icmp.rs 35 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068
  1. use core::cmp;
  2. #[cfg(feature = "async")]
  3. use core::task::Waker;
  4. use crate::phy::ChecksumCapabilities;
  5. #[cfg(feature = "async")]
  6. use crate::socket::WakerRegistration;
  7. use crate::socket::{Context, PollAt, Socket, SocketHandle, SocketMeta};
  8. use crate::storage::{PacketBuffer, PacketMetadata};
  9. use crate::{Error, Result};
  10. use crate::wire::IcmpRepr;
  11. #[cfg(feature = "proto-ipv4")]
  12. use crate::wire::{Icmpv4Packet, Icmpv4Repr, Ipv4Address, Ipv4Repr};
  13. #[cfg(feature = "proto-ipv6")]
  14. use crate::wire::{Icmpv6Packet, Icmpv6Repr, Ipv6Address, Ipv6Repr};
  15. use crate::wire::{IpAddress, IpEndpoint, IpProtocol, IpRepr};
  16. use crate::wire::{UdpPacket, UdpRepr};
  17. /// Type of endpoint to bind the ICMP socket to. See [IcmpSocket::bind] for
  18. /// more details.
  19. ///
  20. /// [IcmpSocket::bind]: struct.IcmpSocket.html#method.bind
  21. #[derive(Debug, PartialEq, Eq, PartialOrd, Ord, Clone, Copy)]
  22. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  23. pub enum Endpoint {
  24. Unspecified,
  25. Ident(u16),
  26. Udp(IpEndpoint),
  27. }
  28. impl Endpoint {
  29. pub fn is_specified(&self) -> bool {
  30. match *self {
  31. Endpoint::Ident(_) => true,
  32. Endpoint::Udp(endpoint) => endpoint.port != 0,
  33. Endpoint::Unspecified => false,
  34. }
  35. }
  36. }
  37. impl Default for Endpoint {
  38. fn default() -> Endpoint {
  39. Endpoint::Unspecified
  40. }
  41. }
  42. /// An ICMP packet metadata.
  43. pub type IcmpPacketMetadata = PacketMetadata<IpAddress>;
  44. /// An ICMP packet ring buffer.
  45. pub type IcmpSocketBuffer<'a> = PacketBuffer<'a, IpAddress>;
  46. /// A ICMP socket
  47. ///
  48. /// An ICMP socket is bound to a specific [IcmpEndpoint] which may
  49. /// be a sepecific UDP port to listen for ICMP error messages related
  50. /// to the port or a specific ICMP identifier value. See [bind] for
  51. /// more details.
  52. ///
  53. /// [IcmpEndpoint]: enum.IcmpEndpoint.html
  54. /// [bind]: #method.bind
  55. #[derive(Debug)]
  56. pub struct IcmpSocket<'a> {
  57. pub(crate) meta: SocketMeta,
  58. rx_buffer: IcmpSocketBuffer<'a>,
  59. tx_buffer: IcmpSocketBuffer<'a>,
  60. /// The endpoint this socket is communicating with
  61. endpoint: Endpoint,
  62. /// The time-to-live (IPv4) or hop limit (IPv6) value used in outgoing packets.
  63. hop_limit: Option<u8>,
  64. #[cfg(feature = "async")]
  65. rx_waker: WakerRegistration,
  66. #[cfg(feature = "async")]
  67. tx_waker: WakerRegistration,
  68. }
  69. impl<'a> IcmpSocket<'a> {
  70. /// Create an ICMP socket with the given buffers.
  71. pub fn new(rx_buffer: IcmpSocketBuffer<'a>, tx_buffer: IcmpSocketBuffer<'a>) -> IcmpSocket<'a> {
  72. IcmpSocket {
  73. meta: SocketMeta::default(),
  74. rx_buffer: rx_buffer,
  75. tx_buffer: tx_buffer,
  76. endpoint: Endpoint::default(),
  77. hop_limit: None,
  78. #[cfg(feature = "async")]
  79. rx_waker: WakerRegistration::new(),
  80. #[cfg(feature = "async")]
  81. tx_waker: WakerRegistration::new(),
  82. }
  83. }
  84. /// Register a waker for receive operations.
  85. ///
  86. /// The waker is woken on state changes that might affect the return value
  87. /// of `recv` method calls, such as receiving data, or the socket closing.
  88. ///
  89. /// Notes:
  90. ///
  91. /// - Only one waker can be registered at a time. If another waker was previously registered,
  92. /// it is overwritten and will no longer be woken.
  93. /// - The Waker is woken only once. Once woken, you must register it again to receive more wakes.
  94. /// - "Spurious wakes" are allowed: a wake doesn't guarantee the result of `recv` has
  95. /// necessarily changed.
  96. #[cfg(feature = "async")]
  97. pub fn register_recv_waker(&mut self, waker: &Waker) {
  98. self.rx_waker.register(waker)
  99. }
  100. /// Register a waker for send operations.
  101. ///
  102. /// The waker is woken on state changes that might affect the return value
  103. /// of `send` method calls, such as space becoming available in the transmit
  104. /// buffer, or the socket closing.
  105. ///
  106. /// Notes:
  107. ///
  108. /// - Only one waker can be registered at a time. If another waker was previously registered,
  109. /// it is overwritten and will no longer be woken.
  110. /// - The Waker is woken only once. Once woken, you must register it again to receive more wakes.
  111. /// - "Spurious wakes" are allowed: a wake doesn't guarantee the result of `send` has
  112. /// necessarily changed.
