1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123 |
- use core::cmp;
- #[cfg(feature = "async")]
- use core::task::Waker;
- use crate::phy::ChecksumCapabilities;
- #[cfg(feature = "async")]
- use crate::socket::WakerRegistration;
- use crate::socket::{Context, PollAt};
- use crate::storage::Empty;
- use crate::wire::IcmpRepr;
- #[cfg(feature = "proto-ipv4")]
- use crate::wire::{Icmpv4Packet, Icmpv4Repr, Ipv4Repr};
- #[cfg(feature = "proto-ipv6")]
- use crate::wire::{Icmpv6Packet, Icmpv6Repr, Ipv6Repr};
- use crate::wire::{IpAddress, IpListenEndpoint, IpProtocol, IpRepr};
- use crate::wire::{UdpPacket, UdpRepr};
- /// Error returned by [`Socket::bind`]
- #[derive(Debug, PartialEq, Eq, Clone, Copy)]
- #[cfg_attr(feature = "defmt", derive(defmt::Format))]
- pub enum BindError {
- InvalidState,
- Unaddressable,
- }
- /// Error returned by [`Socket::send`]
- #[derive(Debug, PartialEq, Eq, Clone, Copy)]
- #[cfg_attr(feature = "defmt", derive(defmt::Format))]
- pub enum SendError {
- Unaddressable,
- BufferFull,
- }
- /// Error returned by [`Socket::recv`]
- #[derive(Debug, PartialEq, Eq, Clone, Copy)]
- #[cfg_attr(feature = "defmt", derive(defmt::Format))]
- pub enum RecvError {
- Exhausted,
- }
- /// Type of endpoint to bind the ICMP socket to. See [IcmpSocket::bind] for
- /// more details.
- ///
- /// [IcmpSocket::bind]: struct.IcmpSocket.html#method.bind
- #[derive(Debug, PartialEq, Eq, PartialOrd, Ord, Clone, Copy)]
- #[cfg_attr(feature = "defmt", derive(defmt::Format))]
- pub enum Endpoint {
- Unspecified,
- Ident(u16),
- Udp(IpListenEndpoint),
- }
- impl Endpoint {
- pub fn is_specified(&self) -> bool {
- match *self {
- Endpoint::Ident(_) => true,
- Endpoint::Udp(endpoint) => endpoint.port != 0,
- Endpoint::Unspecified => false,
- }
- }
- }
- impl Default for Endpoint {
- fn default() -> Endpoint {
- Endpoint::Unspecified
- }
- }
- /// An ICMP packet metadata.
- pub type PacketMetadata = crate::storage::PacketMetadata<IpAddress>;
- /// An ICMP packet ring buffer.
- pub type PacketBuffer<'a> = crate::storage::PacketBuffer<'a, IpAddress>;
- /// A ICMP socket
- ///
- /// An ICMP socket is bound to a specific [IcmpEndpoint] which may
- /// be a specific UDP port to listen for ICMP error messages related
- /// to the port or a specific ICMP identifier value. See [bind] for
- /// more details.
- ///
- /// [IcmpEndpoint]: enum.IcmpEndpoint.html
- /// [bind]: #method.bind
- #[derive(Debug)]
- pub struct Socket<'a> {
- rx_buffer: PacketBuffer<'a>,
- tx_buffer: PacketBuffer<'a>,
- /// The endpoint this socket is communicating with
- endpoint: Endpoint,
- /// The time-to-live (IPv4) or hop limit (IPv6) value used in outgoing packets.
- hop_limit: Option<u8>,
- #[cfg(feature = "async")]
- rx_waker: WakerRegistration,
- #[cfg(feature = "async")]
- tx_waker: WakerRegistration,
- }
- impl<'a> Socket<'a> {
- /// Create an ICMP socket with the given buffers.
- pub fn new(rx_buffer: PacketBuffer<'a>, tx_buffer: PacketBuffer<'a>) -> Socket<'a> {
- Socket {
- rx_buffer: rx_buffer,
- tx_buffer: tx_buffer,
- endpoint: Default::default(),
- hop_limit: None,
- #[cfg(feature = "async")]
- rx_waker: WakerRegistration::new(),
- #[cfg(feature = "async")]
- tx_waker: WakerRegistration::new(),
- }
- }
- /// Register a waker for receive operations.
- ///
- /// The waker is woken on state changes that might affect the return value
- /// of `recv` method calls, such as receiving data, or the socket closing.
- ///
- /// Notes:
- ///
- /// - Only one waker can be registered at a time. If another waker was previously registered,
- /// it is overwritten and will no longer be woken.
- /// - The Waker is woken only once. Once woken, you must register it again to receive more wakes.
- /// - "Spurious wakes" are allowed: a wake doesn't guarantee the result of `recv` has
- /// necessarily changed.
- #[cfg(feature = "async")]
- pub fn register_recv_waker(&mut self, waker: &Waker) {
- self.rx_waker.register(waker)
- }
- /// Register a waker for send operations.
- ///
- /// The waker is woken on state changes that might affect the return value
- /// of `send` method calls, such as space becoming available in the transmit
- /// buffer, or the socket closing.
- ///
- /// Notes:
- ///
- /// - Only one waker can be registered at a time. If another waker was previously registered,
- /// it is overwritten and will no longer be woken.
