icmpv4.rs 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619
  1. use core::{cmp, fmt};
  2. use byteorder::{ByteOrder, NetworkEndian};
  3. use crate::{Error, Result};
  4. use crate::phy::ChecksumCapabilities;
  5. use crate::wire::ip::checksum;
  6. use crate::wire::{Ipv4Packet, Ipv4Repr};
  7. enum_with_unknown! {
  8. /// Internet protocol control message type.
  9. pub enum Message(u8) {
  10. /// Echo reply
  11. EchoReply = 0,
  12. /// Destination unreachable
  13. DstUnreachable = 3,
  14. /// Message redirect
  15. Redirect = 5,
  16. /// Echo request
  17. EchoRequest = 8,
  18. /// Router advertisement
  19. RouterAdvert = 9,
  20. /// Router solicitation
  21. RouterSolicit = 10,
  22. /// Time exceeded
  23. TimeExceeded = 11,
  24. /// Parameter problem
  25. ParamProblem = 12,
  26. /// Timestamp
  27. Timestamp = 13,
  28. /// Timestamp reply
  29. TimestampReply = 14
  30. }
  31. }
  32. impl fmt::Display for Message {
  33. fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
  34. match *self {
  35. Message::EchoReply => write!(f, "echo reply"),
  36. Message::DstUnreachable => write!(f, "destination unreachable"),
  37. Message::Redirect => write!(f, "message redirect"),
  38. Message::EchoRequest => write!(f, "echo request"),
  39. Message::RouterAdvert => write!(f, "router advertisement"),
  40. Message::RouterSolicit => write!(f, "router solicitation"),
  41. Message::TimeExceeded => write!(f, "time exceeded"),
  42. Message::ParamProblem => write!(f, "parameter problem"),
  43. Message::Timestamp => write!(f, "timestamp"),
  44. Message::TimestampReply => write!(f, "timestamp reply"),
  45. Message::Unknown(id) => write!(f, "{}", id)
  46. }
  47. }
  48. }
  49. enum_with_unknown! {
  50. /// Internet protocol control message subtype for type "Destination Unreachable".
  51. pub enum DstUnreachable(u8) {
  52. /// Destination network unreachable
  53. NetUnreachable = 0,
  54. /// Destination host unreachable
  55. HostUnreachable = 1,
  56. /// Destination protocol unreachable
  57. ProtoUnreachable = 2,
  58. /// Destination port unreachable
  59. PortUnreachable = 3,
  60. /// Fragmentation required, and DF flag set
  61. FragRequired = 4,
  62. /// Source route failed
  63. SrcRouteFailed = 5,
  64. /// Destination network unknown
  65. DstNetUnknown = 6,
  66. /// Destination host unknown
  67. DstHostUnknown = 7,
  68. /// Source host isolated
  69. SrcHostIsolated = 8,
  70. /// Network administratively prohibited
  71. NetProhibited = 9,
  72. /// Host administratively prohibited
  73. HostProhibited = 10,
  74. /// Network unreachable for ToS
  75. NetUnreachToS = 11,
  76. /// Host unreachable for ToS
  77. HostUnreachToS = 12,
  78. /// Communication administratively prohibited
  79. CommProhibited = 13,
  80. /// Host precedence violation
  81. HostPrecedViol = 14,
  82. /// Precedence cutoff in effect
  83. PrecedCutoff = 15
  84. }
  85. }
  86. impl fmt::Display for DstUnreachable {
  87. fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
  88. match *self {
  89. DstUnreachable::NetUnreachable =>
  90. write!(f, "destination network unreachable"),
  91. DstUnreachable::HostUnreachable =>
  92. write!(f, "destination host unreachable"),
  93. DstUnreachable::ProtoUnreachable =>
  94. write!(f, "destination protocol unreachable"),
  95. DstUnreachable::PortUnreachable =>
  96. write!(f, "destination port unreachable"),
  97. DstUnreachable::FragRequired =>