  113. #[cfg(feature = "async")]
  114. pub fn register_send_waker(&mut self, waker: &Waker) {
  115. self.tx_waker.register(waker)
  116. }
  117. /// Return the socket handle.
  118. #[inline]
  119. pub fn handle(&self) -> SocketHandle {
  120. self.meta.handle
  121. }
  122. /// Return the time-to-live (IPv4) or hop limit (IPv6) value used in outgoing packets.
  123. ///
  124. /// See also the [set_hop_limit](#method.set_hop_limit) method
  125. pub fn hop_limit(&self) -> Option<u8> {
  126. self.hop_limit
  127. }
  128. /// Set the time-to-live (IPv4) or hop limit (IPv6) value used in outgoing packets.
  129. ///
  130. /// A socket without an explicitly set hop limit value uses the default [IANA recommended]
  131. /// value (64).
  132. ///
  133. /// # Panics
  134. ///
  135. /// This function panics if a hop limit value of 0 is given. See [RFC 1122 § 3.2.1.7].
  136. ///
  137. /// [IANA recommended]: https://www.iana.org/assignments/ip-parameters/ip-parameters.xhtml
  138. /// [RFC 1122 § 3.2.1.7]: https://tools.ietf.org/html/rfc1122#section-3.2.1.7
  139. pub fn set_hop_limit(&mut self, hop_limit: Option<u8>) {
  140. // A host MUST NOT send a datagram with a hop limit value of 0
  141. if let Some(0) = hop_limit {
  142. panic!("the time-to-live value of a packet must not be zero")
  143. }
  144. self.hop_limit = hop_limit
  145. }
  146. /// Bind the socket to the given endpoint.
  147. ///
  148. /// This function returns `Err(Error::Illegal)` if the socket was open
  149. /// (see [is_open](#method.is_open)), and `Err(Error::Unaddressable)`
  150. /// if `endpoint` is unspecified (see [is_specified]).
  151. ///
  152. /// # Examples
  153. ///
  154. /// ## Bind to ICMP Error messages associated with a specific UDP port:
  155. ///
  156. /// To [recv] ICMP error messages that are associated with a specific local
  157. /// UDP port, the socket may be bound to a given port using [IcmpEndpoint::Udp].
  158. /// This may be useful for applications using UDP attempting to detect and/or
  159. /// diagnose connection problems.
  160. ///
  161. /// ```
  162. /// # use smoltcp::socket::{Socket, IcmpSocket, IcmpSocketBuffer, IcmpPacketMetadata};
  163. /// # let rx_buffer = IcmpSocketBuffer::new(vec![IcmpPacketMetadata::EMPTY], vec![0; 20]);
  164. /// # let tx_buffer = IcmpSocketBuffer::new(vec![IcmpPacketMetadata::EMPTY], vec![0; 20]);
  165. /// use smoltcp::wire::IpEndpoint;
  166. /// use smoltcp::socket::IcmpEndpoint;
  167. ///
  168. /// let mut icmp_socket = // ...
  169. /// # IcmpSocket::new(rx_buffer, tx_buffer);
  170. ///
  171. /// // Bind to ICMP error responses for UDP packets sent from port 53.
  172. /// let endpoint = IpEndpoint::from(53);
  173. /// icmp_socket.bind(IcmpEndpoint::Udp(endpoint)).unwrap();
  174. /// ```
  175. ///
  176. /// ## Bind to a specific ICMP identifier:
  177. ///
  178. /// To [send] and [recv] ICMP packets that are not associated with a specific UDP
  179. /// port, the socket may be bound to a specific ICMP identifier using
  180. /// [IcmpEndpoint::Ident]. This is useful for sending and receiving Echo Request/Reply
  181. /// messages.
  182. ///
  183. /// ```
  184. /// # use smoltcp::socket::{Socket, IcmpSocket, IcmpSocketBuffer, IcmpPacketMetadata};
  185. /// # let rx_buffer = IcmpSocketBuffer::new(vec![IcmpPacketMetadata::EMPTY], vec![0; 20]);
  186. /// # let tx_buffer = IcmpSocketBuffer::new(vec![IcmpPacketMetadata::EMPTY], vec![0; 20]);
  187. /// use smoltcp::socket::IcmpEndpoint;
  188. ///
  189. /// let mut icmp_socket = // ...
  190. /// # IcmpSocket::new(rx_buffer, tx_buffer);
  191. ///
  192. /// // Bind to ICMP messages with the ICMP identifier 0x1234
  193. /// icmp_socket.bind(IcmpEndpoint::Ident(0x1234)).unwrap();
  194. /// ```
  195. ///
  196. /// [is_specified]: enum.IcmpEndpoint.html#method.is_specified
  197. /// [IcmpEndpoint::Ident]: enum.IcmpEndpoint.html#variant.Ident
  198. /// [IcmpEndpoint::Udp]: enum.IcmpEndpoint.html#variant.Udp
  199. /// [send]: #method.send
  200. /// [recv]: #method.recv
  201. pub fn bind<T: Into<Endpoint>>(&mut self, endpoint: T) -> Result<()> {
  202. let endpoint = endpoint.into();
  203. if !endpoint.is_specified() {
  204. return Err(Error::Unaddressable);
  205. }
  206. if self.is_open() {
  207. return Err(Error::Illegal);
  208. }
  209. self.endpoint = endpoint;
  210. #[cfg(feature = "async")]
  211. {
  212. self.rx_waker.wake();
  213. self.tx_waker.wake();
  214. }
  215. Ok(())
  216. }
  217. /// Check whether the transmit buffer is full.
