 367 netif = netif->next;
yueee_yt 0:7766f6712673 368 }
yueee_yt 0:7766f6712673 369 if (netif == inp) {
yueee_yt 0:7766f6712673 370 netif = netif->next;
yueee_yt 0:7766f6712673 371 }
yueee_yt 0:7766f6712673 372 } while(netif != NULL);
yueee_yt 0:7766f6712673 373 }
yueee_yt 0:7766f6712673 374
yueee_yt 0:7766f6712673 375 #if IP_ACCEPT_LINK_LAYER_ADDRESSING
yueee_yt 0:7766f6712673 376 /* Pass DHCP messages regardless of destination address. DHCP traffic is addressed
yueee_yt 0:7766f6712673 377 * using link layer addressing (such as Ethernet MAC) so we must not filter on IP.
yueee_yt 0:7766f6712673 378 * According to RFC 1542 section 3.1.1, referred by RFC 2131).
yueee_yt 0:7766f6712673 379 *
yueee_yt 0:7766f6712673 380 * If you want to accept private broadcast communication while a netif is down,
yueee_yt 0:7766f6712673 381 * define LWIP_IP_ACCEPT_UDP_PORT(dst_port), e.g.:
yueee_yt 0:7766f6712673 382 *
yueee_yt 0:7766f6712673 383 * #define LWIP_IP_ACCEPT_UDP_PORT(dst_port) ((dst_port) == PP_NTOHS(12345))
yueee_yt 0:7766f6712673 384 */
yueee_yt 0:7766f6712673 385 if (netif == NULL) {
yueee_yt 0:7766f6712673 386 /* remote port is DHCP server? */
yueee_yt 0:7766f6712673 387 if (IPH_PROTO(iphdr) == IP_PROTO_UDP) {
yueee_yt 0:7766f6712673 388 struct udp_hdr *udphdr = (struct udp_hdr *)((u8_t *)iphdr + iphdr_hlen);
yueee_yt 0:7766f6712673 389 LWIP_DEBUGF(IP_DEBUG | LWIP_DBG_TRACE, ("ip_input: UDP packet to DHCP client port %"U16_F"\n",
yueee_yt 0:7766f6712673 390 ntohs(udphdr->dest)));
yueee_yt 0:7766f6712673 391 if (IP_ACCEPT_LINK_LAYER_ADDRESSED_PORT(udphdr->dest)) {
yueee_yt 0:7766f6712673 392 LWIP_DEBUGF(IP_DEBUG | LWIP_DBG_TRACE, ("ip_input: DHCP packet accepted.\n"));
yueee_yt 0:7766f6712673 393 netif = inp;
yueee_yt 0:7766f6712673 394 check_ip_src = 0;
yueee_yt 0:7766f6712673 395 }
yueee_yt 0:7766f6712673 396 }
yueee_yt 0:7766f6712673 397 }
yueee_yt 0:7766f6712673 398 #endif /* IP_ACCEPT_LINK_LAYER_ADDRESSING */
yueee_yt 0:7766f6712673 399
yueee_yt 0:7766f6712673 400 /* broadcast or multicast packet source address? Compliant with RFC 1122: 3.2.1.3 */
yueee_yt 0:7766f6712673 401 #if IP_ACCEPT_LINK_LAYER_ADDRESSING
yueee_yt 0:7766f6712673 402 /* DHCP servers need 0.0.0.0 to be allowed as source address (RFC 1.1.2.2: 3.2.1.3/a) */
yueee_yt 0:7766f6712673 403 if (check_ip_src && current_iphdr_src.addr != IPADDR_ANY)
yueee_yt 0:7766f6712673 404 #endif /* IP_ACCEPT_LINK_LAYER_ADDRESSING */
yueee_yt 0:7766f6712673 405 { if ((ip_addr_isbroadcast(&current_iphdr_src, inp)) ||
yueee_yt 0:7766f6712673 406 (ip_addr_ismulticast(&current_iphdr_src))) {
yueee_yt 0:7766f6712673 407 /* packet source is not valid */
yueee_yt 0:7766f6712673 408 LWIP_DEBUGF(IP_DEBUG | LWIP_DBG_TRACE | LWIP_DBG_LEVEL_WARNING, ("ip_input: packet source is not valid.\n"));
yueee_yt 0:7766f6712673 409 /* free (drop) packet pbufs */
yueee_yt 0:7766f6712673 410 pbuf_free(p);
yueee_yt 0:7766f6712673 411 IP_STATS_INC(ip.drop);
yueee_yt 0:7766f6712673 412 snmp_inc_ipinaddrerrors();
yueee_yt 0:7766f6712673 413 snmp_inc_ipindiscards();
yueee_yt 0:7766f6712673 414 return ERR_OK;
yueee_yt 0:7766f6712673 415 }
yueee_yt 0:7766f6712673 416 }
yueee_yt 0:7766f6712673 417
yueee_yt 0:7766f6712673 418 /* packet not for us? */
yueee_yt 0:7766f6712673 419 if (netif == NULL) {
yueee_yt 0:7766f6712673 420 /* packet not for us, route or discard */
yueee_yt 0:7766f6712673 421 LWIP_DEBUGF(IP_DEBUG | LWIP_DBG_TRACE, ("ip_input: packet not for us.\n"));
yueee_yt 0:7766f6712673 422 #if IP_FORWARD
yueee_yt 0:7766f6712673 423 /* non-broadcast packet? */
yueee_yt 0:7766f6712673 424 if (!ip_addr_isbroadcast(&current_iphdr_dest, inp)) {
