ipv4.rs 37 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179
  1. use byteorder::{ByteOrder, NetworkEndian};
  2. use core::fmt;
  3. use super::{Error, Result};
  4. use crate::phy::ChecksumCapabilities;
  5. use crate::wire::ip::{checksum, pretty_print_ip_payload};
  6. pub use super::IpProtocol as Protocol;
  7. /// Minimum MTU required of all links supporting IPv4. See [RFC 791 § 3.1].
  8. ///
  9. /// [RFC 791 § 3.1]: https://tools.ietf.org/html/rfc791#section-3.1
  10. // RFC 791 states the following:
  11. //
  12. // > Every internet module must be able to forward a datagram of 68
  13. // > octets without further fragmentation... Every internet destination
  14. // > must be able to receive a datagram of 576 octets either in one piece
  15. // > or in fragments to be reassembled.
  16. //
  17. // As a result, we can assume that every host we send packets to can
  18. // accept a packet of the following size.
  19. pub const MIN_MTU: usize = 576;
  20. /// Size of IPv4 adderess in octets.
  21. ///
  22. /// [RFC 8200 § 2]: https://www.rfc-editor.org/rfc/rfc791#section-3.2
  23. pub const ADDR_SIZE: usize = 4;
  24. #[derive(Debug, Eq, PartialEq, Ord, PartialOrd, Clone, Copy)]
  25. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  26. pub struct Key {
  27. id: u16,
  28. src_addr: Address,
  29. dst_addr: Address,
  30. protocol: Protocol,
  31. }
  32. /// A four-octet IPv4 address.
  33. #[derive(Debug, Hash, PartialEq, Eq, PartialOrd, Ord, Clone, Copy, Default)]
  34. pub struct Address(pub [u8; ADDR_SIZE]);
  35. impl Address {
  36. /// An unspecified address.
  37. pub const UNSPECIFIED: Address = Address([0x00; ADDR_SIZE]);
  38. /// The broadcast address.
  39. pub const BROADCAST: Address = Address([0xff; ADDR_SIZE]);
  40. /// All multicast-capable nodes
  41. pub const MULTICAST_ALL_SYSTEMS: Address = Address([224, 0, 0, 1]);
  42. /// All multicast-capable routers
  43. pub const MULTICAST_ALL_ROUTERS: Address = Address([224, 0, 0, 2]);
  44. /// Construct an IPv4 address from parts.
  45. pub const fn new(a0: u8, a1: u8, a2: u8, a3: u8) -> Address {
  46. Address([a0, a1, a2, a3])
  47. }
  48. /// Construct an IPv4 address from a sequence of octets, in big-endian.
  49. ///
  50. /// # Panics
  51. /// The function panics if `data` is not four octets long.
  52. pub fn from_bytes(data: &[u8]) -> Address {
  53. let mut bytes = [0; ADDR_SIZE];
  54. bytes.copy_from_slice(data);
  55. Address(bytes)
  56. }
  57. /// Return an IPv4 address as a sequence of octets, in big-endian.
  58. pub const fn as_bytes(&self) -> &[u8] {
  59. &self.0
  60. }
  61. /// Query whether the address is an unicast address.
  62. pub fn is_unicast(&self) -> bool {
  63. !(self.is_broadcast() || self.is_multicast() || self.is_unspecified())
  64. }
  65. /// Query whether the address is the broadcast address.
  66. pub fn is_broadcast(&self) -> bool {
  67. self.0[0..4] == [255; ADDR_SIZE]
  68. }
  69. /// Query whether the address is a multicast address.
  70. pub const fn is_multicast(&self) -> bool {
  71. self.0[0] & 0xf0 == 224
  72. }
  73. /// Query whether the address falls into the "unspecified" range.
  74. pub const fn is_unspecified(&self) -> bool {
  75. self.0[0] == 0
  76. }
  77. /// Query whether the address falls into the "link-local" range.
  78. pub fn is_link_local(&self) -> bool {
  79. self.0[0..2] == [169, 254]
  80. }
  81. /// Query whether the address falls into the "loopback" range.
  82. pub const fn is_loopback(&self) -> bool {
  83. self.0[0] == 127
  84. }
  85. /// Convert to an `IpAddress`.
  86. ///
  87. /// Same as `.into()`, but works in `const`.
  88. pub const fn into_address(self) -> super::IpAddress {
  89. super::IpAddress::Ipv4(self)
  90. }
  91. }
  92. #[cfg(feature = "std")]
  93. impl From<::std::net::Ipv4Addr> for Address {
  94. fn from(x: ::std::net::Ipv4Addr) -> Address {
  95. Address(x.octets())
  96. }
  97. }
  98. #[cfg(feature = "std")]
  99. impl From<Address> for ::std::net::Ipv4Addr {
  100. fn from(Address(x): Address) -> ::std::net::Ipv4Addr {
  101. x.into()
  102. }
  103. }
  104. impl fmt::Display for Address {
  105. fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
  106. let bytes = self.0;
  107. write!(f, "{}.{}.{}.{}", bytes[0], bytes[1], bytes[2], bytes[3])
  108. }
  109. }
  110. #[cfg(feature = "defmt")]
  111. impl defmt::Format for Address {
  112. fn format(&self, f: defmt::Formatter) {
  113. defmt::write!(
  114. f,
  115. "{=u8}.{=u8}.{=u8}.{=u8}",
  116. self.0[0],
  117. self.0[1],
  118. self.0[2],
  119. self.0[3]
  120. )
  121. }
  122. }
  123. /// A specification of an IPv4 CIDR block, containing an address and a variable-length
  124. /// subnet masking prefix length.
  125. #[derive(Debug, Hash, PartialEq, Eq, PartialOrd, Ord, Clone, Copy, Default)]
  126. pub struct Cidr {
  127. address: Address,
  128. prefix_len: u8,
  129. }
  130. impl Cidr {
  131. /// Create an IPv4 CIDR block from the given address and prefix length.
