/* * Copyright (c) 2001-2003 Swedish Institute of Computer Science. * All rights reserved. * * Redistribution and use in source and binary forms, with or without modification, * are permitted provided that the following conditions are met: * * 1. Redistributions of source code must retain the above copyright notice, * this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright notice, * this list of conditions and the following disclaimer in the documentation * and/or other materials provided with the distribution. * 3. The name of the author may not be used to endorse or promote products * derived from this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT * SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT * OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY * OF SUCH DAMAGE. * * This file is part of the lwIP TCP/IP stack. * * Author: Adam Dunkels * Simon Goldschmidt * */ #include #include /* sprintf() for task names */ #ifdef _MSC_VER #pragma warning (push, 3) #endif #include #ifdef _MSC_VER #pragma warning (pop) #endif #include #include #include #include #include #include #include /** Set this to 1 to enable assertion checks that SYS_ARCH_PROTECT() is only * called once in a call stack (calling it nested might cause trouble in some * implementations, so let's avoid this in core code as long as we can). */ #ifndef LWIP_SYS_ARCH_CHECK_NESTED_PROTECT #define LWIP_SYS_ARCH_CHECK_NESTED_PROTECT 1 #endif /** Set this to 1 to enable assertion checks that SYS_ARCH_PROTECT() is *not* * called before functions potentiolly involving the OS scheduler. * * This scheme is currently broken only for non-core-locking when waking up * threads waiting on a socket via select/poll. */ #ifndef LWIP_SYS_ARCH_CHECK_SCHEDULING_UNPROTECTED #define LWIP_SYS_ARCH_CHECK_SCHEDULING_UNPROTECTED LWIP_TCPIP_CORE_LOCKING #endif #define LWIP_WIN32_SYS_ARCH_ENABLE_PROTECT_COUNTER (LWIP_SYS_ARCH_CHECK_NESTED_PROTECT || LWIP_SYS_ARCH_CHECK_SCHEDULING_UNPROTECTED) /* These functions are used from NO_SYS also, for precise timer triggering */ static LARGE_INTEGER freq, sys_start_time; #define SYS_INITIALIZED() (freq.QuadPart != 0) static DWORD netconn_sem_tls_index; static HCRYPTPROV hcrypt; u32_t sys_win_rand(void) { u32_t ret; if (CryptGenRandom(hcrypt, sizeof(ret), (BYTE*)&ret)) { return ret; } LWIP_ASSERT("CryptGenRandom failed", 0); return 0; } static void sys_win_rand_init(void) { if (!CryptAcquireContext(&hcrypt, NULL, NULL, PROV_RSA_FULL, 0)) { DWORD err = GetLastError(); LWIP_PLATFORM_DIAG(("CryptAcquireContext failed with error %d, trying to create NEWKEYSET", (int)err)); if(!CryptAcquireContext(&hcrypt, NULL, NULL, PROV_RSA_FULL, CRYPT_NEWKEYSET)) { char errbuf[128]; err = GetLastError(); snprintf(errbuf, sizeof(errbuf), "CryptAcquireContext failed with error %d", (int)err); LWIP_UNUSED_ARG(err); LWIP_ASSERT(errbuf, 0); } } } static void sys_init_timing(void) { QueryPerformanceFrequency(&freq); QueryPerformanceCounter(&sys_start_time); } static LONGLONG sys_get_ms_longlong(void) { LONGLONG ret; LARGE_INTEGER