ipv4.rs 34 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995
  1. use core::fmt;
  2. use byteorder::{ByteOrder, NetworkEndian};
  3. use crate::{Error, Result};
  4. use crate::phy::ChecksumCapabilities;
  5. use crate::wire::ip::{checksum, pretty_print_ip_payload};
  6. pub use super::IpProtocol as Protocol;
  7. /// Minimum MTU required of all links supporting IPv4. See [RFC 791 § 3.1].
  8. ///
  9. /// [RFC 791 § 3.1]: https://tools.ietf.org/html/rfc791#section-3.1
  10. // RFC 791 states the following:
  11. //
  12. // > Every internet module must be able to forward a datagram of 68
  13. // > octets without further fragmentation... Every internet destination
  14. // > must be able to receive a datagram of 576 octets either in one piece
  15. // > or in fragments to be reassembled.
  16. //
  17. // As a result, we can assume that every host we send packets to can
  18. // accept a packet of the following size.
  19. pub const MIN_MTU: usize = 576;
  20. /// A four-octet IPv4 address.
  21. #[derive(Debug, Hash, PartialEq, Eq, PartialOrd, Ord, Clone, Copy, Default)]
  22. pub struct Address(pub [u8; 4]);
  23. impl Address {
  24. /// An unspecified address.
  25. pub const UNSPECIFIED: Address = Address([0x00; 4]);
  26. /// The broadcast address.
  27. pub const BROADCAST: Address = Address([0xff; 4]);
  28. /// All multicast-capable nodes
  29. pub const MULTICAST_ALL_SYSTEMS: Address = Address([224, 0, 0, 1]);
  30. /// All multicast-capable routers
  31. pub const MULTICAST_ALL_ROUTERS: Address = Address([224, 0, 0, 2]);
  32. /// Construct an IPv4 address from parts.
  33. pub fn new(a0: u8, a1: u8, a2: u8, a3: u8) -> Address {
  34. Address([a0, a1, a2, a3])
  35. }
  36. /// Construct an IPv4 address from a sequence of octets, in big-endian.
  37. ///
  38. /// # Panics
  39. /// The function panics if `data` is not four octets long.
  40. pub fn from_bytes(data: &[u8]) -> Address {
  41. let mut bytes = [0; 4];
  42. bytes.copy_from_slice(data);
  43. Address(bytes)
  44. }
  45. /// Return an IPv4 address as a sequence of octets, in big-endian.
  46. pub fn as_bytes(&self) -> &[u8] {
  47. &self.0
  48. }
  49. /// Query whether the address is an unicast address.
  50. pub fn is_unicast(&self) -> bool {
  51. !(self.is_broadcast() ||
  52. self.is_multicast() ||
  53. self.is_unspecified())
  54. }
  55. /// Query whether the address is the broadcast address.
  56. pub fn is_broadcast(&self) -> bool {
  57. self.0[0..4] == [255; 4]
  58. }
  59. /// Query whether the address is a multicast address.
  60. pub fn is_multicast(&self) -> bool {
  61. self.0[0] & 0xf0 == 224
  62. }
  63. /// Query whether the address falls into the "unspecified" range.
  64. pub fn is_unspecified(&self) -> bool {
  65. self.0[0] == 0
  66. }
  67. /// Query whether the address falls into the "link-local" range.
  68. pub fn is_link_local(&self) -> bool {
  69. self.0[0..2] == [169, 254]
  70. }
  71. /// Query whether the address falls into the "loopback" range.
  72. pub fn is_loopback(&self) -> bool {
  73. self.0[0] == 127
  74. }
  75. }
  76. #[cfg(feature = "std")]
  77. impl From<::std::net::Ipv4Addr> for Address {
  78. fn from(x: ::std::net::Ipv4Addr) -> Address {
  79. Address(x.octets())
  80. }
  81. }
  82. #[cfg(feature = "std")]
  83. impl From<Address> for ::std::net::Ipv4Addr {
  84. fn from(Address(x): Address) -> ::std::net::Ipv4Addr {
  85. x.into()
  86. }
  87. }
  88. impl fmt::Display for Address {
  89. fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
  90. let bytes = self.0;
  91. write!(f, "{}.{}.{}.{}", bytes[0], bytes[1], bytes[2], bytes[3])
  92. }
  93. }
  94. /// A specification of an IPv4 CIDR block, containing an address and a variable-length
  95. /// subnet masking prefix length.
  96. #[derive(Debug, Hash, PartialEq, Eq, PartialOrd, Ord, Clone, Copy, Default)]
  97. pub struct Cidr {
  98. address: Address,
  99. prefix_len: u8,
  100. }
  101. impl Cidr {
  102. /// Create an IPv4 CIDR block from the given address and prefix length.
  103. ///
  104. /// # Panics
  105. /// This function panics if the prefix length is larger than 32.
  106. pub fn new(address: Address, prefix_len: u8) -> Cidr {
  107. assert!(prefix_len <= 32);
  108. Cidr { address, prefix_len }
  109. }
  110. /// Create an IPv4 CIDR block from the given address and network mask.
  111. pub fn from_netmask(addr: Address, netmask: Address) -> Result<Cidr> {
  112. let netmask = NetworkEndian::read_u32(&netmask.0[..]);
  113. if netmask.leading_zeros() == 0 && netmask.trailing_zeros() == netmask.count_zeros() {
  114. Ok(Cidr { address: addr, prefix_len: netmask.count_ones() as u8 })
  115. } else {
  116. Err(Error::Illegal)
  117. }
  118. }
  119. /// Return the address of this IPv4 CIDR block.