  218. #[inline]
  219. pub fn can_send(&self) -> bool {
  220. !self.tx_buffer.is_full()
  221. }
  222. /// Check whether the receive buffer is not empty.
  223. #[inline]
  224. pub fn can_recv(&self) -> bool {
  225. !self.rx_buffer.is_empty()
  226. }
  227. /// Return the maximum number packets the socket can receive.
  228. #[inline]
  229. pub fn packet_recv_capacity(&self) -> usize {
  230. self.rx_buffer.packet_capacity()
  231. }
  232. /// Return the maximum number packets the socket can transmit.
  233. #[inline]
  234. pub fn packet_send_capacity(&self) -> usize {
  235. self.tx_buffer.packet_capacity()
  236. }
  237. /// Return the maximum number of bytes inside the recv buffer.
  238. #[inline]
  239. pub fn payload_recv_capacity(&self) -> usize {
  240. self.rx_buffer.payload_capacity()
  241. }
  242. /// Return the maximum number of bytes inside the transmit buffer.
  243. #[inline]
  244. pub fn payload_send_capacity(&self) -> usize {
  245. self.tx_buffer.payload_capacity()
  246. }
  247. /// Check whether the socket is open.
  248. #[inline]
  249. pub fn is_open(&self) -> bool {
  250. self.endpoint != Endpoint::Unspecified
  251. }
  252. /// Enqueue a packet to be sent to a given remote address, and return a pointer
  253. /// to its payload.
  254. ///
  255. /// This function returns `Err(Error::Exhausted)` if the transmit buffer is full,
  256. /// `Err(Error::Truncated)` if the requested size is larger than the packet buffer
  257. /// size, and `Err(Error::Unaddressable)` if the remote address is unspecified.
  258. pub fn send(&mut self, size: usize, endpoint: IpAddress) -> Result<&mut [u8]> {
  259. if endpoint.is_unspecified() {
  260. return Err(Error::Unaddressable);
  261. }
  262. let packet_buf = self.tx_buffer.enqueue(size, endpoint)?;
  263. net_trace!(
  264. "{}:{}: buffer to send {} octets",
  265. self.meta.handle,
  266. endpoint,
  267. size
  268. );
  269. Ok(packet_buf)
  270. }
  271. /// Enqueue a packet to be sent to a given remote address, and fill it from a slice.
  272. ///
  273. /// See also [send](#method.send).
  274. pub fn send_slice(&mut self, data: &[u8], endpoint: IpAddress) -> Result<()> {
  275. let packet_buf = self.send(data.len(), endpoint)?;
  276. packet_buf.copy_from_slice(data);
  277. Ok(())
  278. }
  279. /// Dequeue a packet received from a remote endpoint, and return the `IpAddress` as well
  280. /// as a pointer to the payload.
  281. ///
  282. /// This function returns `Err(Error::Exhausted)` if the receive buffer is empty.
  283. pub fn recv(&mut self) -> Result<(&[u8], IpAddress)> {
  284. let (endpoint, packet_buf) = self.rx_buffer.dequeue()?;
  285. net_trace!(
  286. "{}:{}: receive {} buffered octets",
  287. self.meta.handle,
  288. endpoint,
  289. packet_buf.len()
  290. );
  291. Ok((packet_buf, endpoint))
  292. }
  293. /// Dequeue a packet received from a remote endpoint, copy the payload into the given slice,
  294. /// and return the amount of octets copied as well as the `IpAddress`
  295. ///
  296. /// See also [recv](#method.recv).
  297. pub fn recv_slice(&mut self, data: &mut [u8]) -> Result<(usize, IpAddress)> {
  298. let (buffer, endpoint) = self.recv()?;
  299. let length = cmp::min(data.len(), buffer.len());
  300. data[..length].copy_from_slice(&buffer[..length]);
  301. Ok((length, endpoint))
  302. }
  303. /// Filter determining which packets received by the interface are appended to
  304. /// the given sockets received buffer.
  305. pub(crate) fn accepts(&self, cx: &Context, ip_repr: &IpRepr, icmp_repr: &IcmpRepr) -> bool {
  306. match (&self.endpoint, icmp_repr) {
  307. // If we are bound to ICMP errors associated to a UDP port, only
  308. // accept Destination Unreachable messages with the data containing
  309. // a UDP packet send from the local port we are bound to.
  310. #[cfg(feature = "proto-ipv4")]
  311. (
  312. &Endpoint::Udp(endpoint),
  313. &IcmpRepr::Ipv4(Icmpv4Repr::DstUnreachable { data, .. }),
  314. ) if endpoint.addr.is_unspecified() || endpoint.addr == ip_repr.dst_addr() => {
  315. let packet = UdpPacket::new_unchecked(data);
  316. match UdpRepr::parse(
  317. &packet,
  318. &ip_repr.src_addr(),
  319. &ip_repr.dst_addr(),
  320. &cx.caps.checksum,
  321. ) {
  322. Ok(repr) => endpoint.port == repr.src_port,
  323. Err(_) => false,
  324. }
  325. }
  326. #[cfg(feature = "proto-ipv6")]
  327. (
  328. &Endpoint::Udp(endpoint),
  329. &IcmpRepr::Ipv6(Icmpv6Repr::DstUnreachable { data, .. }),
  330. ) if endpoint.addr.is_unspecified() || endpoint.addr == ip_repr.dst_addr() => {
  331. let packet = UdpPacket::new_unchecked(data);
  332. match UdpRepr::parse(
  333. &packet,
  334. &ip_repr.src_addr(),
  335. &ip_repr.dst_addr(),
  336. &cx.caps.checksum,
  337. ) {
  338. Ok(repr) => endpoint.port == repr.src_port,
  339. Err(_) => false,
  340. }
  341. }
  342. // If we are bound to a specific ICMP identifier value, only accept an
  343. // Echo Request/Reply with the identifier field matching the endpoint
  344. // port.
