Hopefully these two text files get attached the the mailing list. If
not, I'll send them directly.
One sends no GET command and the handshake works correctly.
The other sends the GET command, but not the ACK.
Hope that helps. :~)
On 13/11/14 13:51, Simon Goldschmidt wrote:
I don't think I really get what your problem is. Could you send a small
pcap the packets in question?
Simon
*Gesendet:* Donnerstag, 13. November 2014 um 14:41 Uhr
*Von:* "Robert Wood" <[email protected]>
*An:* [email protected]
*Betreff:* Re: [lwip-users] Pulling data from a server using HTTP with lwIP
Ah, no, I wasn't aware of that at all.
I still don't know how I'd do that as, if left to its own devices, the
stack sends the ACK out anyway and I have no idea how I'd tack that data
on to the ACK.
It seems like the low level stuff does take care of that for you. Is it
the case that I can poll something to wait for the stack to inform me
that the ACK has gone out and I can send stuff or am I looking at it the
wrong way?
Thanks,
Rob
On 13/11/14 13:31, Simon Goldschmidt wrote:
> Robert,
> are you aware that it's legal for the ACK you are missing to contain
> data also? In this case the packets would look like this:
> SYN ->
> <- SYN/ACK
> ACK+DATA(GET) ->
> This is what I was trying to explain in my last mail...
> Simon
> *Gesendet:* Donnerstag, 13. November 2014 um 14:22 Uhr
> *Von:* "Robert Wood" <[email protected]>
> *An:* [email protected]
> *Betreff:* Re: [lwip-users] Pulling data from a server using HTTP
with lwIP
> It's not quite like that, I'm not explaining very well. I'll try
again. :~)
>
> If I send the GET command out, then my board does not send the ACK to
> the server for the SYN, SYN ACK, ACK handshake. This is what happens.
> Bear in mind the lwIP board is the client in this case.
>
> Here are two different In both cases I do this in the lwIP client thread:
>
> IP4_ADDR(&local_ip,emacIPADDR0,emacIPADDR1,emacIPADDR2,emacIPADDR3);
> rc1 = netconn_bind ( xNetConn, &local_ip, 0 );
> IP4_ADDR(&remote_ip,192,168,0,87);
> rc2 = netconn_connect ( xNetConn, &remote_ip, 80 );
>
> Scenario 1:
>
> In this case I do not send a GET request out.
>
> Client -> SYN (Server receives this)
> Server -> SYN ACK (Client receives this)
> Client -> ACK (Server receives this)
>
> Scenario 2:
>
> In this case I send the GET command out.
>
> Client -> SYN (Server receives this)
> Server -> SYN ACK (Client receives this)
> Client -> GET Command
>
> So, in scenario 2, the client is not sending out the ACK in the initial
> handshake. I'm assuming it's because I need to wait for the lwIP stack
> to send the ACK. I'm assuming anyway. If that is the case, how does my
> thread know when the stack has sent the ACK to the server and I am at
> liberty to send the GET request?
>
> I hope I've made that clearer. :~)
>
> I'm probably doing naive things because I'm trying to learn a lot of
> stuff at the moment!
>
> On 13/11/14 13:09, Simon Goldschmidt wrote:
> > Robert Wood wrote:
> >> If I establish a connection from the board to the desktop and do not
> >> send a GET request, then lwIP does the SYN, SYN ACK, ACK handshake
just
> >> fine.
> >>
> >> If I add the [potentially incorrect] GET request, the SYNN is
sent, the
> >> SYN ACK is received, but my board running lwIP does not send the
ACK out
> >> to the desktop.
> >
> > Does it piggy-back the ACK on your GET request or is the GET request
> not even sent out? I'd expect to see the GET request along with the
> handshake-ACK.Then, the webserver will eventually time out waiting for
> the double-CRLF.