- /// - The Waker is woken only once. Once woken, you must register it again to receive more wakes.
- /// - "Spurious wakes" are allowed: a wake doesn't guarantee the result of `send` has
- /// necessarily changed.
- #[cfg(feature = "async")]
- pub fn register_send_waker(&mut self, waker: &Waker) {
- self.tx_waker.register(waker)
- }
- /// Return the time-to-live (IPv4) or hop limit (IPv6) value used in outgoing packets.
- ///
- /// See also the [set_hop_limit](#method.set_hop_limit) method
- pub fn hop_limit(&self) -> Option<u8> {
- self.hop_limit
- }
- /// Set the time-to-live (IPv4) or hop limit (IPv6) value used in outgoing packets.
- ///
- /// A socket without an explicitly set hop limit value uses the default [IANA recommended]
- /// value (64).
- ///
- /// # Panics
- ///
- /// This function panics if a hop limit value of 0 is given. See [RFC 1122 § 3.2.1.7].
- ///
- /// [IANA recommended]: https://www.iana.org/assignments/ip-parameters/ip-parameters.xhtml
- /// [RFC 1122 § 3.2.1.7]: https://tools.ietf.org/html/rfc1122#section-3.2.1.7
- pub fn set_hop_limit(&mut self, hop_limit: Option<u8>) {
- // A host MUST NOT send a datagram with a hop limit value of 0
- if let Some(0) = hop_limit {
- panic!("the time-to-live value of a packet must not be zero")
- }
- self.hop_limit = hop_limit
- }
- /// Bind the socket to the given endpoint.
- ///
- /// This function returns `Err(Error::Illegal)` if the socket was open
- /// (see [is_open](#method.is_open)), and `Err(Error::Unaddressable)`
- /// if `endpoint` is unspecified (see [is_specified]).
- ///
- /// # Examples
- ///
- /// ## Bind to ICMP Error messages associated with a specific UDP port:
- ///
- /// To [recv] ICMP error messages that are associated with a specific local
- /// UDP port, the socket may be bound to a given port using [IcmpEndpoint::Udp].
- /// This may be useful for applications using UDP attempting to detect and/or
- /// diagnose connection problems.
- ///
- /// ```
- /// use smoltcp::wire::IpListenEndpoint;
- /// use smoltcp::socket::icmp;
- /// # let rx_buffer = icmp::PacketBuffer::new(vec![icmp::PacketMetadata::EMPTY], vec![0; 20]);
- /// # let tx_buffer = icmp::PacketBuffer::new(vec![icmp::PacketMetadata::EMPTY], vec![0; 20]);
- ///
- /// let mut icmp_socket = // ...
- /// # icmp::Socket::new(rx_buffer, tx_buffer);
- ///
- /// // Bind to ICMP error responses for UDP packets sent from port 53.
- /// let endpoint = IpListenEndpoint::from(53);
- /// icmp_socket.bind(icmp::Endpoint::Udp(endpoint)).unwrap();
- /// ```
- ///
- /// ## Bind to a specific ICMP identifier:
- ///
- /// To [send] and [recv] ICMP packets that are not associated with a specific UDP
- /// port, the socket may be bound to a specific ICMP identifier using
- /// [IcmpEndpoint::Ident]. This is useful for sending and receiving Echo Request/Reply
- /// messages.
- ///
- /// ```
- /// use smoltcp::wire::IpListenEndpoint;
- /// use smoltcp::socket::icmp;
- /// # let rx_buffer = icmp::PacketBuffer::new(vec![icmp::PacketMetadata::EMPTY], vec![0; 20]);
- /// # let tx_buffer = icmp::PacketBuffer::new(vec![icmp::PacketMetadata::EMPTY], vec![0; 20]);
- ///
- /// let mut icmp_socket = // ...
- /// # icmp::Socket::new(rx_buffer, tx_buffer);
- ///
- /// // Bind to ICMP messages with the ICMP identifier 0x1234
- /// icmp_socket.bind(icmp::Endpoint::Ident(0x1234)).unwrap();
- /// ```
- ///
- /// [is_specified]: enum.IcmpEndpoint.html#method.is_specified
- /// [IcmpEndpoint::Ident]: enum.IcmpEndpoint.html#variant.Ident
- /// [IcmpEndpoint::Udp]: enum.IcmpEndpoint.html#variant.Udp
- /// [send]: #method.send
- /// [recv]: #method.recv
- pub fn bind<T: Into<Endpoint>>(&mut self, endpoint: T) -> Result<(), BindError> {
- let endpoint = endpoint.into();
- if !endpoint.is_specified() {
- return Err(BindError::Unaddressable);
- }
- if self.is_open() {
- return Err(BindError::InvalidState);
- }
- self.endpoint = endpoint;
- #[cfg(feature = "async")]
- {
- self.rx_waker.wake();
- self.tx_waker.wake();
- }
- Ok(())
- }
- /// Check whether the transmit buffer is full.
- #[inline]
- pub fn can_send(&self) -> bool {
- !self.tx_buffer.is_full()
- }
- /// Check whether the receive buffer is not empty.