  132. ///
  133. /// # Panics
  134. /// This function panics if the prefix length is larger than 32.
  135. #[allow(clippy::no_effect)]
  136. pub const fn new(address: Address, prefix_len: u8) -> Cidr {
  137. // Replace with const panic (or assert) when stabilized
  138. // see: https://github.com/rust-lang/rust/issues/51999
  139. ["Prefix length should be <= 32"][(prefix_len > 32) as usize];
  140. Cidr {
  141. address,
  142. prefix_len,
  143. }
  144. }
  145. /// Create an IPv4 CIDR block from the given address and network mask.
  146. pub fn from_netmask(addr: Address, netmask: Address) -> Result<Cidr> {
  147. let netmask = NetworkEndian::read_u32(&netmask.0[..]);
  148. if netmask.leading_zeros() == 0 && netmask.trailing_zeros() == netmask.count_zeros() {
  149. Ok(Cidr {
  150. address: addr,
  151. prefix_len: netmask.count_ones() as u8,
  152. })
  153. } else {
  154. Err(Error)
  155. }
  156. }
  157. /// Return the address of this IPv4 CIDR block.
  158. pub const fn address(&self) -> Address {
  159. self.address
  160. }
  161. /// Return the prefix length of this IPv4 CIDR block.
  162. pub const fn prefix_len(&self) -> u8 {
  163. self.prefix_len
  164. }
  165. /// Return the network mask of this IPv4 CIDR.
  166. pub const fn netmask(&self) -> Address {
  167. if self.prefix_len == 0 {
  168. return Address([0, 0, 0, 0]);
  169. }
  170. let number = 0xffffffffu32 << (32 - self.prefix_len);
  171. let data = [
  172. ((number >> 24) & 0xff) as u8,
  173. ((number >> 16) & 0xff) as u8,
  174. ((number >> 8) & 0xff) as u8,
  175. ((number >> 0) & 0xff) as u8,
  176. ];
  177. Address(data)
  178. }
  179. /// Return the broadcast address of this IPv4 CIDR.
  180. pub fn broadcast(&self) -> Option<Address> {
  181. let network = self.network();
  182. if network.prefix_len == 31 || network.prefix_len == 32 {
  183. return None;
  184. }
  185. let network_number = NetworkEndian::read_u32(&network.address.0[..]);
  186. let number = network_number | 0xffffffffu32 >> network.prefix_len;
  187. let data = [
  188. ((number >> 24) & 0xff) as u8,
  189. ((number >> 16) & 0xff) as u8,
  190. ((number >> 8) & 0xff) as u8,
  191. ((number >> 0) & 0xff) as u8,
  192. ];
  193. Some(Address(data))
  194. }
  195. /// Return the network block of this IPv4 CIDR.
  196. pub const fn network(&self) -> Cidr {
  197. let mask = self.netmask().0;
  198. let network = [
  199. self.address.0[0] & mask[0],
  200. self.address.0[1] & mask[1],
  201. self.address.0[2] & mask[2],
  202. self.address.0[3] & mask[3],
  203. ];
  204. Cidr {
  205. address: Address(network),
  206. prefix_len: self.prefix_len,
  207. }
  208. }
  209. /// Query whether the subnetwork described by this IPv4 CIDR block contains
  210. /// the given address.
  211. pub fn contains_addr(&self, addr: &Address) -> bool {
  212. // right shift by 32 is not legal
  213. if self.prefix_len == 0 {
  214. return true;
  215. }
  216. let shift = 32 - self.prefix_len;
  217. let self_prefix = NetworkEndian::read_u32(self.address.as_bytes()) >> shift;
  218. let addr_prefix = NetworkEndian::read_u32(addr.as_bytes()) >> shift;
  219. self_prefix == addr_prefix
  220. }
  221. /// Query whether the subnetwork described by this IPv4 CIDR block contains
  222. /// the subnetwork described by the given IPv4 CIDR block.
  223. pub fn contains_subnet(&self, subnet: &Cidr) -> bool {
  224. self.prefix_len <= subnet.prefix_len && self.contains_addr(&subnet.address)
  225. }
  226. }
  227. impl fmt::Display for Cidr {
  228. fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
  229. write!(f, "{}/{}", self.address, self.prefix_len)
  230. }
  231. }
  232. #[cfg(feature = "defmt")]
  233. impl defmt::Format for Cidr {
  234. fn format(&self, f: defmt::Formatter) {
  235. defmt::write!(f, "{}/{=u8}", self.address, self.prefix_len);
  236. }
  237. }
  238. /// A read/write wrapper around an Internet Protocol version 4 packet buffer.
  239. #[derive(Debug, PartialEq, Eq, Clone)]
  240. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  241. pub struct Packet<T: AsRef<[u8]>> {
  242. buffer: T,
  243. }
  244. mod field {
  245. use crate::wire::field::*;
  246. pub const VER_IHL: usize = 0;
  247. pub const DSCP_ECN: usize = 1;
  248. pub const LENGTH: Field = 2..4;
  249. pub const IDENT: Field = 4..6;
  250. pub const FLG_OFF: Field = 6..8;
  251. pub const TTL: usize = 8;
  252. pub const PROTOCOL: usize = 9;
  253. pub const CHECKSUM: Field = 10..12;
  254. pub const SRC_ADDR: Field = 12..16;
  255. pub const DST_ADDR: Field = 16..20;
  256. }
  257. pub const HEADER_LEN: usize = field::DST_ADDR.end;
  258. impl<T: AsRef<[u8]>> Packet<T> {
  259. /// Imbue a raw octet buffer with IPv4 packet structure.
  260. pub const fn new_unchecked(buffer: T) -> Packet<T> {
  261. Packet { buffer }
  262. }
  263. /// Shorthand for a combination of [new_unchecked] and [check_len].
