/* * Copyright (c) 2013-2019, Huawei Technologies Co., Ltd. All rights reserved. * Copyright (c) 2020, Huawei Device Co., Ltd. All rights reserved. * * Redistribution and use in source and binary forms, with or without modification, * are permitted provided that the following conditions are met: * * 1. Redistributions of source code must retain the above copyright notice, this list of * conditions and the following disclaimer. * * 2. Redistributions in binary form must reproduce the above copyright notice, this list * of conditions and the following disclaimer in the documentation and/or other materials * provided with the distribution. * * 3. Neither the name of the copyright holder nor the names of its contributors may be used * to endorse or promote products derived from this software without specific prior written * permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include "api_shell_fix.h" #include #include #include #include #include #include #include #include "securec.h" #define NETIFAPI_VAR_REF(name) API_VAR_REF(name) #define NETIFAPI_VAR_DECLARE(name) API_VAR_DECLARE(struct netifapi_msg, name) #define NETIFAPI_VAR_ALLOC(name) API_VAR_ALLOC(struct netifapi_msg, MEMP_NETIFAPI_MSG, name, ERR_MEM) #define NETIFAPI_VAR_FREE(name) API_VAR_FREE(MEMP_NETIFAPI_MSG, name) /** * * * ################# FOR API_SHELL ONLY ################# * * * */ #if LWIP_ENABLE_LOS_SHELL_CMD #if LWIP_DHCP #include /* * Close DHCP and set static network. * * @param netif a pre-allocated netif structure * * @return ERR_OK, or ERR_VAL if failed. */ err_t netif_dhcp_off(struct netif *netif) { ip_addr_t old_ipaddr; ip_addr_t old_netmask; ip_addr_t old_gateway; if (netif == NULL) { return ERR_VAL; } old_ipaddr = netif->ip_addr; old_netmask = netif->netmask; old_gateway = netif->gw; if (netif_dhcp_data(netif)) { (void) dhcp_release(netif); (void) dhcp_stop(netif); (void) dhcp_cleanup(netif); LWIP_DEBUGF(NETIF_DEBUG, ("DHCP is close;set static IP\n")); } ip_addr_set_val(&netif->ip_addr, &old_ipaddr); ip_addr_set_val(&netif->netmask, &old_netmask); ip_addr_set_val(&netif->gw, &old_gateway); (void) netif_set_up(netif); return ERR_OK; } #endif /* LWIP_DHCP */ #if LWIP_DHCPS #include "dhcps.h" static err_t netifapi_do_dhcps_start (struct tcpip_api_call_data *m) { /* cast through void* to silence alignment warnings. * We know it works because the structs have been instantiated as struct netifapi_msg */ err_t ret; struct netifapi_msg *msg = (struct netifapi_msg*)(void*)m; ret = dhcps_start(msg->netif, msg->msg.dhcp_start_params.start_ip, msg->msg.dhcp_start_params.ip_num); return ret; } err_t netifapi_dhcps_start(struct netif *netif, char *start_ip, u16_t ip_num) { err_t err; NETIFAPI_VAR_DECLARE(msg); LWIP_ERROR("netifapi_dhcps_start : invalid arguments", (netif != NULL), return ERR_VAL); NETIFAPI_VAR_ALLOC(msg); NETIFAPI_VAR_REF(msg).netif = netif; NETIFAPI_VAR_REF(msg).msg.dhcp_start_params.start_ip = start_ip ; NETIFAPI_VAR_REF(msg).msg.dhcp_start_params.ip_num = ip_num ; err = tcpip_api_call(netifapi_do_dhcps_start, &API_VAR_REF(msg).call); NETIFAPI_VAR_FREE(msg); return err; } err_t netifapi_dhcps_stop(struct netif *netif) { LWIP_ERROR("netifapi_dhcps_stop : invalid arguments", (netif != NULL), return ERR_VAL); return netifapi_netif_common(netif, dhcps_stop, NULL); } #endif /* LWIP_DHCPS */ /* * This function is for making sure that accept() should not block indefinetely * when removing IPv6 address used for accept() by using API[netifapi_netif_rmv_ip6_address]. */ static void tcp_unlock_accept(ip6_addr_t *ipaddr) { // FIXME } static void netif_ip6_addr_setinvalid(struct