- #[inline]
- pub fn can_recv(&self) -> bool {
- !self.rx_buffer.is_empty()
- }
- /// Return the maximum number packets the socket can receive.
- #[inline]
- pub fn packet_recv_capacity(&self) -> usize {
- self.rx_buffer.packet_capacity()
- }
- /// Return the maximum number packets the socket can transmit.
- #[inline]
- pub fn packet_send_capacity(&self) -> usize {
- self.tx_buffer.packet_capacity()
- }
- /// Return the maximum number of bytes inside the recv buffer.
- #[inline]
- pub fn payload_recv_capacity(&self) -> usize {
- self.rx_buffer.payload_capacity()
- }
- /// Return the maximum number of bytes inside the transmit buffer.
- #[inline]
- pub fn payload_send_capacity(&self) -> usize {
- self.tx_buffer.payload_capacity()
- }
- /// Check whether the socket is open.
- #[inline]
- pub fn is_open(&self) -> bool {
- self.endpoint != Endpoint::Unspecified
- }
- /// Enqueue a packet to be sent to a given remote address, and return a pointer
- /// to its payload.
- ///
- /// This function returns `Err(Error::Exhausted)` if the transmit buffer is full,
- /// `Err(Error::Truncated)` if the requested size is larger than the packet buffer
- /// size, and `Err(Error::Unaddressable)` if the remote address is unspecified.
- pub fn send(&mut self, size: usize, endpoint: IpAddress) -> Result<&mut [u8], SendError> {
- if endpoint.is_unspecified() {
- return Err(SendError::Unaddressable);
- }
- let packet_buf = self
- .tx_buffer
- .enqueue(size, endpoint)
- .map_err(|_| SendError::BufferFull)?;
- net_trace!("icmp:{}: buffer to send {} octets", endpoint, size);
- Ok(packet_buf)
- }
- /// Enqueue a packet to be send to a given remote address and pass the buffer
- /// to the provided closure. The closure then returns the size of the data written
- /// into the buffer.
- ///
- /// Also see [send](#method.send).
- pub fn send_with<F>(
- &mut self,
- max_size: usize,
- endpoint: IpAddress,
- f: F,
- ) -> Result<usize, SendError>
- where
- F: FnOnce(&mut [u8]) -> usize,
- {
- if endpoint.is_unspecified() {
- return Err(SendError::Unaddressable);
- }
- let size = self
- .tx_buffer
- .enqueue_with_infallible(max_size, endpoint, f)
- .map_err(|_| SendError::BufferFull)?;
- net_trace!("icmp:{}: buffer to send {} octets", endpoint, size);
- Ok(size)
- }
- /// Enqueue a packet to be sent to a given remote address, and fill it from a slice.
- ///
- /// See also [send](#method.send).
- pub fn send_slice(&mut self, data: &[u8], endpoint: IpAddress) -> Result<(), SendError> {
- let packet_buf = self.send(data.len(), endpoint)?;
- packet_buf.copy_from_slice(data);
- Ok(())
- }
- /// Dequeue a packet received from a remote endpoint, and return the `IpAddress` as well
- /// as a pointer to the payload.
- ///
- /// This function returns `Err(Error::Exhausted)` if the receive buffer is empty.
- pub fn recv(&mut self) -> Result<(&[u8], IpAddress), RecvError> {
- let (endpoint, packet_buf) = self.rx_buffer.dequeue().map_err(|_| RecvError::Exhausted)?;
- net_trace!(
- "icmp:{}: receive {} buffered octets",
- endpoint,
- packet_buf.len()
- );
- Ok((packet_buf, endpoint))
- }
- /// Dequeue a packet received from a remote endpoint, copy the payload into the given slice,
- /// and return the amount of octets copied as well as the `IpAddress`
- ///
- /// See also [recv](#method.recv).
- pub fn recv_slice(&mut self, data: &mut [u8]) -> Result<(usize, IpAddress), RecvError> {
- let (buffer, endpoint) = self.recv()?;
- let length = cmp::min(data.len(), buffer.len());
- data[..length].copy_from_slice(&buffer[..length]);
- Ok((length, endpoint))
- }
- /// Filter determining which packets received by the interface are appended to
- /// the given sockets received buffer.
- pub(crate) fn accepts(&self, cx: &mut Context, ip_repr: &IpRepr, icmp_repr: &IcmpRepr) -> bool {
- match (&self.endpoint, icmp_repr) {
- // If we are bound to ICMP errors associated to a UDP port, only
- // accept Destination Unreachable or Time Exceeded messages with
- // the data containing a UDP packet send from the local port we
- // are bound to.