  120. pub fn address(&self) -> Address {
  121. self.address
  122. }
  123. /// Return the prefix length of this IPv4 CIDR block.
  124. pub fn prefix_len(&self) -> u8 {
  125. self.prefix_len
  126. }
  127. /// Return the network mask of this IPv4 CIDR.
  128. pub fn netmask(&self) -> Address {
  129. if self.prefix_len == 0 {
  130. return Address([0, 0, 0, 0]);
  131. }
  132. let number = 0xffffffffu32 << (32 - self.prefix_len);
  133. let data = [
  134. ((number >> 24) & 0xff) as u8,
  135. ((number >> 16) & 0xff) as u8,
  136. ((number >> 8) & 0xff) as u8,
  137. ((number >> 0) & 0xff) as u8,
  138. ];
  139. Address(data)
  140. }
  141. /// Return the broadcast address of this IPv4 CIDR.
  142. pub fn broadcast(&self) -> Option<Address> {
  143. let network = self.network();
  144. if network.prefix_len == 31 || network.prefix_len == 32 {
  145. return None;
  146. }
  147. let network_number = NetworkEndian::read_u32(&network.address.0[..]);
  148. let number = network_number | 0xffffffffu32 >> network.prefix_len;
  149. let data = [
  150. ((number >> 24) & 0xff) as u8,
  151. ((number >> 16) & 0xff) as u8,
  152. ((number >> 8) & 0xff) as u8,
  153. ((number >> 0) & 0xff) as u8,
  154. ];
  155. Some(Address(data))
  156. }
  157. /// Return the network block of this IPv4 CIDR.
  158. pub fn network(&self) -> Cidr {
  159. let mask = self.netmask().0;
  160. let network = [
  161. self.address.0[0] & mask[0],
  162. self.address.0[1] & mask[1],
  163. self.address.0[2] & mask[2],
  164. self.address.0[3] & mask[3],
  165. ];
  166. Cidr { address: Address(network), prefix_len: self.prefix_len }
  167. }
  168. /// Query whether the subnetwork described by this IPv4 CIDR block contains
  169. /// the given address.
  170. pub fn contains_addr(&self, addr: &Address) -> bool {
  171. // right shift by 32 is not legal
  172. if self.prefix_len == 0 { return true }
  173. let shift = 32 - self.prefix_len;
  174. let self_prefix = NetworkEndian::read_u32(self.address.as_bytes()) >> shift;
  175. let addr_prefix = NetworkEndian::read_u32(addr.as_bytes()) >> shift;
  176. self_prefix == addr_prefix
  177. }
  178. /// Query whether the subnetwork described by this IPv4 CIDR block contains
  179. /// the subnetwork described by the given IPv4 CIDR block.
  180. pub fn contains_subnet(&self, subnet: &Cidr) -> bool {
  181. self.prefix_len <= subnet.prefix_len && self.contains_addr(&subnet.address)
  182. }
  183. }
  184. impl fmt::Display for Cidr {
  185. fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
  186. write!(f, "{}/{}", self.address, self.prefix_len)
  187. }
  188. }
  189. /// A read/write wrapper around an Internet Protocol version 4 packet buffer.
  190. #[derive(Debug, PartialEq, Clone)]
  191. pub struct Packet<T: AsRef<[u8]>> {
  192. buffer: T
  193. }
  194. mod field {
  195. use crate::wire::field::*;
  196. pub const VER_IHL: usize = 0;
  197. pub const DSCP_ECN: usize = 1;
  198. pub const LENGTH: Field = 2..4;
  199. pub const IDENT: Field = 4..6;
  200. pub const FLG_OFF: Field = 6..8;
  201. pub const TTL: usize = 8;
  202. pub const PROTOCOL: usize = 9;
  203. pub const CHECKSUM: Field = 10..12;
  204. pub const SRC_ADDR: Field = 12..16;
  205. pub const DST_ADDR: Field = 16..20;
  206. }
  207. impl<T: AsRef<[u8]>> Packet<T> {
  208. /// Imbue a raw octet buffer with IPv4 packet structure.
  209. pub fn new_unchecked(buffer: T) -> Packet<T> {
  210. Packet { buffer }
  211. }
  212. /// Shorthand for a combination of [new_unchecked] and [check_len].
  213. ///
  214. /// [new_unchecked]: #method.new_unchecked
  215. /// [check_len]: #method.check_len
  216. pub fn new_checked(buffer: T) -> Result<Packet<T>> {
  217. let packet = Self::new_unchecked(buffer);
  218. packet.check_len()?;
  219. Ok(packet)
  220. }
  221. /// Ensure that no accessor method will panic if called.
  222. /// Returns `Err(Error::Truncated)` if the buffer is too short.
  223. /// Returns `Err(Error::Malformed)` if the header length is greater
  224. /// than total length.
  225. ///
  226. /// The result of this check is invalidated by calling [set_header_len]
  227. /// and [set_total_len].
