icmpv4.rs 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624
  1. use core::{cmp, fmt};
  2. use byteorder::{ByteOrder, NetworkEndian};
  3. use crate::{Error, Result};
  4. use crate::phy::ChecksumCapabilities;
  5. use crate::wire::ip::checksum;
  6. use crate::wire::{Ipv4Packet, Ipv4Repr};
  7. enum_with_unknown! {
  8. /// Internet protocol control message type.
  9. pub doc enum Message(u8) {
  10. /// Echo reply
  11. EchoReply = 0,
  12. /// Destination unreachable
  13. DstUnreachable = 3,
  14. /// Message redirect
  15. Redirect = 5,
  16. /// Echo request
  17. EchoRequest = 8,
  18. /// Router advertisement
  19. RouterAdvert = 9,
  20. /// Router solicitation
  21. RouterSolicit = 10,
  22. /// Time exceeded
  23. TimeExceeded = 11,
  24. /// Parameter problem
  25. ParamProblem = 12,
  26. /// Timestamp
  27. Timestamp = 13,
  28. /// Timestamp reply
  29. TimestampReply = 14
  30. }
  31. }
  32. impl fmt::Display for Message {
  33. fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
  34. match *self {
  35. Message::EchoReply => write!(f, "echo reply"),
  36. Message::DstUnreachable => write!(f, "destination unreachable"),
  37. Message::Redirect => write!(f, "message redirect"),
  38. Message::EchoRequest => write!(f, "echo request"),
  39. Message::RouterAdvert => write!(f, "router advertisement"),
  40. Message::RouterSolicit => write!(f, "router solicitation"),
  41. Message::TimeExceeded => write!(f, "time exceeded"),
  42. Message::ParamProblem => write!(f, "parameter problem"),
  43. Message::Timestamp => write!(f, "timestamp"),
  44. Message::TimestampReply => write!(f, "timestamp reply"),
  45. Message::Unknown(id) => write!(f, "{}", id)
  46. }
  47. }
  48. }
  49. enum_with_unknown! {
  50. /// Internet protocol control message subtype for type "Destination Unreachable".
  51. pub doc enum DstUnreachable(u8) {
  52. /// Destination network unreachable
  53. NetUnreachable = 0,
  54. /// Destination host unreachable
  55. HostUnreachable = 1,
  56. /// Destination protocol unreachable
  57. ProtoUnreachable = 2,
  58. /// Destination port unreachable
  59. PortUnreachable = 3,
  60. /// Fragmentation required, and DF flag set
  61. FragRequired = 4,
  62. /// Source route failed
  63. SrcRouteFailed = 5,
  64. /// Destination network unknown
  65. DstNetUnknown = 6,
  66. /// Destination host unknown
  67. DstHostUnknown = 7,
  68. /// Source host isolated
  69. SrcHostIsolated = 8,
  70. /// Network administratively prohibited
  71. NetProhibited = 9,
  72. /// Host administratively prohibited
  73. HostProhibited = 10,
  74. /// Network unreachable for ToS
  75. NetUnreachToS = 11,
  76. /// Host unreachable for ToS
  77. HostUnreachToS = 12,
  78. /// Communication administratively prohibited
  79. CommProhibited = 13,
  80. /// Host precedence violation
  81. HostPrecedViol = 14,
  82. /// Precedence cutoff in effect
  83. PrecedCutoff = 15
  84. }
  85. }
  86. impl fmt::Display for DstUnreachable {
  87. fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
  88. match *self {
  89. DstUnreachable::NetUnreachable =>
  90. write!(f, "destination network unreachable"),
  91. DstUnreachable::HostUnreachable =>
  92. write!(f, "destination host unreachable"),
  93. DstUnreachable::ProtoUnreachable =>
  94. write!(f, "destination protocol unreachable"),
  95. DstUnreachable::PortUnreachable =>
  96. write!(f, "destination port unreachable"),
  97. DstUnreachable::FragRequired =>