  264. ///
  265. /// [new_unchecked]: #method.new_unchecked
  266. /// [check_len]: #method.check_len
  267. pub fn new_checked(buffer: T) -> Result<Packet<T>> {
  268. let packet = Self::new_unchecked(buffer);
  269. packet.check_len()?;
  270. Ok(packet)
  271. }
  272. /// Ensure that no accessor method will panic if called.
  273. /// Returns `Err(Error)` if the buffer is too short.
  274. /// Returns `Err(Error)` if the header length is greater
  275. /// than total length.
  276. ///
  277. /// The result of this check is invalidated by calling [set_header_len]
  278. /// and [set_total_len].
  279. ///
  280. /// [set_header_len]: #method.set_header_len
  281. /// [set_total_len]: #method.set_total_len
  282. #[allow(clippy::if_same_then_else)]
  283. pub fn check_len(&self) -> Result<()> {
  284. let len = self.buffer.as_ref().len();
  285. if len < field::DST_ADDR.end {
  286. Err(Error)
  287. } else if len < self.header_len() as usize {
  288. Err(Error)
  289. } else if self.header_len() as u16 > self.total_len() {
  290. Err(Error)
  291. } else if len < self.total_len() as usize {
  292. Err(Error)
  293. } else {
  294. Ok(())
  295. }
  296. }
  297. /// Consume the packet, returning the underlying buffer.
  298. pub fn into_inner(self) -> T {
  299. self.buffer
  300. }
  301. /// Return the version field.
  302. #[inline]
  303. pub fn version(&self) -> u8 {
  304. let data = self.buffer.as_ref();
  305. data[field::VER_IHL] >> 4
  306. }
  307. /// Return the header length, in octets.
  308. #[inline]
  309. pub fn header_len(&self) -> u8 {
  310. let data = self.buffer.as_ref();
  311. (data[field::VER_IHL] & 0x0f) * 4
  312. }
  313. /// Return the Differential Services Code Point field.
  314. pub fn dscp(&self) -> u8 {
  315. let data = self.buffer.as_ref();
  316. data[field::DSCP_ECN] >> 2
  317. }
  318. /// Return the Explicit Congestion Notification field.
  319. pub fn ecn(&self) -> u8 {
  320. let data = self.buffer.as_ref();
  321. data[field::DSCP_ECN] & 0x03
  322. }
  323. /// Return the total length field.
  324. #[inline]
  325. pub fn total_len(&self) -> u16 {
  326. let data = self.buffer.as_ref();
  327. NetworkEndian::read_u16(&data[field::LENGTH])
  328. }
  329. /// Return the fragment identification field.
  330. #[inline]
  331. pub fn ident(&self) -> u16 {
  332. let data = self.buffer.as_ref();
  333. NetworkEndian::read_u16(&data[field::IDENT])
  334. }
  335. /// Return the "don't fragment" flag.
  336. #[inline]
  337. pub fn dont_frag(&self) -> bool {
  338. let data = self.buffer.as_ref();
  339. NetworkEndian::read_u16(&data[field::FLG_OFF]) & 0x4000 != 0
  340. }
  341. /// Return the "more fragments" flag.
  342. #[inline]
  343. pub fn more_frags(&self) -> bool {
  344. let data = self.buffer.as_ref();
  345. NetworkEndian::read_u16(&data[field::FLG_OFF]) & 0x2000 != 0
  346. }
  347. /// Return the fragment offset, in octets.
  348. #[inline]
  349. pub fn frag_offset(&self) -> u16 {
  350. let data = self.buffer.as_ref();
  351. NetworkEndian::read_u16(&data[field::FLG_OFF]) << 3
  352. }
  353. /// Return the time to live field.
  354. #[inline]
  355. pub fn hop_limit(&self) -> u8 {
  356. let data = self.buffer.as_ref();
  357. data[field::TTL]
  358. }
  359. /// Return the next_header (protocol) field.
  360. #[inline]
  361. pub fn next_header(&self) -> Protocol {
  362. let data = self.buffer.as_ref();
  363. Protocol::from(data[field::PROTOCOL])
  364. }
  365. /// Return the header checksum field.
  366. #[inline]
  367. pub fn checksum(&self) -> u16 {
  368. let data = self.buffer.as_ref();
  369. NetworkEndian::read_u16(&data[field::CHECKSUM])
  370. }
  371. /// Return the source address field.
  372. #[inline]
  373. pub fn src_addr(&self) -> Address {
  374. let data = self.buffer.as_ref();
  375. Address::from_bytes(&data[field::SRC_ADDR])
  376. }
  377. /// Return the destination address field.
  378. #[inline]
  379. pub fn dst_addr(&self) -> Address {
  380. let data = self.buffer.as_ref();
  381. Address::from_bytes(&data[field::DST_ADDR])
  382. }
  383. /// Validate the header checksum.
  384. ///
  385. /// # Fuzzing
  386. /// This function always returns `true` when fuzzing.
  387. pub fn verify_checksum(&self) -> bool {
  388. if cfg!(fuzzing) {
  389. return true;
  390. }
  391. let data = self.buffer.as_ref();
  392. checksum::data(&data[..self.header_len() as usize]) == !0
  393. }
  394. /// Returns the key for identifying the packet.
  395. pub fn get_key(&self) -> Key {
  396. Key {
  397. id: self.ident(),
  398. src_addr: self.src_addr(),
  399. dst_addr: self.dst_addr(),
  400. protocol: self.next_header(),
  401. }
  402. }
  403. }
  404. impl<'a, T: AsRef<[u8]> + ?Sized> Packet<&'a T> {
  405. /// Return a pointer to the payload.