  228. ///
  229. /// [set_header_len]: #method.set_header_len
  230. /// [set_total_len]: #method.set_total_len
  231. #[allow(clippy::if_same_then_else)]
  232. pub fn check_len(&self) -> Result<()> {
  233. let len = self.buffer.as_ref().len();
  234. if len < field::DST_ADDR.end {
  235. Err(Error::Truncated)
  236. } else if len < self.header_len() as usize {
  237. Err(Error::Truncated)
  238. } else if self.header_len() as u16 > self.total_len() {
  239. Err(Error::Malformed)
  240. } else if len < self.total_len() as usize {
  241. Err(Error::Truncated)
  242. } else {
  243. Ok(())
  244. }
  245. }
  246. /// Consume the packet, returning the underlying buffer.
  247. pub fn into_inner(self) -> T {
  248. self.buffer
  249. }
  250. /// Return the version field.
  251. #[inline]
  252. pub fn version(&self) -> u8 {
  253. let data = self.buffer.as_ref();
  254. data[field::VER_IHL] >> 4
  255. }
  256. /// Return the header length, in octets.
  257. #[inline]
  258. pub fn header_len(&self) -> u8 {
  259. let data = self.buffer.as_ref();
  260. (data[field::VER_IHL] & 0x0f) * 4
  261. }
  262. /// Return the Differential Services Code Point field.
  263. pub fn dscp(&self) -> u8 {
  264. let data = self.buffer.as_ref();
  265. data[field::DSCP_ECN] >> 2
  266. }
  267. /// Return the Explicit Congestion Notification field.
  268. pub fn ecn(&self) -> u8 {
  269. let data = self.buffer.as_ref();
  270. data[field::DSCP_ECN] & 0x03
  271. }
  272. /// Return the total length field.
  273. #[inline]
  274. pub fn total_len(&self) -> u16 {
  275. let data = self.buffer.as_ref();
  276. NetworkEndian::read_u16(&data[field::LENGTH])
  277. }
  278. /// Return the fragment identification field.
  279. #[inline]
  280. pub fn ident(&self) -> u16 {
  281. let data = self.buffer.as_ref();
  282. NetworkEndian::read_u16(&data[field::IDENT])
  283. }
  284. /// Return the "don't fragment" flag.
  285. #[inline]
  286. pub fn dont_frag(&self) -> bool {
  287. let data = self.buffer.as_ref();
  288. NetworkEndian::read_u16(&data[field::FLG_OFF]) & 0x4000 != 0
  289. }
  290. /// Return the "more fragments" flag.
  291. #[inline]
  292. pub fn more_frags(&self) -> bool {
  293. let data = self.buffer.as_ref();
  294. NetworkEndian::read_u16(&data[field::FLG_OFF]) & 0x2000 != 0
  295. }
  296. /// Return the fragment offset, in octets.
  297. #[inline]
  298. pub fn frag_offset(&self) -> u16 {
  299. let data = self.buffer.as_ref();
  300. NetworkEndian::read_u16(&data[field::FLG_OFF]) << 3
  301. }
  302. /// Return the time to live field.
  303. #[inline]
  304. pub fn hop_limit(&self) -> u8 {
  305. let data = self.buffer.as_ref();
  306. data[field::TTL]
  307. }
  308. /// Return the protocol field.
  309. #[inline]
  310. pub fn protocol(&self) -> Protocol {
  311. let data = self.buffer.as_ref();
  312. Protocol::from(data[field::PROTOCOL])
  313. }
  314. /// Return the header checksum field.
  315. #[inline]
  316. pub fn checksum(&self) -> u16 {
  317. let data = self.buffer.as_ref();
  318. NetworkEndian::read_u16(&data[field::CHECKSUM])
  319. }
  320. /// Return the source address field.
  321. #[inline]
  322. pub fn src_addr(&self) -> Address {
  323. let data = self.buffer.as_ref();
  324. Address::from_bytes(&data[field::SRC_ADDR])
  325. }
  326. /// Return the destination address field.
  327. #[inline]
  328. pub fn dst_addr(&self) -> Address {
  329. let data = self.buffer.as_ref();
  330. Address::from_bytes(&data[field::DST_ADDR])
  331. }
  332. /// Validate the header checksum.
  333. ///
  334. /// # Fuzzing
  335. /// This function always returns `true` when fuzzing.
  336. pub fn verify_checksum(&self) -> bool {
  337. if cfg!(fuzzing) { return true }
  338. let data = self.buffer.as_ref();
  339. checksum::data(&data[..self.header_len() as usize]) == !0
  340. }
  341. }
  342. impl<'a, T: AsRef<[u8]> + ?Sized> Packet<&'a T> {
  343. /// Return a pointer to the payload.
  344. #[inline]
  345. pub fn payload(&self) -> &'a [u8] {
  346. let range = self.header_len() as usize..self.total_len() as usize;
  347. let data = self.buffer.as_ref();
  348. &data[range]
  349. }
  350. }
  351. impl<T: AsRef<[u8]> + AsMut<[u8]>> Packet<T> {
  352. /// Set the version field.
  353. #[inline]
  354. pub fn set_version(&mut self, value: u8) {
  355. let data = self.buffer.as_mut();
  356. data[field::VER_IHL] = (data[field::VER_IHL] & !0xf0) | (value << 4);
  357. }
  358. /// Set the header length, in octets.
  359. #[inline]
  360. pub fn set_header_len(&mut self, value: u8) {
  361. let data = self.buffer.as_mut();
  362. data[field::VER_IHL] = (data[field::VER_IHL] & !0x0f) | ((value / 4) & 0x0f);
  363. }
  364. /// Set the Differential Services Code Point field.
