亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲(chóng)蟲(chóng)下載站! | ?? 資源下載 ?? 資源專(zhuān)輯 ?? 關(guān)于我們
? 蟲(chóng)蟲(chóng)下載站

?? http.#1

?? 基于單片機(jī)C8051F020與以太網(wǎng)進(jìn)行通信程序
?? #1
字號(hào):
//-----------------------------------------------------------------------------
// Copyright (c) 2002 Jim Brady
// Do not use commercially without author's permission
// Last revised August 2002
// Net HTTP.C
//
// This module is the Web Server
// It currently serves a html text page and a jpeg image, or handles
// a POST message to turn an LED on or off.
// The HTTP protocol specification is at http://www.w3.org/Protocols/ 
//-----------------------------------------------------------------------------
#include <string.h>
#include <stdlib.h>
#include <ctype.h>		// toupper
#include "C8051f.h"
#include "net.h"
#include "serial.h"  
#include "cksum.h"
#include "analog.h"
#include "ip.h"
#include "tcp.h"
#include "http.h"


// These structures keep track of connection information
extern CONNECTION xdata conxn[];
 
extern ULONG code my_ipaddr;
extern char xdata text[];
extern UINT idata cpu_temperature;
extern UINT idata air_temperature;
extern UINT idata cpu_voltage;
extern char code html_header[];
extern char code web_page[];
extern char code jpeg_header[];
extern UCHAR code photo1_jpeg[];
extern UCHAR idata rcve_buf_allocated;
extern UCHAR idata debug;
bit CONTROL_LED;
void LightONOFF(bit b);

void init_http(void)
{
  CONTROL_LED = 0;
  LightONOFF(CONTROL_LED);
}



//------------------------------------------------------------------------
// This function is the standard string search. The Keil library
// does not provide it.  It looks for one string in another string
// and returns a pointer to it if found, otherwise returns NULL. 
//------------------------------------------------------------------------
char * strstr(char * haystack, char * needle)
{
	char *ptr1, *ptr2;
	
	// Protect against NULL pointer
	if (*needle == 0) return(haystack);
	for( ; *haystack; haystack++ )
	{
		// Look for needle in haystack.  If there is a
      // match then this will continue all the way
      // until ptr1 reaches the NULL at the end of needle 
		for(ptr1 = needle, ptr2 = haystack; *ptr1 && (*ptr1 == *ptr2); ++ptr1, ++ptr2);
							
		// If there is a match then return pointer to needle in haystack
		if(*ptr1 == 0) return(haystack);	
	}
	return NULL;			// no matching string found
}



//------------------------------------------------------------------------
// This sends an TCP segment to the ip layer.  The segment is 
// is normally either a web page or a graphic.
// See "TCP/IP Illustrated, Volume 1" Sect 17.3
//------------------------------------------------------------------------
void http_send(UCHAR xdata * outbuf, UINT len, UCHAR nr)
{
   TCP_HEADER xdata * tcp;
   IP_HEADER xdata * ip;
   ULONG idata sum;
   UINT idata result;
          
   // Fill in TCP segment header
   tcp = (TCP_HEADER xdata *)(outbuf + 34);
   ip = (IP_HEADER xdata *)(outbuf + 14);

   tcp->source_port = HTTP_PORT;
   tcp->dest_port = conxn[nr].port;
   tcp->sequence = conxn[nr].my_sequence;
   tcp->ack_number = conxn[nr].his_sequence;
      
	// Header is always 20 bytes long
   tcp->flags = 0x5000 | FLG_ACK | FLG_PSH;
   tcp->window = 1024;
   tcp->checksum = 0;
   tcp->urgent_ptr = 0;
   
   // Compute checksum including 12 bytes of pseudoheader
	// Must pre-fill 2 items in ip header to do this
	ip->dest_ipaddr = conxn[nr].ipaddr;
	ip->source_ipaddr = my_ipaddr;
		
	// Sum source_ipaddr, dest_ipaddr, and entire TCP message 
	sum = (ULONG)cksum(outbuf + 26, 8 + len);
				
	// Add in the rest of pseudoheader which is
	// protocol id and TCP segment length
	sum += (ULONG)0x0006;
	sum += (ULONG)len;