  406. #[inline]
  407. pub fn payload(&self) -> &'a [u8] {
  408. let range = self.header_len() as usize..self.total_len() as usize;
  409. let data = self.buffer.as_ref();
  410. &data[range]
  411. }
  412. }
  413. impl<T: AsRef<[u8]> + AsMut<[u8]>> Packet<T> {
  414. /// Set the version field.
  415. #[inline]
  416. pub fn set_version(&mut self, value: u8) {
  417. let data = self.buffer.as_mut();
  418. data[field::VER_IHL] = (data[field::VER_IHL] & !0xf0) | (value << 4);
  419. }
  420. /// Set the header length, in octets.
  421. #[inline]
  422. pub fn set_header_len(&mut self, value: u8) {
  423. let data = self.buffer.as_mut();
  424. data[field::VER_IHL] = (data[field::VER_IHL] & !0x0f) | ((value / 4) & 0x0f);
  425. }
  426. /// Set the Differential Services Code Point field.
  427. pub fn set_dscp(&mut self, value: u8) {
  428. let data = self.buffer.as_mut();
  429. data[field::DSCP_ECN] = (data[field::DSCP_ECN] & !0xfc) | (value << 2)
  430. }
  431. /// Set the Explicit Congestion Notification field.
  432. pub fn set_ecn(&mut self, value: u8) {
  433. let data = self.buffer.as_mut();
  434. data[field::DSCP_ECN] = (data[field::DSCP_ECN] & !0x03) | (value & 0x03)
  435. }
  436. /// Set the total length field.
  437. #[inline]
  438. pub fn set_total_len(&mut self, value: u16) {
  439. let data = self.buffer.as_mut();
  440. NetworkEndian::write_u16(&mut data[field::LENGTH], value)
  441. }
  442. /// Set the fragment identification field.
  443. #[inline]
  444. pub fn set_ident(&mut self, value: u16) {
  445. let data = self.buffer.as_mut();
  446. NetworkEndian::write_u16(&mut data[field::IDENT], value)
  447. }
  448. /// Clear the entire flags field.
  449. #[inline]
  450. pub fn clear_flags(&mut self) {
  451. let data = self.buffer.as_mut();
  452. let raw = NetworkEndian::read_u16(&data[field::FLG_OFF]);
  453. let raw = raw & !0xe000;
  454. NetworkEndian::write_u16(&mut data[field::FLG_OFF], raw);
  455. }
  456. /// Set the "don't fragment" flag.
  457. #[inline]
  458. pub fn set_dont_frag(&mut self, value: bool) {
  459. let data = self.buffer.as_mut();
  460. let raw = NetworkEndian::read_u16(&data[field::FLG_OFF]);
  461. let raw = if value { raw | 0x4000 } else { raw & !0x4000 };
  462. NetworkEndian::write_u16(&mut data[field::FLG_OFF], raw);
  463. }
  464. /// Set the "more fragments" flag.
  465. #[inline]
  466. pub fn set_more_frags(&mut self, value: bool) {
  467. let data = self.buffer.as_mut();
  468. let raw = NetworkEndian::read_u16(&data[field::FLG_OFF]);
  469. let raw = if value { raw | 0x2000 } else { raw & !0x2000 };
  470. NetworkEndian::write_u16(&mut data[field::FLG_OFF], raw);
  471. }
  472. /// Set the fragment offset, in octets.
  473. #[inline]
  474. pub fn set_frag_offset(&mut self, value: u16) {
  475. let data = self.buffer.as_mut();
  476. let raw = NetworkEndian::read_u16(&data[field::FLG_OFF]);
  477. let raw = (raw & 0xe000) | (value >> 3);
  478. NetworkEndian::write_u16(&mut data[field::FLG_OFF], raw);
  479. }
  480. /// Set the time to live field.
  481. #[inline]
  482. pub fn set_hop_limit(&mut self, value: u8) {
  483. let data = self.buffer.as_mut();
  484. data[field::TTL] = value
  485. }
  486. /// Set the next header (protocol) field.
  487. #[inline]
  488. pub fn set_next_header(&mut self, value: Protocol) {
  489. let data = self.buffer.as_mut();
  490. data[field::PROTOCOL] = value.into()
  491. }
  492. /// Set the header checksum field.
  493. #[inline]
  494. pub fn set_checksum(&mut self, value: u16) {
  495. let data = self.buffer.as_mut();
  496. NetworkEndian::write_u16(&mut data[field::CHECKSUM], value)
  497. }
  498. /// Set the source address field.
  499. #[inline]
  500. pub fn set_src_addr(&mut self, value: Address) {
  501. let data = self.buffer.as_mut();
  502. data[field::SRC_ADDR].copy_from_slice(value.as_bytes())
  503. }
  504. /// Set the destination address field.
  505. #[inline]
  506. pub fn set_dst_addr(&mut self, value: Address) {
  507. let data = self.buffer.as_mut();
  508. data[field::DST_ADDR].copy_from_slice(value.as_bytes())
  509. }
  510. /// Compute and fill in the header checksum.
  511. pub fn fill_checksum(&mut self) {
  512. self.set_checksum(0);
  513. let checksum = {
  514. let data = self.buffer.as_ref();
  515. !checksum::data(&data[..self.header_len() as usize])
  516. };
  517. self.set_checksum(checksum)
  518. }
  519. /// Return a mutable pointer to the payload.
  520. #[inline]
  521. pub fn payload_mut(&mut self) -> &mut [u8] {
  522. let range = self.header_len() as usize..self.total_len() as usize;
  523. let data = self.buffer.as_mut();
  524. &mut data[range]
  525. }
  526. }
  527. impl<T: AsRef<[u8]>> AsRef<[u8]> for Packet<T> {
  528. fn as_ref(&self) -> &[u8] {
  529. self.buffer.as_ref()
  530. }
  531. }
  532. /// A high-level representation of an Internet Protocol version 4 packet header.