- #[cfg(feature = "proto-ipv4")]
- (
- &Endpoint::Udp(endpoint),
- &IcmpRepr::Ipv4(
- Icmpv4Repr::DstUnreachable { data, header, .. }
- | Icmpv4Repr::TimeExceeded { data, header, .. },
- ),
- ) if endpoint.addr.is_none() || endpoint.addr == Some(ip_repr.dst_addr()) => {
- let packet = UdpPacket::new_unchecked(data);
- match UdpRepr::parse(
- &packet,
- &header.src_addr.into(),
- &header.dst_addr.into(),
- &cx.checksum_caps(),
- ) {
- Ok(repr) => endpoint.port == repr.src_port,
- Err(_) => false,
- }
- }
- #[cfg(feature = "proto-ipv6")]
- (
- &Endpoint::Udp(endpoint),
- &IcmpRepr::Ipv6(
- Icmpv6Repr::DstUnreachable { data, header, .. }
- | Icmpv6Repr::TimeExceeded { data, header, .. },
- ),
- ) if endpoint.addr.is_none() || endpoint.addr == Some(ip_repr.dst_addr()) => {
- let packet = UdpPacket::new_unchecked(data);
- match UdpRepr::parse(
- &packet,
- &header.src_addr.into(),
- &header.dst_addr.into(),
- &cx.checksum_caps(),
- ) {
- Ok(repr) => endpoint.port == repr.src_port,
- Err(_) => false,
- }
- }
- // If we are bound to a specific ICMP identifier value, only accept an
- // Echo Request/Reply with the identifier field matching the endpoint
- // port.
- #[cfg(feature = "proto-ipv4")]
- (
- &Endpoint::Ident(bound_ident),
- &IcmpRepr::Ipv4(Icmpv4Repr::EchoRequest { ident, .. }),
- )
- | (
- &Endpoint::Ident(bound_ident),
- &IcmpRepr::Ipv4(Icmpv4Repr::EchoReply { ident, .. }),
- ) => ident == bound_ident,
- #[cfg(feature = "proto-ipv6")]
- (
- &Endpoint::Ident(bound_ident),
- &IcmpRepr::Ipv6(Icmpv6Repr::EchoRequest { ident, .. }),
- )
- | (
- &Endpoint::Ident(bound_ident),
- &IcmpRepr::Ipv6(Icmpv6Repr::EchoReply { ident, .. }),
- ) => ident == bound_ident,
- _ => false,
- }
- }
- pub(crate) fn process(&mut self, _cx: &mut Context, ip_repr: &IpRepr, icmp_repr: &IcmpRepr) {
- match *icmp_repr {
- #[cfg(feature = "proto-ipv4")]
- IcmpRepr::Ipv4(ref icmp_repr) => {
- net_trace!("icmp: receiving {} octets", icmp_repr.buffer_len());
- match self
- .rx_buffer
- .enqueue(icmp_repr.buffer_len(), ip_repr.src_addr())
- {
- Ok(packet_buf) => {
- icmp_repr.emit(
- &mut Icmpv4Packet::new_unchecked(packet_buf),
- &ChecksumCapabilities::default(),
- );
- }
- Err(_) => net_trace!("icmp: buffer full, dropped incoming packet"),
- }
- }
- #[cfg(feature = "proto-ipv6")]
- IcmpRepr::Ipv6(ref icmp_repr) => {
- net_trace!("icmp: receiving {} octets", icmp_repr.buffer_len());
- match self
- .rx_buffer
- .enqueue(icmp_repr.buffer_len(), ip_repr.src_addr())
- {
- Ok(packet_buf) => icmp_repr.emit(
- &ip_repr.src_addr(),
- &ip_repr.dst_addr(),
- &mut Icmpv6Packet::new_unchecked(packet_buf),
- &ChecksumCapabilities::default(),
- ),
- Err(_) => net_trace!("icmp: buffer full, dropped incoming packet"),
- }
- }
- }
- #[cfg(feature = "async")]
- self.rx_waker.wake();
- }
- pub(crate) fn dispatch<F, E>(&mut self, cx: &mut Context, emit: F) -> Result<(), E>
- where
- F: FnOnce(&mut Context, (IpRepr, IcmpRepr)) -> Result<(), E>,
- {
- let hop_limit = self.hop_limit.unwrap_or(64);
- let res = self.tx_buffer.dequeue_with(|remote_endpoint, packet_buf| {
- net_trace!(
- "icmp:{}: sending {} octets",
- remote_endpoint,
- packet_buf.len()
- );
- match *remote_endpoint {
- #[cfg(feature = "proto-ipv4")]
- IpAddress::Ipv4(dst_addr) => {
- let src_addr = match cx.get_source_address_ipv4(dst_addr) {
- Some(addr) => addr,
- None => {
- net_trace!(
- "icmp:{}: not find suitable source address, dropping",
- remote_endpoint
- );
- return Ok(());
- }
- };
- let packet = Icmpv4Packet::new_unchecked(&*packet_buf);
- let repr = match Icmpv4Repr::parse(&packet, &ChecksumCapabilities::ignored()) {
- Ok(x) => x,
- Err(_) => {
- net_trace!(
- "icmp:{}: malformed packet in queue, dropping",
- remote_endpoint
