dhcpv4.rs 34 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008
  1. use crate::iface::Context;
  2. use crate::time::{Duration, Instant};
  3. use crate::wire::dhcpv4::field as dhcpv4_field;
  4. use crate::wire::HardwareAddress;
  5. use crate::wire::{
  6. DhcpMessageType, DhcpPacket, DhcpRepr, IpAddress, IpProtocol, Ipv4Address, Ipv4Cidr, Ipv4Repr,
  7. UdpRepr, DHCP_CLIENT_PORT, DHCP_MAX_DNS_SERVER_COUNT, DHCP_SERVER_PORT, UDP_HEADER_LEN,
  8. };
  9. use crate::{Error, Result};
  10. use super::PollAt;
  11. const DISCOVER_TIMEOUT: Duration = Duration::from_secs(10);
  12. // timeout doubles every 2 tries.
  13. // total time 5 + 5 + 10 + 10 + 20 = 50s
  14. const REQUEST_TIMEOUT: Duration = Duration::from_secs(5);
  15. const REQUEST_RETRIES: u16 = 5;
  16. const MIN_RENEW_TIMEOUT: Duration = Duration::from_secs(60);
  17. const DEFAULT_LEASE_DURATION: Duration = Duration::from_secs(120);
  18. const PARAMETER_REQUEST_LIST: &[u8] = &[
  19. dhcpv4_field::OPT_SUBNET_MASK,
  20. dhcpv4_field::OPT_ROUTER,
  21. dhcpv4_field::OPT_DOMAIN_NAME_SERVER,
  22. ];
  23. /// IPv4 configuration data provided by the DHCP server.
  24. #[derive(Debug, Eq, PartialEq, Clone, Copy)]
  25. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  26. pub struct Config {
  27. /// IP address
  28. pub address: Ipv4Cidr,
  29. /// Router address, also known as default gateway. Does not necessarily
  30. /// match the DHCP server's address.
  31. pub router: Option<Ipv4Address>,
  32. /// DNS servers
  33. pub dns_servers: [Option<Ipv4Address>; DHCP_MAX_DNS_SERVER_COUNT],
  34. }
  35. /// Information on how to reach a DHCP server.
  36. #[derive(Debug, Clone, Copy)]
  37. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  38. struct ServerInfo {
  39. /// IP address to use as destination in outgoing packets
  40. address: Ipv4Address,
  41. /// Server identifier to use in outgoing packets. Usually equal to server_address,
  42. /// but may differ in some situations (eg DHCP relays)
  43. identifier: Ipv4Address,
  44. }
  45. #[derive(Debug)]
  46. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  47. struct DiscoverState {
  48. /// When to send next request
  49. retry_at: Instant,
  50. }
  51. #[derive(Debug)]
  52. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  53. struct RequestState {
  54. /// When to send next request
  55. retry_at: Instant,
  56. /// How many retries have been done
  57. retry: u16,
  58. /// Server we're trying to request from
  59. server: ServerInfo,
  60. /// IP address that we're trying to request.
  61. requested_ip: Ipv4Address,
  62. }
  63. #[derive(Debug)]
  64. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  65. struct RenewState {
  66. /// Server that gave us the lease
  67. server: ServerInfo,
  68. /// Active network config
  69. config: Config,
  70. /// Renew timer. When reached, we will start attempting
  71. /// to renew this lease with the DHCP server.
  72. /// Must be less or equal than `expires_at`.
  73. renew_at: Instant,
  74. /// Expiration timer. When reached, this lease is no longer valid, so it must be
  75. /// thrown away and the ethernet interface deconfigured.
  76. expires_at: Instant,
  77. }
  78. #[derive(Debug)]
  79. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  80. enum ClientState {
  81. /// Discovering the DHCP server
  82. Discovering(DiscoverState),
  83. /// Requesting an address
  84. Requesting(RequestState),
  85. /// Having an address, refresh it periodically.
  86. Renewing(RenewState),
  87. }
  88. /// Return value for the `Dhcpv4Socket::poll` function
  89. #[derive(Debug, PartialEq, Eq)]
  90. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  91. pub enum Event {
  92. /// Configuration has been lost (for example, the lease has expired)
  93. Deconfigured,
  94. /// Configuration has been newly acquired, or modified.
  95. Configured(Config),
  96. }
  97. #[derive(Debug)]
  98. pub struct Dhcpv4Socket {
  99. /// State of the DHCP client.
  100. state: ClientState,
  101. /// Set to true on config/state change, cleared back to false by the `config` function.
  102. config_changed: bool,
  103. /// xid of the last sent message.
  104. transaction_id: u32,
  105. /// Max lease duration. If set, it sets a maximum cap to the server-provided lease duration.
  106. /// Useful to react faster to IP configuration changes and to test whether renews work correctly.
