CDC/ECM driver for mbed, based on USBDevice by mbed-official. Uses PicoTCP to access Ethernet USB device. License: GPLv2

Dependents:   USBEthernet_TEST

Fork of USB_Ethernet by Daniele Lacamera

Committer:
daniele
Date:
Sat Aug 03 13:16:14 2013 +0000
Revision:
2:540f6e142d59
Moved to single package

Who changed what in which revision?

UserRevisionLine numberNew contents of line
daniele 2:540f6e142d59 1 /*********************************************************************
daniele 2:540f6e142d59 2 PicoTCP. Copyright (c) 2012 TASS Belgium NV. Some rights reserved.
daniele 2:540f6e142d59 3 See LICENSE and COPYING for usage.
daniele 2:540f6e142d59 4
daniele 2:540f6e142d59 5 Authors: Simon Maes
daniele 2:540f6e142d59 6 *********************************************************************/
daniele 2:540f6e142d59 7
daniele 2:540f6e142d59 8 #include "pico_ipv4.h"
daniele 2:540f6e142d59 9 #include "pico_config.h"
daniele 2:540f6e142d59 10 #include "pico_icmp4.h"
daniele 2:540f6e142d59 11 #include "pico_stack.h"
daniele 2:540f6e142d59 12 #include "pico_eth.h"
daniele 2:540f6e142d59 13 #include "pico_socket.h"
daniele 2:540f6e142d59 14 #include "pico_device.h"
daniele 2:540f6e142d59 15 #include "pico_ipfilter.h"
daniele 2:540f6e142d59 16 #include "pico_tcp.h"
daniele 2:540f6e142d59 17 #include "pico_udp.h"
daniele 2:540f6e142d59 18
daniele 2:540f6e142d59 19
daniele 2:540f6e142d59 20 //#define ipf_dbg dbg
daniele 2:540f6e142d59 21 #define ipf_dbg(...) do{}while(0)
daniele 2:540f6e142d59 22
daniele 2:540f6e142d59 23 struct filter_node;
daniele 2:540f6e142d59 24 typedef int (*func_pntr)(struct filter_node *filter, struct pico_frame *f);
daniele 2:540f6e142d59 25
daniele 2:540f6e142d59 26 struct filter_node {
daniele 2:540f6e142d59 27 struct pico_device *fdev;
daniele 2:540f6e142d59 28 struct filter_node *next_filter;
daniele 2:540f6e142d59 29 uint32_t out_addr;
daniele 2:540f6e142d59 30 uint32_t out_addr_netmask;
daniele 2:540f6e142d59 31 uint32_t in_addr;
daniele 2:540f6e142d59 32 uint32_t in_addr_netmask;
daniele 2:540f6e142d59 33 uint16_t out_port;
daniele 2:540f6e142d59 34 uint16_t in_port;
daniele 2:540f6e142d59 35 uint8_t proto;
daniele 2:540f6e142d59 36 int8_t priority;
daniele 2:540f6e142d59 37 uint8_t tos;
daniele 2:540f6e142d59 38 uint8_t filter_id;
daniele 2:540f6e142d59 39 func_pntr function_ptr;
daniele 2:540f6e142d59 40 };
daniele 2:540f6e142d59 41
daniele 2:540f6e142d59 42 static struct filter_node *head = NULL;
daniele 2:540f6e142d59 43 static struct filter_node *tail = NULL;
daniele 2:540f6e142d59 44
daniele 2:540f6e142d59 45 /*======================== FUNCTION PNTRS ==========================*/
daniele 2:540f6e142d59 46
daniele 2:540f6e142d59 47 static int fp_accept(struct filter_node *filter, struct pico_frame *f) {return 0;}
daniele 2:540f6e142d59 48
daniele 2:540f6e142d59 49 static int fp_priority(struct filter_node *filter, struct pico_frame *f) {
daniele 2:540f6e142d59 50