yueee_yt 0:7766f6712673 425 /* try to forward IP packet on (other) interfaces */
yueee_yt 0:7766f6712673 426 ip_forward(p, iphdr, inp);
yueee_yt 0:7766f6712673 427 } else
yueee_yt 0:7766f6712673 428 #endif /* IP_FORWARD */
yueee_yt 0:7766f6712673 429 {
yueee_yt 0:7766f6712673 430 snmp_inc_ipinaddrerrors();
yueee_yt 0:7766f6712673 431 snmp_inc_ipindiscards();
yueee_yt 0:7766f6712673 432 }
yueee_yt 0:7766f6712673 433 pbuf_free(p);
yueee_yt 0:7766f6712673 434 return ERR_OK;
yueee_yt 0:7766f6712673 435 }
yueee_yt 0:7766f6712673 436 /* packet consists of multiple fragments? */
yueee_yt 0:7766f6712673 437 if ((IPH_OFFSET(iphdr) & PP_HTONS(IP_OFFMASK | IP_MF)) != 0) {
yueee_yt 0:7766f6712673 438 #if IP_REASSEMBLY /* packet fragment reassembly code present? */
yueee_yt 0:7766f6712673 439 LWIP_DEBUGF(IP_DEBUG, ("IP packet is a fragment (id=0x%04"X16_F" tot_len=%"U16_F" len=%"U16_F" MF=%"U16_F" offset=%"U16_F"), calling ip_reass()\n",
yueee_yt 0:7766f6712673 440 ntohs(IPH_ID(iphdr)), p->tot_len, ntohs(IPH_LEN(iphdr)), !!(IPH_OFFSET(iphdr) & PP_HTONS(IP_MF)), (ntohs(IPH_OFFSET(iphdr)) & IP_OFFMASK)*8));
yueee_yt 0:7766f6712673 441 /* reassemble the packet*/
yueee_yt 0:7766f6712673 442 p = ip_reass(p);
yueee_yt 0:7766f6712673 443 /* packet not fully reassembled yet? */
yueee_yt 0:7766f6712673 444 if (p == NULL) {
yueee_yt 0:7766f6712673 445 return ERR_OK;
yueee_yt 0:7766f6712673 446 }
yueee_yt 0:7766f6712673 447 iphdr = (struct ip_hdr *)p->payload;
yueee_yt 0:7766f6712673 448 #else /* IP_REASSEMBLY == 0, no packet fragment reassembly code present */
yueee_yt 0:7766f6712673 449 pbuf_free(p);
yueee_yt 0:7766f6712673 450 LWIP_DEBUGF(IP_DEBUG | LWIP_DBG_LEVEL_SERIOUS, ("IP packet dropped since it was fragmented (0x%"X16_F") (while IP_REASSEMBLY == 0).\n",
yueee_yt 0:7766f6712673 451 ntohs(IPH_OFFSET(iphdr))));
yueee_yt 0:7766f6712673 452 IP_STATS_INC(ip.opterr);
yueee_yt 0:7766f6712673 453 IP_STATS_INC(ip.drop);
yueee_yt 0:7766f6712673 454 /* unsupported protocol feature */
yueee_yt 0:7766f6712673 455 snmp_inc_ipinunknownprotos();
yueee_yt 0:7766f6712673 456 return ERR_OK;
yueee_yt 0:7766f6712673 457 #endif /* IP_REASSEMBLY */
yueee_yt 0:7766f6712673 458 }
yueee_yt 0:7766f6712673 459
yueee_yt 0:7766f6712673 460 #if IP_OPTIONS_ALLOWED == 0 /* no support for IP options in the IP header? */
yueee_yt 0:7766f6712673 461
yueee_yt 0:7766f6712673 462 #if LWIP_IGMP
yueee_yt 0:7766f6712673 463 /* there is an extra "router alert" option in IGMP messages which we allow for but do not police */
yueee_yt 0:7766f6712673 464 if((iphdr_hlen > IP_HLEN) && (IPH_PROTO(iphdr) != IP_PROTO_IGMP)) {
yueee_yt 0:7766f6712673 465 #else
yueee_yt 0:7766f6712673 466 if (iphdr_hlen > IP_HLEN) {
yueee_yt 0:7766f6712673 467 #endif /* LWIP_IGMP */
yueee_yt 0:7766f6712673 468 LWIP_DEBUGF(IP_DEBUG | LWIP_DBG_LEVEL_SERIOUS, ("IP packet dropped since there were IP options (while IP_OPTIONS_ALLOWED == 0).\n"));
yueee_yt 0:7766f6712673 469 pbuf_free(p);
yueee_yt 0:7766f6712673 470 IP_STATS_INC(ip.opterr);
yueee_yt 0:7766f6712673 471 IP_STATS_INC(ip.drop);
yueee_yt 0:7766f6712673 472 /* unsupported protocol feature */
yueee_yt 0:7766f6712673 473 snmp_inc_ipinunknownprotos();
yueee_yt 0:7766f6712673 474 return ERR_OK;
yueee_yt 0:7766f6712673 475 }
yueee_yt 0:7766f6712673 476 #endif /* IP_OPTIONS_ALLOWED == 0 */
yueee_yt 0:7766f6712673 477
yueee_yt 0:7766f6712673 478 /* send to upper layers */
yueee_yt 0:7766f6712673 479 LWIP_DEBUGF(IP_DEBUG, ("ip_input: \n"));
yueee_yt 0:7766f6712673 480 ip_debug_print(p);
yueee_yt 0:7766f6712673 481 LWIP_DEBUGF(IP_DEBUG, ("ip_input: p->len %"U16_F" p->tot_len %"U16_F"\n", p->len, p->tot_len));
yueee_yt 0:7766f6712673 482