  365. pub fn set_dscp(&mut self, value: u8) {
  366. let data = self.buffer.as_mut();
  367. data[field::DSCP_ECN] = (data[field::DSCP_ECN] & !0xfc) | (value << 2)
  368. }
  369. /// Set the Explicit Congestion Notification field.
  370. pub fn set_ecn(&mut self, value: u8) {
  371. let data = self.buffer.as_mut();
  372. data[field::DSCP_ECN] = (data[field::DSCP_ECN] & !0x03) | (value & 0x03)
  373. }
  374. /// Set the total length field.
  375. #[inline]
  376. pub fn set_total_len(&mut self, value: u16) {
  377. let data = self.buffer.as_mut();
  378. NetworkEndian::write_u16(&mut data[field::LENGTH], value)
  379. }
  380. /// Set the fragment identification field.
  381. #[inline]
  382. pub fn set_ident(&mut self, value: u16) {
  383. let data = self.buffer.as_mut();
  384. NetworkEndian::write_u16(&mut data[field::IDENT], value)
  385. }
  386. /// Clear the entire flags field.
  387. #[inline]
  388. pub fn clear_flags(&mut self) {
  389. let data = self.buffer.as_mut();
  390. let raw = NetworkEndian::read_u16(&data[field::FLG_OFF]);
  391. let raw = raw & !0xe000;
  392. NetworkEndian::write_u16(&mut data[field::FLG_OFF], raw);
  393. }
  394. /// Set the "don't fragment" flag.
  395. #[inline]
  396. pub fn set_dont_frag(&mut self, value: bool) {
  397. let data = self.buffer.as_mut();
  398. let raw = NetworkEndian::read_u16(&data[field::FLG_OFF]);
  399. let raw = if value { raw | 0x4000 } else { raw & !0x4000 };
  400. NetworkEndian::write_u16(&mut data[field::FLG_OFF], raw);
  401. }
  402. /// Set the "more fragments" flag.
  403. #[inline]
  404. pub fn set_more_frags(&mut self, value: bool) {
  405. let data = self.buffer.as_mut();
  406. let raw = NetworkEndian::read_u16(&data[field::FLG_OFF]);
  407. let raw = if value { raw | 0x2000 } else { raw & !0x2000 };
  408. NetworkEndian::write_u16(&mut data[field::FLG_OFF], raw);
  409. }
  410. /// Set the fragment offset, in octets.
  411. #[inline]
  412. pub fn set_frag_offset(&mut self, value: u16) {
  413. let data = self.buffer.as_mut();
  414. let raw = NetworkEndian::read_u16(&data[field::FLG_OFF]);
  415. let raw = (raw & 0xe000) | (value >> 3);
  416. NetworkEndian::write_u16(&mut data[field::FLG_OFF], raw);
  417. }
  418. /// Set the time to live field.
  419. #[inline]
  420. pub fn set_hop_limit(&mut self, value: u8) {
  421. let data = self.buffer.as_mut();
  422. data[field::TTL] = value
  423. }
  424. /// Set the protocol field.
  425. #[inline]
  426. pub fn set_protocol(&mut self, value: Protocol) {
  427. let data = self.buffer.as_mut();
  428. data[field::PROTOCOL] = value.into()
  429. }
  430. /// Set the header checksum field.
  431. #[inline]
  432. pub fn set_checksum(&mut self, value: u16) {
  433. let data = self.buffer.as_mut();
  434. NetworkEndian::write_u16(&mut data[field::CHECKSUM], value)
  435. }
  436. /// Set the source address field.
  437. #[inline]
  438. pub fn set_src_addr(&mut self, value: Address) {
  439. let data = self.buffer.as_mut();
  440. data[field::SRC_ADDR].copy_from_slice(value.as_bytes())
  441. }
  442. /// Set the destination address field.
  443. #[inline]
  444. pub fn set_dst_addr(&mut self, value: Address) {
  445. let data = self.buffer.as_mut();
  446. data[field::DST_ADDR].copy_from_slice(value.as_bytes())
  447. }
  448. /// Compute and fill in the header checksum.
  449. pub fn fill_checksum(&mut self) {
  450. self.set_checksum(0);
  451. let checksum = {
  452. let data = self.buffer.as_ref();
  453. !checksum::data(&data[..self.header_len() as usize])
  454. };
  455. self.set_checksum(checksum)
  456. }
  457. /// Return a mutable pointer to the payload.
  458. #[inline]
  459. pub fn payload_mut(&mut self) -> &mut [u8] {
  460. let range = self.header_len() as usize..self.total_len() as usize;
  461. let data = self.buffer.as_mut();
  462. &mut data[range]
  463. }
  464. }
  465. impl<T: AsRef<[u8]>> AsRef<[u8]> for Packet<T> {
  466. fn as_ref(&self) -> &[u8] {
  467. self.buffer.as_ref()
  468. }
  469. }
  470. /// A high-level representation of an Internet Protocol version 4 packet header.
  471. #[derive(Debug, PartialEq, Eq, Clone, Copy)]
  472. pub struct Repr {
  473. pub src_addr: Address,
  474. pub dst_addr: Address,
  475. pub protocol: Protocol,
  476. pub payload_len: usize,
  477. pub hop_limit: u8
  478. }
  479. impl Repr {
  480. /// Parse an Internet Protocol version 4 packet and return a high-level representation.