  98. write!(f, "fragmentation required, and DF flag set"),
  99. DstUnreachable::SrcRouteFailed =>
  100. write!(f, "source route failed"),
  101. DstUnreachable::DstNetUnknown =>
  102. write!(f, "destination network unknown"),
  103. DstUnreachable::DstHostUnknown =>
  104. write!(f, "destination host unknown"),
  105. DstUnreachable::SrcHostIsolated =>
  106. write!(f, "source host isolated"),
  107. DstUnreachable::NetProhibited =>
  108. write!(f, "network administratively prohibited"),
  109. DstUnreachable::HostProhibited =>
  110. write!(f, "host administratively prohibited"),
  111. DstUnreachable::NetUnreachToS =>
  112. write!(f, "network unreachable for ToS"),
  113. DstUnreachable::HostUnreachToS =>
  114. write!(f, "host unreachable for ToS"),
  115. DstUnreachable::CommProhibited =>
  116. write!(f, "communication administratively prohibited"),
  117. DstUnreachable::HostPrecedViol =>
  118. write!(f, "host precedence violation"),
  119. DstUnreachable::PrecedCutoff =>
  120. write!(f, "precedence cutoff in effect"),
  121. DstUnreachable::Unknown(id) =>
  122. write!(f, "{}", id)
  123. }
  124. }
  125. }
  126. enum_with_unknown! {
  127. /// Internet protocol control message subtype for type "Redirect Message".
  128. pub enum Redirect(u8) {
  129. /// Redirect Datagram for the Network
  130. Net = 0,
  131. /// Redirect Datagram for the Host
  132. Host = 1,
  133. /// Redirect Datagram for the ToS & network
  134. NetToS = 2,
  135. /// Redirect Datagram for the ToS & host
  136. HostToS = 3
  137. }
  138. }
  139. enum_with_unknown! {
  140. /// Internet protocol control message subtype for type "Time Exceeded".
  141. pub enum TimeExceeded(u8) {
  142. /// TTL expired in transit
  143. TtlExpired = 0,
  144. /// Fragment reassembly time exceeded
  145. FragExpired = 1
  146. }
  147. }
  148. enum_with_unknown! {
  149. /// Internet protocol control message subtype for type "Parameter Problem".
  150. pub enum ParamProblem(u8) {
  151. /// Pointer indicates the error
  152. AtPointer = 0,
  153. /// Missing a required option
  154. MissingOption = 1,
  155. /// Bad length
  156. BadLength = 2
  157. }
  158. }
  159. /// A read/write wrapper around an Internet Control Message Protocol version 4 packet buffer.
  160. #[derive(Debug, PartialEq, Clone)]
  161. pub struct Packet<T: AsRef<[u8]>> {
  162. buffer: T
  163. }
  164. mod field {
  165. use crate::wire::field::*;
  166. pub const TYPE: usize = 0;
  167. pub const CODE: usize = 1;
  168. pub const CHECKSUM: Field = 2..4;
  169. pub const UNUSED: Field = 4..8;
  170. pub const ECHO_IDENT: Field = 4..6;
  171. pub const ECHO_SEQNO: Field = 6..8;
  172. pub const HEADER_END: usize = 8;
  173. }
  174. impl<T: AsRef<[u8]>> Packet<T> {
  175. /// Imbue a raw octet buffer with ICMPv4 packet structure.
  176. pub fn new_unchecked(buffer: T) -> Packet<T> {
  177. Packet { buffer }
  178. }
  179. /// Shorthand for a combination of [new_unchecked] and [check_len].
  180. ///
  181. /// [new_unchecked]: #method.new_unchecked
  182. /// [check_len]: #method.check_len
  183. pub fn new_checked(buffer: T) -> Result<Packet<T>> {
  184. let packet = Self::new_unchecked(buffer);
  185. packet.check_len()?;
  186. Ok(packet)
  187. }
  188. /// Ensure that no accessor method will panic if called.
  189. /// Returns `Err(Error::Truncated)` if the buffer is too short.
  190. ///
  191. /// The result of this check is invalidated by calling [set_header_len].