  533. #[derive(Debug, PartialEq, Eq, Clone, Copy)]
  534. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  535. pub struct Repr {
  536. pub src_addr: Address,
  537. pub dst_addr: Address,
  538. pub next_header: Protocol,
  539. pub payload_len: usize,
  540. pub hop_limit: u8,
  541. }
  542. impl Repr {
  543. /// Parse an Internet Protocol version 4 packet and return a high-level representation.
  544. pub fn parse<T: AsRef<[u8]> + ?Sized>(
  545. packet: &Packet<&T>,
  546. checksum_caps: &ChecksumCapabilities,
  547. ) -> Result<Repr> {
  548. packet.check_len()?;
  549. // Version 4 is expected.
  550. if packet.version() != 4 {
  551. return Err(Error);
  552. }
  553. // Valid checksum is expected.
  554. if checksum_caps.ipv4.rx() && !packet.verify_checksum() {
  555. return Err(Error);
  556. }
  557. #[cfg(not(feature = "proto-ipv4-fragmentation"))]
  558. // We do not support fragmentation.
  559. if packet.more_frags() || packet.frag_offset() != 0 {
  560. return Err(Error);
  561. }
  562. let payload_len = packet.total_len() as usize - packet.header_len() as usize;
  563. // All DSCP values are acceptable, since they are of no concern to receiving endpoint.
  564. // All ECN values are acceptable, since ECN requires opt-in from both endpoints.
  565. // All TTL values are acceptable, since we do not perform routing.
  566. Ok(Repr {
  567. src_addr: packet.src_addr(),
  568. dst_addr: packet.dst_addr(),
  569. next_header: packet.next_header(),
  570. payload_len,
  571. hop_limit: packet.hop_limit(),
  572. })
  573. }
  574. /// Return the length of a header that will be emitted from this high-level representation.
  575. pub const fn buffer_len(&self) -> usize {
  576. // We never emit any options.
  577. field::DST_ADDR.end
  578. }
  579. /// Emit a high-level representation into an Internet Protocol version 4 packet.
  580. pub fn emit<T: AsRef<[u8]> + AsMut<[u8]>>(
  581. &self,
  582. packet: &mut Packet<T>,
  583. checksum_caps: &ChecksumCapabilities,
  584. ) {
  585. packet.set_version(4);
  586. packet.set_header_len(field::DST_ADDR.end as u8);
  587. packet.set_dscp(0);
  588. packet.set_ecn(0);
  589. let total_len = packet.header_len() as u16 + self.payload_len as u16;
  590. packet.set_total_len(total_len);
  591. packet.set_ident(0);
  592. packet.clear_flags();
  593. packet.set_more_frags(false);
  594. packet.set_dont_frag(true);
  595. packet.set_frag_offset(0);
  596. packet.set_hop_limit(self.hop_limit);
  597. packet.set_next_header(self.next_header);
  598. packet.set_src_addr(self.src_addr);
  599. packet.set_dst_addr(self.dst_addr);
  600. if checksum_caps.ipv4.tx() {
  601. packet.fill_checksum();
  602. } else {
  603. // make sure we get a consistently zeroed checksum,
  604. // since implementations might rely on it
  605. packet.set_checksum(0);
  606. }
  607. }
  608. }
  609. impl<'a, T: AsRef<[u8]> + ?Sized> fmt::Display for Packet<&'a T> {
  610. fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
  611. match Repr::parse(self, &ChecksumCapabilities::ignored()) {
  612. Ok(repr) => write!(f, "{repr}"),
  613. Err(err) => {
  614. write!(f, "IPv4 ({err})")?;
  615. write!(
  616. f,
  617. " src={} dst={} proto={} hop_limit={}",
  618. self.src_addr(),
  619. self.dst_addr(),
  620. self.next_header(),
  621. self.hop_limit()
  622. )?;
  623. if self.version() != 4 {
  624. write!(f, " ver={}", self.version())?;
  625. }
  626. if self.header_len() != 20 {
  627. write!(f, " hlen={}", self.header_len())?;
  628. }
  629. if self.dscp() != 0 {
  630. write!(f, " dscp={}", self.dscp())?;
  631. }
  632. if self.ecn() != 0 {
  633. write!(f, " ecn={}", self.ecn())?;
  634. }
  635. write!(f, " tlen={}", self.total_len())?;
  636. if self.dont_frag() {
  637. write!(f, " df")?;
  638. }
  639. if self.more_frags() {
  640. write!(f, " mf")?;
  641. }
  642. if self.frag_offset() != 0 {
  643. write!(f, " off={}", self.frag_offset())?;
  644. }
  645. if self.more_frags() || self.frag_offset() != 0 {
  646. write!(f, " id={}", self.ident())?;
  647. }
  648. Ok(())
  649. }
  650. }
  651. }
  652. }
  653. impl fmt::Display for Repr {
  654. fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
  655. write!(
  656. f,
  657. "IPv4 src={} dst={} proto={}",
  658. self.src_addr, self.dst_addr, self.next_header
  659. )
  660. }
  661. }