daniele 2:540f6e142d59 51 //TODO do priority-stuff
daniele 2:540f6e142d59 52 return 0;
daniele 2:540f6e142d59 53 }
daniele 2:540f6e142d59 54
daniele 2:540f6e142d59 55 static int fp_reject(struct filter_node *filter, struct pico_frame *f) {
daniele 2:540f6e142d59 56 // TODO check first if sender is pico itself or not
daniele 2:540f6e142d59 57 ipf_dbg("ipfilter> #reject\n");
daniele 2:540f6e142d59 58 pico_icmp4_packet_filtered(f);
daniele 2:540f6e142d59 59 pico_frame_discard(f);
daniele 2:540f6e142d59 60 return 1;
daniele 2:540f6e142d59 61 }
daniele 2:540f6e142d59 62
daniele 2:540f6e142d59 63 static int fp_drop(struct filter_node *filter, struct pico_frame *f) {
daniele 2:540f6e142d59 64
daniele 2:540f6e142d59 65 ipf_dbg("ipfilter> # drop\n");
daniele 2:540f6e142d59 66 pico_frame_discard(f);
daniele 2:540f6e142d59 67 return 1;
daniele 2:540f6e142d59 68 }
daniele 2:540f6e142d59 69
daniele 2:540f6e142d59 70 /*============================ API CALLS ============================*/
daniele 2:540f6e142d59 71 int pico_ipv4_filter_add(struct pico_device *dev, uint8_t proto, struct pico_ip4 *out_addr, struct pico_ip4 *out_addr_netmask, struct pico_ip4 *in_addr, struct pico_ip4 *in_addr_netmask, uint16_t out_port, uint16_t in_port, int8_t priority, uint8_t tos, enum filter_action action)
daniele 2:540f6e142d59 72 {
daniele 2:540f6e142d59 73 static uint8_t filter_id = 0;
daniele 2:540f6e142d59 74 struct filter_node *new_filter;
daniele 2:540f6e142d59 75
daniele 2:540f6e142d59 76 if ( !(dev != NULL || proto != 0 || (out_addr != NULL && out_addr->addr != 0U) || (out_addr_netmask != NULL && out_addr_netmask->addr != 0U)|| (in_addr != NULL && in_addr->addr != 0U) || (in_addr_netmask != NULL && in_addr_netmask->addr != 0U)|| out_port != 0 || in_port !=0 || tos != 0 )) {
daniele 2:540f6e142d59 77 pico_err = PICO_ERR_EINVAL;
daniele 2:540f6e142d59 78 return -1;
daniele 2:540f6e142d59 79 }
daniele 2:540f6e142d59 80 if ( priority > 10 || priority < -10) {
daniele 2:540f6e142d59 81 pico_err = PICO_ERR_EINVAL;
daniele 2:540f6e142d59 82 return -1;
daniele 2:540f6e142d59 83 }
daniele 2:540f6e142d59 84 if (action > 3 || action < 0) {
daniele 2:540f6e142d59 85 pico_err = PICO_ERR_EINVAL;
daniele 2:540f6e142d59 86 return -1;
daniele 2:540f6e142d59 87 }
daniele 2:540f6e142d59 88 ipf_dbg("ipfilter> # adding filter\n");
daniele 2:540f6e142d59 89
daniele 2:540f6e142d59 90 new_filter = pico_zalloc(sizeof(struct filter_node));
daniele 2:540f6e142d59 91 if (!head) {
daniele 2:540f6e142d59 92 head = tail = new_filter;
daniele 2:540f6e142d59 93 } else {
daniele 2:540f6e142d59 94 tail->next_filter = new_filter;
daniele 2:540f6e142d59 95 tail = new_filter;
daniele 2:540f6e142d59 96 }
daniele 2:540f6e142d59 97
daniele 2:540f6e142d59 98 new_filter->fdev = dev;
daniele 2:540f6e142d59 99 new_filter->proto = proto;
daniele 2:540f6e142d59 100 if (out_addr != NULL)
daniele 2:540f6e142d59 101 new_filter->out_addr = out_addr->addr;