  192. ///
  193. /// [set_header_len]: #method.set_header_len
  194. pub fn check_len(&self) -> Result<()> {
  195. let len = self.buffer.as_ref().len();
  196. if len < field::HEADER_END {
  197. Err(Error::Truncated)
  198. } else {
  199. Ok(())
  200. }
  201. }
  202. /// Consume the packet, returning the underlying buffer.
  203. pub fn into_inner(self) -> T {
  204. self.buffer
  205. }
  206. /// Return the message type field.
  207. #[inline]
  208. pub fn msg_type(&self) -> Message {
  209. let data = self.buffer.as_ref();
  210. Message::from(data[field::TYPE])
  211. }
  212. /// Return the message code field.
  213. #[inline]
  214. pub fn msg_code(&self) -> u8 {
  215. let data = self.buffer.as_ref();
  216. data[field::CODE]
  217. }
  218. /// Return the checksum field.
  219. #[inline]
  220. pub fn checksum(&self) -> u16 {
  221. let data = self.buffer.as_ref();
  222. NetworkEndian::read_u16(&data[field::CHECKSUM])
  223. }
  224. /// Return the identifier field (for echo request and reply packets).
  225. ///
  226. /// # Panics
  227. /// This function may panic if this packet is not an echo request or reply packet.
  228. #[inline]
  229. pub fn echo_ident(&self) -> u16 {
  230. let data = self.buffer.as_ref();
  231. NetworkEndian::read_u16(&data[field::ECHO_IDENT])
  232. }
  233. /// Return the sequence number field (for echo request and reply packets).
  234. ///
  235. /// # Panics
  236. /// This function may panic if this packet is not an echo request or reply packet.
  237. #[inline]
  238. pub fn echo_seq_no(&self) -> u16 {
  239. let data = self.buffer.as_ref();
  240. NetworkEndian::read_u16(&data[field::ECHO_SEQNO])
  241. }
  242. /// Return the header length.
  243. /// The result depends on the value of the message type field.
  244. pub fn header_len(&self) -> usize {
  245. match self.msg_type() {
  246. Message::EchoRequest => field::ECHO_SEQNO.end,
  247. Message::EchoReply => field::ECHO_SEQNO.end,
  248. Message::DstUnreachable => field::UNUSED.end,
  249. _ => field::UNUSED.end // make a conservative assumption
  250. }
  251. }
  252. /// Validate the header checksum.
  253. ///
  254. /// # Fuzzing
  255. /// This function always returns `true` when fuzzing.
  256. pub fn verify_checksum(&self) -> bool {
  257. if cfg!(fuzzing) { return true }
  258. let data = self.buffer.as_ref();
  259. checksum::data(data) == !0
  260. }
  261. }
  262. impl<'a, T: AsRef<[u8]> + ?Sized> Packet<&'a T> {
  263. /// Return a pointer to the type-specific data.
  264. #[inline]
  265. pub fn data(&self) -> &'a [u8] {
  266. let data = self.buffer.as_ref();
  267. &data[self.header_len()..]
  268. }
  269. }
  270. impl<T: AsRef<[u8]> + AsMut<[u8]>> Packet<T> {
  271. /// Set the message type field.
  272. #[inline]
  273. pub fn set_msg_type(&mut self, value: Message) {
  274. let data = self.buffer.as_mut();
  275. data[field::TYPE] = value.into()
  276. }
  277. /// Set the message code field.
  278. #[inline]
  279. pub fn set_msg_code(&mut self, value: u8) {
  280. let data = self.buffer.as_mut();
  281. data[field::CODE] = value
  282. }
  283. /// Set the checksum field.
  284. #[inline]
  285. pub fn set_checksum(&mut self, value: u16) {
  286. let data = self.buffer.as_mut();
  287. NetworkEndian::write_u16(&mut data[field::CHECKSUM], value)
  288. }
  289. /// Set the identifier field (for echo request and reply packets).
  290. ///
  291. /// # Panics
  292. /// This function may panic if this packet is not an echo request or reply packet.