  98. write!(f, "fragmentation required, and DF flag set"),
  99. DstUnreachable::SrcRouteFailed =>
  100. write!(f, "source route failed"),
  101. DstUnreachable::DstNetUnknown =>
  102. write!(f, "destination network unknown"),
  103. DstUnreachable::DstHostUnknown =>
  104. write!(f, "destination host unknown"),
  105. DstUnreachable::SrcHostIsolated =>
  106. write!(f, "source host isolated"),
  107. DstUnreachable::NetProhibited =>
  108. write!(f, "network administratively prohibited"),
  109. DstUnreachable::HostProhibited =>
  110. write!(f, "host administratively prohibited"),
  111. DstUnreachable::NetUnreachToS =>
  112. write!(f, "network unreachable for ToS"),
  113. DstUnreachable::HostUnreachToS =>
  114. write!(f, "host unreachable for ToS"),
  115. DstUnreachable::CommProhibited =>
  116. write!(f, "communication administratively prohibited"),
  117. DstUnreachable::HostPrecedViol =>
  118. write!(f, "host precedence violation"),
  119. DstUnreachable::PrecedCutoff =>
  120. write!(f, "precedence cutoff in effect"),
  121. DstUnreachable::Unknown(id) =>
  122. write!(f, "{}", id)
  123. }
  124. }
  125. }
  126. enum_with_unknown! {
  127. /// Internet protocol control message subtype for type "Redirect Message".
  128. pub doc enum Redirect(u8) {
  129. /// Redirect Datagram for the Network
  130. Net = 0,
  131. /// Redirect Datagram for the Host
  132. Host = 1,
  133. /// Redirect Datagram for the ToS & network
  134. NetToS = 2,
  135. /// Redirect Datagram for the ToS & host
  136. HostToS = 3
  137. }
  138. }
  139. enum_with_unknown! {
  140. /// Internet protocol control message subtype for type "Time Exceeded".
  141. pub doc enum TimeExceeded(u8) {
  142. /// TTL expired in transit
  143. TtlExpired = 0,
  144. /// Fragment reassembly time exceeded
  145. FragExpired = 1
  146. }
  147. }
  148. enum_with_unknown! {
  149. /// Internet protocol control message subtype for type "Parameter Problem".
  150. pub doc enum ParamProblem(u8) {
  151. /// Pointer indicates the error
  152. AtPointer = 0,
  153. /// Missing a required option
  154. MissingOption = 1,
  155. /// Bad length
  156. BadLength = 2
  157. }
  158. }
  159. /// A read/write wrapper around an Internet Control Message Protocol version 4 packet buffer.
  160. #[derive(Debug, PartialEq, Clone)]
  161. pub struct Packet<T: AsRef<[u8]>> {
  162. buffer: T
  163. }
  164. mod field {
  165. use crate::wire::field::*;
  166. pub const TYPE: usize = 0;
  167. pub const CODE: usize = 1;
  168. pub const CHECKSUM: Field = 2..4;
  169. pub const UNUSED: Field = 4..8;
  170. pub const ECHO_IDENT: Field = 4..6;
  171. pub const ECHO_SEQNO: Field = 6..8;
  172. pub const HEADER_END: usize = 8;
  173. }
  174. impl<T: AsRef<[u8]>> Packet<T> {
  175. /// Imbue a raw octet buffer with ICMPv4 packet structure.
  176. pub fn new_unchecked(buffer: T) -> Packet<T> {
  177. Packet { buffer }
  178. }
  179. /// Shorthand for a combination of [new_unchecked] and [check_len].
  180. ///
  181. /// [new_unchecked]: #method.new_unchecked
  182. /// [check_len]: #method.check_len
  183. pub fn new_checked(buffer: T) -> Result<Packet<T>> {
  184. let packet = Self::new_unchecked(buffer);
  185. packet.check_len()?;
  186. Ok(packet)
  187. }
  188. /// Ensure that no accessor method will panic if called.
  189. /// Returns `Err(Error::Truncated)` if the buffer is too short.
  190. ///
  191. /// The result of this check is invalidated by calling [set_header_len].