	// In case there was a carry, add it back around
	result = (UINT)(sum + (sum >> 16));
	tcp->checksum = ~result;
   
   if (debug) serial_send("TCP: Sending msg to IP layer\r");
	ip_send(outbuf, conxn[nr].ipaddr, TCP_TYPE, len);

   // (Re)start TCP retransmit timer
   conxn[nr].timer = TCP_TIMEOUT;
}



//------------------------------------------------------------------------
// This searches a web page looking for a specified tag.  If found,
// it replaces the tag with the text in * sub.  Tags are fixed length -
// The first 4 chars of the tag is always "TAG:" and the rest of it
// is always 4 chars for a total of 8 chars. 
//------------------------------------------------------------------------
void replace_tag(UCHAR xdata * start, char * tag, char * sub) 
{ 
   UCHAR idata i, flg;
   UCHAR xdata * ptr;
   
   // Find tag.  If not found - just return
   ptr = strstr(start, tag);
	if (ptr == NULL) return;
   
	flg = TRUE;

   // Replace the 8 char tag with the substitute text
	// Pad on the right with spaces
   for (i=0; i < 8; i++)
	{
   	if (sub[i] == 0) flg = FALSE;
   	if (flg) ptr[i] = sub[i]; else ptr[i] = SPACE;
	}
}



//------------------------------------------------------------------------
//	This serves up either a HTML page, a JPEG image, or controls an 
// LED,  depending what it gets from the browser.  The received header
// must contain the word "GET" or "POST" to be considered a valid request.
// With HTTP 1.1 where the connection is left open, the header I send
// should include content length. With HTTP 1.0 you can just close the
// connection after sending the page and the browser knows its done. 
//
// The HTTP protocol specification is at http://www.w3.org/Protocols/ 
//------------------------------------------------------------------------
UINT http_server(UCHAR xdata * inbuf, UINT header_len, UCHAR nr, UCHAR resend)
{
	UCHAR i;
	UINT idata body_len, hhdr_len, jhdr_len, page_len, jpeg_len;
	UINT idata sent, remaining;
	UCHAR xdata * outbuf;
	UCHAR xdata * ptr;
	UCHAR xdata * tcp_data;
	UCHAR idata request;
   static UCHAR idata post_flg = FALSE;
		    	
	// Make sure this is a valid connection
	if (nr == NO_CONNECTION) return 0;
	
	// Compute start of TCP data
   
   // Save first 20 chars and seq number just in case
   // we need to re-generate page
   // TODO: if post, then save switch state infomation
   if (!resend)
   {
      tcp_data = inbuf + 34 + header_len;
      memcpy(conxn[nr].query, tcp_data, 20);
      conxn[nr].old_sequence = conxn[nr].my_sequence;
   }
   // If this is a resend, set sequence number to what it was
   // the last time we sent this
   else
   {
      tcp_data = inbuf;
      conxn[nr].my_sequence = conxn[nr].old_sequence;   
   }
   
   // Start off with no request
   request = NONE;
      
	// TODO: Calling strstr() on a large buffer takes a lot of time
   // so perhaps we could speed things up by limiting the search
   // range to the portion of the buffer where the item is expected
   // to be found
	
	// If it is a POST, then set a flag to start looking for the post
	// data of interest, which is the string "switch=".  It may arrive
	// in a later segment (Netscape seems to split up the POST message)
   if (strstr(tcp_data, "POST") != NULL) post_flg = TRUE; 
	   
   // See if this is a GET message
   else if (strstr(tcp_data, "GET") != NULL)
   {
      post_flg = FALSE;
      if (strstr(tcp_data, "photo1") != NULL) request = GET_JPEG;
      else if (strstr(tcp_data, "index") != NULL) request = GET_PAGE;
      else if (strstr(tcp_data, "/ ") != NULL) request = GET_PAGE;
   }
   