  481. pub fn parse<T: AsRef<[u8]> + ?Sized>(packet: &Packet<&T>,
  482. checksum_caps: &ChecksumCapabilities) -> Result<Repr> {
  483. // Version 4 is expected.
  484. if packet.version() != 4 { return Err(Error::Malformed) }
  485. // Valid checksum is expected.
  486. if checksum_caps.ipv4.rx() && !packet.verify_checksum() { return Err(Error::Checksum) }
  487. // We do not support fragmentation.
  488. if packet.more_frags() || packet.frag_offset() != 0 { return Err(Error::Fragmented) }
  489. // Since the packet is not fragmented, it must include the entire payload.
  490. let payload_len = packet.total_len() as usize - packet.header_len() as usize;
  491. if packet.payload().len() < payload_len { return Err(Error::Truncated) }
  492. // All DSCP values are acceptable, since they are of no concern to receiving endpoint.
  493. // All ECN values are acceptable, since ECN requires opt-in from both endpoints.
  494. // All TTL values are acceptable, since we do not perform routing.
  495. Ok(Repr {
  496. src_addr: packet.src_addr(),
  497. dst_addr: packet.dst_addr(),
  498. protocol: packet.protocol(),
  499. payload_len: payload_len,
  500. hop_limit: packet.hop_limit()
  501. })
  502. }
  503. /// Return the length of a header that will be emitted from this high-level representation.
  504. pub fn buffer_len(&self) -> usize {
  505. // We never emit any options.
  506. field::DST_ADDR.end
  507. }
  508. /// Emit a high-level representation into an Internet Protocol version 4 packet.
  509. pub fn emit<T: AsRef<[u8]> + AsMut<[u8]>>(&self, packet: &mut Packet<T>, checksum_caps: &ChecksumCapabilities) {
  510. packet.set_version(4);
  511. packet.set_header_len(field::DST_ADDR.end as u8);
  512. packet.set_dscp(0);
  513. packet.set_ecn(0);
  514. let total_len = packet.header_len() as u16 + self.payload_len as u16;
  515. packet.set_total_len(total_len);
  516. packet.set_ident(0);
  517. packet.clear_flags();
  518. packet.set_more_frags(false);
  519. packet.set_dont_frag(true);
  520. packet.set_frag_offset(0);
  521. packet.set_hop_limit(self.hop_limit);
  522. packet.set_protocol(self.protocol);
  523. packet.set_src_addr(self.src_addr);
  524. packet.set_dst_addr(self.dst_addr);
  525. if checksum_caps.ipv4.tx() {
  526. packet.fill_checksum();
  527. } else {
  528. // make sure we get a consistently zeroed checksum,
  529. // since implementations might rely on it
  530. packet.set_checksum(0);
  531. }
  532. }
  533. }
  534. impl<'a, T: AsRef<[u8]> + ?Sized> fmt::Display for Packet<&'a T> {
  535. fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
  536. match Repr::parse(self, &ChecksumCapabilities::ignored()) {
  537. Ok(repr) => write!(f, "{}", repr),
  538. Err(err) => {
  539. write!(f, "IPv4 ({})", err)?;
  540. write!(f, " src={} dst={} proto={} hop_limit={}",
  541. self.src_addr(), self.dst_addr(), self.protocol(), self.hop_limit())?;
  542. if self.version() != 4 {
  543. write!(f, " ver={}", self.version())?;
  544. }
  545. if self.header_len() != 20 {
  546. write!(f, " hlen={}", self.header_len())?;
  547. }
  548. if self.dscp() != 0 {
  549. write!(f, " dscp={}", self.dscp())?;
  550. }
  551. if self.ecn() != 0 {
  552. write!(f, " ecn={}", self.ecn())?;
  553. }
  554. write!(f, " tlen={}", self.total_len())?;
  555. if self.dont_frag() {
  556. write!(f, " df")?;
  557. }
  558. if self.more_frags() {
  559. write!(f, " mf")?;
  560. }
  561. if self.frag_offset() != 0 {
  562. write!(f, " off={}", self.frag_offset())?;
  563. }
  564. if self.more_frags() || self.frag_offset() != 0 {
  565. write!(f, " id={}", self.ident())?;
  566. }
  567. Ok(())
  568. }
  569. }
  570. }
  571. }
  572. impl fmt::Display for Repr {
  573. fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
  574. write!(f, "IPv4 src={} dst={} proto={}",
  575. self.src_addr, self.dst_addr, self.protocol)
  576. }
  577. }
  578. use crate::wire::pretty_print::{PrettyPrint, PrettyIndent};
  579. impl<T: AsRef<[u8]>> PrettyPrint for Packet<T> {