- );
- return Ok(());
- }
- };
- let ip_repr = IpRepr::Ipv4(Ipv4Repr {
- src_addr,
- dst_addr,
- next_header: IpProtocol::Icmp,
- payload_len: repr.buffer_len(),
- hop_limit: hop_limit,
- });
- emit(cx, (ip_repr, IcmpRepr::Ipv4(repr)))
- }
- #[cfg(feature = "proto-ipv6")]
- IpAddress::Ipv6(dst_addr) => {
- let src_addr = match cx.get_source_address_ipv6(dst_addr) {
- Some(addr) => addr,
- None => {
- net_trace!(
- "icmp:{}: not find suitable source address, dropping",
- remote_endpoint
- );
- return Ok(());
- }
- };
- let packet = Icmpv6Packet::new_unchecked(&*packet_buf);
- let repr = match Icmpv6Repr::parse(
- &src_addr.into(),
- &dst_addr.into(),
- &packet,
- &ChecksumCapabilities::ignored(),
- ) {
- Ok(x) => x,
- Err(_) => {
- net_trace!(
- "icmp:{}: malformed packet in queue, dropping",
- remote_endpoint
- );
- return Ok(());
- }
- };
- let ip_repr = IpRepr::Ipv6(Ipv6Repr {
- src_addr,
- dst_addr,
- next_header: IpProtocol::Icmpv6,
- payload_len: repr.buffer_len(),
- hop_limit: hop_limit,
- });
- emit(cx, (ip_repr, IcmpRepr::Ipv6(repr)))
- }
- }
- });
- match res {
- Err(Empty) => Ok(()),
- Ok(Err(e)) => Err(e),
- Ok(Ok(())) => {
- #[cfg(feature = "async")]
- self.tx_waker.wake();
- Ok(())
- }
- }
- }
- pub(crate) fn poll_at(&self, _cx: &mut Context) -> PollAt {
- if self.tx_buffer.is_empty() {
- PollAt::Ingress
- } else {
- PollAt::Now
- }
- }
- }
- #[cfg(test)]
- mod tests_common {
- pub use super::*;
- pub use crate::phy::DeviceCapabilities;
- pub use crate::wire::IpAddress;
- pub fn buffer(packets: usize) -> PacketBuffer<'static> {
- PacketBuffer::new(vec![PacketMetadata::EMPTY; packets], vec![0; 66 * packets])
- }
- pub fn socket(
- rx_buffer: PacketBuffer<'static>,
- tx_buffer: PacketBuffer<'static>,
- ) -> Socket<'static> {
- Socket::new(rx_buffer, tx_buffer)
- }
- pub const LOCAL_PORT: u16 = 53;
- pub static UDP_REPR: UdpRepr = UdpRepr {
- src_port: 53,
- dst_port: 9090,
- };
- pub static UDP_PAYLOAD: &[u8] = &[0xff; 10];
- }
- #[cfg(all(test, feature = "proto-ipv4"))]
- mod test_ipv4 {
- use super::tests_common::*;
- use crate::wire::{Icmpv4DstUnreachable, IpEndpoint, Ipv4Address};
- const REMOTE_IPV4: Ipv4Address = Ipv4Address([192, 168, 1, 2]);
- const LOCAL_IPV4: Ipv4Address = Ipv4Address([192, 168, 1, 1]);
- const LOCAL_END_V4: IpEndpoint = IpEndpoint {
- addr: IpAddress::Ipv4(LOCAL_IPV4),
- port: LOCAL_PORT,
- };
- static ECHOV4_REPR: Icmpv4Repr = Icmpv4Repr::EchoRequest {
- ident: 0x1234,
- seq_no: 0x5678,
- data: &[0xff; 16],
- };
- static LOCAL_IPV4_REPR: IpRepr = IpRepr::Ipv4(Ipv4Repr {
- src_addr: LOCAL_IPV4,
- dst_addr: REMOTE_IPV4,
- next_header: IpProtocol::Icmp,
- payload_len: 24,
- hop_limit: 0x40,
- });
- static REMOTE_IPV4_REPR: IpRepr = IpRepr::Ipv4(Ipv4Repr {
- src_addr: REMOTE_IPV4,
- dst_addr: LOCAL_IPV4,
- next_header: IpProtocol::Icmp,
- payload_len: 24,
- hop_limit: 0x40,
- });
- #[test]
- fn test_send_unaddressable() {
- let mut socket = socket(buffer(0), buffer(1));
- assert_eq!(
- socket.send_slice(b"abcdef", IpAddress::Ipv4(Ipv4Address::default())),
- Err(SendError::Unaddressable)
- );
- assert_eq!(socket.send_slice(b"abcdef", REMOTE_IPV4.into()), Ok(()));
- }
- #[test]
- fn test_send_dispatch() {
- let mut socket = socket(buffer(0), buffer(1));
- let mut cx = Context::mock();
- let checksum = ChecksumCapabilities::default();
- assert_eq!(
- socket.dispatch(&mut cx, |_, _| unreachable!()),
- Ok::<_, ()>(())
- );
- // This buffer is too long
- assert_eq!(
- socket.send_slice(&[0xff; 67], REMOTE_IPV4.into()),
- Err(SendError::BufferFull)
- );
- assert!(socket.can_send());
- let mut bytes = [0xff; 24];
- let mut packet = Icmpv4Packet::new_unchecked(&mut bytes);
- ECHOV4_REPR.emit(&mut packet, &checksum);