daniele 2:540f6e142d59 102 else
daniele 2:540f6e142d59 103 new_filter->out_addr = 0U;
daniele 2:540f6e142d59 104
daniele 2:540f6e142d59 105 if (out_addr_netmask != NULL)
daniele 2:540f6e142d59 106 new_filter->out_addr_netmask = out_addr_netmask->addr;
daniele 2:540f6e142d59 107 else
daniele 2:540f6e142d59 108 new_filter->out_addr_netmask = 0U;
daniele 2:540f6e142d59 109
daniele 2:540f6e142d59 110 if (in_addr != NULL)
daniele 2:540f6e142d59 111 new_filter->in_addr = in_addr->addr;
daniele 2:540f6e142d59 112 else
daniele 2:540f6e142d59 113 new_filter->in_addr = 0U;
daniele 2:540f6e142d59 114
daniele 2:540f6e142d59 115 if (in_addr_netmask != NULL)
daniele 2:540f6e142d59 116 new_filter->in_addr_netmask = in_addr_netmask->addr;
daniele 2:540f6e142d59 117 else
daniele 2:540f6e142d59 118 new_filter->in_addr_netmask = 0U;
daniele 2:540f6e142d59 119
daniele 2:540f6e142d59 120 new_filter->out_port = out_port;
daniele 2:540f6e142d59 121 new_filter->in_port = in_port;
daniele 2:540f6e142d59 122 new_filter->priority = priority;
daniele 2:540f6e142d59 123 new_filter->tos = tos;
daniele 2:540f6e142d59 124 new_filter->filter_id = filter_id++;
daniele 2:540f6e142d59 125
daniele 2:540f6e142d59 126 /*Define filterType_functionPointer here instead of in ipfilter-function, to prevent running multiple times through switch*/
daniele 2:540f6e142d59 127 switch (action) {
daniele 2:540f6e142d59 128 case FILTER_ACCEPT:
daniele 2:540f6e142d59 129 new_filter->function_ptr = fp_accept;
daniele 2:540f6e142d59 130 break;
daniele 2:540f6e142d59 131 case FILTER_PRIORITY:
daniele 2:540f6e142d59 132 new_filter->function_ptr = fp_priority;
daniele 2:540f6e142d59 133 break;
daniele 2:540f6e142d59 134 case FILTER_REJECT:
daniele 2:540f6e142d59 135 new_filter->function_ptr = fp_reject;
daniele 2:540f6e142d59 136 break;
daniele 2:540f6e142d59 137 case FILTER_DROP:
daniele 2:540f6e142d59 138 new_filter->function_ptr = fp_drop;
daniele 2:540f6e142d59 139 break;
daniele 2:540f6e142d59 140 default:
daniele 2:540f6e142d59 141 ipf_dbg("ipfilter> #unknown filter action\n");
daniele 2:540f6e142d59 142 break;
daniele 2:540f6e142d59 143 }
daniele 2:540f6e142d59 144 return new_filter->filter_id;
daniele 2:540f6e142d59 145 }
daniele 2:540f6e142d59 146
daniele 2:540f6e142d59 147 int pico_ipv4_filter_del(uint8_t filter_id)
daniele 2:540f6e142d59 148 {
daniele 2:540f6e142d59 149 struct filter_node *work;
daniele 2:540f6e142d59 150 struct filter_node *prev;
daniele 2:540f6e142d59 151
daniele 2:540f6e142d59 152 if (!tail || !head) {
daniele 2:540f6e142d59 153 pico_err = PICO_ERR_EPERM;
daniele 2:540f6e142d59 154 return -1;
daniele 2:540f6e142d59 155 }
daniele 2:540f6e142d59 156
daniele 2:540f6e142d59 157 work = head;
daniele 2:540f6e142d59 158 if (work->filter_id == filter_id) {
daniele 2:540f6e142d59 159 /*delete filter_node from linked list*/
daniele 2:540f6e142d59 160 head = work->next_filter;