  107. max_lease_duration: Option<Duration>,
  108. /// Ignore NAKs.
  109. ignore_naks: bool,
  110. }
  111. /// DHCP client socket.
  112. ///
  113. /// The socket acquires an IP address configuration through DHCP autonomously.
  114. /// You must query the configuration with `.poll()` after every call to `Interface::poll()`,
  115. /// and apply the configuration to the `Interface`.
  116. impl Dhcpv4Socket {
  117. /// Create a DHCPv4 socket
  118. #[allow(clippy::new_without_default)]
  119. pub fn new() -> Self {
  120. Dhcpv4Socket {
  121. state: ClientState::Discovering(DiscoverState {
  122. retry_at: Instant::from_millis(0),
  123. }),
  124. config_changed: true,
  125. transaction_id: 1,
  126. max_lease_duration: None,
  127. ignore_naks: false,
  128. }
  129. }
  130. /// Get the configured max lease duration.
  131. ///
  132. /// See also [`Self::set_max_lease_duration()`]
  133. pub fn max_lease_duration(&self) -> Option<Duration> {
  134. self.max_lease_duration
  135. }
  136. /// Set the max lease duration.
  137. ///
  138. /// When set, the lease duration will be capped at the configured duration if the
  139. /// DHCP server gives us a longer lease. This is generally not recommended, but
  140. /// can be useful for debugging or reacting faster to network configuration changes.
  141. ///
  142. /// If None, no max is applied (the lease duration from the DHCP server is used.)
  143. pub fn set_max_lease_duration(&mut self, max_lease_duration: Option<Duration>) {
  144. self.max_lease_duration = max_lease_duration;
  145. }
  146. /// Get whether to ignore NAKs.
  147. ///
  148. /// See also [`Self::set_ignore_naks()`]
  149. pub fn ignore_naks(&self) -> bool {
  150. self.ignore_naks
  151. }
  152. /// Set whether to ignore NAKs.
  153. ///
  154. /// This is not compliant with the DHCP RFCs, since theoretically
  155. /// we must stop using the assigned IP when receiving a NAK. This
  156. /// can increase reliability on broken networks with buggy routers
  157. /// or rogue DHCP servers, however.
  158. pub fn set_ignore_naks(&mut self, ignore_naks: bool) {
  159. self.ignore_naks = ignore_naks;
  160. }
  161. pub(crate) fn poll_at(&self, _cx: &mut Context) -> PollAt {
  162. let t = match &self.state {
  163. ClientState::Discovering(state) => state.retry_at,
  164. ClientState::Requesting(state) => state.retry_at,
  165. ClientState::Renewing(state) => state.renew_at.min(state.expires_at),
  166. };
  167. PollAt::Time(t)
  168. }
  169. pub(crate) fn process(
  170. &mut self,
  171. cx: &mut Context,
  172. ip_repr: &Ipv4Repr,
  173. repr: &UdpRepr,
  174. payload: &[u8],
  175. ) -> Result<()> {
  176. let src_ip = ip_repr.src_addr;
  177. // This is enforced in interface.rs.
  178. assert!(repr.src_port == DHCP_SERVER_PORT && repr.dst_port == DHCP_CLIENT_PORT);
  179. let dhcp_packet = match DhcpPacket::new_checked(payload) {
  180. Ok(dhcp_packet) => dhcp_packet,
  181. Err(e) => {
  182. net_debug!("DHCP invalid pkt from {}: {:?}", src_ip, e);
  183. return Ok(());
  184. }
  185. };
  186. let dhcp_repr = match DhcpRepr::parse(&dhcp_packet) {
  187. Ok(dhcp_repr) => dhcp_repr,
  188. Err(e) => {
  189. net_debug!("DHCP error parsing pkt from {}: {:?}", src_ip, e);
  190. return Ok(());
  191. }
  192. };
  193. let hardware_addr = if let Some(HardwareAddress::Ethernet(addr)) = cx.hardware_addr() {
  194. addr
  195. } else {
  196. return Err(Error::Malformed);
  197. };
  198. if dhcp_repr.client_hardware_address != hardware_addr {
  199. return Ok(());
  200. }
  201. if dhcp_repr.transaction_id != self.transaction_id {
  202. return Ok(());
  203. }
  204. let server_identifier = match dhcp_repr.server_identifier {
  205. Some(server_identifier) => server_identifier,
  206. None => {
  207. net_debug!(
  208. "DHCP ignoring {:?} because missing server_identifier",