- assert_eq!(
- socket.send_slice(&*packet.into_inner(), REMOTE_IPV4.into()),
- Ok(())
- );
- assert_eq!(
- socket.send_slice(b"123456", REMOTE_IPV4.into()),
- Err(SendError::BufferFull)
- );
- assert!(!socket.can_send());
- assert_eq!(
- socket.dispatch(&mut cx, |_, (ip_repr, icmp_repr)| {
- assert_eq!(ip_repr, LOCAL_IPV4_REPR);
- assert_eq!(icmp_repr, ECHOV4_REPR.into());
- Err(())
- }),
- Err(())
- );
- // buffer is not taken off of the tx queue due to the error
- assert!(!socket.can_send());
- assert_eq!(
- socket.dispatch(&mut cx, |_, (ip_repr, icmp_repr)| {
- assert_eq!(ip_repr, LOCAL_IPV4_REPR);
- assert_eq!(icmp_repr, ECHOV4_REPR.into());
- Ok::<_, ()>(())
- }),
- Ok(())
- );
- // buffer is taken off of the queue this time
- assert!(socket.can_send());
- }
- #[test]
- fn test_set_hop_limit_v4() {
- let mut s = socket(buffer(0), buffer(1));
- let mut cx = Context::mock();
- let checksum = ChecksumCapabilities::default();
- let mut bytes = [0xff; 24];
- let mut packet = Icmpv4Packet::new_unchecked(&mut bytes);
- ECHOV4_REPR.emit(&mut packet, &checksum);
- s.set_hop_limit(Some(0x2a));
- assert_eq!(
- s.send_slice(&*packet.into_inner(), REMOTE_IPV4.into()),
- Ok(())
- );
- assert_eq!(
- s.dispatch(&mut cx, |_, (ip_repr, _)| {
- assert_eq!(
- ip_repr,
- IpRepr::Ipv4(Ipv4Repr {
- src_addr: LOCAL_IPV4,
- dst_addr: REMOTE_IPV4,
- next_header: IpProtocol::Icmp,
- payload_len: ECHOV4_REPR.buffer_len(),
- hop_limit: 0x2a,
- })
- );
- Ok::<_, ()>(())
- }),
- Ok(())
- );
- }
- #[test]
- fn test_recv_process() {
- let mut socket = socket(buffer(1), buffer(1));
- let mut cx = Context::mock();
- assert_eq!(socket.bind(Endpoint::Ident(0x1234)), Ok(()));
- assert!(!socket.can_recv());
- assert_eq!(socket.recv(), Err(RecvError::Exhausted));
- let checksum = ChecksumCapabilities::default();
- let mut bytes = [0xff; 24];
- let mut packet = Icmpv4Packet::new_unchecked(&mut bytes[..]);
- ECHOV4_REPR.emit(&mut packet, &checksum);
- let data = &*packet.into_inner();
- assert!(socket.accepts(&mut cx, &REMOTE_IPV4_REPR, &ECHOV4_REPR.into()));
- socket.process(&mut cx, &REMOTE_IPV4_REPR, &ECHOV4_REPR.into());
- assert!(socket.can_recv());
- assert!(socket.accepts(&mut cx, &REMOTE_IPV4_REPR, &ECHOV4_REPR.into()));
- socket.process(&mut cx, &REMOTE_IPV4_REPR, &ECHOV4_REPR.into());
- assert_eq!(socket.recv(), Ok((data, REMOTE_IPV4.into())));
- assert!(!socket.can_recv());
- }
- #[test]
- fn test_accept_bad_id() {
- let mut socket = socket(buffer(1), buffer(1));
- let mut cx = Context::mock();
- assert_eq!(socket.bind(Endpoint::Ident(0x1234)), Ok(()));
- let checksum = ChecksumCapabilities::default();
- let mut bytes = [0xff; 20];
- let mut packet = Icmpv4Packet::new_unchecked(&mut bytes);
- let icmp_repr = Icmpv4Repr::EchoRequest {
- ident: 0x4321,
- seq_no: 0x5678,
- data: &[0xff; 16],
- };
- icmp_repr.emit(&mut packet, &checksum);
- // Ensure that a packet with an identifier that isn't the bound
- // ID is not accepted
- assert!(!socket.accepts(&mut cx, &REMOTE_IPV4_REPR, &icmp_repr.into()));
- }
- #[test]
- fn test_accepts_udp() {
- let mut socket = socket(buffer(1), buffer(1));
- let mut cx = Context::mock();
- assert_eq!(socket.bind(Endpoint::Udp(LOCAL_END_V4.into())), Ok(()));
- let checksum = ChecksumCapabilities::default();
- let mut bytes = [0xff; 18];
- let mut packet = UdpPacket::new_unchecked(&mut bytes);
- UDP_REPR.emit(
- &mut packet,
- &REMOTE_IPV4.into(),
- &LOCAL_IPV4.into(),
- UDP_PAYLOAD.len(),
- |buf| buf.copy_from_slice(UDP_PAYLOAD),
- &checksum,
- );
- let data = &*packet.into_inner();
- let icmp_repr = Icmpv4Repr::DstUnreachable {
- reason: Icmpv4DstUnreachable::PortUnreachable,
- header: Ipv4Repr {
- src_addr: LOCAL_IPV4,
- dst_addr: REMOTE_IPV4,