yueee_yt 0:7766f6712673 483 current_netif = inp;
yueee_yt 0:7766f6712673 484 current_header = iphdr;
yueee_yt 0:7766f6712673 485
yueee_yt 0:7766f6712673 486 #if LWIP_RAW
yueee_yt 0:7766f6712673 487 /* raw input did not eat the packet? */
yueee_yt 0:7766f6712673 488 if (raw_input(p, inp) == 0)
yueee_yt 0:7766f6712673 489 #endif /* LWIP_RAW */
yueee_yt 0:7766f6712673 490 {
yueee_yt 0:7766f6712673 491
yueee_yt 0:7766f6712673 492 switch (IPH_PROTO(iphdr)) {
yueee_yt 0:7766f6712673 493 #if LWIP_UDP
yueee_yt 0:7766f6712673 494 case IP_PROTO_UDP:
yueee_yt 0:7766f6712673 495 #if LWIP_UDPLITE
yueee_yt 0:7766f6712673 496 case IP_PROTO_UDPLITE:
yueee_yt 0:7766f6712673 497 #endif /* LWIP_UDPLITE */
yueee_yt 0:7766f6712673 498 snmp_inc_ipindelivers();
yueee_yt 0:7766f6712673 499 udp_input(p, inp);
yueee_yt 0:7766f6712673 500 break;
yueee_yt 0:7766f6712673 501 #endif /* LWIP_UDP */
yueee_yt 0:7766f6712673 502 #if LWIP_TCP
yueee_yt 0:7766f6712673 503 case IP_PROTO_TCP:
yueee_yt 0:7766f6712673 504 snmp_inc_ipindelivers();
yueee_yt 0:7766f6712673 505 tcp_input(p, inp);
yueee_yt 0:7766f6712673 506 break;
yueee_yt 0:7766f6712673 507 #endif /* LWIP_TCP */
yueee_yt 0:7766f6712673 508 #if LWIP_ICMP
yueee_yt 0:7766f6712673 509 case IP_PROTO_ICMP:
yueee_yt 0:7766f6712673 510 snmp_inc_ipindelivers();
yueee_yt 0:7766f6712673 511 icmp_input(p, inp);
yueee_yt 0:7766f6712673 512 break;
yueee_yt 0:7766f6712673 513 #endif /* LWIP_ICMP */
yueee_yt 0:7766f6712673 514 #if LWIP_IGMP
yueee_yt 0:7766f6712673 515 case IP_PROTO_IGMP:
yueee_yt 0:7766f6712673 516 igmp_input(p, inp, &current_iphdr_dest);
yueee_yt 0:7766f6712673 517 break;
yueee_yt 0:7766f6712673 518 #endif /* LWIP_IGMP */
yueee_yt 0:7766f6712673 519 default:
yueee_yt 0:7766f6712673 520 #if LWIP_ICMP
yueee_yt 0:7766f6712673 521 /* send ICMP destination protocol unreachable unless is was a broadcast */
yueee_yt 0:7766f6712673 522 if (!ip_addr_isbroadcast(&current_iphdr_dest, inp) &&
yueee_yt 0:7766f6712673 523 !ip_addr_ismulticast(&current_iphdr_dest)) {
yueee_yt 0:7766f6712673 524 p->payload = iphdr;
yueee_yt 0:7766f6712673 525 icmp_dest_unreach(p, ICMP_DUR_PROTO);
yueee_yt 0:7766f6712673 526 }
yueee_yt 0:7766f6712673 527 #endif /* LWIP_ICMP */
yueee_yt 0:7766f6712673 528 pbuf_free(p);
yueee_yt 0:7766f6712673 529
yueee_yt 0:7766f6712673 530 LWIP_DEBUGF(IP_DEBUG | LWIP_DBG_LEVEL_SERIOUS, ("Unsupported transport protocol %"U16_F"\n", IPH_PROTO(iphdr)));
yueee_yt 0:7766f6712673 531
yueee_yt 0:7766f6712673 532 IP_STATS_INC(ip.proterr);
yueee_yt 0:7766f6712673 533 IP_STATS_INC(ip.drop);
yueee_yt 0:7766f6712673 534 snmp_inc_ipinunknownprotos();
yueee_yt 0:7766f6712673 535 }
yueee_yt 0:7766f6712673 536 }
yueee_yt 0:7766f6712673 537
yueee_yt 0:7766f6712673 538 current_netif = NULL;
yueee_yt 0:7766f6712673 539 current_header = NULL;
yueee_yt 0:7766f6712673 540 ip_addr_set_any(&current_iphdr_src);
yueee_yt 0:7766f6712673 541 ip_addr_set_any(&current_iphdr_dest);
yueee_yt 0:7766f6712673 542
yueee_yt 0:7766f6712673 543 return ERR_OK;
yueee_yt 0:7766f6712673 544 }
yueee_yt 0:7766f6712673 545
yueee_yt 0:7766f6712673 546 /**
yueee_yt 0:7766f6712673 547 * Sends an IP packet on a network interface. This function constructs
yueee_yt 0:7766f6712673 548 * the IP header and calculates the IP header checksum. If the source
yueee_yt 0:7766f6712673 549 * IP address is NULL, the IP address of the outgoing network
yueee_yt 0:7766f6712673 550 * interface is filled in as source address.
yueee_yt 0:7766f6712673 551 * If the destination IP address is IP_HDRINCL, p is assumed to already
yueee_yt 0:7766f6712673 552 * include an IP header and p->payload points to it instead of the data.