   // If POST flag is "armed" then look for the "switch=" string
   // and if found, turn the LED on or off according to whether 
   // the browser is sending a 1 or a 0.
   if (post_flg)
   {
      ptr = strstr(tcp_data, "switch=");
      if (ptr != NULL)
      {
         // Move to space after equals sign
         // Set control indicator accordingly
         post_flg = FALSE;
         request = POST_PAGE;
         ptr += 7;
         if (*ptr == '1') {CONTROL_LED=0x0;}   
         else if (*ptr == '0') {CONTROL_LED=0x1;}
		 LightONOFF(CONTROL_LED);
      }
   }

   if ((request == GET_PAGE) || (request == POST_PAGE))
   {
      // Figure out sizes
      hhdr_len = strlen(html_header);
      page_len = strlen(web_page);
      body_len = hhdr_len + page_len;
      
      // Free memory holding received message.  The message from the
      // browser can be 500+ bytes long so this is a significant 
      // chunk out of the available malloc space of 1500 bytes
      if (!resend) {free(inbuf); rcve_buf_allocated = FALSE;}

      // Allocate memory for entire outgoing message including
      // 14 byte Ethernet + 20 byte IP + 20 byte TCP headers
      // Allow 1 byte for NULL char at the end
      outbuf = (UCHAR xdata *)malloc(54 + body_len + 1);
      if (outbuf == NULL)
      {
         if (debug) serial_send("TCP: Oops, out of memory\r");
         return 0;
      }
      
      // Copy page data.  This moves data from flash into RAM.  It is
      // an undesirable process, but must get data into RAM to replace
      // tags 
		memcpy(outbuf + 54, html_header, hhdr_len);
		memcpy(outbuf + 54 + hhdr_len, web_page, page_len);
   	   	   	
   	outbuf[54 + body_len] = 0;		// Append NULL 
   
      // Replace length tag with actual value
       itoa(page_len, text, 10);
		replace_tag(outbuf + 54, "TAG:LEN1", text);
		
		// Replace CPU temperature tag with actual value
		itoa(cpu_temperature/100, text, 10);
		i=strlen(text);
		text[i]='.';
		i++;
		itoa(cpu_temperature%100, text+i, 11);
		replace_tag(outbuf + 54, "TAG:TMP1", text);

		itoa(air_temperature/100, text, 10);
		i=strlen(text);
		text[i]='.';
		i++;
		itoa(air_temperature%100, text+i, 11);
		replace_tag(outbuf + 54, "TAG:TMP2", text);

		// Replace CPU voltage tag with actual value X 100
		// Insert decimal point between first and second digits
		itoa(cpu_voltage/100, text, 10);
		i=strlen(text);
		text[i]='.';
		i++;
		itoa(cpu_voltage%100, text+i, 11);
		replace_tag(outbuf + 54, "TAG:VOL1", text);
      
      // Insert the word CHECKED into the html so the browser will
		// check the correct LED state indicator box 
      if (CONTROL_LED == OFF) replace_tag(outbuf + 54, "TAG:CHK1", "CHECKED");
      else replace_tag(outbuf + 54, "TAG:CHK2", "CHECKED");
      
      // Segment length = body_len + 20
      http_send(outbuf, body_len + 20, nr);
      conxn[nr].my_sequence += body_len;
   }
   else if (request == GET_JPEG)
   {
      // Ths browser has requested the jpeg image.  First figure out
      // sizes - cannot use sizeof() for jpeg here because it is in
      // another module.  Just directly specify length of it
      jhdr_len = strlen(jpeg_header);
      jpeg_len = 5705;//6194;
      body_len = jhdr_len + jpeg_len;
      
      // Free memory holding received message.  The message from the
      // browser can be 500+ bytes long so this is a significant 
      // chunk out of the available malloc space of 1500 bytes
      if (!resend) {free(inbuf); rcve_buf_allocated = FALSE;}

      // First send the header and enough of the jpeg to make 1000 bytes.
      // The value of 1000 is arbitrary, but must be stay under 1500. 
      if (body_len < 1000) remaining = body_len; else remaining = 1000; 
      outbuf = (UCHAR xdata *)malloc(54 + remaining + 1);
      if (outbuf == NULL)
      {
         if (debug) serial_send("TCP: Oops, out of memory\r");
         return 0;
      }
      
      memcpy(outbuf + 54, jpeg_header, jhdr_len);
		memcpy(outbuf + 54 + jhdr_len, photo1_jpeg, remaining - jhdr_len);
                  
      outbuf[54 + remaining] = 0;		// Append NULL

      // Replace jpeg length tag with actual value
      itoa(jpeg_len, text, 10);
		replace_tag(outbuf + 54, "TAG:LEN2", text);

      http_send(outbuf, remaining + 20, nr);
      sent = remaining - jhdr_len;
      conxn[nr].my_sequence += remaining;
     