  345. #[cfg(feature = "proto-ipv4")]
  346. (
  347. &Endpoint::Ident(bound_ident),
  348. &IcmpRepr::Ipv4(Icmpv4Repr::EchoRequest { ident, .. }),
  349. )
  350. | (
  351. &Endpoint::Ident(bound_ident),
  352. &IcmpRepr::Ipv4(Icmpv4Repr::EchoReply { ident, .. }),
  353. ) => ident == bound_ident,
  354. #[cfg(feature = "proto-ipv6")]
  355. (
  356. &Endpoint::Ident(bound_ident),
  357. &IcmpRepr::Ipv6(Icmpv6Repr::EchoRequest { ident, .. }),
  358. )
  359. | (
  360. &Endpoint::Ident(bound_ident),
  361. &IcmpRepr::Ipv6(Icmpv6Repr::EchoReply { ident, .. }),
  362. ) => ident == bound_ident,
  363. _ => false,
  364. }
  365. }
  366. pub(crate) fn process(
  367. &mut self,
  368. _cx: &Context,
  369. ip_repr: &IpRepr,
  370. icmp_repr: &IcmpRepr,
  371. ) -> Result<()> {
  372. match *icmp_repr {
  373. #[cfg(feature = "proto-ipv4")]
  374. IcmpRepr::Ipv4(ref icmp_repr) => {
  375. let packet_buf = self
  376. .rx_buffer
  377. .enqueue(icmp_repr.buffer_len(), ip_repr.src_addr())?;
  378. icmp_repr.emit(
  379. &mut Icmpv4Packet::new_unchecked(packet_buf),
  380. &ChecksumCapabilities::default(),
  381. );
  382. net_trace!(
  383. "{}:{}: receiving {} octets",
  384. self.meta.handle,
  385. icmp_repr.buffer_len(),
  386. packet_buf.len()
  387. );
  388. }
  389. #[cfg(feature = "proto-ipv6")]
  390. IcmpRepr::Ipv6(ref icmp_repr) => {
  391. let packet_buf = self
  392. .rx_buffer
  393. .enqueue(icmp_repr.buffer_len(), ip_repr.src_addr())?;
  394. icmp_repr.emit(
  395. &ip_repr.src_addr(),
  396. &ip_repr.dst_addr(),
  397. &mut Icmpv6Packet::new_unchecked(packet_buf),
  398. &ChecksumCapabilities::default(),
  399. );
  400. net_trace!(
  401. "{}:{}: receiving {} octets",
  402. self.meta.handle,
  403. icmp_repr.buffer_len(),
  404. packet_buf.len()
  405. );
  406. }
  407. }
  408. #[cfg(feature = "async")]
  409. self.rx_waker.wake();
  410. Ok(())
  411. }
  412. pub(crate) fn dispatch<F>(&mut self, _cx: &Context, emit: F) -> Result<()>
  413. where
  414. F: FnOnce((IpRepr, IcmpRepr)) -> Result<()>,
  415. {
  416. let handle = self.meta.handle;
  417. let hop_limit = self.hop_limit.unwrap_or(64);
  418. self.tx_buffer.dequeue_with(|remote_endpoint, packet_buf| {
  419. net_trace!(
  420. "{}:{}: sending {} octets",
  421. handle,
  422. remote_endpoint,
  423. packet_buf.len()
  424. );
  425. match *remote_endpoint {
  426. #[cfg(feature = "proto-ipv4")]
  427. IpAddress::Ipv4(ipv4_addr) => {
  428. let packet = Icmpv4Packet::new_unchecked(&*packet_buf);
  429. let repr = Icmpv4Repr::parse(&packet, &ChecksumCapabilities::ignored())?;
  430. let ip_repr = IpRepr::Ipv4(Ipv4Repr {
  431. src_addr: Ipv4Address::default(),
  432. dst_addr: ipv4_addr,
  433. protocol: IpProtocol::Icmp,
  434. payload_len: repr.buffer_len(),
  435. hop_limit: hop_limit,
  436. });
  437. emit((ip_repr, IcmpRepr::Ipv4(repr)))
  438. }
  439. #[cfg(feature = "proto-ipv6")]
  440. IpAddress::Ipv6(ipv6_addr) => {
  441. let packet = Icmpv6Packet::new_unchecked(&*packet_buf);
  442. let src_addr = Ipv6Address::default();
  443. let repr = Icmpv6Repr::parse(
  444. &src_addr.into(),
  445. &ipv6_addr.into(),
  446. &packet,
  447. &ChecksumCapabilities::ignored(),
  448. )?;
  449. let ip_repr = IpRepr::Ipv6(Ipv6Repr {
  450. src_addr: src_addr,
  451. dst_addr: ipv6_addr,
  452. next_header: IpProtocol::Icmpv6,
  453. payload_len: repr.buffer_len(),
  454. hop_limit: hop_limit,
  455. });
  456. emit((ip_repr, IcmpRepr::Ipv6(repr)))
  457. }
  458. _ => Err(Error::Unaddressable),
  459. }
  460. })?;
  461. #[cfg(feature = "async")]
  462. self.tx_waker.wake();
  463. Ok(())
  464. }
  465. pub(crate) fn poll_at(&self, _cx: &Context) -> PollAt {
  466. if self.tx_buffer.is_empty() {
  467. PollAt::Ingress
  468. } else {
  469. PollAt::Now
  470. }
  471. }
  472. }
  473. impl<'a> From<IcmpSocket<'a>> for Socket<'a> {
  474. fn from(val: IcmpSocket<'a>) -> Self {
  475. Socket::Icmp(val)
  476. }
  477. }