yueee_yt 0:7766f6712673 553 *
yueee_yt 0:7766f6712673 554 * @param p the packet to send (p->payload points to the data, e.g. next
yueee_yt 0:7766f6712673 555 protocol header; if dest == IP_HDRINCL, p already includes an IP
yueee_yt 0:7766f6712673 556 header and p->payload points to that IP header)
yueee_yt 0:7766f6712673 557 * @param src the source IP address to send from (if src == IP_ADDR_ANY, the
yueee_yt 0:7766f6712673 558 * IP address of the netif used to send is used as source address)
yueee_yt 0:7766f6712673 559 * @param dest the destination IP address to send the packet to
yueee_yt 0:7766f6712673 560 * @param ttl the TTL value to be set in the IP header
yueee_yt 0:7766f6712673 561 * @param tos the TOS value to be set in the IP header
yueee_yt 0:7766f6712673 562 * @param proto the PROTOCOL to be set in the IP header
yueee_yt 0:7766f6712673 563 * @param netif the netif on which to send this packet
yueee_yt 0:7766f6712673 564 * @return ERR_OK if the packet was sent OK
yueee_yt 0:7766f6712673 565 * ERR_BUF if p doesn't have enough space for IP/LINK headers
yueee_yt 0:7766f6712673 566 * returns errors returned by netif->output
yueee_yt 0:7766f6712673 567 *
yueee_yt 0:7766f6712673 568 * @note ip_id: RFC791 "some host may be able to simply use
yueee_yt 0:7766f6712673 569 * unique identifiers independent of destination"
yueee_yt 0:7766f6712673 570 */
yueee_yt 0:7766f6712673 571 err_t
yueee_yt 0:7766f6712673 572 ip_output_if(struct pbuf *p, ip_addr_t *src, ip_addr_t *dest,
yueee_yt 0:7766f6712673 573 u8_t ttl, u8_t tos,
yueee_yt 0:7766f6712673 574 u8_t proto, struct netif *netif)
yueee_yt 0:7766f6712673 575 {
yueee_yt 0:7766f6712673 576 #if IP_OPTIONS_SEND
yueee_yt 0:7766f6712673 577 return ip_output_if_opt(p, src, dest, ttl, tos, proto, netif, NULL, 0);
yueee_yt 0:7766f6712673 578 }
yueee_yt 0:7766f6712673 579
yueee_yt 0:7766f6712673 580 /**
yueee_yt 0:7766f6712673 581 * Same as ip_output_if() but with the possibility to include IP options:
yueee_yt 0:7766f6712673 582 *
yueee_yt 0:7766f6712673 583 * @ param ip_options pointer to the IP options, copied into the IP header
yueee_yt 0:7766f6712673 584 * @ param optlen length of ip_options
yueee_yt 0:7766f6712673 585 */
yueee_yt 0:7766f6712673 586 err_t ip_output_if_opt(struct pbuf *p, ip_addr_t *src, ip_addr_t *dest,
yueee_yt 0:7766f6712673 587 u8_t ttl, u8_t tos, u8_t proto, struct netif *netif, void *ip_options,
yueee_yt 0:7766f6712673 588 u16_t optlen)
yueee_yt 0:7766f6712673 589 {
yueee_yt 0:7766f6712673 590 #endif /* IP_OPTIONS_SEND */
yueee_yt 0:7766f6712673 591 struct ip_hdr *iphdr;
yueee_yt 0:7766f6712673 592 ip_addr_t dest_addr;
yueee_yt 0:7766f6712673 593 #if CHECKSUM_GEN_IP_INLINE
yueee_yt 0:7766f6712673 594 u32_t chk_sum = 0;
yueee_yt 0:7766f6712673 595 #endif /* CHECKSUM_GEN_IP_INLINE */
yueee_yt 0:7766f6712673 596
yueee_yt 0:7766f6712673 597 /* pbufs passed to IP must have a ref-count of 1 as their payload pointer
yueee_yt 0:7766f6712673 598 gets altered as the packet is passed down the stack */
yueee_yt 0:7766f6712673 599 LWIP_ASSERT("p->ref == 1", p->ref == 1);
yueee_yt 0:7766f6712673 600
yueee_yt 0:7766f6712673 601 snmp_inc_ipoutrequests();
yueee_yt 0:7766f6712673 602
yueee_yt 0:7766f6712673 603 /* Should the IP header be generated or is it already included in p? */
yueee_yt 0:7766f6712673 604 if (dest != IP_HDRINCL) {
yueee_yt 0:7766f6712673 605 u16_t ip_hlen = IP_HLEN;
yueee_yt 0:7766f6712673 606 #if IP_OPTIONS_SEND
yueee_yt 0:7766f6712673 607 u16_t optlen_aligned = 0;
