Dependents:   TimeZoneDemo EthernetJackTestCode MMEx_Challenge ntp_mem ... more

Committer:
segundo
Date:
Tue Nov 09 20:54:15 2010 +0000
Revision:
0:ac1725ba162c

        

Who changed what in which revision?

UserRevisionLine numberNew contents of line
segundo 0:ac1725ba162c 1 /*
segundo 0:ac1725ba162c 2 * Copyright (c) 2001-2004 Swedish Institute of Computer Science.
segundo 0:ac1725ba162c 3 * All rights reserved.
segundo 0:ac1725ba162c 4 *
segundo 0:ac1725ba162c 5 * Redistribution and use in source and binary forms, with or without modification,
segundo 0:ac1725ba162c 6 * are permitted provided that the following conditions are met:
segundo 0:ac1725ba162c 7 *
segundo 0:ac1725ba162c 8 * 1. Redistributions of source code must retain the above copyright notice,
segundo 0:ac1725ba162c 9 * this list of conditions and the following disclaimer.
segundo 0:ac1725ba162c 10 * 2. Redistributions in binary form must reproduce the above copyright notice,
segundo 0:ac1725ba162c 11 * this list of conditions and the following disclaimer in the documentation
segundo 0:ac1725ba162c 12 * and/or other materials provided with the distribution.
segundo 0:ac1725ba162c 13 * 3. The name of the author may not be used to endorse or promote products
segundo 0:ac1725ba162c 14 * derived from this software without specific prior written permission.
segundo 0:ac1725ba162c 15 *
segundo 0:ac1725ba162c 16 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED
segundo 0:ac1725ba162c 17 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
segundo 0:ac1725ba162c 18 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
segundo 0:ac1725ba162c 19 * SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
segundo 0:ac1725ba162c 20 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT
segundo 0:ac1725ba162c 21 * OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
segundo 0:ac1725ba162c 22 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
segundo 0:ac1725ba162c 23 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
segundo 0:ac1725ba162c 24 * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY
segundo 0:ac1725ba162c 25 * OF SUCH DAMAGE.
segundo 0:ac1725ba162c 26 *
segundo 0:ac1725ba162c 27 * This file is part of the lwIP TCP/IP stack.
segundo 0:ac1725ba162c 28 *
segundo 0:ac1725ba162c 29 * Author: Adam Dunkels <adam@sics.se>
segundo 0:ac1725ba162c 30 *
segundo 0:ac1725ba162c 31 */
segundo 0:ac1725ba162c 32 #ifndef __LWIP_INET_CHKSUM_H__
segundo 0:ac1725ba162c 33 #define __LWIP_INET_CHKSUM_H__
segundo 0:ac1725ba162c 34
segundo 0:ac1725ba162c 35 #include "lwip/opt.h"
segundo 0:ac1725ba162c 36
segundo 0:ac1725ba162c 37 #include "lwip/pbuf.h"
segundo 0:ac1725ba162c 38 #include "lwip/ip_addr.h"
segundo 0:ac1725ba162c 39
segundo 0:ac1725ba162c 40 /** Swap the bytes in an u16_t: much like htons() for little-endian */
segundo 0:ac1725ba162c 41 #ifndef SWAP_BYTES_IN_WORD