  478. #[cfg(test)]
  479. mod tests_common {
  480. pub use super::*;
  481. pub use crate::phy::DeviceCapabilities;
  482. pub use crate::wire::IpAddress;
  483. pub fn buffer(packets: usize) -> IcmpSocketBuffer<'static> {
  484. IcmpSocketBuffer::new(
  485. vec![IcmpPacketMetadata::EMPTY; packets],
  486. vec![0; 66 * packets],
  487. )
  488. }
  489. pub fn socket(
  490. rx_buffer: IcmpSocketBuffer<'static>,
  491. tx_buffer: IcmpSocketBuffer<'static>,
  492. ) -> IcmpSocket<'static> {
  493. IcmpSocket::new(rx_buffer, tx_buffer)
  494. }
  495. pub const LOCAL_PORT: u16 = 53;
  496. pub static UDP_REPR: UdpRepr = UdpRepr {
  497. src_port: 53,
  498. dst_port: 9090,
  499. };
  500. pub static UDP_PAYLOAD: &[u8] = &[0xff; 10];
  501. }
  502. #[cfg(all(test, feature = "proto-ipv4"))]
  503. mod test_ipv4 {
  504. use super::tests_common::*;
  505. use crate::wire::Icmpv4DstUnreachable;
  506. const REMOTE_IPV4: Ipv4Address = Ipv4Address([0x7f, 0x00, 0x00, 0x02]);
  507. const LOCAL_IPV4: Ipv4Address = Ipv4Address([0x7f, 0x00, 0x00, 0x01]);
  508. const LOCAL_END_V4: IpEndpoint = IpEndpoint {
  509. addr: IpAddress::Ipv4(LOCAL_IPV4),
  510. port: LOCAL_PORT,
  511. };
  512. static ECHOV4_REPR: Icmpv4Repr = Icmpv4Repr::EchoRequest {
  513. ident: 0x1234,
  514. seq_no: 0x5678,
  515. data: &[0xff; 16],
  516. };
  517. static LOCAL_IPV4_REPR: IpRepr = IpRepr::Ipv4(Ipv4Repr {
  518. src_addr: Ipv4Address::UNSPECIFIED,
  519. dst_addr: REMOTE_IPV4,
  520. protocol: IpProtocol::Icmp,
  521. payload_len: 24,
  522. hop_limit: 0x40,
  523. });
  524. static REMOTE_IPV4_REPR: IpRepr = IpRepr::Ipv4(Ipv4Repr {
  525. src_addr: REMOTE_IPV4,
  526. dst_addr: LOCAL_IPV4,
  527. protocol: IpProtocol::Icmp,
  528. payload_len: 24,
  529. hop_limit: 0x40,
  530. });
  531. #[test]
  532. fn test_send_unaddressable() {
  533. let mut socket = socket(buffer(0), buffer(1));
  534. assert_eq!(
  535. socket.send_slice(b"abcdef", IpAddress::default()),
  536. Err(Error::Unaddressable)
  537. );
  538. assert_eq!(socket.send_slice(b"abcdef", REMOTE_IPV4.into()), Ok(()));
  539. }
  540. #[test]
  541. fn test_send_dispatch() {
  542. let mut socket = socket(buffer(0), buffer(1));
  543. let checksum = ChecksumCapabilities::default();
  544. assert_eq!(
  545. socket.dispatch(&Context::DUMMY, |_| unreachable!()),
  546. Err(Error::Exhausted)
  547. );
  548. // This buffer is too long
  549. assert_eq!(
  550. socket.send_slice(&[0xff; 67], REMOTE_IPV4.into()),
  551. Err(Error::Truncated)
  552. );
  553. assert!(socket.can_send());
  554. let mut bytes = [0xff; 24];
  555. let mut packet = Icmpv4Packet::new_unchecked(&mut bytes);
  556. ECHOV4_REPR.emit(&mut packet, &checksum);
  557. assert_eq!(
  558. socket.send_slice(&packet.into_inner()[..], REMOTE_IPV4.into()),
  559. Ok(())
  560. );
  561. assert_eq!(
  562. socket.send_slice(b"123456", REMOTE_IPV4.into()),
  563. Err(Error::Exhausted)
  564. );
  565. assert!(!socket.can_send());
  566. assert_eq!(
  567. socket.dispatch(&Context::DUMMY, |(ip_repr, icmp_repr)| {
  568. assert_eq!(ip_repr, LOCAL_IPV4_REPR);
  569. assert_eq!(icmp_repr, ECHOV4_REPR.into());
  570. Err(Error::Unaddressable)
  571. }),
  572. Err(Error::Unaddressable)
  573. );
  574. // buffer is not taken off of the tx queue due to the error
  575. assert!(!socket.can_send());
  576. assert_eq!(
  577. socket.dispatch(&Context::DUMMY, |(ip_repr, icmp_repr)| {
  578. assert_eq!(ip_repr, LOCAL_IPV4_REPR);
  579. assert_eq!(icmp_repr, ECHOV4_REPR.into());
  580. Ok(())
  581. }),
  582. Ok(())
  583. );
  584. // buffer is taken off of the queue this time
  585. assert!(socket.can_send());
  586. }
  587. #[test]
  588. fn test_set_hop_limit_v4() {
  589. let mut s = socket(buffer(0), buffer(1));
  590. let checksum = ChecksumCapabilities::default();
  591. let mut bytes = [0xff; 24];
  592. let mut packet = Icmpv4Packet::new_unchecked(&mut bytes);
  593. ECHOV4_REPR.emit(&mut packet, &checksum);