  209. dhcp_repr.message_type
  210. );
  211. return Ok(());
  212. }
  213. };
  214. net_debug!(
  215. "DHCP recv {:?} from {}: {:?}",
  216. dhcp_repr.message_type,
  217. src_ip,
  218. dhcp_repr
  219. );
  220. match (&mut self.state, dhcp_repr.message_type) {
  221. (ClientState::Discovering(_state), DhcpMessageType::Offer) => {
  222. if !dhcp_repr.your_ip.is_unicast() {
  223. net_debug!("DHCP ignoring OFFER because your_ip is not unicast");
  224. return Ok(());
  225. }
  226. self.state = ClientState::Requesting(RequestState {
  227. retry_at: cx.now(),
  228. retry: 0,
  229. server: ServerInfo {
  230. address: src_ip,
  231. identifier: server_identifier,
  232. },
  233. requested_ip: dhcp_repr.your_ip, // use the offered ip
  234. });
  235. }
  236. (ClientState::Requesting(state), DhcpMessageType::Ack) => {
  237. if let Some((config, renew_at, expires_at)) =
  238. Self::parse_ack(cx.now(), &dhcp_repr, self.max_lease_duration)
  239. {
  240. self.config_changed = true;
  241. self.state = ClientState::Renewing(RenewState {
  242. server: state.server,
  243. config,
  244. renew_at,
  245. expires_at,
  246. });
  247. }
  248. }
  249. (ClientState::Requesting(_), DhcpMessageType::Nak) => {
  250. if !self.ignore_naks {
  251. self.reset();
  252. }
  253. }
  254. (ClientState::Renewing(state), DhcpMessageType::Ack) => {
  255. if let Some((config, renew_at, expires_at)) =
  256. Self::parse_ack(cx.now(), &dhcp_repr, self.max_lease_duration)
  257. {
  258. state.renew_at = renew_at;
  259. state.expires_at = expires_at;
  260. if state.config != config {
  261. self.config_changed = true;
  262. state.config = config;
  263. }
  264. }
  265. }
  266. (ClientState::Renewing(_), DhcpMessageType::Nak) => {
  267. if !self.ignore_naks {
  268. self.reset();
  269. }
  270. }
  271. _ => {
  272. net_debug!(
  273. "DHCP ignoring {:?}: unexpected in current state",
  274. dhcp_repr.message_type
  275. );
  276. }
  277. }
  278. Ok(())
  279. }
  280. fn parse_ack(
  281. now: Instant,
  282. dhcp_repr: &DhcpRepr,
  283. max_lease_duration: Option<Duration>,
  284. ) -> Option<(Config, Instant, Instant)> {
  285. let subnet_mask = match dhcp_repr.subnet_mask {
  286. Some(subnet_mask) => subnet_mask,
  287. None => {
  288. net_debug!("DHCP ignoring ACK because missing subnet_mask");
  289. return None;
  290. }
  291. };
  292. let prefix_len = match IpAddress::Ipv4(subnet_mask).prefix_len() {
  293. Some(prefix_len) => prefix_len,
  294. None => {
  295. net_debug!("DHCP ignoring ACK because subnet_mask is not a valid mask");
  296. return None;
  297. }
  298. };
  299. if !dhcp_repr.your_ip.is_unicast() {
  300. net_debug!("DHCP ignoring ACK because your_ip is not unicast");
  301. return None;
  302. }
  303. let mut lease_duration = dhcp_repr
  304. .lease_duration
  305. .map(|d| Duration::from_secs(d as _))
  306. .unwrap_or(DEFAULT_LEASE_DURATION);
  307. if let Some(max_lease_duration) = max_lease_duration {
  308. lease_duration = lease_duration.min(max_lease_duration);
  309. }
  310. // Cleanup the DNS servers list, keeping only unicasts/
  311. // TP-Link TD-W8970 sends 0.0.0.0 as second DNS server if there's only one configured :(
  312. let mut dns_servers = [None; DHCP_MAX_DNS_SERVER_COUNT];
  313. if let Some(received) = dhcp_repr.dns_servers {
  314. let mut i = 0;
  315. for addr in received.iter().flatten() {
  316. if addr.is_unicast() {
  317. // This can never be out-of-bounds since both arrays have length DHCP_MAX_DNS_SERVER_COUNT
  318. dns_servers[i] = Some(*addr);
  319. i += 1;
  320. }
  321. }
  322. }
  323. let config = Config {
  324. address: Ipv4Cidr::new(dhcp_repr.your_ip, prefix_len),
  325. router: dhcp_repr.router,
  326. dns_servers: dns_servers,
  327. };
  328. // RFC 2131 indicates clients should renew a lease halfway through its expiration.