  662. use crate::wire::pretty_print::{PrettyIndent, PrettyPrint};
  663. impl<T: AsRef<[u8]>> PrettyPrint for Packet<T> {
  664. fn pretty_print(
  665. buffer: &dyn AsRef<[u8]>,
  666. f: &mut fmt::Formatter,
  667. indent: &mut PrettyIndent,
  668. ) -> fmt::Result {
  669. use crate::wire::ip::checksum::format_checksum;
  670. let checksum_caps = ChecksumCapabilities::ignored();
  671. let (ip_repr, payload) = match Packet::new_checked(buffer) {
  672. Err(err) => return write!(f, "{indent}({err})"),
  673. Ok(ip_packet) => match Repr::parse(&ip_packet, &checksum_caps) {
  674. Err(_) => return Ok(()),
  675. Ok(ip_repr) => {
  676. if ip_packet.more_frags() || ip_packet.frag_offset() != 0 {
  677. write!(
  678. f,
  679. "{}IPv4 Fragment more_frags={} offset={}",
  680. indent,
  681. ip_packet.more_frags(),
  682. ip_packet.frag_offset()
  683. )?;
  684. return Ok(());
  685. } else {
  686. write!(f, "{indent}{ip_repr}")?;
  687. format_checksum(f, ip_packet.verify_checksum())?;
  688. (ip_repr, ip_packet.payload())
  689. }
  690. }
  691. },
  692. };
  693. pretty_print_ip_payload(f, indent, ip_repr, payload)
  694. }
  695. }
  696. #[cfg(test)]
  697. mod test {
  698. use super::*;
  699. static PACKET_BYTES: [u8; 30] = [
  700. 0x45, 0x00, 0x00, 0x1e, 0x01, 0x02, 0x62, 0x03, 0x1a, 0x01, 0xd5, 0x6e, 0x11, 0x12, 0x13,
  701. 0x14, 0x21, 0x22, 0x23, 0x24, 0xaa, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff,
  702. ];
  703. static PAYLOAD_BYTES: [u8; 10] = [0xaa, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff];
  704. #[test]
  705. fn test_deconstruct() {
  706. let packet = Packet::new_unchecked(&PACKET_BYTES[..]);
  707. assert_eq!(packet.version(), 4);
  708. assert_eq!(packet.header_len(), 20);
  709. assert_eq!(packet.dscp(), 0);
  710. assert_eq!(packet.ecn(), 0);
  711. assert_eq!(packet.total_len(), 30);
  712. assert_eq!(packet.ident(), 0x102);
  713. assert!(packet.more_frags());
  714. assert!(packet.dont_frag());
  715. assert_eq!(packet.frag_offset(), 0x203 * 8);
  716. assert_eq!(packet.hop_limit(), 0x1a);
  717. assert_eq!(packet.next_header(), Protocol::Icmp);
  718. assert_eq!(packet.checksum(), 0xd56e);
  719. assert_eq!(packet.src_addr(), Address([0x11, 0x12, 0x13, 0x14]));
  720. assert_eq!(packet.dst_addr(), Address([0x21, 0x22, 0x23, 0x24]));
  721. assert!(packet.verify_checksum());
  722. assert_eq!(packet.payload(), &PAYLOAD_BYTES[..]);
  723. }
  724. #[test]
  725. fn test_construct() {
  726. let mut bytes = vec![0xa5; 30];
  727. let mut packet = Packet::new_unchecked(&mut bytes);
  728. packet.set_version(4);
  729. packet.set_header_len(20);
  730. packet.clear_flags();
  731. packet.set_dscp(0);
  732. packet.set_ecn(0);
  733. packet.set_total_len(30);
  734. packet.set_ident(0x102);
  735. packet.set_more_frags(true);
  736. packet.set_dont_frag(true);
  737. packet.set_frag_offset(0x203 * 8);
  738. packet.set_hop_limit(0x1a);
  739. packet.set_next_header(Protocol::Icmp);
  740. packet.set_src_addr(Address([0x11, 0x12, 0x13, 0x14]));
  741. packet.set_dst_addr(Address([0x21, 0x22, 0x23, 0x24]));
  742. packet.fill_checksum();
  743. packet.payload_mut().copy_from_slice(&PAYLOAD_BYTES[..]);
  744. assert_eq!(&*packet.into_inner(), &PACKET_BYTES[..]);
  745. }
  746. #[test]
  747. fn test_overlong() {
  748. let mut bytes = vec![];
  749. bytes.extend(&PACKET_BYTES[..]);
  750. bytes.push(0);
  751. assert_eq!(
  752. Packet::new_unchecked(&bytes).payload().len(),
  753. PAYLOAD_BYTES.len()
  754. );
  755. assert_eq!(
  756. Packet::new_unchecked(&mut bytes).payload_mut().len(),
  757. PAYLOAD_BYTES.len()
  758. );
  759. }
  760. #[test]
  761. fn test_total_len_overflow() {
  762. let mut bytes = vec![];
  763. bytes.extend(&PACKET_BYTES[..]);
  764. Packet::new_unchecked(&mut bytes).set_total_len(128);
  765. assert_eq!(Packet::new_checked(&bytes).unwrap_err(), Error);
  766. }
  767. static REPR_PACKET_BYTES: [u8; 24] = [
  768. 0x45, 0x00, 0x00, 0x18, 0x00, 0x00, 0x40, 0x00, 0x40, 0x01, 0xd2, 0x79, 0x11, 0x12, 0x13,
  769. 0x14, 0x21, 0x22, 0x23, 0x24, 0xaa, 0x00, 0x00, 0xff,
  770. ];
  771. static REPR_PAYLOAD_BYTES: [u8; ADDR_SIZE] = [0xaa, 0x00, 0x00, 0xff];
  772. const fn packet_repr() -> Repr {
  773. Repr {
  774. src_addr: Address([0x11, 0x12, 0x13, 0x14]),
  775. dst_addr: Address([0x21, 0x22, 0x23, 0x24]),
  776. next_header: Protocol::Icmp,
  777. payload_len: 4,
  778. hop_limit: 64,