  192. ///
  193. /// [set_header_len]: #method.set_header_len
  194. pub fn check_len(&self) -> Result<()> {
  195. let len = self.buffer.as_ref().len();
  196. if len < field::HEADER_END {
  197. Err(Error::Truncated)
  198. } else {
  199. Ok(())
  200. }
  201. }
  202. /// Consume the packet, returning the underlying buffer.
  203. pub fn into_inner(self) -> T {
  204. self.buffer
  205. }
  206. /// Return the message type field.
  207. #[inline]
  208. pub fn msg_type(&self) -> Message {
  209. let data = self.buffer.as_ref();
  210. Message::from(data[field::TYPE])
  211. }
  212. /// Return the message code field.
  213. #[inline]
  214. pub fn msg_code(&self) -> u8 {
  215. let data = self.buffer.as_ref();
  216. data[field::CODE]
  217. }
  218. /// Return the checksum field.
  219. #[inline]
  220. pub fn checksum(&self) -> u16 {
  221. let data = self.buffer.as_ref();
  222. NetworkEndian::read_u16(&data[field::CHECKSUM])
  223. }
  224. /// Return the identifier field (for echo request and reply packets).
  225. ///
  226. /// # Panics
  227. /// This function may panic if this packet is not an echo request or reply packet.
  228. #[inline]
  229. pub fn echo_ident(&self) -> u16 {
  230. let data = self.buffer.as_ref();
  231. NetworkEndian::read_u16(&data[field::ECHO_IDENT])
  232. }
  233. /// Return the sequence number field (for echo request and reply packets).
  234. ///
  235. /// # Panics
  236. /// This function may panic if this packet is not an echo request or reply packet.
  237. #[inline]
  238. pub fn echo_seq_no(&self) -> u16 {
  239. let data = self.buffer.as_ref();
  240. NetworkEndian::read_u16(&data[field::ECHO_SEQNO])
  241. }
  242. /// Return the header length.
  243. /// The result depends on the value of the message type field.
  244. pub fn header_len(&self) -> usize {
  245. match self.msg_type() {
  246. Message::EchoRequest => field::ECHO_SEQNO.end,
  247. Message::EchoReply => field::ECHO_SEQNO.end,
  248. Message::DstUnreachable => field::UNUSED.end,
  249. _ => field::UNUSED.end // make a conservative assumption
  250. }
  251. }
  252. /// Validate the header checksum.
  253. ///
  254. /// # Fuzzing
  255. /// This function always returns `true` when fuzzing.
  256. pub fn verify_checksum(&self) -> bool {
  257. if cfg!(fuzzing) { return true }
  258. let data = self.buffer.as_ref();
  259. checksum::data(data) == !0
  260. }
  261. }
  262. impl<'a, T: AsRef<[u8]> + ?Sized> Packet<&'a T> {
  263. /// Return a pointer to the type-specific data.
  264. #[inline]
  265. pub fn data(&self) -> &'a [u8] {
  266. let data = self.buffer.as_ref();
  267. &data[self.header_len()..]
  268. }
  269. }
  270. impl<T: AsRef<[u8]> + AsMut<[u8]>> Packet<T> {
  271. /// Set the message type field.
  272. #[inline]
  273. pub fn set_msg_type(&mut self, value: Message) {
  274. let data = self.buffer.as_mut();
  275. data[field::TYPE] = value.into()
  276. }
  277. /// Set the message code field.
  278. #[inline]
  279. pub fn set_msg_code(&mut self, value: u8) {
  280. let data = self.buffer.as_mut();
  281. data[field::CODE] = value
  282. }
  283. /// Set the checksum field.
  284. #[inline]
  285. pub fn set_checksum(&mut self, value: u16) {
  286. let data = self.buffer.as_mut();
  287. NetworkEndian::write_u16(&mut data[field::CHECKSUM], value)
  288. }
  289. /// Set the identifier field (for echo request and reply packets).
  290. ///
  291. /// # Panics
  292. /// This function may panic if this packet is not an echo request or reply packet.
  293. #[inline]
  294. pub fn set_echo_ident(&mut self, value: u16) {
  295. let data = self.buffer.as_mut();
  296. NetworkEndian::write_u16(&mut data[field::ECHO_IDENT], value)
  297. }
  298. /// Set the sequence number field (for echo request and reply packets).