  329. let renew_at = now + lease_duration / 2;
  330. let expires_at = now + lease_duration;
  331. Some((config, renew_at, expires_at))
  332. }
  333. #[cfg(not(test))]
  334. fn random_transaction_id(cx: &mut Context) -> u32 {
  335. cx.rand().rand_u32()
  336. }
  337. #[cfg(test)]
  338. fn random_transaction_id(_cx: &mut Context) -> u32 {
  339. 0x12345678
  340. }
  341. pub(crate) fn dispatch<F>(&mut self, cx: &mut Context, emit: F) -> Result<()>
  342. where
  343. F: FnOnce(&mut Context, (Ipv4Repr, UdpRepr, DhcpRepr)) -> Result<()>,
  344. {
  345. // note: Dhcpv4Socket is only usable in ethernet mediums, so the
  346. // unwrap can never fail.
  347. let ethernet_addr = if let Some(HardwareAddress::Ethernet(addr)) = cx.hardware_addr() {
  348. addr
  349. } else {
  350. return Err(Error::Malformed);
  351. };
  352. // Worst case biggest IPv4 header length.
  353. // 0x0f * 4 = 60 bytes.
  354. const MAX_IPV4_HEADER_LEN: usize = 60;
  355. // We don't directly modify self.transaction_id because sending the packet
  356. // may fail. We only want to update state after succesfully sending.
  357. let next_transaction_id = Self::random_transaction_id(cx);
  358. let mut dhcp_repr = DhcpRepr {
  359. message_type: DhcpMessageType::Discover,
  360. transaction_id: next_transaction_id,
  361. client_hardware_address: ethernet_addr,
  362. client_ip: Ipv4Address::UNSPECIFIED,
  363. your_ip: Ipv4Address::UNSPECIFIED,
  364. server_ip: Ipv4Address::UNSPECIFIED,
  365. router: None,
  366. subnet_mask: None,
  367. relay_agent_ip: Ipv4Address::UNSPECIFIED,
  368. broadcast: false,
  369. requested_ip: None,
  370. client_identifier: Some(ethernet_addr),
  371. server_identifier: None,
  372. parameter_request_list: Some(PARAMETER_REQUEST_LIST),
  373. max_size: Some((cx.ip_mtu() - MAX_IPV4_HEADER_LEN - UDP_HEADER_LEN) as u16),
  374. lease_duration: None,
  375. dns_servers: None,
  376. };
  377. let udp_repr = UdpRepr {
  378. src_port: DHCP_CLIENT_PORT,
  379. dst_port: DHCP_SERVER_PORT,
  380. };
  381. let mut ipv4_repr = Ipv4Repr {
  382. src_addr: Ipv4Address::UNSPECIFIED,
  383. dst_addr: Ipv4Address::BROADCAST,
  384. protocol: IpProtocol::Udp,
  385. payload_len: 0, // filled right before emit
  386. hop_limit: 64,
  387. };
  388. match &mut self.state {
  389. ClientState::Discovering(state) => {
  390. if cx.now() < state.retry_at {
  391. return Err(Error::Exhausted);
  392. }
  393. // send packet
  394. net_debug!(
  395. "DHCP send DISCOVER to {}: {:?}",
  396. ipv4_repr.dst_addr,
  397. dhcp_repr
  398. );
  399. ipv4_repr.payload_len = udp_repr.header_len() + dhcp_repr.buffer_len();
  400. emit(cx, (ipv4_repr, udp_repr, dhcp_repr))?;
  401. // Update state AFTER the packet has been successfully sent.
  402. state.retry_at = cx.now() + DISCOVER_TIMEOUT;
  403. self.transaction_id = next_transaction_id;
  404. Ok(())
  405. }
  406. ClientState::Requesting(state) => {
  407. if cx.now() < state.retry_at {
  408. return Err(Error::Exhausted);
  409. }
  410. if state.retry >= REQUEST_RETRIES {
  411. net_debug!("DHCP request retries exceeded, restarting discovery");
  412. self.reset();
  413. // return Ok so we get polled again
  414. return Ok(());
  415. }
  416. dhcp_repr.message_type = DhcpMessageType::Request;
  417. dhcp_repr.requested_ip = Some(state.requested_ip);
  418. dhcp_repr.server_identifier = Some(state.server.identifier);
  419. net_debug!(
  420. "DHCP send request to {}: {:?}",
  421. ipv4_repr.dst_addr,
  422. dhcp_repr
  423. );
  424. ipv4_repr.payload_len = udp_repr.header_len() + dhcp_repr.buffer_len();
  425. emit(cx, (ipv4_repr, udp_repr, dhcp_repr))?;
  426. // Exponential backoff: Double every 2 retries.