- next_header: IpProtocol::Icmp,
- payload_len: 12,
- hop_limit: 0x40,
- },
- data: data,
- };
- let ip_repr = IpRepr::Ipv4(Ipv4Repr {
- src_addr: REMOTE_IPV4,
- dst_addr: LOCAL_IPV4,
- next_header: IpProtocol::Icmp,
- payload_len: icmp_repr.buffer_len(),
- hop_limit: 0x40,
- });
- assert!(!socket.can_recv());
- // Ensure we can accept ICMP error response to the bound
- // UDP port
- assert!(socket.accepts(&mut cx, &ip_repr, &icmp_repr.into()));
- socket.process(&mut cx, &ip_repr, &icmp_repr.into());
- assert!(socket.can_recv());
- let mut bytes = [0x00; 46];
- let mut packet = Icmpv4Packet::new_unchecked(&mut bytes[..]);
- icmp_repr.emit(&mut packet, &checksum);
- assert_eq!(
- socket.recv(),
- Ok((&*packet.into_inner(), REMOTE_IPV4.into()))
- );
- assert!(!socket.can_recv());
- }
- }
- #[cfg(all(test, feature = "proto-ipv6"))]
- mod test_ipv6 {
- use super::tests_common::*;
- use crate::wire::{Icmpv6DstUnreachable, IpEndpoint, Ipv6Address};
- const REMOTE_IPV6: Ipv6Address =
- Ipv6Address([0xfe, 0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 2]);
- const LOCAL_IPV6: Ipv6Address =
- Ipv6Address([0xfe, 0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1]);
- const LOCAL_END_V6: IpEndpoint = IpEndpoint {
- addr: IpAddress::Ipv6(LOCAL_IPV6),
- port: LOCAL_PORT,
- };
- static ECHOV6_REPR: Icmpv6Repr = Icmpv6Repr::EchoRequest {
- ident: 0x1234,
- seq_no: 0x5678,
- data: &[0xff; 16],
- };
- static LOCAL_IPV6_REPR: IpRepr = IpRepr::Ipv6(Ipv6Repr {
- src_addr: LOCAL_IPV6,
- dst_addr: REMOTE_IPV6,
- next_header: IpProtocol::Icmpv6,
- payload_len: 24,
- hop_limit: 0x40,
- });
- static REMOTE_IPV6_REPR: IpRepr = IpRepr::Ipv6(Ipv6Repr {
- src_addr: REMOTE_IPV6,
- dst_addr: LOCAL_IPV6,
- next_header: IpProtocol::Icmpv6,
- payload_len: 24,
- hop_limit: 0x40,
- });
- #[test]
- fn test_send_unaddressable() {
- let mut socket = socket(buffer(0), buffer(1));
- assert_eq!(
- socket.send_slice(b"abcdef", IpAddress::Ipv6(Ipv6Address::default())),
- Err(SendError::Unaddressable)
- );
- assert_eq!(socket.send_slice(b"abcdef", REMOTE_IPV6.into()), Ok(()));
- }
- #[test]
- fn test_send_dispatch() {
- let mut socket = socket(buffer(0), buffer(1));
- let mut cx = Context::mock();
- let checksum = ChecksumCapabilities::default();
- assert_eq!(
- socket.dispatch(&mut cx, |_, _| unreachable!()),
- Ok::<_, ()>(())
- );
- // This buffer is too long
- assert_eq!(
- socket.send_slice(&[0xff; 67], REMOTE_IPV6.into()),
- Err(SendError::BufferFull)
- );
- assert!(socket.can_send());
- let mut bytes = vec![0xff; 24];
- let mut packet = Icmpv6Packet::new_unchecked(&mut bytes);
- ECHOV6_REPR.emit(
- &LOCAL_IPV6.into(),
- &REMOTE_IPV6.into(),
- &mut packet,
- &checksum,
- );
- assert_eq!(
- socket.send_slice(&*packet.into_inner(), REMOTE_IPV6.into()),
- Ok(())
- );
- assert_eq!(
- socket.send_slice(b"123456", REMOTE_IPV6.into()),
- Err(SendError::BufferFull)
- );
- assert!(!socket.can_send());
- assert_eq!(
- socket.dispatch(&mut cx, |_, (ip_repr, icmp_repr)| {
- assert_eq!(ip_repr, LOCAL_IPV6_REPR);
- assert_eq!(icmp_repr, ECHOV6_REPR.into());
- Err(())
- }),
- Err(())
- );
- // buffer is not taken off of the tx queue due to the error
- assert!(!socket.can_send());
- assert_eq!(
- socket.dispatch(&mut cx, |_, (ip_repr, icmp_repr)| {
- assert_eq!(ip_repr, LOCAL_IPV6_REPR);
- assert_eq!(icmp_repr, ECHOV6_REPR.into());
- Ok::<_, ()>(())
- }),
- Ok(())
- );
- // buffer is taken off of the queue this time
- assert!(socket.can_send());
- }
- #[test]
- fn test_set_hop_limit() {
- let mut s = socket(buffer(0), buffer(1));
- let mut cx = Context::mock();
- let checksum = ChecksumCapabilities::default();
- let mut bytes = vec![0xff; 24];
- let mut packet = Icmpv6Packet::new_unchecked(&mut bytes);