> >
> > However, if lwIP does not send ANYTHING after receiving the SYN-ACK,
> there's something wrong... :-/
> >
> > Simon
> >
> > _______________________________________________
> > lwip-users mailing list
> > [email protected]
> > https://lists.nongnu.org/mailman/listinfo/lwip-users
> >
>
> _______________________________________________
> lwip-users mailing list
> [email protected]
> https://lists.nongnu.org/mailman/listinfo/lwip-users
>
>
> _______________________________________________
> lwip-users mailing list
> [email protected]
> https://lists.nongnu.org/mailman/listinfo/lwip-users
>
_______________________________________________
lwip-users mailing list
[email protected]
https://lists.nongnu.org/mailman/listinfo/lwip-users
_______________________________________________
lwip-users mailing list
[email protected]
https://lists.nongnu.org/mailman/listinfo/lwip-users
No. Time Source Destination Protocol
Length Info
23 11.014021000 192.168.0.205 192.168.0.87 TCP 60
patrolview > http [SYN] Seq=0 Win=1500 Len=0 MSS=1500
Frame 23: 60 bytes on wire (480 bits), 60 bytes captured (480 bits) on
interface 0
Ethernet II, Src: 00:bd:33:06:68:22 (00:bd:33:06:68:22), Dst: AsustekC_30:36:22
(14:da:e9:30:36:22)
Destination: AsustekC_30:36:22 (14:da:e9:30:36:22)
Source: 00:bd:33:06:68:22 (00:bd:33:06:68:22)
Type: IP (0x0800)
Padding: 0000
Internet Protocol Version 4, Src: 192.168.0.205 (192.168.0.205), Dst:
192.168.0.87 (192.168.0.87)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00: Not-ECT
(Not ECN-Capable Transport))
Total Length: 44
Identification: 0x0000 (0)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 255
Protocol: TCP (6)
Header checksum: 0xf956 [validation disabled]
Source: 192.168.0.205 (192.168.0.205)
Destination: 192.168.0.87 (192.168.0.87)
[Source GeoIP: Unknown]
[Destination GeoIP: Unknown]
Transmission Control Protocol, Src Port: patrolview (4097), Dst Port: http
(80), Seq: 0, Len: 0
Source port: patrolview (4097)
Destination port: http (80)
[Stream index: 8]
Sequence number: 0 (relative sequence number)
Header length: 24 bytes
Flags: 0x002 (SYN)
Window size value: 1500
[Calculated window size: 1500]
Checksum: 0xe5ef [validation disabled]
[Good Checksum: False]
[Bad Checksum: False]
Options: (4 bytes), Maximum segment size
Maximum segment size: 1500 bytes
No. Time Source Destination Protocol
Length Info
24 11.014054000 192.168.0.87 192.168.0.205 TCP 58
http > patrolview [SYN, ACK] Seq=0 Ack=1 Win=29200 Len=0 MSS=1460
Frame 24: 58 bytes on wire (464 bits), 58 bytes captured (464 bits) on
interface 0
Ethernet II, Src: AsustekC_30:36:22 (14:da:e9:30:36:22), Dst: 00:bd:33:06:68:22
(00:bd:33:06:68:22)
Destination: 00:bd:33:06:68:22 (00:bd:33:06:68:22)
Source: AsustekC_30:36:22 (14:da:e9:30:36:22)
Type: IP (0x0800)
Internet Protocol Version 4, Src: 192.168.0.87 (192.168.0.87), Dst:
192.168.0.205 (192.168.0.205)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00: Not-ECT
(Not ECN-Capable Transport))
Total Length: 44
Identification: 0x0000 (0)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0xb857 [validation disabled]
Source: 192.168.0.87 (192.168.0.87)
Destination: 192.168.0.205 (192.168.0.205)
[Source GeoIP: Unknown]
[Destination GeoIP: Unknown]
Transmission Control Protocol, Src Port: http (80), Dst Port: patrolview
(4097), Seq: 0, Ack: 1, Len: 0
Source port: http (80)
Destination port: patrolview (4097)
[Stream index: 8]
Sequence number: 0 (relative sequence number)
Acknowledgment number: 1 (relative ack number)
Header length: 24 bytes
Flags: 0x012 (SYN, ACK)
Window size value: 29200
[Calculated window size: 29200]
Checksum: 0xb77e [validation disabled]
[Good Checksum: False]
[Bad Checksum: False]
Options: (4 bytes), Maximum segment size
Maximum segment size: 1460 bytes
[SEQ/ACK analysis]
No. Time Source Destination Protocol
Length Info
25 11.262655000 192.168.0.205 192.168.0.87 TCP 60
patrolview > http [ACK] Seq=1 Ack=1 Win=1500 Len=0
Frame 25: 60 bytes on wire (480 bits), 60 bytes captured (480 bits) on