  427. state.retry_at = cx.now() + (REQUEST_TIMEOUT << (state.retry as u32 / 2));
  428. state.retry += 1;
  429. self.transaction_id = next_transaction_id;
  430. Ok(())
  431. }
  432. ClientState::Renewing(state) => {
  433. if state.expires_at <= cx.now() {
  434. net_debug!("DHCP lease expired");
  435. self.reset();
  436. // return Ok so we get polled again
  437. return Ok(());
  438. }
  439. if cx.now() < state.renew_at {
  440. return Err(Error::Exhausted);
  441. }
  442. ipv4_repr.src_addr = state.config.address.address();
  443. ipv4_repr.dst_addr = state.server.address;
  444. dhcp_repr.message_type = DhcpMessageType::Request;
  445. dhcp_repr.client_ip = state.config.address.address();
  446. net_debug!("DHCP send renew to {}: {:?}", ipv4_repr.dst_addr, dhcp_repr);
  447. ipv4_repr.payload_len = udp_repr.header_len() + dhcp_repr.buffer_len();
  448. emit(cx, (ipv4_repr, udp_repr, dhcp_repr))?;
  449. // In both RENEWING and REBINDING states, if the client receives no
  450. // response to its DHCPREQUEST message, the client SHOULD wait one-half
  451. // of the remaining time until T2 (in RENEWING state) and one-half of
  452. // the remaining lease time (in REBINDING state), down to a minimum of
  453. // 60 seconds, before retransmitting the DHCPREQUEST message.
  454. state.renew_at =
  455. cx.now() + MIN_RENEW_TIMEOUT.max((state.expires_at - cx.now()) / 2);
  456. self.transaction_id = next_transaction_id;
  457. Ok(())
  458. }
  459. }
  460. }
  461. /// Reset state and restart discovery phase.
  462. ///
  463. /// Use this to speed up acquisition of an address in a new
  464. /// network if a link was down and it is now back up.
  465. pub fn reset(&mut self) {
  466. net_trace!("DHCP reset");
  467. if let ClientState::Renewing(_) = &self.state {
  468. self.config_changed = true;
  469. }
  470. self.state = ClientState::Discovering(DiscoverState {
  471. retry_at: Instant::from_millis(0),
  472. });
  473. }
  474. /// Query the socket for configuration changes.
  475. ///
  476. /// The socket has an internal "configuration changed" flag. If
  477. /// set, this function returns the configuration and resets the flag.
  478. pub fn poll(&mut self) -> Option<Event> {
  479. if !self.config_changed {
  480. None
  481. } else if let ClientState::Renewing(state) = &self.state {
  482. self.config_changed = false;
  483. Some(Event::Configured(state.config))
  484. } else {
  485. self.config_changed = false;
  486. Some(Event::Deconfigured)
  487. }
  488. }
  489. }
  490. #[cfg(test)]
  491. mod test {
  492. use std::ops::{Deref, DerefMut};
  493. use super::*;
  494. use crate::wire::EthernetAddress;
  495. // =========================================================================================//
  496. // Helper functions
  497. struct TestSocket {
  498. socket: Dhcpv4Socket,
  499. cx: Context<'static>,
  500. }
  501. impl Deref for TestSocket {
  502. type Target = Dhcpv4Socket;
  503. fn deref(&self) -> &Self::Target {
  504. &self.socket
  505. }
  506. }
  507. impl DerefMut for TestSocket {
  508. fn deref_mut(&mut self) -> &mut Self::Target {
  509. &mut self.socket
  510. }
  511. }
  512. fn send(
  513. s: &mut TestSocket,
  514. timestamp: Instant,
  515. (ip_repr, udp_repr, dhcp_repr): (Ipv4Repr, UdpRepr, DhcpRepr),
  516. ) -> Result<()> {
  517. s.cx.set_now(timestamp);
  518. net_trace!("send: {:?}", ip_repr);
  519. net_trace!(" {:?}", udp_repr);
  520. net_trace!(" {:?}", dhcp_repr);
  521. let mut payload = vec![0; dhcp_repr.buffer_len()];
  522. dhcp_repr
  523. .emit(&mut DhcpPacket::new_unchecked(&mut payload))
  524. .unwrap();
  525. s.socket.process(&mut s.cx, &ip_repr, &udp_repr, &payload)
  526. }
  527. fn recv(s: &mut TestSocket, timestamp: Instant, reprs: &[(Ipv4Repr, UdpRepr, DhcpRepr)]) {
  528. s.cx.set_now(timestamp);
  529. let mut i = 0;
  530. while s.socket.poll_at(&mut s.cx) <= PollAt::Time(timestamp) {
  531. let _ = s
  532. .socket
  533. .dispatch(&mut s.cx, |_, (mut ip_repr, udp_repr, dhcp_repr)| {
  534. assert_eq!(ip_repr.protocol, IpProtocol::Udp);
  535. assert_eq!(
  536. ip_repr.payload_len,
  537. udp_repr.header_len() + dhcp_repr.buffer_len()