segundo 0:ac1725ba162c 42 #if LWIP_PLATFORM_BYTESWAP && (BYTE_ORDER == LITTLE_ENDIAN)
segundo 0:ac1725ba162c 43 /* little endian and PLATFORM_BYTESWAP defined */
segundo 0:ac1725ba162c 44 #define SWAP_BYTES_IN_WORD(w) LWIP_PLATFORM_HTONS(w)
segundo 0:ac1725ba162c 45 #else /* LWIP_PLATFORM_BYTESWAP && (BYTE_ORDER == LITTLE_ENDIAN) */
segundo 0:ac1725ba162c 46 /* can't use htons on big endian (or PLATFORM_BYTESWAP not defined)... */
segundo 0:ac1725ba162c 47 #define SWAP_BYTES_IN_WORD(w) (((w) & 0xff) << 8) | (((w) & 0xff00) >> 8)
segundo 0:ac1725ba162c 48 #endif /* LWIP_PLATFORM_BYTESWAP && (BYTE_ORDER == LITTLE_ENDIAN)*/
segundo 0:ac1725ba162c 49 #endif /* SWAP_BYTES_IN_WORD */
segundo 0:ac1725ba162c 50
segundo 0:ac1725ba162c 51 /** Split an u32_t in two u16_ts and add them up */
segundo 0:ac1725ba162c 52 #ifndef FOLD_U32T
segundo 0:ac1725ba162c 53 #define FOLD_U32T(u) (((u) >> 16) + ((u) & 0x0000ffffUL))
segundo 0:ac1725ba162c 54 #endif
segundo 0:ac1725ba162c 55
segundo 0:ac1725ba162c 56 #if LWIP_CHECKSUM_ON_COPY
segundo 0:ac1725ba162c 57 /** Function-like macro: same as MEMCPY but returns the checksum of copied data
segundo 0:ac1725ba162c 58 as u16_t */
segundo 0:ac1725ba162c 59 #ifndef LWIP_CHKSUM_COPY
segundo 0:ac1725ba162c 60 #define LWIP_CHKSUM_COPY(dst, src, len) lwip_chksum_copy(dst, src, len)
segundo 0:ac1725ba162c 61 #ifndef LWIP_CHKSUM_COPY_ALGORITHM
segundo 0:ac1725ba162c 62 #define LWIP_CHKSUM_COPY_ALGORITHM 1
segundo 0:ac1725ba162c 63 #endif /* LWIP_CHKSUM_COPY_ALGORITHM */
segundo 0:ac1725ba162c 64 #endif /* LWIP_CHKSUM_COPY */
segundo 0:ac1725ba162c 65 #else /* LWIP_CHECKSUM_ON_COPY */
segundo 0:ac1725ba162c 66 #define LWIP_CHKSUM_COPY_ALGORITHM 0
segundo 0:ac1725ba162c 67 #endif /* LWIP_CHECKSUM_ON_COPY */
segundo 0:ac1725ba162c 68
segundo 0:ac1725ba162c 69 #ifdef __cplusplus
segundo 0:ac1725ba162c 70 extern "C" {
segundo 0:ac1725ba162c 71 #endif
segundo 0:ac1725ba162c 72
segundo 0:ac1725ba162c 73 u16_t inet_chksum(void *dataptr, u16_t len);
segundo 0:ac1725ba162c 74 u16_t inet_chksum_pbuf(struct pbuf *p);
segundo 0:ac1725ba162c 75 u16_t inet_chksum_pseudo(struct pbuf *p,
segundo 0:ac1725ba162c 76 ip_addr_t *src, ip_addr_t *dest,
segundo 0:ac1725ba162c 77 u8_t proto, u16_t proto_len);
segundo 0:ac1725ba162c 78 u16_t inet_chksum_pseudo_partial(struct pbuf *p,
segundo 0:ac1725ba162c 79 ip_addr_t *src, ip_addr_t *dest,
segundo 0:ac1725ba162c 80 u8_t proto, u16_t proto_len, u16_t chksum_len);
segundo 0:ac1725ba162c 81 #if LWIP_CHKSUM_COPY_ALGORITHM
segundo 0:ac1725ba162c 82 u16_t lwip_chksum_copy(void *dst, const void *src, u16_t len);
segundo 0:ac1725ba162c 83 #endif /* LWIP_CHKSUM_COPY_ALGORITHM */
segundo 0:ac1725ba162c 84
segundo 0:ac1725ba162c 85 #ifdef __cplusplus
segundo 0:ac1725ba162c 86 }
segundo 0:ac1725ba162c 87 #endif
segundo 0:ac1725ba162c 88
segundo 0:ac1725ba162c 89 #endif /* __LWIP_INET_H__ */
segundo 0:ac1725ba162c 90