interface 0
Ethernet II, Src: 00:bd:33:06:68:22 (00:bd:33:06:68:22), Dst: AsustekC_30:36:22
(14:da:e9:30:36:22)
Destination: AsustekC_30:36:22 (14:da:e9:30:36:22)
Source: 00:bd:33:06:68:22 (00:bd:33:06:68:22)
Type: IP (0x0800)
Padding: 000000000000
Internet Protocol Version 4, Src: 192.168.0.205 (192.168.0.205), Dst:
192.168.0.87 (192.168.0.87)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00: Not-ECT
(Not ECN-Capable Transport))
Total Length: 40
Identification: 0x0000 (0)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 255
Protocol: TCP (6)
Header checksum: 0xf95a [validation disabled]
Source: 192.168.0.205 (192.168.0.205)
Destination: 192.168.0.87 (192.168.0.87)
[Source GeoIP: Unknown]
[Destination GeoIP: Unknown]
Transmission Control Protocol, Src Port: patrolview (4097), Dst Port: http
(80), Seq: 1, Ack: 1, Len: 0
Source port: patrolview (4097)
Destination port: http (80)
[Stream index: 8]
Sequence number: 1 (relative sequence number)
Acknowledgment number: 1 (relative ack number)
Header length: 20 bytes
Flags: 0x010 (ACK)
Window size value: 1500
[Calculated window size: 1500]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x3b70 [validation disabled]
[Good Checksum: False]
[Bad Checksum: False]
[SEQ/ACK analysis]
No. Time Source Destination Protocol
Length Info
28 19.353301000 192.168.0.205 192.168.0.87 TCP 60
patrolview > http [SYN] Seq=0 Win=1500 Len=0 MSS=1500
Frame 28: 60 bytes on wire (480 bits), 60 bytes captured (480 bits) on
interface 0
Ethernet II, Src: 00:bd:33:06:68:22 (00:bd:33:06:68:22), Dst: AsustekC_30:36:22
(14:da:e9:30:36:22)
Destination: AsustekC_30:36:22 (14:da:e9:30:36:22)
Source: 00:bd:33:06:68:22 (00:bd:33:06:68:22)
Type: IP (0x0800)
Padding: 0000
Internet Protocol Version 4, Src: 192.168.0.205 (192.168.0.205), Dst:
192.168.0.87 (192.168.0.87)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00: Not-ECT
(Not ECN-Capable Transport))
Total Length: 44
Identification: 0x0000 (0)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 255
Protocol: TCP (6)
Header checksum: 0xf956 [validation disabled]
Source: 192.168.0.205 (192.168.0.205)
Destination: 192.168.0.87 (192.168.0.87)
[Source GeoIP: Unknown]
[Destination GeoIP: Unknown]
Transmission Control Protocol, Src Port: patrolview (4097), Dst Port: http
(80), Seq: 0, Len: 0
Source port: patrolview (4097)
Destination port: http (80)
[Stream index: 2]
Sequence number: 0 (relative sequence number)
Header length: 24 bytes
Flags: 0x002 (SYN)
Window size value: 1500
[Calculated window size: 1500]
Checksum: 0xe5ef [validation disabled]
[Good Checksum: False]
[Bad Checksum: False]
Options: (4 bytes), Maximum segment size
Maximum segment size: 1500 bytes
No. Time Source Destination Protocol
Length Info
29 19.353322000 192.168.0.87 192.168.0.205 TCP 58
http > patrolview [SYN, ACK] Seq=0 Ack=1 Win=29200 Len=0 MSS=1460
Frame 29: 58 bytes on wire (464 bits), 58 bytes captured (464 bits) on
interface 0
Ethernet II, Src: AsustekC_30:36:22 (14:da:e9:30:36:22), Dst: 00:bd:33:06:68:22
(00:bd:33:06:68:22)
Destination: 00:bd:33:06:68:22 (00:bd:33:06:68:22)
Source: AsustekC_30:36:22 (14:da:e9:30:36:22)
Type: IP (0x0800)
Internet Protocol Version 4, Src: 192.168.0.87 (192.168.0.87), Dst:
192.168.0.205 (192.168.0.205)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00: Not-ECT
(Not ECN-Capable Transport))
Total Length: 44
Identification: 0x0000 (0)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0xb857 [validation disabled]
Source: 192.168.0.87 (192.168.0.87)
Destination: 192.168.0.205 (192.168.0.205)
[Source GeoIP: Unknown]
[Destination GeoIP: Unknown]
Transmission Control Protocol, Src Port: http (80), Dst Port: patrolview
(4097), Seq: 0, Ack: 1, Len: 0
Source port: http (80)
Destination port: patrolview (4097)
[Stream index: 2]
Sequence number: 0 (relative sequence number)
Acknowledgment number: 1 (relative ack number)
Header length: 24 bytes
Flags: 0x012 (SYN, ACK)
Window size value: 29200
[Calculated window size: 29200]