  538. );
  539. // We validated the payload len, change it to 0 to make equality testing easier
  540. ip_repr.payload_len = 0;
  541. net_trace!("recv: {:?}", ip_repr);
  542. net_trace!(" {:?}", udp_repr);
  543. net_trace!(" {:?}", dhcp_repr);
  544. let got_repr = (ip_repr, udp_repr, dhcp_repr);
  545. match reprs.get(i) {
  546. Some(want_repr) => assert_eq!(want_repr, &got_repr),
  547. None => panic!("Too many reprs emitted"),
  548. }
  549. i += 1;
  550. Ok(())
  551. });
  552. }
  553. assert_eq!(i, reprs.len());
  554. }
  555. macro_rules! send {
  556. ($socket:ident, $repr:expr) =>
  557. (send!($socket, time 0, $repr));
  558. ($socket:ident, $repr:expr, $result:expr) =>
  559. (send!($socket, time 0, $repr, $result));
  560. ($socket:ident, time $time:expr, $repr:expr) =>
  561. (send!($socket, time $time, $repr, Ok(( ))));
  562. ($socket:ident, time $time:expr, $repr:expr, $result:expr) =>
  563. (assert_eq!(send(&mut $socket, Instant::from_millis($time), $repr), $result));
  564. }
  565. macro_rules! recv {
  566. ($socket:ident, $reprs:expr) => ({
  567. recv!($socket, time 0, $reprs);
  568. });
  569. ($socket:ident, time $time:expr, $reprs:expr) => ({
  570. recv(&mut $socket, Instant::from_millis($time), &$reprs);
  571. });
  572. }
  573. // =========================================================================================//
  574. // Constants
  575. const TXID: u32 = 0x12345678;
  576. const MY_IP: Ipv4Address = Ipv4Address([192, 168, 1, 42]);
  577. const SERVER_IP: Ipv4Address = Ipv4Address([192, 168, 1, 1]);
  578. const DNS_IP_1: Ipv4Address = Ipv4Address([1, 1, 1, 1]);
  579. const DNS_IP_2: Ipv4Address = Ipv4Address([1, 1, 1, 2]);
  580. const DNS_IP_3: Ipv4Address = Ipv4Address([1, 1, 1, 3]);
  581. const DNS_IPS: [Option<Ipv4Address>; DHCP_MAX_DNS_SERVER_COUNT] =
  582. [Some(DNS_IP_1), Some(DNS_IP_2), Some(DNS_IP_3)];
  583. const MASK_24: Ipv4Address = Ipv4Address([255, 255, 255, 0]);
  584. const MY_MAC: EthernetAddress = EthernetAddress([0x02, 0x02, 0x02, 0x02, 0x02, 0x02]);
  585. const IP_BROADCAST: Ipv4Repr = Ipv4Repr {
  586. src_addr: Ipv4Address::UNSPECIFIED,
  587. dst_addr: Ipv4Address::BROADCAST,
  588. protocol: IpProtocol::Udp,
  589. payload_len: 0,
  590. hop_limit: 64,
  591. };
  592. const IP_SERVER_BROADCAST: Ipv4Repr = Ipv4Repr {
  593. src_addr: SERVER_IP,
  594. dst_addr: Ipv4Address::BROADCAST,
  595. protocol: IpProtocol::Udp,
  596. payload_len: 0,
  597. hop_limit: 64,
  598. };
  599. const IP_RECV: Ipv4Repr = Ipv4Repr {
  600. src_addr: SERVER_IP,
  601. dst_addr: MY_IP,
  602. protocol: IpProtocol::Udp,
  603. payload_len: 0,
  604. hop_limit: 64,
  605. };
  606. const IP_SEND: Ipv4Repr = Ipv4Repr {
  607. src_addr: MY_IP,
  608. dst_addr: SERVER_IP,
  609. protocol: IpProtocol::Udp,
  610. payload_len: 0,
  611. hop_limit: 64,
  612. };
  613. const UDP_SEND: UdpRepr = UdpRepr {
  614. src_port: 68,
  615. dst_port: 67,
  616. };
  617. const UDP_RECV: UdpRepr = UdpRepr {
  618. src_port: 67,
  619. dst_port: 68,
  620. };
  621. const DHCP_DEFAULT: DhcpRepr = DhcpRepr {
  622. message_type: DhcpMessageType::Unknown(99),
  623. transaction_id: TXID,
  624. client_hardware_address: MY_MAC,
  625. client_ip: Ipv4Address::UNSPECIFIED,
  626. your_ip: Ipv4Address::UNSPECIFIED,
  627. server_ip: Ipv4Address::UNSPECIFIED,
  628. router: None,
  629. subnet_mask: None,
  630. relay_agent_ip: Ipv4Address::UNSPECIFIED,
  631. broadcast: false,
  632. requested_ip: None,
  633. client_identifier: None,
  634. server_identifier: None,
  635. parameter_request_list: None,
  636. dns_servers: None,
  637. max_size: None,
  638. lease_duration: None,
  639. };
  640. const DHCP_DISCOVER: DhcpRepr = DhcpRepr {
  641. message_type: DhcpMessageType::Discover,
  642. client_identifier: Some(MY_MAC),
  643. parameter_request_list: Some(&[1, 3, 6]),
  644. max_size: Some(1432),
  645. ..DHCP_DEFAULT
  646. };
  647. const DHCP_OFFER: DhcpRepr = DhcpRepr {
  648. message_type: DhcpMessageType::Offer,
  649. server_ip: SERVER_IP,
  650. server_identifier: Some(SERVER_IP),
  651. your_ip: MY_IP,
  652. router: Some(SERVER_IP),
