tcp.rs 44 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331
  1. use byteorder::{ByteOrder, NetworkEndian};
  2. use core::{cmp, fmt, i32, ops};
  3. use super::{Error, Result};
  4. use crate::phy::ChecksumCapabilities;
  5. use crate::wire::ip::checksum;
  6. use crate::wire::{IpAddress, IpProtocol};
  7. /// A TCP sequence number.
  8. ///
  9. /// A sequence number is a monotonically advancing integer modulo 2<sup>32</sup>.
  10. /// Sequence numbers do not have a discontiguity when compared pairwise across a signed overflow.
  11. #[derive(Debug, PartialEq, Eq, Clone, Copy, Default)]
  12. pub struct SeqNumber(pub i32);
  13. impl SeqNumber {
  14. pub fn max(self, rhs: Self) -> Self {
  15. if self > rhs {
  16. self
  17. } else {
  18. rhs
  19. }
  20. }
  21. pub fn min(self, rhs: Self) -> Self {
  22. if self < rhs {
  23. self
  24. } else {
  25. rhs
  26. }
  27. }
  28. }
  29. impl fmt::Display for SeqNumber {
  30. fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
  31. write!(f, "{}", self.0 as u32)
  32. }
  33. }
  34. #[cfg(feature = "defmt")]
  35. impl defmt::Format for SeqNumber {
  36. fn format(&self, fmt: defmt::Formatter) {
  37. defmt::write!(fmt, "{}", self.0 as u32);
  38. }
  39. }
  40. impl ops::Add<usize> for SeqNumber {
  41. type Output = SeqNumber;
  42. fn add(self, rhs: usize) -> SeqNumber {
  43. if rhs > i32::MAX as usize {
  44. panic!("attempt to add to sequence number with unsigned overflow")
  45. }
  46. SeqNumber(self.0.wrapping_add(rhs as i32))
  47. }
  48. }
  49. impl ops::Sub<usize> for SeqNumber {
  50. type Output = SeqNumber;
  51. fn sub(self, rhs: usize) -> SeqNumber {
  52. if rhs > i32::MAX as usize {
  53. panic!("attempt to subtract to sequence number with unsigned overflow")
  54. }
  55. SeqNumber(self.0.wrapping_sub(rhs as i32))
  56. }
  57. }
  58. impl ops::AddAssign<usize> for SeqNumber {
  59. fn add_assign(&mut self, rhs: usize) {
  60. *self = *self + rhs;
  61. }
  62. }
  63. impl ops::Sub for SeqNumber {
  64. type Output = usize;
  65. fn sub(self, rhs: SeqNumber) -> usize {
  66. let result = self.0.wrapping_sub(rhs.0);
  67. if result < 0 {
  68. panic!("attempt to subtract sequence numbers with underflow")
  69. }
  70. result as usize
  71. }
  72. }
  73. impl cmp::PartialOrd for SeqNumber {
  74. fn partial_cmp(&self, other: &SeqNumber) -> Option<cmp::Ordering> {
  75. self.0.wrapping_sub(other.0).partial_cmp(&0)
  76. }
  77. }
  78. /// A read/write wrapper around a Transmission Control Protocol packet buffer.
  79. #[derive(Debug, PartialEq, Eq, Clone)]
  80. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  81. pub struct Packet<T: AsRef<[u8]>> {
  82. buffer: T,
  83. }
  84. mod field {
  85. #![allow(non_snake_case)]
  86. use crate::wire::field::*;
  87. pub const SRC_PORT: Field = 0..2;
  88. pub const DST_PORT: Field = 2..4;
  89. pub const SEQ_NUM: Field = 4..8;
  90. pub const ACK_NUM: Field = 8..12;
  91. pub const FLAGS: Field = 12..14;
  92. pub const WIN_SIZE: Field = 14..16;
  93. pub const CHECKSUM: Field = 16..18;
  94. pub const URGENT: Field = 18..20;
  95. pub const fn OPTIONS(length: u8) -> Field {
  96. URGENT.end..(length as usize)
  97. }
  98. pub const FLG_FIN: u16 = 0x001;
  99. pub const FLG_SYN: u16 = 0x002;
  100. pub const FLG_RST: u16 = 0x004;
  101. pub const FLG_PSH: u16 = 0x008;
  102. pub const FLG_ACK: u16 = 0x010;
  103. pub const FLG_URG: u16 = 0x020;
  104. pub const FLG_ECE: u16 = 0x040;
  105. pub const FLG_CWR: u16 = 0x080;
  106. pub const FLG_NS: u16 = 0x100;
  107. pub const OPT_END: u8 = 0x00;
  108. pub const OPT_NOP: u8 = 0x01;
  109. pub const OPT_MSS: u8 = 0x02;
  110. pub const OPT_WS: u8 = 0x03;
  111. pub const OPT_SACKPERM: u8 = 0x04;
  112. pub const OPT_SACKRNG: u8 = 0x05;
  113. }
  114. pub const HEADER_LEN: usize = field::URGENT.end;
  115. impl<T: AsRef<[u8]>> Packet<T> {
  116. /// Imbue a raw octet buffer with TCP packet structure.