  293. #[inline]
  294. pub fn set_echo_ident(&mut self, value: u16) {
  295. let data = self.buffer.as_mut();
  296. NetworkEndian::write_u16(&mut data[field::ECHO_IDENT], value)
  297. }
  298. /// Set the sequence number field (for echo request and reply packets).
  299. ///
  300. /// # Panics
  301. /// This function may panic if this packet is not an echo request or reply packet.
  302. #[inline]
  303. pub fn set_echo_seq_no(&mut self, value: u16) {
  304. let data = self.buffer.as_mut();
  305. NetworkEndian::write_u16(&mut data[field::ECHO_SEQNO], value)
  306. }
  307. /// Compute and fill in the header checksum.
  308. pub fn fill_checksum(&mut self) {
  309. self.set_checksum(0);
  310. let checksum = {
  311. let data = self.buffer.as_ref();
  312. !checksum::data(data)
  313. };
  314. self.set_checksum(checksum)
  315. }
  316. }
  317. impl<'a, T: AsRef<[u8]> + AsMut<[u8]> + ?Sized> Packet<&'a mut T> {
  318. /// Return a mutable pointer to the type-specific data.
  319. #[inline]
  320. pub fn data_mut(&mut self) -> &mut [u8] {
  321. let range = self.header_len()..;
  322. let data = self.buffer.as_mut();
  323. &mut data[range]
  324. }
  325. }
  326. impl<T: AsRef<[u8]>> AsRef<[u8]> for Packet<T> {
  327. fn as_ref(&self) -> &[u8] {
  328. self.buffer.as_ref()
  329. }
  330. }
  331. /// A high-level representation of an Internet Control Message Protocol version 4 packet header.
  332. #[derive(Debug, PartialEq, Eq, Clone, Copy)]
  333. #[non_exhaustive]
  334. pub enum Repr<'a> {
  335. EchoRequest {
  336. ident: u16,
  337. seq_no: u16,
  338. data: &'a [u8]
  339. },
  340. EchoReply {
  341. ident: u16,
  342. seq_no: u16,
  343. data: &'a [u8]
  344. },
  345. DstUnreachable {
  346. reason: DstUnreachable,
  347. header: Ipv4Repr,
  348. data: &'a [u8]
  349. },
  350. }
  351. impl<'a> Repr<'a> {
  352. /// Parse an Internet Control Message Protocol version 4 packet and return
  353. /// a high-level representation.
  354. pub fn parse<T>(packet: &Packet<&'a T>, checksum_caps: &ChecksumCapabilities)
  355. -> Result<Repr<'a>>
  356. where T: AsRef<[u8]> + ?Sized {
  357. // Valid checksum is expected.
  358. if checksum_caps.icmpv4.rx() && !packet.verify_checksum() { return Err(Error::Checksum) }
  359. match (packet.msg_type(), packet.msg_code()) {
  360. (Message::EchoRequest, 0) => {
  361. Ok(Repr::EchoRequest {
  362. ident: packet.echo_ident(),
  363. seq_no: packet.echo_seq_no(),
  364. data: packet.data()
  365. })
  366. },
  367. (Message::EchoReply, 0) => {
  368. Ok(Repr::EchoReply {
  369. ident: packet.echo_ident(),
  370. seq_no: packet.echo_seq_no(),
  371. data: packet.data()
  372. })
  373. },
  374. (Message::DstUnreachable, code) => {
  375. let ip_packet = Ipv4Packet::new_checked(packet.data())?;
  376. let payload = &packet.data()[ip_packet.header_len() as usize..];
  377. // RFC 792 requires exactly eight bytes to be returned.
  378. // We allow more, since there isn't a reason not to, but require at least eight.
  379. if payload.len() < 8 { return Err(Error::Truncated) }
  380. Ok(Repr::DstUnreachable {
  381. reason: DstUnreachable::from(code),
  382. header: Ipv4Repr {
  383. src_addr: ip_packet.src_addr(),
  384. dst_addr: ip_packet.dst_addr(),
  385. protocol: ip_packet.protocol(),
  386. payload_len: payload.len(),
  387. hop_limit: ip_packet.hop_limit()
  388. },
  389. data: payload
  390. })
  391. }
  392. _ => Err(Error::Unrecognized)
  393. }
  394. }
  395. /// Return the length of a packet that will be emitted from this high-level representation.