yueee_yt 0:7766f6712673 608 if (optlen != 0) {
yueee_yt 0:7766f6712673 609 #if CHECKSUM_GEN_IP_INLINE
yueee_yt 0:7766f6712673 610 int i;
yueee_yt 0:7766f6712673 611 #endif /* CHECKSUM_GEN_IP_INLINE */
yueee_yt 0:7766f6712673 612 /* round up to a multiple of 4 */
yueee_yt 0:7766f6712673 613 optlen_aligned = ((optlen + 3) & ~3);
yueee_yt 0:7766f6712673 614 ip_hlen += optlen_aligned;
yueee_yt 0:7766f6712673 615 /* First write in the IP options */
yueee_yt 0:7766f6712673 616 if (pbuf_header(p, optlen_aligned)) {
yueee_yt 0:7766f6712673 617 LWIP_DEBUGF(IP_DEBUG | LWIP_DBG_LEVEL_SERIOUS, ("ip_output_if_opt: not enough room for IP options in pbuf\n"));
yueee_yt 0:7766f6712673 618 IP_STATS_INC(ip.err);
yueee_yt 0:7766f6712673 619 snmp_inc_ipoutdiscards();
yueee_yt 0:7766f6712673 620 return ERR_BUF;
yueee_yt 0:7766f6712673 621 }
yueee_yt 0:7766f6712673 622 MEMCPY(p->payload, ip_options, optlen);
yueee_yt 0:7766f6712673 623 if (optlen < optlen_aligned) {
yueee_yt 0:7766f6712673 624 /* zero the remaining bytes */
yueee_yt 0:7766f6712673 625 memset(((char*)p->payload) + optlen, 0, optlen_aligned - optlen);
yueee_yt 0:7766f6712673 626 }
yueee_yt 0:7766f6712673 627 #if CHECKSUM_GEN_IP_INLINE
yueee_yt 0:7766f6712673 628 for (i = 0; i < optlen_aligned/2; i++) {
yueee_yt 0:7766f6712673 629 chk_sum += ((u16_t*)p->payload)[i];
yueee_yt 0:7766f6712673 630 }
yueee_yt 0:7766f6712673 631 #endif /* CHECKSUM_GEN_IP_INLINE */
yueee_yt 0:7766f6712673 632 }
yueee_yt 0:7766f6712673 633 #endif /* IP_OPTIONS_SEND */
yueee_yt 0:7766f6712673 634 /* generate IP header */
yueee_yt 0:7766f6712673 635 if (pbuf_header(p, IP_HLEN)) {
yueee_yt 0:7766f6712673 636 LWIP_DEBUGF(IP_DEBUG | LWIP_DBG_LEVEL_SERIOUS, ("ip_output: not enough room for IP header in pbuf\n"));
yueee_yt 0:7766f6712673 637
yueee_yt 0:7766f6712673 638 IP_STATS_INC(ip.err);
yueee_yt 0:7766f6712673 639 snmp_inc_ipoutdiscards();
yueee_yt 0:7766f6712673 640 return ERR_BUF;
yueee_yt 0:7766f6712673 641 }
yueee_yt 0:7766f6712673 642
yueee_yt 0:7766f6712673 643 iphdr = (struct ip_hdr *)p->payload;
yueee_yt 0:7766f6712673 644 LWIP_ASSERT("check that first pbuf can hold struct ip_hdr",
yueee_yt 0:7766f6712673 645 (p->len >= sizeof(struct ip_hdr)));
yueee_yt 0:7766f6712673 646
yueee_yt 0:7766f6712673 647 IPH_TTL_SET(iphdr, ttl);
yueee_yt 0:7766f6712673 648 IPH_PROTO_SET(iphdr, proto);
yueee_yt 0:7766f6712673 649 #if CHECKSUM_GEN_IP_INLINE
yueee_yt 0:7766f6712673 650 chk_sum += LWIP_MAKE_U16(proto, ttl);
yueee_yt 0:7766f6712673 651 #endif /* CHECKSUM_GEN_IP_INLINE */
yueee_yt 0:7766f6712673 652
yueee_yt 0:7766f6712673 653 /* dest cannot be NULL here */
yueee_yt 0:7766f6712673 654 ip_addr_copy(iphdr->dest, *dest);
yueee_yt 0:7766f6712673 655 #if CHECKSUM_GEN_IP_INLINE
yueee_yt 0:7766f6712673 656 chk_sum += ip4_addr_get_u32(&iphdr->dest) & 0xFFFF;
yueee_yt 0:7766f6712673 657 chk_sum += ip4_addr_get_u32(&iphdr->dest) >> 16;
yueee_yt 0:7766f6712673 658 #endif /* CHECKSUM_GEN_IP_INLINE */
yueee_yt 0:7766f6712673 659
yueee_yt 0:7766f6712673 660 IPH_VHLTOS_SET(iphdr, 4, ip_hlen / 4, tos);
yueee_yt 0:7766f6712673 661 #if CHECKSUM_GEN_IP_INLINE
yueee_yt 0:7766f6712673 662 chk_sum += iphdr->_v_hl_tos;
yueee_yt 0:7766f6712673 663 #endif /* CHECKSUM_GEN_IP_INLINE */
yueee_yt 0:7766f6712673 664 IPH_LEN_SET(iphdr, htons(p->tot_len));
yueee_yt 0:7766f6712673 665 #if CHECKSUM_GEN_IP_INLINE
yueee_yt 0:7766f6712673 666 chk_sum += iphdr->_len;
yueee_yt 0:7766f6712673 667 #endif /* CHECKSUM_GEN_IP_INLINE */
yueee_yt 0:7766f6712673 668 IPH_OFFSET_SET(iphdr, 0);