  594. s.set_hop_limit(Some(0x2a));
  595. assert_eq!(
  596. s.send_slice(&packet.into_inner()[..], REMOTE_IPV4.into()),
  597. Ok(())
  598. );
  599. assert_eq!(
  600. s.dispatch(&Context::DUMMY, |(ip_repr, _)| {
  601. assert_eq!(
  602. ip_repr,
  603. IpRepr::Ipv4(Ipv4Repr {
  604. src_addr: Ipv4Address::UNSPECIFIED,
  605. dst_addr: REMOTE_IPV4,
  606. protocol: IpProtocol::Icmp,
  607. payload_len: ECHOV4_REPR.buffer_len(),
  608. hop_limit: 0x2a,
  609. })
  610. );
  611. Ok(())
  612. }),
  613. Ok(())
  614. );
  615. }
  616. #[test]
  617. fn test_recv_process() {
  618. let mut socket = socket(buffer(1), buffer(1));
  619. assert_eq!(socket.bind(Endpoint::Ident(0x1234)), Ok(()));
  620. assert!(!socket.can_recv());
  621. assert_eq!(socket.recv(), Err(Error::Exhausted));
  622. let checksum = ChecksumCapabilities::default();
  623. let mut bytes = [0xff; 24];
  624. let mut packet = Icmpv4Packet::new_unchecked(&mut bytes);
  625. ECHOV4_REPR.emit(&mut packet, &checksum);
  626. let data = &packet.into_inner()[..];
  627. assert!(socket.accepts(&Context::DUMMY, &REMOTE_IPV4_REPR, &ECHOV4_REPR.into()));
  628. assert_eq!(
  629. socket.process(&Context::DUMMY, &REMOTE_IPV4_REPR, &ECHOV4_REPR.into()),
  630. Ok(())
  631. );
  632. assert!(socket.can_recv());
  633. assert!(socket.accepts(&Context::DUMMY, &REMOTE_IPV4_REPR, &ECHOV4_REPR.into()));
  634. assert_eq!(
  635. socket.process(&Context::DUMMY, &REMOTE_IPV4_REPR, &ECHOV4_REPR.into()),
  636. Err(Error::Exhausted)
  637. );
  638. assert_eq!(socket.recv(), Ok((data, REMOTE_IPV4.into())));
  639. assert!(!socket.can_recv());
  640. }
  641. #[test]
  642. fn test_accept_bad_id() {
  643. let mut socket = socket(buffer(1), buffer(1));
  644. assert_eq!(socket.bind(Endpoint::Ident(0x1234)), Ok(()));
  645. let checksum = ChecksumCapabilities::default();
  646. let mut bytes = [0xff; 20];
  647. let mut packet = Icmpv4Packet::new_unchecked(&mut bytes);
  648. let icmp_repr = Icmpv4Repr::EchoRequest {
  649. ident: 0x4321,
  650. seq_no: 0x5678,
  651. data: &[0xff; 16],
  652. };
  653. icmp_repr.emit(&mut packet, &checksum);
  654. // Ensure that a packet with an identifier that isn't the bound
  655. // ID is not accepted
  656. assert!(!socket.accepts(&Context::DUMMY, &REMOTE_IPV4_REPR, &icmp_repr.into()));
  657. }
  658. #[test]
  659. fn test_accepts_udp() {
  660. let mut socket = socket(buffer(1), buffer(1));
  661. assert_eq!(socket.bind(Endpoint::Udp(LOCAL_END_V4)), Ok(()));
  662. let checksum = ChecksumCapabilities::default();
  663. let mut bytes = [0xff; 18];
  664. let mut packet = UdpPacket::new_unchecked(&mut bytes);
  665. UDP_REPR.emit(
  666. &mut packet,
  667. &REMOTE_IPV4.into(),
  668. &LOCAL_IPV4.into(),
  669. UDP_PAYLOAD.len(),
  670. |buf| buf.copy_from_slice(UDP_PAYLOAD),
  671. &checksum,
  672. );
  673. let data = &packet.into_inner()[..];
  674. let icmp_repr = Icmpv4Repr::DstUnreachable {
  675. reason: Icmpv4DstUnreachable::PortUnreachable,
  676. header: Ipv4Repr {
  677. src_addr: LOCAL_IPV4,
  678. dst_addr: REMOTE_IPV4,
  679. protocol: IpProtocol::Icmp,
  680. payload_len: 12,
  681. hop_limit: 0x40,
  682. },
  683. data: data,
  684. };
  685. let ip_repr = IpRepr::Unspecified {
  686. src_addr: REMOTE_IPV4.into(),
  687. dst_addr: LOCAL_IPV4.into(),
  688. protocol: IpProtocol::Icmp,
  689. payload_len: icmp_repr.buffer_len(),
  690. hop_limit: 0x40,
  691. };
  692. assert!(!socket.can_recv());
  693. // Ensure we can accept ICMP error response to the bound
  694. // UDP port
  695. assert!(socket.accepts(&Context::DUMMY, &ip_repr, &icmp_repr.into()));
  696. assert_eq!(
  697. socket.process(&Context::DUMMY, &ip_repr, &icmp_repr.into()),
  698. Ok(())
  699. );
  700. assert!(socket.can_recv());
  701. let mut bytes = [0x00; 46];
  702. let mut packet = Icmpv4Packet::new_unchecked(&mut bytes[..]);
  703. icmp_repr.emit(&mut packet, &checksum);
  704. assert_eq!(
  705. socket.recv(),