  396. pub fn buffer_len(&self) -> usize {
  397. match self {
  398. &Repr::EchoRequest { data, .. } |
  399. &Repr::EchoReply { data, .. } => {
  400. field::ECHO_SEQNO.end + data.len()
  401. },
  402. &Repr::DstUnreachable { header, data, .. } => {
  403. field::UNUSED.end + header.buffer_len() + data.len()
  404. }
  405. }
  406. }
  407. /// Emit a high-level representation into an Internet Control Message Protocol version 4
  408. /// packet.
  409. pub fn emit<T>(&self, packet: &mut Packet<&mut T>, checksum_caps: &ChecksumCapabilities)
  410. where T: AsRef<[u8]> + AsMut<[u8]> + ?Sized {
  411. packet.set_msg_code(0);
  412. match *self {
  413. Repr::EchoRequest { ident, seq_no, data } => {
  414. packet.set_msg_type(Message::EchoRequest);
  415. packet.set_msg_code(0);
  416. packet.set_echo_ident(ident);
  417. packet.set_echo_seq_no(seq_no);
  418. let data_len = cmp::min(packet.data_mut().len(), data.len());
  419. packet.data_mut()[..data_len].copy_from_slice(&data[..data_len])
  420. },
  421. Repr::EchoReply { ident, seq_no, data } => {
  422. packet.set_msg_type(Message::EchoReply);
  423. packet.set_msg_code(0);
  424. packet.set_echo_ident(ident);
  425. packet.set_echo_seq_no(seq_no);
  426. let data_len = cmp::min(packet.data_mut().len(), data.len());
  427. packet.data_mut()[..data_len].copy_from_slice(&data[..data_len])
  428. },
  429. Repr::DstUnreachable { reason, header, data } => {
  430. packet.set_msg_type(Message::DstUnreachable);
  431. packet.set_msg_code(reason.into());
  432. let mut ip_packet = Ipv4Packet::new_unchecked(packet.data_mut());
  433. header.emit(&mut ip_packet, checksum_caps);
  434. let payload = &mut ip_packet.into_inner()[header.buffer_len()..];
  435. payload.copy_from_slice(&data[..])
  436. }
  437. }
  438. if checksum_caps.icmpv4.tx() {
  439. packet.fill_checksum()
  440. } else {
  441. // make sure we get a consistently zeroed checksum,
  442. // since implementations might rely on it
  443. packet.set_checksum(0);
  444. }
  445. }
  446. }
  447. impl<'a, T: AsRef<[u8]> + ?Sized> fmt::Display for Packet<&'a T> {
  448. fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
  449. match Repr::parse(self, &ChecksumCapabilities::default()) {
  450. Ok(repr) => write!(f, "{}", repr),
  451. Err(err) => {
  452. write!(f, "ICMPv4 ({})", err)?;
  453. write!(f, " type={:?}", self.msg_type())?;
  454. match self.msg_type() {
  455. Message::DstUnreachable =>
  456. write!(f, " code={:?}", DstUnreachable::from(self.msg_code())),
  457. _ => write!(f, " code={}", self.msg_code())
  458. }
  459. }
  460. }
  461. }
  462. }
  463. impl<'a> fmt::Display for Repr<'a> {
  464. fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
  465. match *self {
  466. Repr::EchoRequest { ident, seq_no, data } =>
  467. write!(f, "ICMPv4 echo request id={} seq={} len={}",
  468. ident, seq_no, data.len()),
  469. Repr::EchoReply { ident, seq_no, data } =>
  470. write!(f, "ICMPv4 echo reply id={} seq={} len={}",
  471. ident, seq_no, data.len()),
  472. Repr::DstUnreachable { reason, .. } =>