  117. pub const fn new_unchecked(buffer: T) -> Packet<T> {
  118. Packet { buffer }
  119. }
  120. /// Shorthand for a combination of [new_unchecked] and [check_len].
  121. ///
  122. /// [new_unchecked]: #method.new_unchecked
  123. /// [check_len]: #method.check_len
  124. pub fn new_checked(buffer: T) -> Result<Packet<T>> {
  125. let packet = Self::new_unchecked(buffer);
  126. packet.check_len()?;
  127. Ok(packet)
  128. }
  129. /// Ensure that no accessor method will panic if called.
  130. /// Returns `Err(Error)` if the buffer is too short.
  131. /// Returns `Err(Error)` if the header length field has a value smaller
  132. /// than the minimal header length.
  133. ///
  134. /// The result of this check is invalidated by calling [set_header_len].
  135. ///
  136. /// [set_header_len]: #method.set_header_len
  137. pub fn check_len(&self) -> Result<()> {
  138. let len = self.buffer.as_ref().len();
  139. if len < field::URGENT.end {
  140. Err(Error)
  141. } else {
  142. let header_len = self.header_len() as usize;
  143. if len < header_len || header_len < field::URGENT.end {
  144. Err(Error)
  145. } else {
  146. Ok(())
  147. }
  148. }
  149. }
  150. /// Consume the packet, returning the underlying buffer.
  151. pub fn into_inner(self) -> T {
  152. self.buffer
  153. }
  154. /// Return the source port field.
  155. #[inline]
  156. pub fn src_port(&self) -> u16 {
  157. let data = self.buffer.as_ref();
  158. NetworkEndian::read_u16(&data[field::SRC_PORT])
  159. }
  160. /// Return the destination port field.
  161. #[inline]
  162. pub fn dst_port(&self) -> u16 {
  163. let data = self.buffer.as_ref();
  164. NetworkEndian::read_u16(&data[field::DST_PORT])
  165. }
  166. /// Return the sequence number field.
  167. #[inline]
  168. pub fn seq_number(&self) -> SeqNumber {
  169. let data = self.buffer.as_ref();
  170. SeqNumber(NetworkEndian::read_i32(&data[field::SEQ_NUM]))
  171. }
  172. /// Return the acknowledgement number field.
  173. #[inline]
  174. pub fn ack_number(&self) -> SeqNumber {
  175. let data = self.buffer.as_ref();
  176. SeqNumber(NetworkEndian::read_i32(&data[field::ACK_NUM]))
  177. }
  178. /// Return the FIN flag.
  179. #[inline]
  180. pub fn fin(&self) -> bool {
  181. let data = self.buffer.as_ref();
  182. let raw = NetworkEndian::read_u16(&data[field::FLAGS]);
  183. raw & field::FLG_FIN != 0
  184. }
  185. /// Return the SYN flag.
  186. #[inline]
  187. pub fn syn(&self) -> bool {
  188. let data = self.buffer.as_ref();
  189. let raw = NetworkEndian::read_u16(&data[field::FLAGS]);
  190. raw & field::FLG_SYN != 0
  191. }
  192. /// Return the RST flag.
  193. #[inline]
  194. pub fn rst(&self) -> bool {
  195. let data = self.buffer.as_ref();
  196. let raw = NetworkEndian::read_u16(&data[field::FLAGS]);
  197. raw & field::FLG_RST != 0
  198. }
  199. /// Return the PSH flag.
  200. #[inline]
  201. pub fn psh(&self) -> bool {
  202. let data = self.buffer.as_ref();
  203. let raw = NetworkEndian::read_u16(&data[field::FLAGS]);
  204. raw & field::FLG_PSH != 0
  205. }
  206. /// Return the ACK flag.