  299. ///
  300. /// # Panics
  301. /// This function may panic if this packet is not an echo request or reply packet.
  302. #[inline]
  303. pub fn set_echo_seq_no(&mut self, value: u16) {
  304. let data = self.buffer.as_mut();
  305. NetworkEndian::write_u16(&mut data[field::ECHO_SEQNO], value)
  306. }
  307. /// Compute and fill in the header checksum.
  308. pub fn fill_checksum(&mut self) {
  309. self.set_checksum(0);
  310. let checksum = {
  311. let data = self.buffer.as_ref();
  312. !checksum::data(data)
  313. };
  314. self.set_checksum(checksum)
  315. }
  316. }
  317. impl<'a, T: AsRef<[u8]> + AsMut<[u8]> + ?Sized> Packet<&'a mut T> {
  318. /// Return a mutable pointer to the type-specific data.
  319. #[inline]
  320. pub fn data_mut(&mut self) -> &mut [u8] {
  321. let range = self.header_len()..;
  322. let data = self.buffer.as_mut();
  323. &mut data[range]
  324. }
  325. }
  326. impl<T: AsRef<[u8]>> AsRef<[u8]> for Packet<T> {
  327. fn as_ref(&self) -> &[u8] {
  328. self.buffer.as_ref()
  329. }
  330. }
  331. /// A high-level representation of an Internet Control Message Protocol version 4 packet header.
  332. #[derive(Debug, PartialEq, Eq, Clone, Copy)]
  333. pub enum Repr<'a> {
  334. EchoRequest {
  335. ident: u16,
  336. seq_no: u16,
  337. data: &'a [u8]
  338. },
  339. EchoReply {
  340. ident: u16,
  341. seq_no: u16,
  342. data: &'a [u8]
  343. },
  344. DstUnreachable {
  345. reason: DstUnreachable,
  346. header: Ipv4Repr,
  347. data: &'a [u8]
  348. },
  349. #[doc(hidden)]
  350. __Nonexhaustive
  351. }
  352. impl<'a> Repr<'a> {
  353. /// Parse an Internet Control Message Protocol version 4 packet and return
  354. /// a high-level representation.
  355. pub fn parse<T>(packet: &Packet<&'a T>, checksum_caps: &ChecksumCapabilities)
  356. -> Result<Repr<'a>>
  357. where T: AsRef<[u8]> + ?Sized {
  358. // Valid checksum is expected.
  359. if checksum_caps.icmpv4.rx() && !packet.verify_checksum() { return Err(Error::Checksum) }
  360. match (packet.msg_type(), packet.msg_code()) {
  361. (Message::EchoRequest, 0) => {
  362. Ok(Repr::EchoRequest {
  363. ident: packet.echo_ident(),
  364. seq_no: packet.echo_seq_no(),
  365. data: packet.data()
  366. })
  367. },
  368. (Message::EchoReply, 0) => {
  369. Ok(Repr::EchoReply {
  370. ident: packet.echo_ident(),
  371. seq_no: packet.echo_seq_no(),
  372. data: packet.data()
  373. })
  374. },
  375. (Message::DstUnreachable, code) => {
  376. let ip_packet = Ipv4Packet::new_checked(packet.data())?;
  377. let payload = &packet.data()[ip_packet.header_len() as usize..];
  378. // RFC 792 requires exactly eight bytes to be returned.
  379. // We allow more, since there isn't a reason not to, but require at least eight.
  380. if payload.len() < 8 { return Err(Error::Truncated) }
  381. Ok(Repr::DstUnreachable {
  382. reason: DstUnreachable::from(code),
  383. header: Ipv4Repr {
  384. src_addr: ip_packet.src_addr(),
  385. dst_addr: ip_packet.dst_addr(),
  386. protocol: ip_packet.protocol(),
  387. payload_len: payload.len(),
  388. hop_limit: ip_packet.hop_limit()
  389. },
  390. data: payload
  391. })
  392. }
  393. _ => Err(Error::Unrecognized)
  394. }
  395. }
  396. /// Return the length of a packet that will be emitted from this high-level representation.