now; #if NO_SYS if (!SYS_INITIALIZED()) { sys_init(); LWIP_ASSERT("initialization failed", SYS_INITIALIZED()); } #endif /* NO_SYS */ QueryPerformanceCounter(&now); ret = now.QuadPart-sys_start_time.QuadPart; return (u32_t)(((ret)*1000)/freq.QuadPart); } u32_t sys_jiffies(void) { return (u32_t)sys_get_ms_longlong(); } u32_t sys_now(void) { return (u32_t)sys_get_ms_longlong(); } CRITICAL_SECTION critSec; #if LWIP_WIN32_SYS_ARCH_ENABLE_PROTECT_COUNTER static int protection_depth; #endif static void InitSysArchProtect(void) { InitializeCriticalSection(&critSec); } sys_prot_t sys_arch_protect(void) { #if NO_SYS if (!SYS_INITIALIZED()) { sys_init(); LWIP_ASSERT("initialization failed", SYS_INITIALIZED()); } #endif EnterCriticalSection(&critSec); #if LWIP_SYS_ARCH_CHECK_NESTED_PROTECT LWIP_ASSERT("nested SYS_ARCH_PROTECT", protection_depth == 0); #endif #if LWIP_WIN32_SYS_ARCH_ENABLE_PROTECT_COUNTER protection_depth++; #endif return 0; } void sys_arch_unprotect(sys_prot_t pval) { LWIP_UNUSED_ARG(pval); #if LWIP_SYS_ARCH_CHECK_NESTED_PROTECT LWIP_ASSERT("missing SYS_ARCH_PROTECT", protection_depth == 1); #else LWIP_ASSERT("missing SYS_ARCH_PROTECT", protection_depth > 0); #endif #if LWIP_WIN32_SYS_ARCH_ENABLE_PROTECT_COUNTER protection_depth--; #endif LeaveCriticalSection(&critSec); } #if LWIP_SYS_ARCH_CHECK_SCHEDULING_UNPROTECTED /** This checks that SYS_ARCH_PROTECT() hasn't been called by protecting * and then checking the level */ static void sys_arch_check_not_protected(void) { sys_arch_protect(); LWIP_ASSERT("SYS_ARCH_PROTECT before scheduling", protection_depth == 1); sys_arch_unprotect(0); } #else #define sys_arch_check_not_protected() #endif static void msvc_sys_init(void) { sys_win_rand_init(); sys_init_timing(); InitSysArchProtect(); netconn_sem_tls_index = TlsAlloc(); LWIP_ASSERT("TlsAlloc failed", netconn_sem_tls_index != TLS_OUT_OF_INDEXES); } void sys_init(void) { msvc_sys_init(); } #if !NO_SYS struct threadlist { lwip_thread_fn function; void *arg; DWORD id; struct threadlist *next; }; static struct threadlist *lwip_win32_threads = NULL; err_t sys_sem_new(sys_sem_t *sem, u8_t count) { HANDLE new_sem = NULL; LWIP_ASSERT("sem != NULL", sem != NULL); new_sem = CreateSemaphore(0, count, 100000, 0); LWIP_ASSERT("Error creating semaphore", new_sem != NULL); if(new_sem != NULL) { if (SYS_INITIALIZED()) { SYS_ARCH_LOCKED(SYS_STATS_INC_USED(sem)); } else { SYS_STATS_INC_USED(sem); } #if LWIP_STATS && SYS_STATS LWIP_ASSERT("sys_sem_new() counter overflow", lwip_stats.sys.sem.used != 0); #endif /* LWIP_STATS && SYS_STATS*/ sem->sem = new_sem; return ERR_OK; } /* failed to allocate memory... */ if (SYS_INITIALIZED()) { SYS_ARCH_LOCKED(SYS_STATS_INC(sem.err)); } else { SYS_STATS_INC(sem.err); } sem->sem = NULL; return ERR_MEM; } void sys_sem_free(sys_sem_t *sem) { /* parameter check */ LWIP_ASSERT("sem != NULL", sem != NULL); LWIP_ASSERT("sem->sem != NULL", sem->sem != NULL); LWIP_ASSERT("sem->sem != INVALID_HANDLE_VALUE", sem->sem != INVALID_HANDLE_VALUE); CloseHandle(sem->sem); SYS_ARCH_LOCKED(SYS_STATS_DEC(sem.used)); #if