  706. Ok((&packet.into_inner()[..], REMOTE_IPV4.into()))
  707. );
  708. assert!(!socket.can_recv());
  709. }
  710. }
  711. #[cfg(all(test, feature = "proto-ipv6"))]
  712. mod test_ipv6 {
  713. use super::tests_common::*;
  714. use crate::wire::Icmpv6DstUnreachable;
  715. const REMOTE_IPV6: Ipv6Address =
  716. Ipv6Address([0xfe, 0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1]);
  717. const LOCAL_IPV6: Ipv6Address =
  718. Ipv6Address([0xfe, 0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 2]);
  719. const LOCAL_END_V6: IpEndpoint = IpEndpoint {
  720. addr: IpAddress::Ipv6(LOCAL_IPV6),
  721. port: LOCAL_PORT,
  722. };
  723. static ECHOV6_REPR: Icmpv6Repr = Icmpv6Repr::EchoRequest {
  724. ident: 0x1234,
  725. seq_no: 0x5678,
  726. data: &[0xff; 16],
  727. };
  728. static LOCAL_IPV6_REPR: IpRepr = IpRepr::Ipv6(Ipv6Repr {
  729. src_addr: Ipv6Address::UNSPECIFIED,
  730. dst_addr: REMOTE_IPV6,
  731. next_header: IpProtocol::Icmpv6,
  732. payload_len: 24,
  733. hop_limit: 0x40,
  734. });
  735. static REMOTE_IPV6_REPR: IpRepr = IpRepr::Ipv6(Ipv6Repr {
  736. src_addr: REMOTE_IPV6,
  737. dst_addr: LOCAL_IPV6,
  738. next_header: IpProtocol::Icmpv6,
  739. payload_len: 24,
  740. hop_limit: 0x40,
  741. });
  742. #[test]
  743. fn test_send_unaddressable() {
  744. let mut socket = socket(buffer(0), buffer(1));
  745. assert_eq!(
  746. socket.send_slice(b"abcdef", IpAddress::default()),
  747. Err(Error::Unaddressable)
  748. );
  749. assert_eq!(socket.send_slice(b"abcdef", REMOTE_IPV6.into()), Ok(()));
  750. }
  751. #[test]
  752. fn test_send_dispatch() {
  753. let mut socket = socket(buffer(0), buffer(1));
  754. let checksum = ChecksumCapabilities::default();
  755. assert_eq!(
  756. socket.dispatch(&Context::DUMMY, |_| unreachable!()),
  757. Err(Error::Exhausted)
  758. );
  759. // This buffer is too long
  760. assert_eq!(
  761. socket.send_slice(&[0xff; 67], REMOTE_IPV6.into()),
  762. Err(Error::Truncated)
  763. );
  764. assert!(socket.can_send());
  765. let mut bytes = vec![0xff; 24];
  766. let mut packet = Icmpv6Packet::new_unchecked(&mut bytes);
  767. ECHOV6_REPR.emit(
  768. &LOCAL_IPV6.into(),
  769. &REMOTE_IPV6.into(),
  770. &mut packet,
  771. &checksum,
  772. );
  773. assert_eq!(
  774. socket.send_slice(&packet.into_inner()[..], REMOTE_IPV6.into()),
  775. Ok(())
  776. );
  777. assert_eq!(
  778. socket.send_slice(b"123456", REMOTE_IPV6.into()),
  779. Err(Error::Exhausted)
  780. );
  781. assert!(!socket.can_send());
  782. assert_eq!(
  783. socket.dispatch(&Context::DUMMY, |(ip_repr, icmp_repr)| {
  784. assert_eq!(ip_repr, LOCAL_IPV6_REPR);
  785. assert_eq!(icmp_repr, ECHOV6_REPR.into());
  786. Err(Error::Unaddressable)
  787. }),
  788. Err(Error::Unaddressable)
  789. );
  790. // buffer is not taken off of the tx queue due to the error
  791. assert!(!socket.can_send());
  792. assert_eq!(
  793. socket.dispatch(&Context::DUMMY, |(ip_repr, icmp_repr)| {
  794. assert_eq!(ip_repr, LOCAL_IPV6_REPR);
  795. assert_eq!(icmp_repr, ECHOV6_REPR.into());
  796. Ok(())
  797. }),
  798. Ok(())
  799. );
  800. // buffer is taken off of the queue this time
  801. assert!(socket.can_send());
  802. }
  803. #[test]
  804. fn test_set_hop_limit() {
  805. let mut s = socket(buffer(0), buffer(1));
  806. let checksum = ChecksumCapabilities::default();
  807. let mut bytes = vec![0xff; 24];
  808. let mut packet = Icmpv6Packet::new_unchecked(&mut bytes);
  809. ECHOV6_REPR.emit(
  810. &LOCAL_IPV6.into(),
  811. &REMOTE_IPV6.into(),
  812. &mut packet,
  813. &checksum,
  814. );
  815. s.set_hop_limit(Some(0x2a));
  816. assert_eq!(
  817. s.send_slice(&packet.into_inner()[..], REMOTE_IPV6.into()),
  818. Ok(())
  819. );
  820. assert_eq!(
  821. s.dispatch(&Context::DUMMY, |(ip_repr, _)| {
  822. assert_eq!(
  823. ip_repr,
  824. IpRepr::Ipv6(Ipv6Repr {
  825. src_addr: Ipv6Address::UNSPECIFIED,
  826. dst_addr: REMOTE_IPV6,