- ECHOV6_REPR.emit(
- &LOCAL_IPV6.into(),
- &REMOTE_IPV6.into(),
- &mut packet,
- &checksum,
- );
- s.set_hop_limit(Some(0x2a));
- assert_eq!(
- s.send_slice(&*packet.into_inner(), REMOTE_IPV6.into()),
- Ok(())
- );
- assert_eq!(
- s.dispatch(&mut cx, |_, (ip_repr, _)| {
- assert_eq!(
- ip_repr,
- IpRepr::Ipv6(Ipv6Repr {
- src_addr: LOCAL_IPV6,
- dst_addr: REMOTE_IPV6,
- next_header: IpProtocol::Icmpv6,
- payload_len: ECHOV6_REPR.buffer_len(),
- hop_limit: 0x2a,
- })
- );
- Ok::<_, ()>(())
- }),
- Ok(())
- );
- }
- #[test]
- fn test_recv_process() {
- let mut socket = socket(buffer(1), buffer(1));
- let mut cx = Context::mock();
- assert_eq!(socket.bind(Endpoint::Ident(0x1234)), Ok(()));
- assert!(!socket.can_recv());
- assert_eq!(socket.recv(), Err(RecvError::Exhausted));
- let checksum = ChecksumCapabilities::default();
- let mut bytes = [0xff; 24];
- let mut packet = Icmpv6Packet::new_unchecked(&mut bytes[..]);
- ECHOV6_REPR.emit(
- &LOCAL_IPV6.into(),
- &REMOTE_IPV6.into(),
- &mut packet,
- &checksum,
- );
- let data = &*packet.into_inner();
- assert!(socket.accepts(&mut cx, &REMOTE_IPV6_REPR, &ECHOV6_REPR.into()));
- socket.process(&mut cx, &REMOTE_IPV6_REPR, &ECHOV6_REPR.into());
- assert!(socket.can_recv());
- assert!(socket.accepts(&mut cx, &REMOTE_IPV6_REPR, &ECHOV6_REPR.into()));
- socket.process(&mut cx, &REMOTE_IPV6_REPR, &ECHOV6_REPR.into());
- assert_eq!(socket.recv(), Ok((data, REMOTE_IPV6.into())));
- assert!(!socket.can_recv());
- }
- #[test]
- fn test_accept_bad_id() {
- let mut socket = socket(buffer(1), buffer(1));
- let mut cx = Context::mock();
- assert_eq!(socket.bind(Endpoint::Ident(0x1234)), Ok(()));
- let checksum = ChecksumCapabilities::default();
- let mut bytes = [0xff; 20];
- let mut packet = Icmpv6Packet::new_unchecked(&mut bytes);
- let icmp_repr = Icmpv6Repr::EchoRequest {
- ident: 0x4321,
- seq_no: 0x5678,
- data: &[0xff; 16],
- };
- icmp_repr.emit(
- &LOCAL_IPV6.into(),
- &REMOTE_IPV6.into(),
- &mut packet,
- &checksum,
- );
- // Ensure that a packet with an identifier that isn't the bound
- // ID is not accepted
- assert!(!socket.accepts(&mut cx, &REMOTE_IPV6_REPR, &icmp_repr.into()));
- }
- #[test]
- fn test_accepts_udp() {
- let mut socket = socket(buffer(1), buffer(1));
- let mut cx = Context::mock();
- assert_eq!(socket.bind(Endpoint::Udp(LOCAL_END_V6.into())), Ok(()));
- let checksum = ChecksumCapabilities::default();
- let mut bytes = [0xff; 18];
- let mut packet = UdpPacket::new_unchecked(&mut bytes);
- UDP_REPR.emit(
- &mut packet,
- &REMOTE_IPV6.into(),
- &LOCAL_IPV6.into(),
- UDP_PAYLOAD.len(),
- |buf| buf.copy_from_slice(UDP_PAYLOAD),
- &checksum,
- );
- let data = &*packet.into_inner();
- let icmp_repr = Icmpv6Repr::DstUnreachable {
- reason: Icmpv6DstUnreachable::PortUnreachable,
- header: Ipv6Repr {
- src_addr: LOCAL_IPV6,
- dst_addr: REMOTE_IPV6,
- next_header: IpProtocol::Icmpv6,
- payload_len: 12,
- hop_limit: 0x40,
- },
- data: data,
- };
- let ip_repr = IpRepr::Ipv6(Ipv6Repr {
- src_addr: REMOTE_IPV6,
- dst_addr: LOCAL_IPV6,
- next_header: IpProtocol::Icmpv6,
- payload_len: icmp_repr.buffer_len(),
- hop_limit: 0x40,
- });
- assert!(!socket.can_recv());
- // Ensure we can accept ICMP error response to the bound
- // UDP port
- assert!(socket.accepts(&mut cx, &ip_repr, &icmp_repr.into()));
- socket.process(&mut cx, &ip_repr, &icmp_repr.into());
- assert!(socket.can_recv());
- let mut bytes = [0x00; 66];
- let mut packet = Icmpv6Packet::new_unchecked(&mut bytes[..]);
- icmp_repr.emit(
- &LOCAL_IPV6.into(),
- &REMOTE_IPV6.into(),
- &mut packet,
- &checksum,
- );
- assert_eq!(
- socket.recv(),
- Ok((&*packet.into_inner(), REMOTE_IPV6.into()))
- );
- assert!(!socket.can_recv());
- }
- }
|