  779. }
  780. }
  781. #[test]
  782. fn test_parse() {
  783. let packet = Packet::new_unchecked(&REPR_PACKET_BYTES[..]);
  784. let repr = Repr::parse(&packet, &ChecksumCapabilities::default()).unwrap();
  785. assert_eq!(repr, packet_repr());
  786. }
  787. #[test]
  788. fn test_parse_bad_version() {
  789. let mut bytes = vec![0; 24];
  790. bytes.copy_from_slice(&REPR_PACKET_BYTES[..]);
  791. let mut packet = Packet::new_unchecked(&mut bytes);
  792. packet.set_version(6);
  793. packet.fill_checksum();
  794. let packet = Packet::new_unchecked(&*packet.into_inner());
  795. assert_eq!(
  796. Repr::parse(&packet, &ChecksumCapabilities::default()),
  797. Err(Error)
  798. );
  799. }
  800. #[test]
  801. fn test_parse_total_len_less_than_header_len() {
  802. let mut bytes = vec![0; 40];
  803. bytes[0] = 0x09;
  804. assert_eq!(Packet::new_checked(&mut bytes), Err(Error));
  805. }
  806. #[test]
  807. fn test_emit() {
  808. let repr = packet_repr();
  809. let mut bytes = vec![0xa5; repr.buffer_len() + REPR_PAYLOAD_BYTES.len()];
  810. let mut packet = Packet::new_unchecked(&mut bytes);
  811. repr.emit(&mut packet, &ChecksumCapabilities::default());
  812. packet.payload_mut().copy_from_slice(&REPR_PAYLOAD_BYTES);
  813. assert_eq!(&*packet.into_inner(), &REPR_PACKET_BYTES[..]);
  814. }
  815. #[test]
  816. fn test_unspecified() {
  817. assert!(Address::UNSPECIFIED.is_unspecified());
  818. assert!(!Address::UNSPECIFIED.is_broadcast());
  819. assert!(!Address::UNSPECIFIED.is_multicast());
  820. assert!(!Address::UNSPECIFIED.is_link_local());
  821. assert!(!Address::UNSPECIFIED.is_loopback());
  822. }
  823. #[test]
  824. fn test_broadcast() {
  825. assert!(!Address::BROADCAST.is_unspecified());
  826. assert!(Address::BROADCAST.is_broadcast());
  827. assert!(!Address::BROADCAST.is_multicast());
  828. assert!(!Address::BROADCAST.is_link_local());
  829. assert!(!Address::BROADCAST.is_loopback());
  830. }
  831. #[test]
  832. fn test_cidr() {
  833. let cidr = Cidr::new(Address::new(192, 168, 1, 10), 24);
  834. let inside_subnet = [
  835. [192, 168, 1, 0],
  836. [192, 168, 1, 1],
  837. [192, 168, 1, 2],
  838. [192, 168, 1, 10],
  839. [192, 168, 1, 127],
  840. [192, 168, 1, 255],
  841. ];
  842. let outside_subnet = [
  843. [192, 168, 0, 0],
  844. [127, 0, 0, 1],
  845. [192, 168, 2, 0],
  846. [192, 168, 0, 255],
  847. [0, 0, 0, 0],
  848. [255, 255, 255, 255],
  849. ];
  850. let subnets = [
  851. ([192, 168, 1, 0], 32),
  852. ([192, 168, 1, 255], 24),
  853. ([192, 168, 1, 10], 30),
  854. ];
  855. let not_subnets = [
  856. ([192, 168, 1, 10], 23),
  857. ([127, 0, 0, 1], 8),
  858. ([192, 168, 1, 0], 0),
  859. ([192, 168, 0, 255], 32),
  860. ];
  861. for addr in inside_subnet.iter().map(|a| Address::from_bytes(a)) {
  862. assert!(cidr.contains_addr(&addr));
  863. }
  864. for addr in outside_subnet.iter().map(|a| Address::from_bytes(a)) {
  865. assert!(!cidr.contains_addr(&addr));
  866. }
  867. for subnet in subnets
  868. .iter()
  869. .map(|&(a, p)| Cidr::new(Address::new(a[0], a[1], a[2], a[3]), p))
  870. {
  871. assert!(cidr.contains_subnet(&subnet));
  872. }
  873. for subnet in not_subnets
  874. .iter()
  875. .map(|&(a, p)| Cidr::new(Address::new(a[0], a[1], a[2], a[3]), p))
  876. {
  877. assert!(!cidr.contains_subnet(&subnet));
  878. }
  879. let cidr_without_prefix = Cidr::new(cidr.address(), 0);
  880. assert!(cidr_without_prefix.contains_addr(&Address::new(127, 0, 0, 1)));
  881. }
  882. #[test]
  883. fn test_cidr_from_netmask() {
  884. assert!(Cidr::from_netmask(Address([0, 0, 0, 0]), Address([1, 0, 2, 0])).is_err());
  885. assert!(Cidr::from_netmask(Address([0, 0, 0, 0]), Address([0, 0, 0, 0])).is_err());
  886. assert_eq!(
  887. Cidr::from_netmask(Address([0, 0, 0, 1]), Address([255, 255, 255, 0])).unwrap(),
  888. Cidr::new(Address([0, 0, 0, 1]), 24)
  889. );
  890. assert_eq!(
  891. Cidr::from_netmask(Address([192, 168, 0, 1]), Address([255, 255, 0, 0])).unwrap(),
  892. Cidr::new(Address([192, 168, 0, 1]), 16)
  893. );
  894. assert_eq!(
  895. Cidr::from_netmask(Address([172, 16, 0, 1]), Address([255, 240, 0, 0])).unwrap(),
  896. Cidr::new(Address([172, 16, 0, 1]), 12)
  897. );
  898. assert_eq!(
  899. Cidr::from_netmask(Address([255, 255, 255, 1]), Address([255, 255, 255, 0])).unwrap(),
  900. Cidr::new(Address([255, 255, 255, 1]), 24)