yueee_yt 0:7766f6712673 669 IPH_ID_SET(iphdr, htons(ip_id));
yueee_yt 0:7766f6712673 670 #if CHECKSUM_GEN_IP_INLINE
yueee_yt 0:7766f6712673 671 chk_sum += iphdr->_id;
yueee_yt 0:7766f6712673 672 #endif /* CHECKSUM_GEN_IP_INLINE */
yueee_yt 0:7766f6712673 673 ++ip_id;
yueee_yt 0:7766f6712673 674
yueee_yt 0:7766f6712673 675 if (ip_addr_isany(src)) {
yueee_yt 0:7766f6712673 676 ip_addr_copy(iphdr->src, netif->ip_addr);
yueee_yt 0:7766f6712673 677 } else {
yueee_yt 0:7766f6712673 678 /* src cannot be NULL here */
yueee_yt 0:7766f6712673 679 ip_addr_copy(iphdr->src, *src);
yueee_yt 0:7766f6712673 680 }
yueee_yt 0:7766f6712673 681
yueee_yt 0:7766f6712673 682 #if CHECKSUM_GEN_IP_INLINE
yueee_yt 0:7766f6712673 683 chk_sum += ip4_addr_get_u32(&iphdr->src) & 0xFFFF;
yueee_yt 0:7766f6712673 684 chk_sum += ip4_addr_get_u32(&iphdr->src) >> 16;
yueee_yt 0:7766f6712673 685 chk_sum = (chk_sum >> 16) + (chk_sum & 0xFFFF);
yueee_yt 0:7766f6712673 686 chk_sum = (chk_sum >> 16) + chk_sum;
yueee_yt 0:7766f6712673 687 chk_sum = ~chk_sum;
yueee_yt 0:7766f6712673 688 iphdr->_chksum = chk_sum; /* network order */
yueee_yt 0:7766f6712673 689 #else /* CHECKSUM_GEN_IP_INLINE */
yueee_yt 0:7766f6712673 690 IPH_CHKSUM_SET(iphdr, 0);
yueee_yt 0:7766f6712673 691 #if CHECKSUM_GEN_IP
yueee_yt 0:7766f6712673 692 IPH_CHKSUM_SET(iphdr, inet_chksum(iphdr, ip_hlen));
yueee_yt 0:7766f6712673 693 #endif
yueee_yt 0:7766f6712673 694 #endif /* CHECKSUM_GEN_IP_INLINE */
yueee_yt 0:7766f6712673 695 } else {
yueee_yt 0:7766f6712673 696 /* IP header already included in p */
yueee_yt 0:7766f6712673 697 iphdr = (struct ip_hdr *)p->payload;
yueee_yt 0:7766f6712673 698 ip_addr_copy(dest_addr, iphdr->dest);
yueee_yt 0:7766f6712673 699 dest = &dest_addr;
yueee_yt 0:7766f6712673 700 }
yueee_yt 0:7766f6712673 701
yueee_yt 0:7766f6712673 702 IP_STATS_INC(ip.xmit);
yueee_yt 0:7766f6712673 703
yueee_yt 0:7766f6712673 704 LWIP_DEBUGF(IP_DEBUG, ("ip_output_if: %c%c%"U16_F"\n", netif->name[0], netif->name[1], netif->num));
yueee_yt 0:7766f6712673 705 ip_debug_print(p);
yueee_yt 0:7766f6712673 706
yueee_yt 0:7766f6712673 707 #if ENABLE_LOOPBACK
yueee_yt 0:7766f6712673 708 if (ip_addr_cmp(dest, &netif->ip_addr)) {
yueee_yt 0:7766f6712673 709 /* Packet to self, enqueue it for loopback */
yueee_yt 0:7766f6712673 710 LWIP_DEBUGF(IP_DEBUG, ("netif_loop_output()"));
yueee_yt 0:7766f6712673 711 return netif_loop_output(netif, p, dest);
yueee_yt 0:7766f6712673 712 }
yueee_yt 0:7766f6712673 713 #if LWIP_IGMP
yueee_yt 0:7766f6712673 714 if ((p->flags & PBUF_FLAG_MCASTLOOP) != 0) {
yueee_yt 0:7766f6712673 715 netif_loop_output(netif, p, dest);
yueee_yt 0:7766f6712673 716 }
yueee_yt 0:7766f6712673 717 #endif /* LWIP_IGMP */
yueee_yt 0:7766f6712673 718 #endif /* ENABLE_LOOPBACK */
yueee_yt 0:7766f6712673 719 #if IP_FRAG
yueee_yt 0:7766f6712673 720 /* don't fragment if interface has mtu set to 0 [loopif] */
yueee_yt 0:7766f6712673 721 if (netif->mtu && (p->tot_len > netif->mtu)) {
yueee_yt 0:7766f6712673 722 return ip_frag(p, netif, dest);
yueee_yt 0:7766f6712673 723 }
yueee_yt 0:7766f6712673 724 #endif /* IP_FRAG */
yueee_yt 0:7766f6712673 725
yueee_yt 0:7766f6712673 726 LWIP_DEBUGF(IP_DEBUG, ("netif->output()"));
yueee_yt 0:7766f6712673 727 return netif->output(netif, p, dest);
yueee_yt 0:7766f6712673 728 }
yueee_yt 0:7766f6712673 729
yueee_yt 0:7766f6712673 730 /**
yueee_yt 0:7766f6712673 731 * Simple interface to ip_output_if. It finds the outgoing network
yueee_yt 0:7766f6712673 732 * interface and calls upon ip_output_if to do the actual work.