Checksum: 0x16ad [validation disabled]
[Good Checksum: False]
[Bad Checksum: False]
Options: (4 bytes), Maximum segment size
Maximum segment size: 1460 bytes
[SEQ/ACK analysis]
No. Time Source Destination Protocol
Length Info
30 19.354615000 192.168.0.205 192.168.0.87 TCP 254
[TCP segment of a reassembled PDU]
Frame 30: 254 bytes on wire (2032 bits), 254 bytes captured (2032 bits) on
interface 0
Ethernet II, Src: 00:bd:33:06:68:22 (00:bd:33:06:68:22), Dst: AsustekC_30:36:22
(14:da:e9:30:36:22)
Destination: AsustekC_30:36:22 (14:da:e9:30:36:22)
Source: 00:bd:33:06:68:22 (00:bd:33:06:68:22)
Type: IP (0x0800)
Internet Protocol Version 4, Src: 192.168.0.205 (192.168.0.205), Dst:
192.168.0.87 (192.168.0.87)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00: Not-ECT
(Not ECN-Capable Transport))
Total Length: 240
Identification: 0x0000 (0)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 255
Protocol: TCP (6)
Header checksum: 0xf892 [validation disabled]
Source: 192.168.0.205 (192.168.0.205)
Destination: 192.168.0.87 (192.168.0.87)
[Source GeoIP: Unknown]
[Destination GeoIP: Unknown]
Transmission Control Protocol, Src Port: patrolview (4097), Dst Port: http
(80), Seq: 1, Ack: 1, Len: 200
Source port: patrolview (4097)
Destination port: http (80)
[Stream index: 2]
Sequence number: 1 (relative sequence number)
[Next sequence number: 201 (relative sequence number)]
Acknowledgment number: 1 (relative ack number)
Header length: 20 bytes
Flags: 0x018 (PSH, ACK)
Window size value: 1500
[Calculated window size: 1500]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xf3c4 [validation disabled]
[Good Checksum: False]
[Bad Checksum: False]
[SEQ/ACK analysis]
TCP segment data (200 bytes)
No. Time Source Destination Protocol
Length Info
31 19.354651000 192.168.0.87 192.168.0.205 TCP 54
http > patrolview [ACK] Seq=1 Ack=201 Win=30016 Len=0
Frame 31: 54 bytes on wire (432 bits), 54 bytes captured (432 bits) on
interface 0
Ethernet II, Src: AsustekC_30:36:22 (14:da:e9:30:36:22), Dst: 00:bd:33:06:68:22
(00:bd:33:06:68:22)
Destination: 00:bd:33:06:68:22 (00:bd:33:06:68:22)
Source: AsustekC_30:36:22 (14:da:e9:30:36:22)
Type: IP (0x0800)
Internet Protocol Version 4, Src: 192.168.0.87 (192.168.0.87), Dst:
192.168.0.205 (192.168.0.205)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00: Not-ECT
(Not ECN-Capable Transport))
Total Length: 40
Identification: 0xe315 (58133)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0xd545 [validation disabled]
Source: 192.168.0.87 (192.168.0.87)
Destination: 192.168.0.205 (192.168.0.205)
[Source GeoIP: Unknown]
[Destination GeoIP: Unknown]
Transmission Control Protocol, Src Port: http (80), Dst Port: patrolview
(4097), Seq: 1, Ack: 201, Len: 0
Source port: http (80)
Destination port: patrolview (4097)
[Stream index: 2]
Sequence number: 1 (relative sequence number)
Acknowledgment number: 201 (relative ack number)
Header length: 20 bytes
Flags: 0x010 (ACK)
Window size value: 30016
[Calculated window size: 30016]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x2a72 [validation disabled]
[Good Checksum: False]
[Bad Checksum: False]
[SEQ/ACK analysis]
No. Time Source Destination Protocol
Length Info
89 39.444910000 192.168.0.87 192.168.0.205 HTTP 460
HTTP/1.1 408 Request Timeout (text/html)
Frame 89: 460 bytes on wire (3680 bits), 460 bytes captured (3680 bits) on
interface 0
Ethernet II, Src: AsustekC_30:36:22 (14:da:e9:30:36:22), Dst: 00:bd:33:06:68:22
(00:bd:33:06:68:22)
Destination: 00:bd:33:06:68:22 (00:bd:33:06:68:22)
Source: AsustekC_30:36:22 (14:da:e9:30:36:22)
Type: IP (0x0800)
Internet Protocol Version 4, Src: 192.168.0.87 (192.168.0.87), Dst:
192.168.0.205 (192.168.0.205)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00: Not-ECT
(Not ECN-Capable Transport))
Total Length: 446
Identification: 0xe316 (58134)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0xd3ae [validation disabled]
Source: 192.168.0.87 (192.168.0.87)
Destination: 192.168.0.205 (192.168.0.205)