  653. subnet_mask: Some(MASK_24),
  654. dns_servers: Some(DNS_IPS),
  655. lease_duration: Some(1000),
  656. ..DHCP_DEFAULT
  657. };
  658. const DHCP_REQUEST: DhcpRepr = DhcpRepr {
  659. message_type: DhcpMessageType::Request,
  660. client_identifier: Some(MY_MAC),
  661. server_identifier: Some(SERVER_IP),
  662. max_size: Some(1432),
  663. requested_ip: Some(MY_IP),
  664. parameter_request_list: Some(&[1, 3, 6]),
  665. ..DHCP_DEFAULT
  666. };
  667. const DHCP_ACK: DhcpRepr = DhcpRepr {
  668. message_type: DhcpMessageType::Ack,
  669. server_ip: SERVER_IP,
  670. server_identifier: Some(SERVER_IP),
  671. your_ip: MY_IP,
  672. router: Some(SERVER_IP),
  673. subnet_mask: Some(MASK_24),
  674. dns_servers: Some(DNS_IPS),
  675. lease_duration: Some(1000),
  676. ..DHCP_DEFAULT
  677. };
  678. const DHCP_NAK: DhcpRepr = DhcpRepr {
  679. message_type: DhcpMessageType::Nak,
  680. server_ip: SERVER_IP,
  681. server_identifier: Some(SERVER_IP),
  682. ..DHCP_DEFAULT
  683. };
  684. const DHCP_RENEW: DhcpRepr = DhcpRepr {
  685. message_type: DhcpMessageType::Request,
  686. client_identifier: Some(MY_MAC),
  687. // NO server_identifier in renew requests, only in first one!
  688. client_ip: MY_IP,
  689. max_size: Some(1432),
  690. requested_ip: None,
  691. parameter_request_list: Some(&[1, 3, 6]),
  692. ..DHCP_DEFAULT
  693. };
  694. // =========================================================================================//
  695. // Tests
  696. fn socket() -> TestSocket {
  697. let mut s = Dhcpv4Socket::new();
  698. assert_eq!(s.poll(), Some(Event::Deconfigured));
  699. TestSocket {
  700. socket: s,
  701. cx: Context::mock(),
  702. }
  703. }
  704. fn socket_bound() -> TestSocket {
  705. let mut s = socket();
  706. s.state = ClientState::Renewing(RenewState {
  707. config: Config {
  708. address: Ipv4Cidr::new(MY_IP, 24),
  709. dns_servers: DNS_IPS,
  710. router: Some(SERVER_IP),
  711. },
  712. server: ServerInfo {
  713. address: SERVER_IP,
  714. identifier: SERVER_IP,
  715. },
  716. renew_at: Instant::from_secs(500),
  717. expires_at: Instant::from_secs(1000),
  718. });
  719. s
  720. }
  721. #[test]
  722. fn test_bind() {
  723. let mut s = socket();
  724. recv!(s, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  725. assert_eq!(s.poll(), None);
  726. send!(s, (IP_RECV, UDP_RECV, DHCP_OFFER));
  727. assert_eq!(s.poll(), None);
  728. recv!(s, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  729. assert_eq!(s.poll(), None);
  730. send!(s, (IP_RECV, UDP_RECV, DHCP_ACK));
  731. assert_eq!(
  732. s.poll(),
  733. Some(Event::Configured(Config {
  734. address: Ipv4Cidr::new(MY_IP, 24),
  735. dns_servers: DNS_IPS,
  736. router: Some(SERVER_IP),
  737. }))
  738. );
  739. match &s.state {
  740. ClientState::Renewing(r) => {
  741. assert_eq!(r.renew_at, Instant::from_secs(500));
  742. assert_eq!(r.expires_at, Instant::from_secs(1000));
  743. }
  744. _ => panic!("Invalid state"),
  745. }
  746. }
  747. #[test]
  748. fn test_discover_retransmit() {
  749. let mut s = socket();
  750. recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  751. recv!(s, time 1_000, []);
  752. recv!(s, time 10_000, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  753. recv!(s, time 11_000, []);
  754. recv!(s, time 20_000, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  755. // check after retransmits it still works
  756. send!(s, time 20_000, (IP_RECV, UDP_RECV, DHCP_OFFER));
  757. recv!(s, time 20_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  758. }
  759. #[test]
  760. fn test_request_retransmit() {
  761. let mut s = socket();
  762. recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  763. send!(s, time 0, (IP_RECV, UDP_RECV, DHCP_OFFER));
  764. recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  765. recv!(s, time 1_000, []);
  766. recv!(s, time 5_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  767. recv!(s, time 6_000, []);
  768. recv!(s, time 10_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  769. recv!(s, time 15_000, []);
  770. recv!(s, time 20_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  771. // check after retransmits it still works