  473. write!(f, "ICMPv4 destination unreachable ({})",
  474. reason),
  475. }
  476. }
  477. }
  478. use crate::wire::pretty_print::{PrettyPrint, PrettyIndent};
  479. impl<T: AsRef<[u8]>> PrettyPrint for Packet<T> {
  480. fn pretty_print(buffer: &dyn AsRef<[u8]>, f: &mut fmt::Formatter,
  481. indent: &mut PrettyIndent) -> fmt::Result {
  482. let packet = match Packet::new_checked(buffer) {
  483. Err(err) => return write!(f, "{}({})", indent, err),
  484. Ok(packet) => packet
  485. };
  486. write!(f, "{}{}", indent, packet)?;
  487. match packet.msg_type() {
  488. Message::DstUnreachable => {
  489. indent.increase(f)?;
  490. super::Ipv4Packet::<&[u8]>::pretty_print(&packet.data(), f, indent)
  491. }
  492. _ => Ok(())
  493. }
  494. }
  495. }
  496. #[cfg(test)]
  497. mod test {
  498. use super::*;
  499. static ECHO_PACKET_BYTES: [u8; 12] =
  500. [0x08, 0x00, 0x8e, 0xfe,
  501. 0x12, 0x34, 0xab, 0xcd,
  502. 0xaa, 0x00, 0x00, 0xff];
  503. static ECHO_DATA_BYTES: [u8; 4] =
  504. [0xaa, 0x00, 0x00, 0xff];
  505. #[test]
  506. fn test_echo_deconstruct() {
  507. let packet = Packet::new_unchecked(&ECHO_PACKET_BYTES[..]);
  508. assert_eq!(packet.msg_type(), Message::EchoRequest);
  509. assert_eq!(packet.msg_code(), 0);
  510. assert_eq!(packet.checksum(), 0x8efe);
  511. assert_eq!(packet.echo_ident(), 0x1234);
  512. assert_eq!(packet.echo_seq_no(), 0xabcd);
  513. assert_eq!(packet.data(), &ECHO_DATA_BYTES[..]);
  514. assert_eq!(packet.verify_checksum(), true);
  515. }
  516. #[test]
  517. fn test_echo_construct() {
  518. let mut bytes = vec![0xa5; 12];
  519. let mut packet = Packet::new_unchecked(&mut bytes);
  520. packet.set_msg_type(Message::EchoRequest);
  521. packet.set_msg_code(0);
  522. packet.set_echo_ident(0x1234);
  523. packet.set_echo_seq_no(0xabcd);
  524. packet.data_mut().copy_from_slice(&ECHO_DATA_BYTES[..]);
  525. packet.fill_checksum();
  526. assert_eq!(&packet.into_inner()[..], &ECHO_PACKET_BYTES[..]);
  527. }
  528. fn echo_packet_repr() -> Repr<'static> {
  529. Repr::EchoRequest {
  530. ident: 0x1234,
  531. seq_no: 0xabcd,
  532. data: &ECHO_DATA_BYTES
  533. }
  534. }
  535. #[test]
  536. fn test_echo_parse() {
  537. let packet = Packet::new_unchecked(&ECHO_PACKET_BYTES[..]);
  538. let repr = Repr::parse(&packet, &ChecksumCapabilities::default()).unwrap();
  539. assert_eq!(repr, echo_packet_repr());
  540. }
  541. #[test]
  542. fn test_echo_emit() {
  543. let repr = echo_packet_repr();
  544. let mut bytes = vec![0xa5; repr.buffer_len()];
  545. let mut packet = Packet::new_unchecked(&mut bytes);
  546. repr.emit(&mut packet, &ChecksumCapabilities::default());
  547. assert_eq!(&packet.into_inner()[..], &ECHO_PACKET_BYTES[..]);
  548. }
  549. #[test]
  550. fn test_check_len() {
  551. let bytes = [0x0b, 0x00, 0x00, 0x00,
  552. 0x00, 0x00, 0x00, 0x00];
  553. assert_eq!(Packet::new_checked(&[]), Err(Error::Truncated));
  554. assert_eq!(Packet::new_checked(&bytes[..4]), Err(Error::Truncated));
  555. assert!(Packet::new_checked(&bytes[..]).is_ok());
  556. }
  557. }