  397. pub fn buffer_len(&self) -> usize {
  398. match self {
  399. &Repr::EchoRequest { data, .. } |
  400. &Repr::EchoReply { data, .. } => {
  401. field::ECHO_SEQNO.end + data.len()
  402. },
  403. &Repr::DstUnreachable { header, data, .. } => {
  404. field::UNUSED.end + header.buffer_len() + data.len()
  405. }
  406. &Repr::__Nonexhaustive => unreachable!()
  407. }
  408. }
  409. /// Emit a high-level representation into an Internet Control Message Protocol version 4
  410. /// packet.
  411. pub fn emit<T>(&self, packet: &mut Packet<&mut T>, checksum_caps: &ChecksumCapabilities)
  412. where T: AsRef<[u8]> + AsMut<[u8]> + ?Sized {
  413. packet.set_msg_code(0);
  414. match *self {
  415. Repr::EchoRequest { ident, seq_no, data } => {
  416. packet.set_msg_type(Message::EchoRequest);
  417. packet.set_msg_code(0);
  418. packet.set_echo_ident(ident);
  419. packet.set_echo_seq_no(seq_no);
  420. let data_len = cmp::min(packet.data_mut().len(), data.len());
  421. packet.data_mut()[..data_len].copy_from_slice(&data[..data_len])
  422. },
  423. Repr::EchoReply { ident, seq_no, data } => {
  424. packet.set_msg_type(Message::EchoReply);
  425. packet.set_msg_code(0);
  426. packet.set_echo_ident(ident);
  427. packet.set_echo_seq_no(seq_no);
  428. let data_len = cmp::min(packet.data_mut().len(), data.len());
  429. packet.data_mut()[..data_len].copy_from_slice(&data[..data_len])
  430. },
  431. Repr::DstUnreachable { reason, header, data } => {
  432. packet.set_msg_type(Message::DstUnreachable);
  433. packet.set_msg_code(reason.into());
  434. let mut ip_packet = Ipv4Packet::new_unchecked(packet.data_mut());
  435. header.emit(&mut ip_packet, checksum_caps);
  436. let payload = &mut ip_packet.into_inner()[header.buffer_len()..];
  437. payload.copy_from_slice(&data[..])
  438. }
  439. Repr::__Nonexhaustive => unreachable!()
  440. }
  441. if checksum_caps.icmpv4.tx() {
  442. packet.fill_checksum()
  443. } else {
  444. // make sure we get a consistently zeroed checksum,
  445. // since implementations might rely on it
  446. packet.set_checksum(0);
  447. }
  448. }
  449. }
  450. impl<'a, T: AsRef<[u8]> + ?Sized> fmt::Display for Packet<&'a T> {
  451. fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
  452. match Repr::parse(self, &ChecksumCapabilities::default()) {
  453. Ok(repr) => write!(f, "{}", repr),
  454. Err(err) => {
  455. write!(f, "ICMPv4 ({})", err)?;
  456. write!(f, " type={:?}", self.msg_type())?;
  457. match self.msg_type() {
  458. Message::DstUnreachable =>
  459. write!(f, " code={:?}", DstUnreachable::from(self.msg_code())),
  460. _ => write!(f, " code={}", self.msg_code())
  461. }
  462. }
  463. }
  464. }
  465. }
  466. impl<'a> fmt::Display for Repr<'a> {
  467. fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
  468. match *self {
  469. Repr::EchoRequest { ident, seq_no, data } =>
  470. write!(f, "ICMPv4 echo request id={} seq={} len={}",
  471. ident, seq_no, data.len()),
  472. Repr::EchoReply { ident, seq_no, data } =>
  473. write!(f, "ICMPv4 echo reply id={} seq={} len={}",
  474. ident, seq_no, data.len()),
  475. Repr::DstUnreachable { reason, .. } =>