      // Send the rest of the jpeg file in 1000 byte chunks.  This sends about
      // 6 segments of 1000 bytes back to back, but we should actually process
      // acks from the other end to make sure we are not sending more than the
      // other end can receive.  Most systems can handle 6K
      while (sent < jpeg_len)
      {
         remaining = jpeg_len - sent;
         if (remaining > 1000) remaining = 1000;
         outbuf = (UCHAR xdata *)malloc(54 + remaining + 1);
         if (outbuf == NULL)
         {
            if (debug) serial_send("TCP: Oops, out of memory\r");
            return 0;
         }
         
         memcpy(outbuf + 54, photo1_jpeg + sent, remaining);
                           
         outbuf[54 + remaining] = 0;		// Append NULL
         http_send(outbuf, remaining + 20, nr);
         sent += remaining;
         conxn[nr].my_sequence += remaining;
      }
   }
   else
   {
      // The incoming HTTP message did not warrant a response
      if (debug) serial_send("HTTP: No response sent\r");
      return 0;
   }
   
   // Return number of bytes sent, not including TCP header
	return(body_len);
}





?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲色欲色欲www在线观看| 亚洲日本成人在线观看| 在线观看国产91| 成人精品电影在线观看| 国产精品一区二区三区四区| 久久69国产一区二区蜜臀| 日韩电影在线观看一区| 三级不卡在线观看| 免费观看在线色综合| 午夜欧美大尺度福利影院在线看| 亚洲综合色自拍一区| 亚洲电影一区二区| 日日夜夜免费精品| 精品一区二区三区免费毛片爱| 狠狠色伊人亚洲综合成人| 国产综合久久久久久久久久久久 | 国产女人18毛片水真多成人如厕| 国产视频一区不卡| 中文字幕在线不卡一区二区三区| 亚洲色图一区二区| 日韩avvvv在线播放| 国内久久精品视频| 99这里只有精品| 欧美美女喷水视频| 精品少妇一区二区三区| 中文字幕中文在线不卡住| 亚洲精品国产无天堂网2021| 五月天激情综合| 国产一区欧美一区| 欧美在线小视频| 欧美一区二区高清| 国产精品理伦片| 日本视频免费一区| 成人国产亚洲欧美成人综合网| 在线免费不卡视频| 久久久久久久综合色一本| 专区另类欧美日韩| 精品午夜久久福利影院| 色综合久久综合网欧美综合网| 51精品秘密在线观看| 国产欧美在线观看一区| 日日夜夜精品视频天天综合网| 国产精品一级黄| 欧美视频自拍偷拍| 国产午夜精品一区二区三区嫩草| 亚洲成人动漫在线免费观看| 国产一区二区三区精品视频| 欧美系列在线观看| 中文字幕第一区| 久久99精品一区二区三区| 