  827. next_header: IpProtocol::Icmpv6,
  828. payload_len: ECHOV6_REPR.buffer_len(),
  829. hop_limit: 0x2a,
  830. })
  831. );
  832. Ok(())
  833. }),
  834. Ok(())
  835. );
  836. }
  837. #[test]
  838. fn test_recv_process() {
  839. let mut socket = socket(buffer(1), buffer(1));
  840. assert_eq!(socket.bind(Endpoint::Ident(0x1234)), Ok(()));
  841. assert!(!socket.can_recv());
  842. assert_eq!(socket.recv(), Err(Error::Exhausted));
  843. let checksum = ChecksumCapabilities::default();
  844. let mut bytes = [0xff; 24];
  845. let mut packet = Icmpv6Packet::new_unchecked(&mut bytes);
  846. ECHOV6_REPR.emit(
  847. &LOCAL_IPV6.into(),
  848. &REMOTE_IPV6.into(),
  849. &mut packet,
  850. &checksum,
  851. );
  852. let data = &packet.into_inner()[..];
  853. assert!(socket.accepts(&Context::DUMMY, &REMOTE_IPV6_REPR, &ECHOV6_REPR.into()));
  854. assert_eq!(
  855. socket.process(&Context::DUMMY, &REMOTE_IPV6_REPR, &ECHOV6_REPR.into()),
  856. Ok(())
  857. );
  858. assert!(socket.can_recv());
  859. assert!(socket.accepts(&Context::DUMMY, &REMOTE_IPV6_REPR, &ECHOV6_REPR.into()));
  860. assert_eq!(
  861. socket.process(&Context::DUMMY, &REMOTE_IPV6_REPR, &ECHOV6_REPR.into()),
  862. Err(Error::Exhausted)
  863. );
  864. assert_eq!(socket.recv(), Ok((data, REMOTE_IPV6.into())));
  865. assert!(!socket.can_recv());
  866. }
  867. #[test]
  868. fn test_accept_bad_id() {
  869. let mut socket = socket(buffer(1), buffer(1));
  870. assert_eq!(socket.bind(Endpoint::Ident(0x1234)), Ok(()));
  871. let checksum = ChecksumCapabilities::default();
  872. let mut bytes = [0xff; 20];
  873. let mut packet = Icmpv6Packet::new_unchecked(&mut bytes);
  874. let icmp_repr = Icmpv6Repr::EchoRequest {
  875. ident: 0x4321,
  876. seq_no: 0x5678,
  877. data: &[0xff; 16],
  878. };
  879. icmp_repr.emit(
  880. &LOCAL_IPV6.into(),
  881. &REMOTE_IPV6.into(),
  882. &mut packet,
  883. &checksum,
  884. );
  885. // Ensure that a packet with an identifier that isn't the bound
  886. // ID is not accepted
  887. assert!(!socket.accepts(&Context::DUMMY, &REMOTE_IPV6_REPR, &icmp_repr.into()));
  888. }
  889. #[test]
  890. fn test_accepts_udp() {
  891. let mut socket = socket(buffer(1), buffer(1));
  892. assert_eq!(socket.bind(Endpoint::Udp(LOCAL_END_V6)), Ok(()));
  893. let checksum = ChecksumCapabilities::default();
  894. let mut bytes = [0xff; 18];
  895. let mut packet = UdpPacket::new_unchecked(&mut bytes);
  896. UDP_REPR.emit(
  897. &mut packet,
  898. &REMOTE_IPV6.into(),
  899. &LOCAL_IPV6.into(),
  900. UDP_PAYLOAD.len(),
  901. |buf| buf.copy_from_slice(UDP_PAYLOAD),
  902. &checksum,
  903. );
  904. let data = &packet.into_inner()[..];
  905. let icmp_repr = Icmpv6Repr::DstUnreachable {
  906. reason: Icmpv6DstUnreachable::PortUnreachable,
  907. header: Ipv6Repr {
  908. src_addr: LOCAL_IPV6,
  909. dst_addr: REMOTE_IPV6,
  910. next_header: IpProtocol::Icmpv6,
  911. payload_len: 12,
  912. hop_limit: 0x40,
  913. },
  914. data: data,
  915. };
  916. let ip_repr = IpRepr::Unspecified {
  917. src_addr: REMOTE_IPV6.into(),
  918. dst_addr: LOCAL_IPV6.into(),
  919. protocol: IpProtocol::Icmpv6,
  920. payload_len: icmp_repr.buffer_len(),
  921. hop_limit: 0x40,
  922. };
  923. assert!(!socket.can_recv());
  924. // Ensure we can accept ICMP error response to the bound
  925. // UDP port
  926. assert!(socket.accepts(&Context::DUMMY, &ip_repr, &icmp_repr.into()));
  927. assert_eq!(
  928. socket.process(&Context::DUMMY, &ip_repr, &icmp_repr.into()),
  929. Ok(())
  930. );
  931. assert!(socket.can_recv());
  932. let mut bytes = [0x00; 66];
  933. let mut packet = Icmpv6Packet::new_unchecked(&mut bytes[..]);
  934. icmp_repr.emit(
  935. &LOCAL_IPV6.into(),
  936. &REMOTE_IPV6.into(),
  937. &mut packet,
  938. &checksum,
  939. );
  940. assert_eq!(
  941. socket.recv(),
  942. Ok((&packet.into_inner()[..], REMOTE_IPV6.into()))
  943. );
  944. assert!(!socket.can_recv());
  945. }
  946. }