  207. #[inline]
  208. pub fn ack(&self) -> bool {
  209. let data = self.buffer.as_ref();
  210. let raw = NetworkEndian::read_u16(&data[field::FLAGS]);
  211. raw & field::FLG_ACK != 0
  212. }
  213. /// Return the URG flag.
  214. #[inline]
  215. pub fn urg(&self) -> bool {
  216. let data = self.buffer.as_ref();
  217. let raw = NetworkEndian::read_u16(&data[field::FLAGS]);
  218. raw & field::FLG_URG != 0
  219. }
  220. /// Return the ECE flag.
  221. #[inline]
  222. pub fn ece(&self) -> bool {
  223. let data = self.buffer.as_ref();
  224. let raw = NetworkEndian::read_u16(&data[field::FLAGS]);
  225. raw & field::FLG_ECE != 0
  226. }
  227. /// Return the CWR flag.
  228. #[inline]
  229. pub fn cwr(&self) -> bool {
  230. let data = self.buffer.as_ref();
  231. let raw = NetworkEndian::read_u16(&data[field::FLAGS]);
  232. raw & field::FLG_CWR != 0
  233. }
  234. /// Return the NS flag.
  235. #[inline]
  236. pub fn ns(&self) -> bool {
  237. let data = self.buffer.as_ref();
  238. let raw = NetworkEndian::read_u16(&data[field::FLAGS]);
  239. raw & field::FLG_NS != 0
  240. }
  241. /// Return the header length, in octets.
  242. #[inline]
  243. pub fn header_len(&self) -> u8 {
  244. let data = self.buffer.as_ref();
  245. let raw = NetworkEndian::read_u16(&data[field::FLAGS]);
  246. ((raw >> 12) * 4) as u8
  247. }
  248. /// Return the window size field.
  249. #[inline]
  250. pub fn window_len(&self) -> u16 {
  251. let data = self.buffer.as_ref();
  252. NetworkEndian::read_u16(&data[field::WIN_SIZE])
  253. }
  254. /// Return the checksum field.
  255. #[inline]
  256. pub fn checksum(&self) -> u16 {
  257. let data = self.buffer.as_ref();
  258. NetworkEndian::read_u16(&data[field::CHECKSUM])
  259. }
  260. /// Return the urgent pointer field.
  261. #[inline]
  262. pub fn urgent_at(&self) -> u16 {
  263. let data = self.buffer.as_ref();
  264. NetworkEndian::read_u16(&data[field::URGENT])
  265. }
  266. /// Return the length of the segment, in terms of sequence space.
  267. pub fn segment_len(&self) -> usize {
  268. let data = self.buffer.as_ref();
  269. let mut length = data.len() - self.header_len() as usize;
  270. if self.syn() {
  271. length += 1
  272. }
  273. if self.fin() {
  274. length += 1
  275. }
  276. length
  277. }
  278. /// Returns whether the selective acknowledgement SYN flag is set or not.
  279. pub fn selective_ack_permitted(&self) -> Result<bool> {
  280. let data = self.buffer.as_ref();
  281. let mut options = &data[field::OPTIONS(self.header_len())];
  282. while !options.is_empty() {
  283. let (next_options, option) = TcpOption::parse(options)?;
  284. if option == TcpOption::SackPermitted {
  285. return Ok(true);
  286. }
  287. options = next_options;
  288. }
  289. Ok(false)
  290. }
  291. /// Return the selective acknowledgement ranges, if any. If there are none in the packet, an
  292. /// array of ``None`` values will be returned.
  293. ///
  294. pub fn selective_ack_ranges(&self) -> Result<[Option<(u32, u32)>; 3]> {
  295. let data = self.buffer.as_ref();
  296. let mut options = &data[field::OPTIONS(self.header_len())];
  297. while !options.is_empty() {
  298. let (next_options, option) = TcpOption::parse(options)?;
  299. if let TcpOption::SackRange(slice) = option {
  300. return Ok(slice);
  301. }
  302. options = next_options;
  303. }
  304. Ok([None, None, None])
  305. }
  306. /// Validate the packet checksum.
  307. ///
  308. /// # Panics
  309. /// This function panics unless `src_addr` and `dst_addr` belong to the same family,
  310. /// and that family is IPv4 or IPv6.
  311. ///
  312. /// # Fuzzing
  313. /// This function always returns `true` when fuzzing.