netif *netif, const ip6_addr_t *addr6) { s8_t idx; LWIP_ERROR("netif_ip6_addr_set : invalid arguments", (netif != NULL), return); LWIP_ERROR("netif_ip6_addr_set : invalid arguments", (addr6 != NULL), return); idx = netif_get_ip6_addr_match(netif, addr6); if (idx < 0) { return; } netif_ip6_addr_set_state(netif, idx, IP6_ADDR_INVALID); return; } err_t netif_do_rmv_ipv6_addr(struct netif *netif, void *arguments) { ip_addr_t *ipaddr = (ip_addr_t *)arguments; if (IP_IS_V6(ipaddr)) { #if LWIP_TCP tcp_unlock_accept(ip_2_ip6(ipaddr)); #endif netif_ip6_addr_setinvalid(netif, ip_2_ip6(ipaddr)); } return ERR_OK; } static err_t netif_do_rmv_ip6_address(struct tcpip_api_call_data *m) { /* cast through void* to silence alignment warnings. * We know it works because the structs have been instantiated as struct netifapi_msg */ struct netifapi_msg *msg = (struct netifapi_msg *)(void *)m; return netif_do_rmv_ipv6_addr(msg->netif, (void *)msg->msg.add.ipaddr); } void netifapi_netif_rmv_ip6_address(struct netif *netif, ip_addr_t *ipaddr) { err_t err; if (netif == NULL) { return; } NETIFAPI_VAR_DECLARE(msg); NETIFAPI_VAR_ALLOC(msg); NETIFAPI_VAR_REF(msg).netif = netif; NETIFAPI_VAR_REF(msg).msg.add.ipaddr = (void *)ipaddr; err = tcpip_api_call(netif_do_rmv_ip6_address, &API_VAR_REF(msg).call); NETIFAPI_VAR_FREE(msg); (void)err; } static struct netif *netif_find_by_name(const char *name) { struct netif *netif = NULL; LWIP_ASSERT_CORE_LOCKED(); if (name == NULL) { return NULL; } if (strcmp("lo", name) == 0) { LWIP_DEBUGF(NETIF_DEBUG, ("netif_find: found %c%c\n", name[0], name[1])); return netif_find(name); } NETIF_FOREACH(netif) { if (strcmp(netif->full_name, name) == 0) { LWIP_DEBUGF(NETIF_DEBUG, ("netif_find: found %c%c\n", name[0], name[1])); return netif; } } LWIP_DEBUGF(NETIF_DEBUG, ("netif_find: didn't find %c%c\n", name[0], name[1])); return NULL; } static err_t netifapi_do_find_by_name(struct tcpip_api_call_data *m) { /* cast through void* to silence alignment warnings. * We know it works because the structs have been instantiated as struct netifapi_msg */ struct netifapi_msg *msg = (struct netifapi_msg *)(void *)m; msg->netif = netif_find_by_name(msg->msg.ifs.name); return ERR_OK; } struct netif *netifapi_netif_find_by_name(const char *name) { struct netif *netif = NULL; NETIFAPI_VAR_DECLARE(msg); NETIFAPI_VAR_ALLOC(msg); NETIFAPI_VAR_REF(msg).netif = NULL; #if LWIP_MPU_COMPATIBLE if (strncpy_s(NETIFAPI_VAR_REF(msg).msg.ifs.name, NETIF_NAMESIZE, name, NETIF_NAMESIZE - 1)) { NETIFAPI_VAR_FREE(msg); return netif; } NETIFAPI_VAR_REF(msg).msg.ifs.name[NETIF_NAMESIZE - 1] = '\0'; #else NETIFAPI_VAR_REF(msg).msg.ifs.name = (char *)name; #endif /* LWIP_MPU_COMPATIBLE */ (void)tcpip_api_call(netifapi_do_find_by_name, &API_VAR_REF(msg).call); netif = msg.netif; NETIFAPI_VAR_FREE(msg); return netif; } #define NETIF_MTU_MIN 1280 #ifndef IP_FRAG_MIN_MTU #define IP_FRAG_MIN_MTU 68 #endif err_t netif_set_mtu(struct netif *netif, u16_t netif_mtu) { /* * As per RFC 791, "Every internet module must be able to forward a datagram of 68 * octets without further fragmentation. This is because an internet header * may be up to 60 octets, and the minimum fragment is 8 octets." */ LWIP_ERROR("netif_set_mtu: invalid arguments", (netif != NULL), return ERR_VAL); #if LWIP_IPV6 LWIP_ERROR("netif_set_mtu: invalid arguments", (netif_mtu >= NETIF_MTU_MIN) && (netif_mtu <= IP_FRAG_MAX_MTU), return ERR_ARG); #else LWIP_ERROR("netif_set_mtu: invalid arguments", (netif_mtu >= IP_FRAG_MIN_MTU) && (netif_mtu <= IP_FRAG_MAX_MTU), return ERR_ARG); #endif netif->mtu = netif_mtu; #if LWIP_IPV6 && LWIP_ND6_ALLOW_RA_UPDATES netif->mtu6 = netif_mtu; #endif /* LWIP_IPV6 && LWIP_ND6_ALLOW_RA_UPDATES */ LWIP_DEBUGF(NETIF_DEBUG | LWIP_DBG_STATE, ("netif: MTU of interface %s is changed to %d\n", netif_get_name(netif), netif->mtu)); return ERR_OK; } err_t netif_set_hwaddr(struct netif *netif, const unsigned char *hw_addr, int hw_len) { LWIP_ERROR("netif_set_hwaddr : invalid arguments", (netif != NULL), return ERR_VAL); LWIP_ERROR("netif_set_hwaddr : invalid arguments", (hw_addr != NULL), return ERR_VAL); LWIP_ERROR("netif_set_hwaddr: invalid arguments", ((unsigned int)hw_len == NETIF_MAX_HWADDR_LEN), return ERR_VAL); if (netif->drv_set_hwaddr == NULL) { return ERR_IF; // ERR_OPNOTSUPP; } if (netif->drv_set_hwaddr(netif, (u8_t *)hw_addr, hw_len) != ERR_OK) { return ERR_VAL; } if (memcpy_s(netif->hwaddr, NETIF_MAX_HWADDR_LEN, hw_addr, hw_len) != EOK) { LWIP_DEBUGF(NETIF_DEBUG, ("netif_set_hwaddr: memcpy_s error\n")); return ERR_VAL; } LWIP_DEBUGF(NETIF_DEBUG | LWIP_DBG_TRACE | LWIP_DBG_STATE, ("netif: HW address of interface %s set to %02X:%02X:%02X:%02X:%02X:%02X\n", netif_get_name(netif), netif->hwaddr[0], netif->hwaddr[1], netif->hwaddr[2], netif->hwaddr[3], netif->hwaddr[4], netif->hwaddr[5])); return ERR_OK; } err_t etharp_update_arp_entry(struct netif *netif, const ip4_addr_t *ipaddr, struct eth_addr *ethaddr, u8_t flags) { return 0; } err_t etharp_delete_arp_entry(struct netif *netif, ip4_addr_t *ipaddr) { return 0; } err_t lwip_dns_setserver(u8_t numdns, ip_addr_t *dnsserver) { return 0; } err_t lwip_dns_getserver(u8_t numdns, ip_addr_t *dnsserver) { return 0; } #if PF_PKT_SUPPORT struct raw_pcb *pkt_raw_pcbs; #endif struct raw_pcb *raw_pcbs; /******************************************************************/ #if LWIP_ENABLE_IP_CONFLICT_SIGNAL u32_t is_ip_conflict_signal = 0; sys_sem_t ip_conflict_detect; #endif u32_t is_dup_detect_initialized = 0; sys_sem_t dup_addr_detect; int lwip_sntp_start(int server_num, char **sntp_server, struct timeval *time) { return 0; } u32_t lwip_tftp_get_file_by_filename(u32_t ulHostAddr, u16_t usTftpServPort, u8_t ucTftpTransMode, s8_t *szSrcFileName, s8_t *szDestDirPath) { return 0; } u32_t lwip_tftp_put_file_by_filename(u32_t ulHostAddr, u16_t usTftpServPort, u8_t cTftpTransMode, s8_t *szSrcFileName, s8_t *szDestDirPath) { return 0; } /**************************************************************** 著名的tcp 11种状态表述,参考博文:https://blog.csdn.net/zzhongcy/article/details/38851271 状态迁移过程:   a、客户端:     CLOSED->SYN_SENT->ESTABLISHED->FIN_WAIT_1->FIN_WAIT_2->TIME_WAIT->CLOSED   b、服务端     CLOSED->LISTEN->SYN_RECEIVED->ESTABLISHED->CLOSE_WAIT->LAST_ACK->CLOSE ****************************************************************/ const char *const tcp_state_str[] = { "CLOSED", //没有使用这个套接字[netstat 无法显示closed状态] "LISTEN", //套接字正在监听连接[调用listen后] "SYN_SENT", //套接字正在试图主动建立连接[发送SYN后还没有收到ACK] "SYN_RCVD", //正在处于连接的初始同步状态[收到对方的SYN,但还没收到自己发过去的SYN的ACK] "ESTABLISHED", //连接已建立,表示两台机器正在传输数据。 "FIN_WAIT_1", //套接字已关闭,正在关闭连接[发送FIN,没有收到ACK也没有收到FIN] "FIN_WAIT_2", //套接字已关闭,正在等待远程套接字关闭[在FIN_WAIT_1状态下收到发过去FIN对应的ACK],从远程TCP等待连接中断请求,主动关闭端接到ACK后,就进入了FIN-WAIT-2 . "CLOSE_WAIT", //远程套接字已经关闭:正在等待关闭这个套接字[被动关闭的一方收到FIN] "CLOSING", //套接字已关闭,远程套接字正在关闭,暂时挂起关闭确认[在FIN_WAIT_1状态下收到被动方的FIN],等待远程TCP对连接中断的确认,处于此种状态比较少见。 "LAST_ACK", //远程套接字已关闭,正在等待本地套接字的关闭确认[被动方在CLOSE_WAIT状态下发送FIN],等待原来的发向远程TCP的连接中断请求的确认,被动关闭端一段时间后,接收到文件结束符的应用程序将调用CLOSE关闭连接,TCP也发送一个 FIN,等待对方的ACK.进入LAST-ACK。 "TIME_WAIT" //套接字已经关闭,正在等待远程套接字的关闭传送[FIN、ACK、FIN、ACK都完毕,这是主动方的最后一个状态,在过了2MSL时间后变为CLOSED状态] }; volatile int tcpip_init_finish = 1; // needed by api_shell.c #endif