yueee_yt 0:7766f6712673 733 *
yueee_yt 0:7766f6712673 734 * @param p the packet to send (p->payload points to the data, e.g. next
yueee_yt 0:7766f6712673 735 protocol header; if dest == IP_HDRINCL, p already includes an IP
yueee_yt 0:7766f6712673 736 header and p->payload points to that IP header)
yueee_yt 0:7766f6712673 737 * @param src the source IP address to send from (if src == IP_ADDR_ANY, the
yueee_yt 0:7766f6712673 738 * IP address of the netif used to send is used as source address)
yueee_yt 0:7766f6712673 739 * @param dest the destination IP address to send the packet to
yueee_yt 0:7766f6712673 740 * @param ttl the TTL value to be set in the IP header
yueee_yt 0:7766f6712673 741 * @param tos the TOS value to be set in the IP header
yueee_yt 0:7766f6712673 742 * @param proto the PROTOCOL to be set in the IP header
yueee_yt 0:7766f6712673 743 *
yueee_yt 0:7766f6712673 744 * @return ERR_RTE if no route is found
yueee_yt 0:7766f6712673 745 * see ip_output_if() for more return values
yueee_yt 0:7766f6712673 746 */
yueee_yt 0:7766f6712673 747 err_t
yueee_yt 0:7766f6712673 748 ip_output(struct pbuf *p, ip_addr_t *src, ip_addr_t *dest,
yueee_yt 0:7766f6712673 749 u8_t ttl, u8_t tos, u8_t proto)
yueee_yt 0:7766f6712673 750 {
yueee_yt 0:7766f6712673 751 struct netif *netif;
yueee_yt 0:7766f6712673 752
yueee_yt 0:7766f6712673 753 /* pbufs passed to IP must have a ref-count of 1 as their payload pointer
yueee_yt 0:7766f6712673 754 gets altered as the packet is passed down the stack */
yueee_yt 0:7766f6712673 755 LWIP_ASSERT("p->ref == 1", p->ref == 1);
yueee_yt 0:7766f6712673 756
yueee_yt 0:7766f6712673 757 if ((netif = ip_route(dest)) == NULL) {
yueee_yt 0:7766f6712673 758 LWIP_DEBUGF(IP_DEBUG, ("ip_output: No route to %"U16_F".%"U16_F".%"U16_F".%"U16_F"\n",
yueee_yt 0:7766f6712673 759 ip4_addr1_16(dest), ip4_addr2_16(dest), ip4_addr3_16(dest), ip4_addr4_16(dest)));
yueee_yt 0:7766f6712673 760 IP_STATS_INC(ip.rterr);
yueee_yt 0:7766f6712673 761 return ERR_RTE;
yueee_yt 0:7766f6712673 762 }
yueee_yt 0:7766f6712673 763
yueee_yt 0:7766f6712673 764 return ip_output_if(p, src, dest, ttl, tos, proto, netif);
yueee_yt 0:7766f6712673 765 }
yueee_yt 0:7766f6712673 766
yueee_yt 0:7766f6712673 767 #if LWIP_NETIF_HWADDRHINT
yueee_yt 0:7766f6712673 768 /** Like ip_output, but takes and addr_hint pointer that is passed on to netif->addr_hint
yueee_yt 0:7766f6712673 769 * before calling ip_output_if.
yueee_yt 0:7766f6712673 770 *
yueee_yt 0:7766f6712673 771 * @param p the packet to send (p->payload points to the data, e.g. next
yueee_yt 0:7766f6712673 772 protocol header; if dest == IP_HDRINCL, p already includes an IP
yueee_yt 0:7766f6712673 773 header and p->payload points to that IP header)
yueee_yt 0:7766f6712673 774 * @param src the source IP address to send from (if src == IP_ADDR_ANY, the
yueee_yt 0:7766f6712673 775 * IP address of the netif used to send is used as source address)
yueee_yt 0:7766f6712673 776 * @param dest the destination IP address to send the packet to
yueee_yt 0:7766f6712673 777 * @param ttl the TTL value to be set in the IP header
yueee_yt 0:7766f6712673 778 * @param tos the TOS value to be set in the IP header
yueee_yt 0:7766f6712673 779 * @param proto the PROTOCOL to be set in the IP header
yueee_yt 0:7766f6712673 780 * @param addr_hint address hint pointer set to netif->addr_hint before
yueee_yt 0:7766f6712673 781 * calling ip_output_if()
yueee_yt 0:7766f6712673 782 *
yueee_yt 0:7766f6712673 783 * @return ERR_RTE if no route is found
yueee_yt 0:7766f6712673 784 * see ip_output_if() for more return values
yueee_yt 0:7766f6712673 785 */
yueee_yt 0:7766f6712673 786 err_t
yueee_yt 0:7766f6712673 787 ip_output_hinted(struct pbuf *p, ip_addr_t *src, ip_addr_t *dest,
yueee_yt 0:7766f6712673 788 u8_t ttl, u8_t tos, u8_t proto, u8_t *addr_hint)
yueee_yt 0:7766f6712673 789 {
yueee_yt 0:7766f6712673 790 struct netif *netif;
yueee_yt 0:7766f6712673 791 err_t err;
yueee_yt 0:7766f6712673 792
yueee_yt 0:7766f6712673 793 /* pbufs passed to IP must have a ref-count of 1 as their payload pointer