  580. fn pretty_print(buffer: &dyn AsRef<[u8]>, f: &mut fmt::Formatter,
  581. indent: &mut PrettyIndent) -> fmt::Result {
  582. use crate::wire::ip::checksum::format_checksum;
  583. let checksum_caps = ChecksumCapabilities::ignored();
  584. let (ip_repr, payload) = match Packet::new_checked(buffer) {
  585. Err(err) => return write!(f, "{}({})", indent, err),
  586. Ok(ip_packet) => {
  587. match Repr::parse(&ip_packet, &checksum_caps) {
  588. Err(_) => return Ok(()),
  589. Ok(ip_repr) => {
  590. write!(f, "{}{}", indent, ip_repr)?;
  591. format_checksum(f, ip_packet.verify_checksum())?;
  592. (ip_repr, ip_packet.payload())
  593. }
  594. }
  595. }
  596. };
  597. pretty_print_ip_payload(f, indent, ip_repr, payload)
  598. }
  599. }
  600. #[cfg(test)]
  601. mod test {
  602. use super::*;
  603. static PACKET_BYTES: [u8; 30] =
  604. [0x45, 0x00, 0x00, 0x1e,
  605. 0x01, 0x02, 0x62, 0x03,
  606. 0x1a, 0x01, 0xd5, 0x6e,
  607. 0x11, 0x12, 0x13, 0x14,
  608. 0x21, 0x22, 0x23, 0x24,
  609. 0xaa, 0x00, 0x00, 0x00,
  610. 0x00, 0x00, 0x00, 0x00,
  611. 0x00, 0xff];
  612. static PAYLOAD_BYTES: [u8; 10] =
  613. [0xaa, 0x00, 0x00, 0x00,
  614. 0x00, 0x00, 0x00, 0x00,
  615. 0x00, 0xff];
  616. #[test]
  617. fn test_deconstruct() {
  618. let packet = Packet::new_unchecked(&PACKET_BYTES[..]);
  619. assert_eq!(packet.version(), 4);
  620. assert_eq!(packet.header_len(), 20);
  621. assert_eq!(packet.dscp(), 0);
  622. assert_eq!(packet.ecn(), 0);
  623. assert_eq!(packet.total_len(), 30);
  624. assert_eq!(packet.ident(), 0x102);
  625. assert_eq!(packet.more_frags(), true);
  626. assert_eq!(packet.dont_frag(), true);
  627. assert_eq!(packet.frag_offset(), 0x203 * 8);
  628. assert_eq!(packet.hop_limit(), 0x1a);
  629. assert_eq!(packet.protocol(), Protocol::Icmp);
  630. assert_eq!(packet.checksum(), 0xd56e);
  631. assert_eq!(packet.src_addr(), Address([0x11, 0x12, 0x13, 0x14]));
  632. assert_eq!(packet.dst_addr(), Address([0x21, 0x22, 0x23, 0x24]));
  633. assert_eq!(packet.verify_checksum(), true);
  634. assert_eq!(packet.payload(), &PAYLOAD_BYTES[..]);
  635. }
  636. #[test]
  637. fn test_construct() {
  638. let mut bytes = vec![0xa5; 30];
  639. let mut packet = Packet::new_unchecked(&mut bytes);
  640. packet.set_version(4);
  641. packet.set_header_len(20);
  642. packet.clear_flags();
  643. packet.set_dscp(0);
  644. packet.set_ecn(0);
  645. packet.set_total_len(30);
  646. packet.set_ident(0x102);
  647. packet.set_more_frags(true);
  648. packet.set_dont_frag(true);
  649. packet.set_frag_offset(0x203 * 8);
  650. packet.set_hop_limit(0x1a);
  651. packet.set_protocol(Protocol::Icmp);
  652. packet.set_src_addr(Address([0x11, 0x12, 0x13, 0x14]));
  653. packet.set_dst_addr(Address([0x21, 0x22, 0x23, 0x24]));
  654. packet.fill_checksum();
  655. packet.payload_mut().copy_from_slice(&PAYLOAD_BYTES[..]);
  656. assert_eq!(&packet.into_inner()[..], &PACKET_BYTES[..]);
  657. }
  658. #[test]
  659. fn test_overlong() {
  660. let mut bytes = vec![];
  661. bytes.extend(&PACKET_BYTES[..]);
  662. bytes.push(0);
  663. assert_eq!(Packet::new_unchecked(&bytes).payload().len(),
  664. PAYLOAD_BYTES.len());
  665. assert_eq!(Packet::new_unchecked(&mut bytes).payload_mut().len(),
  666. PAYLOAD_BYTES.len());
  667. }
  668. #[test]
  669. fn test_total_len_overflow() {
  670. let mut bytes = vec![];
  671. bytes.extend(&PACKET_BYTES[..]);
  672. Packet::new_unchecked(&mut bytes).set_total_len(128);
  673. assert_eq!(Packet::new_checked(&bytes).unwrap_err(),
  674. Error::Truncated);
  675. }
  676. static REPR_PACKET_BYTES: [u8; 24] =
  677. [0x45, 0x00, 0x00, 0x18,
  678. 0x00, 0x00, 0x40, 0x00,
  679. 0x40, 0x01, 0xd2, 0x79,
  680. 0x11, 0x12, 0x13, 0x14,
  681. 0x21, 0x22, 0x23, 0x24,
  682. 0xaa, 0x00, 0x00, 0xff];
  683. static REPR_PAYLOAD_BYTES: [u8; 4] =
  684. [0xaa, 0x00, 0x00, 0xff];
  685. fn packet_repr() -> Repr {
  686. Repr {
  687. src_addr: Address([0x11, 0x12, 0x13, 0x14]),
  688. dst_addr: Address([0x21, 0x22, 0x23, 0x24]),
  689. protocol: Protocol::Icmp,
  690. payload_len: 4,