  476. write!(f, "ICMPv4 destination unreachable ({})",
  477. reason),
  478. Repr::__Nonexhaustive => unreachable!()
  479. }
  480. }
  481. }
  482. use crate::wire::pretty_print::{PrettyPrint, PrettyIndent};
  483. impl<T: AsRef<[u8]>> PrettyPrint for Packet<T> {
  484. fn pretty_print(buffer: &dyn AsRef<[u8]>, f: &mut fmt::Formatter,
  485. indent: &mut PrettyIndent) -> fmt::Result {
  486. let packet = match Packet::new_checked(buffer) {
  487. Err(err) => return write!(f, "{}({})", indent, err),
  488. Ok(packet) => packet
  489. };
  490. write!(f, "{}{}", indent, packet)?;
  491. match packet.msg_type() {
  492. Message::DstUnreachable => {
  493. indent.increase(f)?;
  494. super::Ipv4Packet::<&[u8]>::pretty_print(&packet.data(), f, indent)
  495. }
  496. _ => Ok(())
  497. }
  498. }
  499. }
  500. #[cfg(test)]
  501. mod test {
  502. use super::*;
  503. static ECHO_PACKET_BYTES: [u8; 12] =
  504. [0x08, 0x00, 0x8e, 0xfe,
  505. 0x12, 0x34, 0xab, 0xcd,
  506. 0xaa, 0x00, 0x00, 0xff];
  507. static ECHO_DATA_BYTES: [u8; 4] =
  508. [0xaa, 0x00, 0x00, 0xff];
  509. #[test]
  510. fn test_echo_deconstruct() {
  511. let packet = Packet::new_unchecked(&ECHO_PACKET_BYTES[..]);
  512. assert_eq!(packet.msg_type(), Message::EchoRequest);
  513. assert_eq!(packet.msg_code(), 0);
  514. assert_eq!(packet.checksum(), 0x8efe);
  515. assert_eq!(packet.echo_ident(), 0x1234);
  516. assert_eq!(packet.echo_seq_no(), 0xabcd);
  517. assert_eq!(packet.data(), &ECHO_DATA_BYTES[..]);
  518. assert_eq!(packet.verify_checksum(), true);
  519. }
  520. #[test]
  521. fn test_echo_construct() {
  522. let mut bytes = vec![0xa5; 12];
  523. let mut packet = Packet::new_unchecked(&mut bytes);
  524. packet.set_msg_type(Message::EchoRequest);
  525. packet.set_msg_code(0);
  526. packet.set_echo_ident(0x1234);
  527. packet.set_echo_seq_no(0xabcd);
  528. packet.data_mut().copy_from_slice(&ECHO_DATA_BYTES[..]);
  529. packet.fill_checksum();
  530. assert_eq!(&packet.into_inner()[..], &ECHO_PACKET_BYTES[..]);
  531. }
  532. fn echo_packet_repr() -> Repr<'static> {
  533. Repr::EchoRequest {
  534. ident: 0x1234,
  535. seq_no: 0xabcd,
  536. data: &ECHO_DATA_BYTES
  537. }
  538. }
  539. #[test]
  540. fn test_echo_parse() {
  541. let packet = Packet::new_unchecked(&ECHO_PACKET_BYTES[..]);
  542. let repr = Repr::parse(&packet, &ChecksumCapabilities::default()).unwrap();
  543. assert_eq!(repr, echo_packet_repr());
  544. }
  545. #[test]
  546. fn test_echo_emit() {
  547. let repr = echo_packet_repr();
  548. let mut bytes = vec![0xa5; repr.buffer_len()];
  549. let mut packet = Packet::new_unchecked(&mut bytes);
  550. repr.emit(&mut packet, &ChecksumCapabilities::default());
  551. assert_eq!(&packet.into_inner()[..], &ECHO_PACKET_BYTES[..]);
  552. }
  553. #[test]
  554. fn test_check_len() {
  555. let bytes = [0x0b, 0x00, 0x00, 0x00,
  556. 0x00, 0x00, 0x00, 0x00];
  557. assert_eq!(Packet::new_checked(&[]), Err(Error::Truncated));
  558. assert_eq!(Packet::new_checked(&bytes[..4]), Err(Error::Truncated));
  559. assert!(Packet::new_checked(&bytes[..]).is_ok());
  560. }
  561. }