yueee_yt 0:7766f6712673 794 gets altered as the packet is passed down the stack */
yueee_yt 0:7766f6712673 795 LWIP_ASSERT("p->ref == 1", p->ref == 1);
yueee_yt 0:7766f6712673 796
yueee_yt 0:7766f6712673 797 if ((netif = ip_route(dest)) == NULL) {
yueee_yt 0:7766f6712673 798 LWIP_DEBUGF(IP_DEBUG, ("ip_output: No route to %"U16_F".%"U16_F".%"U16_F".%"U16_F"\n",
yueee_yt 0:7766f6712673 799 ip4_addr1_16(dest), ip4_addr2_16(dest), ip4_addr3_16(dest), ip4_addr4_16(dest)));
yueee_yt 0:7766f6712673 800 IP_STATS_INC(ip.rterr);
yueee_yt 0:7766f6712673 801 return ERR_RTE;
yueee_yt 0:7766f6712673 802 }
yueee_yt 0:7766f6712673 803
yueee_yt 0:7766f6712673 804 netif->addr_hint = addr_hint;
yueee_yt 0:7766f6712673 805 err = ip_output_if(p, src, dest, ttl, tos, proto, netif);
yueee_yt 0:7766f6712673 806 netif->addr_hint = NULL;
yueee_yt 0:7766f6712673 807
yueee_yt 0:7766f6712673 808 return err;
yueee_yt 0:7766f6712673 809 }
yueee_yt 0:7766f6712673 810 #endif /* LWIP_NETIF_HWADDRHINT*/
yueee_yt 0:7766f6712673 811
yueee_yt 0:7766f6712673 812 #if IP_DEBUG
yueee_yt 0:7766f6712673 813 /* Print an IP header by using LWIP_DEBUGF
yueee_yt 0:7766f6712673 814 * @param p an IP packet, p->payload pointing to the IP header
yueee_yt 0:7766f6712673 815 */
yueee_yt 0:7766f6712673 816 void
yueee_yt 0:7766f6712673 817 ip_debug_print(struct pbuf *p)
yueee_yt 0:7766f6712673 818 {
yueee_yt 0:7766f6712673 819 struct ip_hdr *iphdr = (struct ip_hdr *)p->payload;
yueee_yt 0:7766f6712673 820 u8_t *payload;
yueee_yt 0:7766f6712673 821
yueee_yt 0:7766f6712673 822 payload = (u8_t *)iphdr + IP_HLEN;
yueee_yt 0:7766f6712673 823
yueee_yt 0:7766f6712673 824 LWIP_DEBUGF(IP_DEBUG, ("IP header:\n"));
yueee_yt 0:7766f6712673 825 LWIP_DEBUGF(IP_DEBUG, ("+-------------------------------+\n"));
yueee_yt 0:7766f6712673 826 LWIP_DEBUGF(IP_DEBUG, ("|%2"S16_F" |%2"S16_F" | 0x%02"X16_F" | %5"U16_F" | (v, hl, tos, len)\n",
yueee_yt 0:7766f6712673 827 IPH_V(iphdr),
yueee_yt 0:7766f6712673 828 IPH_HL(iphdr),
yueee_yt 0:7766f6712673 829 IPH_TOS(iphdr),
yueee_yt 0:7766f6712673 830 ntohs(IPH_LEN(iphdr))));
yueee_yt 0:7766f6712673 831 LWIP_DEBUGF(IP_DEBUG, ("+-------------------------------+\n"));
yueee_yt 0:7766f6712673 832 LWIP_DEBUGF(IP_DEBUG, ("| %5"U16_F" |%"U16_F"%"U16_F"%"U16_F"| %4"U16_F" | (id, flags, offset)\n",
yueee_yt 0:7766f6712673 833 ntohs(IPH_ID(iphdr)),
yueee_yt 0:7766f6712673 834 ntohs(IPH_OFFSET(iphdr)) >> 15 & 1,
yueee_yt 0:7766f6712673 835 ntohs(IPH_OFFSET(iphdr)) >> 14 & 1,
yueee_yt 0:7766f6712673 836 ntohs(IPH_OFFSET(iphdr)) >> 13 & 1,
yueee_yt 0:7766f6712673 837 ntohs(IPH_OFFSET(iphdr)) & IP_OFFMASK));
yueee_yt 0:7766f6712673 838 LWIP_DEBUGF(IP_DEBUG, ("+-------------------------------+\n"));
yueee_yt 0:7766f6712673 839 LWIP_DEBUGF(IP_DEBUG, ("| %3"U16_F" | %3"U16_F" | 0x%04"X16_F" | (ttl, proto, chksum)\n",
yueee_yt 0:7766f6712673 840 IPH_TTL(iphdr),
yueee_yt 0:7766f6712673 841 IPH_PROTO(iphdr),
yueee_yt 0:7766f6712673 842 ntohs(IPH_CHKSUM(iphdr))));
yueee_yt 0:7766f6712673 843 LWIP_DEBUGF(IP_DEBUG, ("+-------------------------------+\n"));
yueee_yt 0:7766f6712673 844 LWIP_DEBUGF(IP_DEBUG, ("| %3"U16_F" | %3"U16_F" | %3"U16_F" | %3"U16_F" | (src)\n",
yueee_yt 0:7766f6712673 845 ip4_addr1_16(&iphdr->src),
yueee_yt 0:7766f6712673 846 ip4_addr2_16(&iphdr->src),
yueee_yt 0:7766f6712673 847 ip4_addr3_16(&iphdr->src),
yueee_yt 0:7766f6712673 848 ip4_addr4_16(&iphdr->src)));
yueee_yt 0:7766f6712673 849 LWIP_DEBUGF(IP_DEBUG, ("+-------------------------------+\n"));
yueee_yt 0:7766f6712673 850 LWIP_DEBUGF(IP_DEBUG, ("| %3"U16_F" | %3"U16_F" | %3"U16_F" | %3"U16_F" | (dest)\n",
yueee_yt 0:7766f6712673 851 ip4_addr1_16(&iphdr->dest),
yueee_yt 0:7766f6712673 852 ip4_addr2_16(&iphdr->dest),
yueee_yt 0:7766f6712673 853 ip4_addr3_16(&iphdr->dest),
yueee_yt 0:7766f6712673 854 ip4_addr4_16(&iphdr->dest)));
yueee_yt 0:7766f6712673 855 LWIP_DEBUGF(IP_DEBUG, ("+-------------------------------+\n"));
yueee_yt 0:7766f6712673 856 }
yueee_yt 0:7766f6712673 857 #endif /* IP_DEBUG */