[Source GeoIP: Unknown]
[Destination GeoIP: Unknown]
Transmission Control Protocol, Src Port: http (80), Dst Port: patrolview
(4097), Seq: 1, Ack: 201, Len: 406
Source port: http (80)
Destination port: patrolview (4097)
[Stream index: 2]
Sequence number: 1 (relative sequence number)
[Next sequence number: 407 (relative sequence number)]
Acknowledgment number: 201 (relative ack number)
Header length: 20 bytes
Flags: 0x018 (PSH, ACK)
Window size value: 30016
[Calculated window size: 30016]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xb1ce [validation disabled]
[Good Checksum: False]
[Bad Checksum: False]
[SEQ/ACK analysis]
Hypertext Transfer Protocol
HTTP/1.1 408 Request Timeout\r\n
Date: Thu, 13 Nov 2014 13:14:36 GMT\r\n
Server: Apache/2.4.7 (Mageia)\r\n
Content-Length: 221\r\n
Connection: close\r\n
Content-Type: text/html; charset=iso-8859-1\r\n
\r\n
[HTTP response 1/1]
Line-based text data: text/html
No. Time Source Destination Protocol
Length Info
90 39.444924000 192.168.0.87 192.168.0.205 TCP 54
http > patrolview [FIN, ACK] Seq=407 Ack=201 Win=30016 Len=0
Frame 90: 54 bytes on wire (432 bits), 54 bytes captured (432 bits) on
interface 0
Ethernet II, Src: AsustekC_30:36:22 (14:da:e9:30:36:22), Dst: 00:bd:33:06:68:22
(00:bd:33:06:68:22)
Destination: 00:bd:33:06:68:22 (00:bd:33:06:68:22)
Source: AsustekC_30:36:22 (14:da:e9:30:36:22)
Type: IP (0x0800)
Internet Protocol Version 4, Src: 192.168.0.87 (192.168.0.87), Dst:
192.168.0.205 (192.168.0.205)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00: Not-ECT
(Not ECN-Capable Transport))
Total Length: 40
Identification: 0xe317 (58135)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0xd543 [validation disabled]
Source: 192.168.0.87 (192.168.0.87)
Destination: 192.168.0.205 (192.168.0.205)
[Source GeoIP: Unknown]
[Destination GeoIP: Unknown]
Transmission Control Protocol, Src Port: http (80), Dst Port: patrolview
(4097), Seq: 407, Ack: 201, Len: 0
Source port: http (80)
Destination port: patrolview (4097)
[Stream index: 2]
Sequence number: 407 (relative sequence number)
Acknowledgment number: 201 (relative ack number)
Header length: 20 bytes
Flags: 0x011 (FIN, ACK)
Window size value: 30016
[Calculated window size: 30016]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x28db [validation disabled]
[Good Checksum: False]
[Bad Checksum: False]
No. Time Source Destination Protocol
Length Info
91 39.446186000 192.168.0.205 192.168.0.87 TCP 60
patrolview > http [ACK] Seq=201 Ack=408 Win=1093 Len=0
Frame 91: 60 bytes on wire (480 bits), 60 bytes captured (480 bits) on
interface 0
Ethernet II, Src: 00:bd:33:06:68:22 (00:bd:33:06:68:22), Dst: AsustekC_30:36:22
(14:da:e9:30:36:22)
Destination: AsustekC_30:36:22 (14:da:e9:30:36:22)
Source: 00:bd:33:06:68:22 (00:bd:33:06:68:22)
Type: IP (0x0800)
Padding: 000000000000
Internet Protocol Version 4, Src: 192.168.0.205 (192.168.0.205), Dst:
192.168.0.87 (192.168.0.87)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00: Not-ECT
(Not ECN-Capable Transport))
Total Length: 40
Identification: 0x0000 (0)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 255
Protocol: TCP (6)
Header checksum: 0xf95a [validation disabled]
Source: 192.168.0.205 (192.168.0.205)
Destination: 192.168.0.87 (192.168.0.87)
[Source GeoIP: Unknown]
[Destination GeoIP: Unknown]
Transmission Control Protocol, Src Port: patrolview (4097), Dst Port: http
(80), Seq: 201, Ack: 408, Len: 0
Source port: patrolview (4097)
Destination port: http (80)
[Stream index: 2]
Sequence number: 201 (relative sequence number)
Acknowledgment number: 408 (relative ack number)
Header length: 20 bytes
Flags: 0x010 (ACK)
Window size value: 1093
[Calculated window size: 1093]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x99d6 [validation disabled]
[Good Checksum: False]
[Bad Checksum: False]
[SEQ/ACK analysis]
_______________________________________________
lwip-users mailing list
[email protected]
https://lists.nongnu.org/mailman/listinfo/lwip-users