  901. );
  902. assert_eq!(
  903. Cidr::from_netmask(Address([255, 255, 255, 255]), Address([255, 255, 255, 255]))
  904. .unwrap(),
  905. Cidr::new(Address([255, 255, 255, 255]), 32)
  906. );
  907. }
  908. #[test]
  909. fn test_cidr_netmask() {
  910. assert_eq!(
  911. Cidr::new(Address([0, 0, 0, 0]), 0).netmask(),
  912. Address([0, 0, 0, 0])
  913. );
  914. assert_eq!(
  915. Cidr::new(Address([0, 0, 0, 1]), 24).netmask(),
  916. Address([255, 255, 255, 0])
  917. );
  918. assert_eq!(
  919. Cidr::new(Address([0, 0, 0, 0]), 32).netmask(),
  920. Address([255, 255, 255, 255])
  921. );
  922. assert_eq!(
  923. Cidr::new(Address([127, 0, 0, 0]), 8).netmask(),
  924. Address([255, 0, 0, 0])
  925. );
  926. assert_eq!(
  927. Cidr::new(Address([192, 168, 0, 0]), 16).netmask(),
  928. Address([255, 255, 0, 0])
  929. );
  930. assert_eq!(
  931. Cidr::new(Address([192, 168, 1, 1]), 16).netmask(),
  932. Address([255, 255, 0, 0])
  933. );
  934. assert_eq!(
  935. Cidr::new(Address([192, 168, 1, 1]), 17).netmask(),
  936. Address([255, 255, 128, 0])
  937. );
  938. assert_eq!(
  939. Cidr::new(Address([172, 16, 0, 0]), 12).netmask(),
  940. Address([255, 240, 0, 0])
  941. );
  942. assert_eq!(
  943. Cidr::new(Address([255, 255, 255, 1]), 24).netmask(),
  944. Address([255, 255, 255, 0])
  945. );
  946. assert_eq!(
  947. Cidr::new(Address([255, 255, 255, 255]), 32).netmask(),
  948. Address([255, 255, 255, 255])
  949. );
  950. }
  951. #[test]
  952. fn test_cidr_broadcast() {
  953. assert_eq!(
  954. Cidr::new(Address([0, 0, 0, 0]), 0).broadcast().unwrap(),
  955. Address([255, 255, 255, 255])
  956. );
  957. assert_eq!(
  958. Cidr::new(Address([0, 0, 0, 1]), 24).broadcast().unwrap(),
  959. Address([0, 0, 0, 255])
  960. );
  961. assert_eq!(Cidr::new(Address([0, 0, 0, 0]), 32).broadcast(), None);
  962. assert_eq!(
  963. Cidr::new(Address([127, 0, 0, 0]), 8).broadcast().unwrap(),
  964. Address([127, 255, 255, 255])
  965. );
  966. assert_eq!(
  967. Cidr::new(Address([192, 168, 0, 0]), 16)
  968. .broadcast()
  969. .unwrap(),
  970. Address([192, 168, 255, 255])
  971. );
  972. assert_eq!(
  973. Cidr::new(Address([192, 168, 1, 1]), 16)
  974. .broadcast()
  975. .unwrap(),
  976. Address([192, 168, 255, 255])
  977. );
  978. assert_eq!(
  979. Cidr::new(Address([192, 168, 1, 1]), 17)
  980. .broadcast()
  981. .unwrap(),
  982. Address([192, 168, 127, 255])
  983. );
  984. assert_eq!(
  985. Cidr::new(Address([172, 16, 0, 1]), 12).broadcast().unwrap(),
  986. Address([172, 31, 255, 255])
  987. );
  988. assert_eq!(
  989. Cidr::new(Address([255, 255, 255, 1]), 24)
  990. .broadcast()
  991. .unwrap(),
  992. Address([255, 255, 255, 255])
  993. );
  994. assert_eq!(
  995. Cidr::new(Address([255, 255, 255, 254]), 31).broadcast(),
  996. None
  997. );
  998. assert_eq!(
  999. Cidr::new(Address([255, 255, 255, 255]), 32).broadcast(),
  1000. None
  1001. );
  1002. }
  1003. #[test]
  1004. fn test_cidr_network() {
  1005. assert_eq!(
  1006. Cidr::new(Address([0, 0, 0, 0]), 0).network(),
  1007. Cidr::new(Address([0, 0, 0, 0]), 0)
  1008. );
  1009. assert_eq!(
  1010. Cidr::new(Address([0, 0, 0, 1]), 24).network(),
  1011. Cidr::new(Address([0, 0, 0, 0]), 24)
  1012. );
  1013. assert_eq!(
  1014. Cidr::new(Address([0, 0, 0, 0]), 32).network(),
  1015. Cidr::new(Address([0, 0, 0, 0]), 32)
  1016. );
  1017. assert_eq!(
  1018. Cidr::new(Address([127, 0, 0, 0]), 8).network(),
  1019. Cidr::new(Address([127, 0, 0, 0]), 8)
  1020. );
  1021. assert_eq!(
  1022. Cidr::new(Address([192, 168, 0, 0]), 16).network(),
  1023. Cidr::new(Address([192, 168, 0, 0]), 16)
  1024. );
  1025. assert_eq!(
  1026. Cidr::new(Address([192, 168, 1, 1]), 16).network(),
  1027. Cidr::new(Address([192, 168, 0, 0]), 16)
  1028. );
  1029. assert_eq!(
  1030. Cidr::new(Address([192, 168, 1, 1]), 17).network(),
  1031. Cidr::new(Address([192, 168, 0, 0]), 17)
  1032. );
  1033. assert_eq!(
  1034. Cidr::new(Address([172, 16, 0, 1]), 12).network(),
  1035. Cidr::new(Address([172, 16, 0, 0]), 12)
  1036. );
  1037. assert_eq!(
  1038. Cidr::new(Address([255, 255, 255, 1]), 24).network(),
  1039. Cidr::new(Address([255, 255, 255, 0]), 24)
  1040. );
  1041. assert_eq!(
  1042. Cidr::new(Address([255, 255, 255, 255]), 32).network(),
  1043. Cidr::new(Address([255, 255, 255, 255]), 32)
  1044. );
  1045. }
  1046. }