  691. hop_limit: 64
  692. }
  693. }
  694. #[test]
  695. fn test_parse() {
  696. let packet = Packet::new_unchecked(&REPR_PACKET_BYTES[..]);
  697. let repr = Repr::parse(&packet, &ChecksumCapabilities::default()).unwrap();
  698. assert_eq!(repr, packet_repr());
  699. }
  700. #[test]
  701. fn test_parse_bad_version() {
  702. let mut bytes = vec![0; 24];
  703. bytes.copy_from_slice(&REPR_PACKET_BYTES[..]);
  704. let mut packet = Packet::new_unchecked(&mut bytes);
  705. packet.set_version(6);
  706. packet.fill_checksum();
  707. let packet = Packet::new_unchecked(&*packet.into_inner());
  708. assert_eq!(Repr::parse(&packet, &ChecksumCapabilities::default()), Err(Error::Malformed));
  709. }
  710. #[test]
  711. fn test_parse_total_len_less_than_header_len() {
  712. let mut bytes = vec![0; 40];
  713. bytes[0] = 0x09;
  714. assert_eq!(Packet::new_checked(&mut bytes), Err(Error::Malformed));
  715. }
  716. #[test]
  717. fn test_emit() {
  718. let repr = packet_repr();
  719. let mut bytes = vec![0xa5; repr.buffer_len() + REPR_PAYLOAD_BYTES.len()];
  720. let mut packet = Packet::new_unchecked(&mut bytes);
  721. repr.emit(&mut packet, &ChecksumCapabilities::default());
  722. packet.payload_mut().copy_from_slice(&REPR_PAYLOAD_BYTES);
  723. assert_eq!(&packet.into_inner()[..], &REPR_PACKET_BYTES[..]);
  724. }
  725. #[test]
  726. fn test_unspecified() {
  727. assert!(Address::UNSPECIFIED.is_unspecified());
  728. assert!(!Address::UNSPECIFIED.is_broadcast());
  729. assert!(!Address::UNSPECIFIED.is_multicast());
  730. assert!(!Address::UNSPECIFIED.is_link_local());
  731. assert!(!Address::UNSPECIFIED.is_loopback());
  732. }
  733. #[test]
  734. fn test_broadcast() {
  735. assert!(!Address::BROADCAST.is_unspecified());
  736. assert!(Address::BROADCAST.is_broadcast());
  737. assert!(!Address::BROADCAST.is_multicast());
  738. assert!(!Address::BROADCAST.is_link_local());
  739. assert!(!Address::BROADCAST.is_loopback());
  740. }
  741. #[test]
  742. fn test_cidr() {
  743. let cidr = Cidr::new(Address::new(192, 168, 1, 10), 24);
  744. let inside_subnet = [
  745. [192, 168, 1, 0], [192, 168, 1, 1],
  746. [192, 168, 1, 2], [192, 168, 1, 10],
  747. [192, 168, 1, 127], [192, 168, 1, 255],
  748. ];
  749. let outside_subnet = [
  750. [192, 168, 0, 0], [127, 0, 0, 1],
  751. [192, 168, 2, 0], [192, 168, 0, 255],
  752. [ 0, 0, 0, 0], [255, 255, 255, 255],
  753. ];
  754. let subnets = [
  755. ([192, 168, 1, 0], 32),
  756. ([192, 168, 1, 255], 24),
  757. ([192, 168, 1, 10], 30),
  758. ];
  759. let not_subnets = [
  760. ([192, 168, 1, 10], 23),
  761. ([127, 0, 0, 1], 8),
  762. ([192, 168, 1, 0], 0),
  763. ([192, 168, 0, 255], 32),
  764. ];
  765. for addr in inside_subnet.iter().map(|a| Address::from_bytes(a)) {
  766. assert!(cidr.contains_addr(&addr));
  767. }
  768. for addr in outside_subnet.iter().map(|a| Address::from_bytes(a)) {
  769. assert!(!cidr.contains_addr(&addr));
  770. }
  771. for subnet in subnets.iter().map(
  772. |&(a, p)| Cidr::new(Address::new(a[0], a[1], a[2], a[3]), p)) {
  773. assert!(cidr.contains_subnet(&subnet));
  774. }
  775. for subnet in not_subnets.iter().map(
  776. |&(a, p)| Cidr::new(Address::new(a[0], a[1], a[2], a[3]), p)) {
  777. assert!(!cidr.contains_subnet(&subnet));
  778. }
  779. let cidr_without_prefix = Cidr::new(cidr.address(), 0);
  780. assert!(cidr_without_prefix.contains_addr(&Address::new(127, 0, 0, 1)));
  781. }
  782. #[test]
  783. fn test_cidr_from_netmask() {
  784. assert_eq!(Cidr::from_netmask(Address([0, 0, 0, 0]), Address([1, 0, 2, 0])).is_err(),
  785. true);
  786. assert_eq!(Cidr::from_netmask(Address([0, 0, 0, 0]), Address([0, 0, 0, 0])).is_err(),
  787. true);
  788. assert_eq!(Cidr::from_netmask(Address([0, 0, 0, 1]), Address([255, 255, 255, 0])).unwrap(),
  789. Cidr::new(Address([0, 0, 0, 1]), 24));
  790. assert_eq!(Cidr::from_netmask(Address([192, 168, 0, 1]), Address([255, 255, 0, 0])).unwrap(),
  791. Cidr::new(Address([192, 168, 0, 1]), 16));