  772. send!(s, time 20_000, (IP_RECV, UDP_RECV, DHCP_ACK));
  773. match &s.state {
  774. ClientState::Renewing(r) => {
  775. assert_eq!(r.renew_at, Instant::from_secs(20 + 500));
  776. assert_eq!(r.expires_at, Instant::from_secs(20 + 1000));
  777. }
  778. _ => panic!("Invalid state"),
  779. }
  780. }
  781. #[test]
  782. fn test_request_timeout() {
  783. let mut s = socket();
  784. recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  785. send!(s, time 0, (IP_RECV, UDP_RECV, DHCP_OFFER));
  786. recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  787. recv!(s, time 5_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  788. recv!(s, time 10_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  789. recv!(s, time 20_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  790. recv!(s, time 30_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  791. // After 5 tries and 70 seconds, it gives up.
  792. // 5 + 5 + 10 + 10 + 20 = 70
  793. recv!(s, time 70_000, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  794. // check it still works
  795. send!(s, time 60_000, (IP_RECV, UDP_RECV, DHCP_OFFER));
  796. recv!(s, time 60_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  797. }
  798. #[test]
  799. fn test_request_nak() {
  800. let mut s = socket();
  801. recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  802. send!(s, time 0, (IP_RECV, UDP_RECV, DHCP_OFFER));
  803. recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  804. send!(s, time 0, (IP_SERVER_BROADCAST, UDP_RECV, DHCP_NAK));
  805. recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  806. }
  807. #[test]
  808. fn test_renew() {
  809. let mut s = socket_bound();
  810. recv!(s, []);
  811. assert_eq!(s.poll(), None);
  812. recv!(s, time 500_000, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
  813. assert_eq!(s.poll(), None);
  814. match &s.state {
  815. ClientState::Renewing(r) => {
  816. // the expiration still hasn't been bumped, because
  817. // we haven't received the ACK yet
  818. assert_eq!(r.expires_at, Instant::from_secs(1000));
  819. }
  820. _ => panic!("Invalid state"),
  821. }
  822. send!(s, time 500_000, (IP_RECV, UDP_RECV, DHCP_ACK));
  823. assert_eq!(s.poll(), None);
  824. match &s.state {
  825. ClientState::Renewing(r) => {
  826. // NOW the expiration gets bumped
  827. assert_eq!(r.renew_at, Instant::from_secs(500 + 500));
  828. assert_eq!(r.expires_at, Instant::from_secs(500 + 1000));
  829. }
  830. _ => panic!("Invalid state"),
  831. }
  832. }
  833. #[test]
  834. fn test_renew_retransmit() {
  835. let mut s = socket_bound();
  836. recv!(s, []);
  837. recv!(s, time 500_000, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
  838. recv!(s, time 749_000, []);
  839. recv!(s, time 750_000, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
  840. recv!(s, time 874_000, []);
  841. recv!(s, time 875_000, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
  842. // check it still works
  843. send!(s, time 875_000, (IP_RECV, UDP_RECV, DHCP_ACK));
  844. match &s.state {
  845. ClientState::Renewing(r) => {
  846. // NOW the expiration gets bumped
  847. assert_eq!(r.renew_at, Instant::from_secs(875 + 500));
  848. assert_eq!(r.expires_at, Instant::from_secs(875 + 1000));
  849. }
  850. _ => panic!("Invalid state"),
  851. }
  852. }
  853. #[test]
  854. fn test_renew_timeout() {
  855. let mut s = socket_bound();
  856. recv!(s, []);
  857. recv!(s, time 500_000, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
  858. recv!(s, time 999_000, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
  859. recv!(s, time 1_000_000, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  860. match &s.state {
  861. ClientState::Discovering(_) => {}
  862. _ => panic!("Invalid state"),
  863. }
  864. }
  865. #[test]
  866. fn test_renew_nak() {
  867. let mut s = socket_bound();
  868. recv!(s, time 500_000, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
  869. send!(s, time 500_000, (IP_SERVER_BROADCAST, UDP_RECV, DHCP_NAK));
  870. recv!(s, time 500_000, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  871. }
  872. }