daniele 2:540f6e142d59 161 pico_free(work);
daniele 2:540f6e142d59 162 return 0;
daniele 2:540f6e142d59 163 }
daniele 2:540f6e142d59 164 prev = work;
daniele 2:540f6e142d59 165 work = work->next_filter;
daniele 2:540f6e142d59 166
daniele 2:540f6e142d59 167 while (1) {
daniele 2:540f6e142d59 168 if (work->filter_id == filter_id) {
daniele 2:540f6e142d59 169 if (work != tail) {
daniele 2:540f6e142d59 170 /*delete filter_node from linked list*/
daniele 2:540f6e142d59 171 prev->next_filter = work->next_filter;
daniele 2:540f6e142d59 172 pico_free(work);
daniele 2:540f6e142d59 173 return 0;
daniele 2:540f6e142d59 174 } else {
daniele 2:540f6e142d59 175 prev->next_filter = NULL;
daniele 2:540f6e142d59 176 pico_free(work);
daniele 2:540f6e142d59 177 return 0;
daniele 2:540f6e142d59 178 }
daniele 2:540f6e142d59 179 } else {
daniele 2:540f6e142d59 180 /*check next filter_node*/
daniele 2:540f6e142d59 181 prev = work;
daniele 2:540f6e142d59 182 work = work->next_filter;
daniele 2:540f6e142d59 183 if (work == tail) {
daniele 2:540f6e142d59 184 pico_err = PICO_ERR_EINVAL;
daniele 2:540f6e142d59 185 return -1;
daniele 2:540f6e142d59 186 }
daniele 2:540f6e142d59 187 }
daniele 2:540f6e142d59 188 }
daniele 2:540f6e142d59 189 }
daniele 2:540f6e142d59 190
daniele 2:540f6e142d59 191 /*================================== CORE FILTER FUNCTIONS ==================================*/
daniele 2:540f6e142d59 192 int match_filter(struct filter_node *filter, struct pico_frame *f)
daniele 2:540f6e142d59 193 {
daniele 2:540f6e142d59 194 struct filter_node temp;
daniele 2:540f6e142d59 195 struct pico_ipv4_hdr *ipv4_hdr = (struct pico_ipv4_hdr *) f->net_hdr;
daniele 2:540f6e142d59 196 struct pico_tcp_hdr *tcp_hdr;
daniele 2:540f6e142d59 197 struct pico_udp_hdr *udp_hdr;
daniele 2:540f6e142d59 198
daniele 2:540f6e142d59 199 if (!filter|| !f) {
daniele 2:540f6e142d59 200 ipf_dbg("ipfilter> ## nullpointer in match filter \n");
daniele 2:540f6e142d59 201 return -1;
daniele 2:540f6e142d59 202 }
daniele 2:540f6e142d59 203
daniele 2:540f6e142d59 204 temp.fdev = f->dev;
daniele 2:540f6e142d59 205 temp.out_addr = ipv4_hdr->dst.addr;
daniele 2:540f6e142d59 206 temp.in_addr = ipv4_hdr->src.addr;
daniele 2:540f6e142d59 207 if (ipv4_hdr->proto == PICO_PROTO_TCP ) {
daniele 2:540f6e142d59 208 tcp_hdr = (struct pico_tcp_hdr *) f->transport_hdr;
daniele 2:540f6e142d59 209 temp.out_port = short_be(tcp_hdr->trans.dport);
daniele 2:540f6e142d59 210 temp.in_port = short_be(tcp_hdr->trans.sport);
daniele 2:540f6e142d59 211 }else if (ipv4_hdr->proto == PICO_PROTO_UDP ) {
daniele 2:540f6e142d59 212 udp_hdr = (struct pico_udp_hdr *) f->transport_hdr;
daniele 2:540f6e142d59 213 temp.out_port = short_be(udp_hdr->trans.dport);
daniele 2:540f6e142d59 214 temp.in_port = short_be(udp_hdr->trans.sport);
daniele 2:540f6e142d59 215 } else {
daniele 2:540f6e142d59 216 temp.out_port = temp.in_port = 0;
daniele 2:540f6e142d59 217 }
daniele 2:540f6e142d59 218 temp.proto = ipv4_hdr->proto;