LWIP_STATS && SYS_STATS LWIP_ASSERT("sys_sem_free() closed more than created", lwip_stats.sys.sem.used != (u16_t)-1); #endif /* LWIP_STATS && SYS_STATS */ sem->sem = NULL; } u32_t sys_arch_sem_wait(sys_sem_t *sem, u32_t timeout) { DWORD ret; LONGLONG starttime, endtime; LWIP_ASSERT("sem != NULL", sem != NULL); LWIP_ASSERT("sem->sem != NULL", sem->sem != NULL); LWIP_ASSERT("sem->sem != INVALID_HANDLE_VALUE", sem->sem != INVALID_HANDLE_VALUE); if (!timeout) { /* wait infinite */ starttime = sys_get_ms_longlong(); ret = WaitForSingleObject(sem->sem, INFINITE); LWIP_ASSERT("Error waiting for semaphore", ret == WAIT_OBJECT_0); endtime = sys_get_ms_longlong(); /* return the time we waited for the sem */ return (u32_t)(endtime - starttime); } else { starttime = sys_get_ms_longlong(); ret = WaitForSingleObject(sem->sem, timeout); LWIP_ASSERT("Error waiting for semaphore", (ret == WAIT_OBJECT_0) || (ret == WAIT_TIMEOUT)); if (ret == WAIT_OBJECT_0) { endtime = sys_get_ms_longlong(); /* return the time we waited for the sem */ return (u32_t)(endtime - starttime); } else { /* timeout */ return SYS_ARCH_TIMEOUT; } } } void sys_sem_signal(sys_sem_t *sem) { BOOL ret; sys_arch_check_not_protected(); LWIP_ASSERT("sem != NULL", sem != NULL); LWIP_ASSERT("sem->sem != NULL", sem->sem != NULL); LWIP_ASSERT("sem->sem != INVALID_HANDLE_VALUE", sem->sem != INVALID_HANDLE_VALUE); ret = ReleaseSemaphore(sem->sem, 1, NULL); LWIP_ASSERT("Error releasing semaphore", ret != 0); LWIP_UNUSED_ARG(ret); } err_t sys_mutex_new(sys_mutex_t *mutex) { HANDLE new_mut = NULL; LWIP_ASSERT("mutex != NULL", mutex != NULL); new_mut = CreateMutex(NULL, FALSE, NULL); LWIP_ASSERT("Error creating mutex", new_mut != NULL); if (new_mut != NULL) { SYS_ARCH_LOCKED(SYS_STATS_INC_USED(mutex)); #if LWIP_STATS && SYS_STATS LWIP_ASSERT("sys_mutex_new() counter overflow", lwip_stats.sys.mutex.used != 0); #endif /* LWIP_STATS && SYS_STATS*/ mutex->mut = new_mut; return ERR_OK; } /* failed to allocate memory... */ SYS_ARCH_LOCKED(SYS_STATS_INC(mutex.err)); mutex->mut = NULL; return ERR_MEM; } void sys_mutex_free(sys_mutex_t *mutex) { /* parameter check */ LWIP_ASSERT("mutex != NULL", mutex != NULL); LWIP_ASSERT("mutex->mut != NULL", mutex->mut != NULL); LWIP_ASSERT("mutex->mut != INVALID_HANDLE_VALUE", mutex->mut != INVALID_HANDLE_VALUE); CloseHandle(mutex->mut); SYS_ARCH_LOCKED(SYS_STATS_DEC(mutex.used)); #if LWIP_STATS && SYS_STATS LWIP_ASSERT("sys_mutex_free() closed more than created", lwip_stats.sys.mutex.used != (u16_t)-1); #endif /* LWIP_STATS && SYS_STATS */ mutex->mut = NULL; } void sys_mutex_lock(sys_mutex_t *mutex) { DWORD ret; LWIP_ASSERT("mutex != NULL", mutex != NULL); LWIP_ASSERT("mutex->mut != NULL", mutex->mut != NULL); LWIP_ASSERT("mutex->mut != INVALID_HANDLE_VALUE", mutex->mut != INVALID_HANDLE_VALUE); /* wait infinite */ ret = WaitForSingleObject(mutex->mut, INFINITE); LWIP_ASSERT("Error waiting for mutex", ret == WAIT_OBJECT_0); LWIP_UNUSED_ARG(ret); } void sys_mutex_unlock(sys_mutex_t *mutex) { sys_arch_check_not_protected(); LWIP_ASSERT("mutex != NULL", mutex != NULL); LWIP_ASSERT("mutex->mut != NULL", mutex->mut != NULL); LWIP_ASSERT("mutex->mut != INVALID_HANDLE_VALUE", mutex->mut != INVALID_HANDLE_VALUE); /* wait infinite */ if (!ReleaseMutex(mutex->mut)) { LWIP_ASSERT("Error releasing mutex", 0); } } #ifdef _MSC_VER const DWORD MS_VC_EXCEPTION=0x406D1388; #pragma pack(push,8) typedef struct tagTHREADNAME_INFO { DWORD dwType; /* Must be 0x1000. */ LPCSTR szName; /* Pointer to name (in user addr space). */ DWORD dwThreadID; /* Thread ID (-1=caller thread). */ DWORD dwFlags; /* Reserved for future use, must be zero. */ } THREADNAME_INFO; #pragma pack(pop) static void SetThreadName(DWORD dwThreadID, const char* threadName) { THREADNAME_INFO info; info.dwType = 0x1000; info.szName = threadName; info.dwThreadID = dwThreadID; info.dwFlags = 0; __try { RaiseException(MS_VC_EXCEPTION, 0, sizeof(info)/sizeof(ULONG_PTR), (ULONG_PTR*)&info); } __except(EXCEPTION_EXECUTE_HANDLER) { } } #else /* _MSC_VER */ static void SetThreadName(DWORD dwThreadID, const char* threadName) { LWIP_UNUSED_ARG(dwThreadID); LWIP_UNUSED_ARG(threadName); } #endif /* _MSC_VER */ static void sys_thread_function(void* arg) { struct threadlist* t = (struct threadlist*)arg; #if LWIP_NETCONN_SEM_PER_THREAD sys_arch_netconn_sem_alloc(); #endif t->function(t->arg); #if LWIP_NETCONN_SEM_PER_THREAD sys_arch_netconn_sem_free(); #endif } sys_thread_t sys_thread_new(const char *name, lwip_thread_fn function, void *arg, int stacksize, int prio) { struct threadlist *new_thread; HANDLE h; SYS_ARCH_DECL_PROTECT(lev); LWIP_UNUSED_ARG(name); LWIP_UNUSED_ARG(stacksize); LWIP_UNUSED_ARG(prio); new_thread = (struct threadlist*)malloc(sizeof(struct threadlist)); LWIP_ASSERT("new_thread != NULL", new_thread != NULL); if (new_thread != NULL) { new_thread->function = function; new_thread->arg = arg; SYS_ARCH_PROTECT(lev); new_thread->next = lwip_win32_threads; lwip_win32_threads = new_thread; h = CreateThread(0, 0, (LPTHREAD_START_ROUTINE)sys_thread_function, new_thread, 0, &(new_thread->id)); LWIP_ASSERT("h != 0", h != 0); LWIP_ASSERT("h != -1", h != INVALID_HANDLE_VALUE); LWIP_UNUSED_ARG(h); SetThreadName(new_thread->id, name); SYS_ARCH_UNPROTECT(lev); return new_thread->id; } return 0; } #if !NO_SYS #if LWIP_TCPIP_CORE_LOCKING static DWORD lwip_core_lock_holder_thread_id; void sys_lock_tcpip_core(void) { sys_mutex_lock(&lock_tcpip_core); lwip_core_lock_holder_thread_id = GetCurrentThreadId(); } void sys_unlock_tcpip_core(void) { lwip_core_lock_holder_thread_id = 0; sys_mutex_unlock(&lock_tcpip_core); } #endif /* LWIP_TCPIP_CORE_LOCKING */ static DWORD lwip_tcpip_thread_id; void sys_mark_tcpip_thread(void) { lwip_tcpip_thread_id = GetCurrentThreadId(); } void sys_check_core_locking(void) { /* Embedded systems should check we are NOT in an interrupt context here */ if (lwip_tcpip_thread_id != 0) { DWORD current_thread_id = GetCurrentThreadId(); #if LWIP_TCPIP_CORE_LOCKING LWIP_ASSERT("Function called without core lock", current_thread_id == lwip_core_lock_holder_thread_id); #else /* LWIP_TCPIP_CORE_LOCKING */ LWIP_ASSERT("Function called from wrong thread", current_thread_id == lwip_tcpip_thread_id); #endif /* LWIP_TCPIP_CORE_LOCKING */ LWIP_UNUSED_ARG(current_thread_id); /* for LWIP_NOASSERT */ } } #endif /* !NO_SYS */ err_t sys_mbox_new(sys_mbox_t *mbox, int size) { LWIP_ASSERT("mbox != NULL", mbox != NULL); LWIP_UNUSED_ARG(size); mbox->sem = CreateSemaphore(0, 0, MAX_QUEUE_ENTRIES, 0); LWIP_ASSERT("Error creating semaphore", mbox->sem != NULL); if (mbox->sem == NULL) { SYS_ARCH_LOCKED(SYS_STATS_INC(mbox.err)); return ERR_MEM; } memset(&mbox->q_mem, 0, sizeof(u32_t)*MAX_QUEUE_ENTRIES); mbox->head = 0; mbox->tail = 0; SYS_ARCH_LOCKED(SYS_STATS_INC_USED(mbox)); #if LWIP_STATS && SYS_STATS LWIP_ASSERT("sys_mbox_new() counter overflow", lwip_stats.sys.mbox.used != 0); #endif /* LWIP_STATS && SYS_STATS */ return ERR_OK; } void sys_mbox_free(sys_mbox_t *mbox) { /* parameter check */ LWIP_ASSERT("mbox != NULL", mbox != NULL); LWIP_ASSERT("mbox->sem != NULL", mbox->sem != NULL); LWIP_ASSERT("mbox->sem != INVALID_HANDLE_VALUE", mbox->sem != INVALID_HANDLE_VALUE); CloseHandle(mbox->sem); SYS_STATS_DEC(mbox.used); #if LWIP_STATS && SYS_STATS LWIP_ASSERT( "sys_mbox_free() ", lwip_stats.sys.mbox.used != (u16_t)-1); #endif /* LWIP_STATS && SYS_STATS */ mbox->sem = NULL; } void sys_mbox_post(sys_mbox_t *q, void *msg) { BOOL ret; SYS_ARCH_DECL_PROTECT(lev); sys_arch_check_not_protected(); /* parameter check */ LWIP_ASSERT("q != SYS_MBOX_NULL", q != SYS_MBOX_NULL); LWIP_ASSERT("q->sem != NULL", q->sem != NULL); LWIP_ASSERT("q->sem != INVALID_HANDLE_VALUE", q->sem != INVALID_HANDLE_VALUE); SYS_ARCH_PROTECT(lev); q->q_mem[q->head] = msg; q->head++; if (q->head >= MAX_QUEUE_ENTRIES) { q->head = 0; } LWIP_ASSERT("mbox is full!", q->head != q->tail); ret = ReleaseSemaphore(q->sem, 1, 0); LWIP_ASSERT("Error releasing sem", ret != 0); LWIP_UNUSED_ARG(ret); SYS_ARCH_UNPROTECT(lev); } err_t sys_mbox_trypost(sys_mbox_t *q, void *msg) { u32_t new_head; BOOL ret; SYS_ARCH_DECL_PROTECT(lev); sys_arch_check_not_protected(); /* parameter check */ LWIP_ASSERT("q != SYS_MBOX_NULL", q != SYS_MBOX_NULL); LWIP_ASSERT("q->sem != NULL", q->sem != NULL); LWIP_ASSERT("q->sem != INVALID_HANDLE_VALUE", q->sem != INVALID_HANDLE_VALUE); SYS_ARCH_PROTECT(lev); new_head = q->head + 1; if (new_head >= MAX_QUEUE_ENTRIES) { new_head = 0; } if (new_head == q->tail) { SYS_ARCH_UNPROTECT(lev); return ERR_MEM; } q->q_mem[q->head] = msg; q->head = new_head; LWIP_ASSERT("mbox is full!", q->head != q->tail); ret = ReleaseSemaphore(q->sem, 1, 0); LWIP_ASSERT("Error releasing sem", ret != 0); LWIP_UNUSED_ARG(ret); SYS_ARCH_UNPROTECT(lev); return ERR_OK; } err_t sys_mbox_trypost_fromisr(sys_mbox_t *q, void *msg) { return sys_mbox_trypost(q, msg); } u32_t sys_arch_mbox_fetch(sys_mbox_t *q, void **msg, u32_t timeout) { DWORD ret; LONGLONG starttime, endtime; SYS_ARCH_DECL_PROTECT(lev); /* parameter check */ LWIP_ASSERT("q != SYS_MBOX_NULL", q != SYS_MBOX_NULL); LWIP_ASSERT("q->sem != NULL", q->sem != NULL); LWIP_ASSERT("q->sem != INVALID_HANDLE_VALUE", q->sem != INVALID_HANDLE_VALUE); if (timeout == 0) { timeout = INFINITE; } starttime = sys_get_ms_longlong(); ret = WaitForSingleObject(q->sem, timeout); if (ret == WAIT_OBJECT_0) { SYS_ARCH_PROTECT(lev); if (msg != NULL) { *msg = q->q_mem[q->tail]; } q->tail++; if (q->tail >= MAX_QUEUE_ENTRIES) { q->tail = 0; } SYS_ARCH_UNPROTECT(lev); endtime = sys_get_ms_longlong(); return (u32_t)(endtime - starttime); } else { LWIP_ASSERT("Error waiting for sem", ret == WAIT_TIMEOUT); if (msg != NULL) { *msg = NULL; } return SYS_ARCH_TIMEOUT; } } u32_t sys_arch_mbox_tryfetch(sys_mbox_t *q, void **msg) { DWORD ret; SYS_ARCH_DECL_PROTECT(lev); /* parameter check */ LWIP_ASSERT("q != SYS_MBOX_NULL", q != SYS_MBOX_NULL); LWIP_ASSERT("q->sem != NULL", q->sem != NULL); LWIP_ASSERT("q->sem != INVALID_HANDLE_VALUE", q->sem != INVALID_HANDLE_VALUE); ret = WaitForSingleObject(q->sem, 0); if (ret == WAIT_OBJECT_0) { SYS_ARCH_PROTECT(lev); if (msg != NULL) { *msg = q->q_mem[q->tail]; } q->tail++; if (q->tail >= MAX_QUEUE_ENTRIES) { q->tail = 0; } SYS_ARCH_UNPROTECT(lev); return 0; } else { LWIP_ASSERT("Error waiting for sem", ret == WAIT_TIMEOUT); if (msg != NULL) { *msg = NULL; } return SYS_ARCH_TIMEOUT; } } #if LWIP_NETCONN_SEM_PER_THREAD sys_sem_t* sys_arch_netconn_sem_get(void) { LPVOID tls_data = TlsGetValue(netconn_sem_tls_index); return (sys_sem_t*)tls_data; } void sys_arch_netconn_sem_alloc(void) { sys_sem_t *sem; err_t err; BOOL done; sem = (sys_sem_t*)malloc(sizeof(sys_sem_t)); LWIP_ASSERT("failed to allocate memory for TLS semaphore", sem != NULL); err = sys_sem_new(sem, 0); LWIP_ASSERT("failed to initialise TLS semaphore", err == ERR_OK); done = TlsSetValue(netconn_sem_tls_index, sem); LWIP_UNUSED_ARG(done); LWIP_ASSERT("failed to initialise TLS semaphore storage", done == TRUE); } void sys_arch_netconn_sem_free(void) { LPVOID tls_data = TlsGetValue(netconn_sem_tls_index); if (tls_data != NULL) { BOOL done; free(tls_data); done = TlsSetValue(netconn_sem_tls_index, NULL); LWIP_UNUSED_ARG(done); LWIP_ASSERT("failed to de-init TLS semaphore storage", done == TRUE); } } #endif /* LWIP_NETCONN_SEM_PER_THREAD */ #endif /* !NO_SYS */ /* get keyboard state to terminate the debug app on any kbhit event using win32 API */ int lwip_win32_keypressed(void) { INPUT_RECORD rec; DWORD num = 0; HANDLE h = GetStdHandle(STD_INPUT_HANDLE); BOOL ret = PeekConsoleInput(h, &rec, 1, &num); if (ret && num) { ReadConsoleInput(h, &rec, 1, &num); if (rec.EventType == KEY_EVENT) { if (rec.Event.KeyEvent.bKeyDown) { /* not a special key? */ if (rec.Event.KeyEvent.uChar.AsciiChar != 0) { return 1; } } } } return 0; } #include /* This is an example implementation for LWIP_PLATFORM_DIAG: * format a string and pass it to your output function. */ void lwip_win32_platform_diag(const char *format, ...) { va_list ap; /* get the varargs */ va_start(ap, format); /* print via varargs; to use another output function, you could use vsnprintf here */ vprintf(format, ap); va_end(ap); }