  792. assert_eq!(Cidr::from_netmask(Address([172, 16, 0, 1]), Address([255, 240, 0, 0])).unwrap(),
  793. Cidr::new(Address([172, 16, 0, 1]), 12));
  794. assert_eq!(Cidr::from_netmask(Address([255, 255, 255, 1]), Address([255, 255, 255, 0])).unwrap(),
  795. Cidr::new(Address([255, 255, 255, 1]), 24));
  796. assert_eq!(Cidr::from_netmask(Address([255, 255, 255, 255]), Address([255, 255, 255, 255])).unwrap(),
  797. Cidr::new(Address([255, 255, 255, 255]), 32));
  798. }
  799. #[test]
  800. fn test_cidr_netmask() {
  801. assert_eq!(Cidr::new(Address([0, 0, 0, 0]), 0).netmask(),
  802. Address([0, 0, 0, 0]));
  803. assert_eq!(Cidr::new(Address([0, 0, 0, 1]), 24).netmask(),
  804. Address([255, 255, 255, 0]));
  805. assert_eq!(Cidr::new(Address([0, 0, 0, 0]), 32).netmask(),
  806. Address([255, 255, 255, 255]));
  807. assert_eq!(Cidr::new(Address([127, 0, 0, 0]), 8).netmask(),
  808. Address([255, 0, 0, 0]));
  809. assert_eq!(Cidr::new(Address([192, 168, 0, 0]), 16).netmask(),
  810. Address([255, 255, 0, 0]));
  811. assert_eq!(Cidr::new(Address([192, 168, 1, 1]), 16).netmask(),
  812. Address([255, 255, 0, 0]));
  813. assert_eq!(Cidr::new(Address([192, 168, 1, 1]), 17).netmask(),
  814. Address([255, 255, 128, 0]));
  815. assert_eq!(Cidr::new(Address([172, 16, 0, 0]), 12).netmask(),
  816. Address([255, 240, 0, 0]));
  817. assert_eq!(Cidr::new(Address([255, 255, 255, 1]), 24).netmask(),
  818. Address([255, 255, 255, 0]));
  819. assert_eq!(Cidr::new(Address([255, 255, 255, 255]), 32).netmask(),
  820. Address([255, 255, 255, 255]));
  821. }
  822. #[test]
  823. fn test_cidr_broadcast() {
  824. assert_eq!(Cidr::new(Address([0, 0, 0, 0]), 0).broadcast().unwrap(),
  825. Address([255, 255, 255, 255]));
  826. assert_eq!(Cidr::new(Address([0, 0, 0, 1]), 24).broadcast().unwrap(),
  827. Address([0, 0, 0, 255]));
  828. assert_eq!(Cidr::new(Address([0, 0, 0, 0]), 32).broadcast(),
  829. None);
  830. assert_eq!(Cidr::new(Address([127, 0, 0, 0]), 8).broadcast().unwrap(),
  831. Address([127, 255, 255, 255]));
  832. assert_eq!(Cidr::new(Address([192, 168, 0, 0]), 16).broadcast().unwrap(),
  833. Address([192, 168, 255, 255]));
  834. assert_eq!(Cidr::new(Address([192, 168, 1, 1]), 16).broadcast().unwrap(),
  835. Address([192, 168, 255, 255]));
  836. assert_eq!(Cidr::new(Address([192, 168, 1, 1]), 17).broadcast().unwrap(),
  837. Address([192, 168, 127, 255]));
  838. assert_eq!(Cidr::new(Address([172, 16, 0, 1]), 12).broadcast().unwrap(),
  839. Address([172, 31, 255, 255]));
  840. assert_eq!(Cidr::new(Address([255, 255, 255, 1]), 24).broadcast().unwrap(),
  841. Address([255, 255, 255, 255]));
  842. assert_eq!(Cidr::new(Address([255, 255, 255, 254]), 31).broadcast(),
  843. None);
  844. assert_eq!(Cidr::new(Address([255, 255, 255, 255]), 32).broadcast(),
  845. None);
  846. }
  847. #[test]
  848. fn test_cidr_network() {
  849. assert_eq!(Cidr::new(Address([0, 0, 0, 0]), 0).network(),
  850. Cidr::new(Address([0, 0, 0, 0]), 0));
  851. assert_eq!(Cidr::new(Address([0, 0, 0, 1]), 24).network(),
  852. Cidr::new(Address([0, 0, 0, 0]), 24));
  853. assert_eq!(Cidr::new(Address([0, 0, 0, 0]), 32).network(),
  854. Cidr::new(Address([0, 0, 0, 0]), 32));
  855. assert_eq!(Cidr::new(Address([127, 0, 0, 0]), 8).network(),
  856. Cidr::new(Address([127, 0, 0, 0]), 8));
  857. assert_eq!(Cidr::new(Address([192, 168, 0, 0]), 16).network(),
  858. Cidr::new(Address([192, 168, 0, 0]), 16));
  859. assert_eq!(Cidr::new(Address([192, 168, 1, 1]), 16).network(),
  860. Cidr::new(Address([192, 168, 0, 0]), 16));
  861. assert_eq!(Cidr::new(Address([192, 168, 1, 1]), 17).network(),
  862. Cidr::new(Address([192, 168, 0, 0]), 17));
  863. assert_eq!(Cidr::new(Address([172, 16, 0, 1]), 12).network(),
  864. Cidr::new(Address([172, 16, 0, 0]), 12));
  865. assert_eq!(Cidr::new(Address([255, 255, 255, 1]), 24).network(),
  866. Cidr::new(Address([255, 255, 255, 0]), 24));
  867. assert_eq!(Cidr::new(Address([255, 255, 255, 255]), 32).network(),
  868. Cidr::new(Address([255, 255, 255, 255]), 32));
  869. }
  870. }