欧美亚洲国产一区二区三区| 久久久青草青青国产亚洲免观| 亚洲不卡一区二区三区| fc2成人免费人成在线观看播放 | 久久亚洲精品小早川怜子| 亚洲美女视频在线| 国产高清成人在线| 日韩欧美高清一区| 亚洲成人免费视| 色综合久久久久综合体| 中文字幕精品在线不卡| 经典三级一区二区| 欧美一级艳片视频免费观看| 亚洲国产精品久久不卡毛片 | 久久99久久久久久久久久久| 在线免费亚洲电影| 亚洲天堂久久久久久久| 国产成人综合自拍| 精品国产乱子伦一区| 日韩高清中文字幕一区| 欧美日韩国产高清一区二区三区 | 精品亚洲成a人在线观看| 欧美日韩国产bt| 亚洲精品中文在线观看| 99久久免费国产| 亚洲欧洲www| av电影天堂一区二区在线 | 国产精品国产自产拍高清av | 亚洲午夜久久久久久久久久久 | 国产一区二区在线影院| 日韩视频在线你懂得| 日韩精品一二区| 欧美一级生活片| 青青青伊人色综合久久| 精品久久久影院| 狠狠色狠狠色综合| 国产精品视频麻豆| av日韩在线网站| 亚洲免费色视频| 欧美在线色视频| 日本三级韩国三级欧美三级| 日韩精品中文字幕在线不卡尤物| 麻豆视频一区二区| 国产日韩精品一区二区三区在线| 高清久久久久久| 亚洲人成精品久久久久久| 91黄视频在线观看| 日韩av不卡一区二区| 久久久91精品国产一区二区精品 | 欧美一区二区视频观看视频| 久久激五月天综合精品| 亚洲国产精品成人综合| 91行情网站电视在线观看高清版| 亚洲国产成人av网| 久久久午夜精品理论片中文字幕| 成人免费看的视频| 亚洲一区二区av电影| 精品日韩99亚洲| 成人97人人超碰人人99| 香蕉成人伊视频在线观看| 精品电影一区二区三区| www.久久久久久久久| 日日噜噜夜夜狠狠视频欧美人| 久久久欧美精品sm网站| 欧美亚洲自拍偷拍| 国产一区二区福利| 亚洲一区二区在线视频| 久久久久一区二区三区四区| 色婷婷综合久色| 国产激情精品久久久第一区二区| 亚洲国产视频直播| 欧美国产精品专区| 日韩免费电影网站| 在线一区二区三区| 国产成人精品网址| 麻豆中文一区二区| 亚洲二区在线观看| 综合欧美亚洲日本| 2020国产精品自拍| 欧美老年两性高潮| 91一区二区在线观看| 国产高清视频一区| 精品在线免费视频| 日韩高清不卡在线| 亚洲国产精品久久久男人的天堂 | 亚洲成人一二三| 国产精品国产馆在线真实露脸| 欧美成人伊人久久综合网| 91久久精品一区二区三| 不卡欧美aaaaa| 国产成人av电影在线播放| 全部av―极品视觉盛宴亚洲| 亚洲国产精品一区二区久久恐怖片| 国产精品国产自产拍在线| 国产日韩综合av| 国产婷婷精品av在线| 精品国产乱码久久久久久闺蜜| 欧美人体做爰大胆视频| 欧美性三三影院| 欧美自拍偷拍午夜视频| 一本色道久久加勒比精品| 91视频免费看| 91丨porny丨在线| 色婷婷综合久色| 欧美在线影院一区二区| 色婷婷狠狠综合| 欧美性感一区二区三区| 在线观看一区不卡| 欧美在线999| 欧美日韩高清一区二区| 欧美日韩国产天堂| 欧美成人在线直播| 国产亚洲一区二区在线观看| 中文字幕av一区二区三区高| 国产午夜精品久久久久久免费视| 国产色91在线| 国产精品久久久久久久久快鸭 | 日韩精品资源二区在线| 日韩欧美成人激情| 久久久99精品久久| 亚洲三级电影全部在线观看高清| 亚洲欧洲韩国日本视频| 亚洲一二三区在线观看| 日本不卡视频在线| 国产激情91久久精品导航| 不卡视频在线看| 91九色最新地址| 欧美va日韩va| 国产精品久久久久影院色老大| 亚洲乱码精品一二三四区日韩在线 | 欧美亚洲综合久久| 日韩欧美123| 国产精品久久久久久久蜜臀 | 久久夜色精品国产欧美乱极品| 久久久电影一区二区三区| 亚洲色图在线播放| 看片的网站亚洲| 色婷婷国产精品久久包臀 | av电影一区二区| 欧美丰满美乳xxx高潮www| 久久久亚洲精华液精华液精华液| 亚洲欧美日韩在线播放| 免费在线观看成人| 91理论电影在线观看| 91精品啪在线观看国产60岁| 国产精品人成在线观看免费| 日韩专区中文字幕一区二区| 国产成人鲁色资源国产91色综| 欧美在线视频日韩| 国产精品久久久久久久蜜臀|