daniele 2:540f6e142d59 219 temp.priority = f->priority;
daniele 2:540f6e142d59 220 temp.tos = ipv4_hdr->tos;
daniele 2:540f6e142d59 221
daniele 2:540f6e142d59 222
daniele 2:540f6e142d59 223
daniele 2:540f6e142d59 224 if ( ((filter->fdev == NULL || filter->fdev == temp.fdev) && \
daniele 2:540f6e142d59 225 (filter->in_addr == 0 || ((filter->in_addr_netmask == 0) ? (filter->in_addr == temp.in_addr) : 1)) &&\
daniele 2:540f6e142d59 226 (filter->in_port == 0 || filter->in_port == temp.in_port) &&\
daniele 2:540f6e142d59 227 (filter->out_addr == 0 || ((filter->out_addr_netmask == 0) ? (filter->out_addr == temp.out_addr) : 1)) && \
daniele 2:540f6e142d59 228 (filter->out_port == 0 || filter->out_port == temp.out_port) && \
daniele 2:540f6e142d59 229 (filter->proto == 0 || filter->proto == temp.proto ) &&\
daniele 2:540f6e142d59 230 (filter->priority == 0 || filter->priority == temp.priority ) &&\
daniele 2:540f6e142d59 231 (filter->tos == 0 || filter->tos == temp.tos ) &&\
daniele 2:540f6e142d59 232 (filter->out_addr_netmask == 0 || ((filter->out_addr & filter->out_addr_netmask) == (temp.out_addr & filter->out_addr_netmask)) ) &&\
daniele 2:540f6e142d59 233 (filter->in_addr_netmask == 0 || ((filter->in_addr & filter->in_addr_netmask) == (temp.in_addr & filter->in_addr_netmask)) )\
daniele 2:540f6e142d59 234 ) )
daniele 2:540f6e142d59 235 return 0;
daniele 2:540f6e142d59 236
daniele 2:540f6e142d59 237 //No filter match!
daniele 2:540f6e142d59 238 ipf_dbg("ipfilter> #no match\n");
daniele 2:540f6e142d59 239 return 1;
daniele 2:540f6e142d59 240 }
daniele 2:540f6e142d59 241
daniele 2:540f6e142d59 242 int ipfilter(struct pico_frame *f)
daniele 2:540f6e142d59 243 {
daniele 2:540f6e142d59 244 struct filter_node *work = head;
daniele 2:540f6e142d59 245
daniele 2:540f6e142d59 246 /*return 1 if pico_frame is discarded as result of the filtering, 0 for an incomming packet, -1 for faults*/
daniele 2:540f6e142d59 247 if (!tail || !head) {
daniele 2:540f6e142d59 248 return 0;
daniele 2:540f6e142d59 249 }
daniele 2:540f6e142d59 250
daniele 2:540f6e142d59 251 if ( match_filter(work, f) == 0 ) {
daniele 2:540f6e142d59 252 ipf_dbg("ipfilter> # ipfilter match\n");
daniele 2:540f6e142d59 253 /*filter match, execute filter!*/
daniele 2:540f6e142d59 254 return work->function_ptr(work, f);
daniele 2:540f6e142d59 255 }
daniele 2:540f6e142d59 256 while (tail != work) {
daniele 2:540f6e142d59 257 ipf_dbg("ipfilter> next filter..\n");
daniele 2:540f6e142d59 258 work = work->next_filter;
daniele 2:540f6e142d59 259 if ( match_filter(work, f) == 0 ) {
daniele 2:540f6e142d59 260 ipf_dbg("ipfilter> # ipfilter match\n");
daniele 2:540f6e142d59 261 /*filter match, execute filter!*/
daniele 2:540f6e142d59 262 return work->function_ptr(work, f);
daniele 2:540f6e142d59 263 }
daniele 2:540f6e142d59 264 }
daniele 2:540f6e142d59 265 return 0;
daniele 2:540f6e142d59 266 }
daniele 2:540f6e142d59 267