  314. pub fn verify_checksum(&self, src_addr: &IpAddress, dst_addr: &IpAddress) -> bool {
  315. if cfg!(fuzzing) {
  316. return true;
  317. }
  318. let data = self.buffer.as_ref();
  319. checksum::combine(&[
  320. checksum::pseudo_header(src_addr, dst_addr, IpProtocol::Tcp, data.len() as u32),
  321. checksum::data(data),
  322. ]) == !0
  323. }
  324. }
  325. impl<'a, T: AsRef<[u8]> + ?Sized> Packet<&'a T> {
  326. /// Return a pointer to the options.
  327. #[inline]
  328. pub fn options(&self) -> &'a [u8] {
  329. let header_len = self.header_len();
  330. let data = self.buffer.as_ref();
  331. &data[field::OPTIONS(header_len)]
  332. }
  333. /// Return a pointer to the payload.
  334. #[inline]
  335. pub fn payload(&self) -> &'a [u8] {
  336. let header_len = self.header_len() as usize;
  337. let data = self.buffer.as_ref();
  338. &data[header_len..]
  339. }
  340. }
  341. impl<T: AsRef<[u8]> + AsMut<[u8]>> Packet<T> {
  342. /// Set the source port field.
  343. #[inline]
  344. pub fn set_src_port(&mut self, value: u16) {
  345. let data = self.buffer.as_mut();
  346. NetworkEndian::write_u16(&mut data[field::SRC_PORT], value)
  347. }
  348. /// Set the destination port field.
  349. #[inline]
  350. pub fn set_dst_port(&mut self, value: u16) {
  351. let data = self.buffer.as_mut();
  352. NetworkEndian::write_u16(&mut data[field::DST_PORT], value)
  353. }
  354. /// Set the sequence number field.
  355. #[inline]
  356. pub fn set_seq_number(&mut self, value: SeqNumber) {
  357. let data = self.buffer.as_mut();
  358. NetworkEndian::write_i32(&mut data[field::SEQ_NUM], value.0)
  359. }
  360. /// Set the acknowledgement number field.
  361. #[inline]
  362. pub fn set_ack_number(&mut self, value: SeqNumber) {
  363. let data = self.buffer.as_mut();
  364. NetworkEndian::write_i32(&mut data[field::ACK_NUM], value.0)
  365. }
  366. /// Clear the entire flags field.
  367. #[inline]
  368. pub fn clear_flags(&mut self) {
  369. let data = self.buffer.as_mut();
  370. let raw = NetworkEndian::read_u16(&data[field::FLAGS]);
  371. let raw = raw & !0x0fff;
  372. NetworkEndian::write_u16(&mut data[field::FLAGS], raw)
  373. }
  374. /// Set the FIN flag.
  375. #[inline]
  376. pub fn set_fin(&mut self, value: bool) {
  377. let data = self.buffer.as_mut();
  378. let raw = NetworkEndian::read_u16(&data[field::FLAGS]);
  379. let raw = if value {
  380. raw | field::FLG_FIN
  381. } else {
  382. raw & !field::FLG_FIN
  383. };
  384. NetworkEndian::write_u16(&mut data[field::FLAGS], raw)
  385. }
  386. /// Set the SYN flag.
  387. #[inline]
  388. pub fn set_syn(&mut self, value: bool) {
  389. let data = self.buffer.as_mut();
  390. let raw = NetworkEndian::read_u16(&data[field::FLAGS]);
  391. let raw = if value {
  392. raw | field::FLG_SYN
  393. } else {
  394. raw & !field::FLG_SYN
  395. };
  396. NetworkEndian::write_u16(&mut data[field::FLAGS], raw)
  397. }
  398. /// Set the RST flag.
  399. #[inline]
  400. pub fn set_rst(&mut self, value: bool) {
  401. let data = self.buffer.as_mut();
  402. let raw = NetworkEndian::read_u16(&data[field::FLAGS]);
  403. let raw = if value {
  404. raw | field::FLG_RST
  405. } else {
  406. raw & !field::FLG_RST
  407. };
  408. NetworkEndian::write_u16(&mut data[field::FLAGS], raw)
  409. }
  410. /// Set the PSH flag.
  411. #[inline]
  412. pub fn set_psh(&mut self, value: bool) {
  413. let data = self.buffer.as_mut();
  414. let raw = NetworkEndian::read_u16(&data[field::FLAGS]);
  415. let raw = if value {
  416. raw | field::FLG_PSH
  417. } else {
  418. raw & !field::FLG_PSH
  419. };
  420. NetworkEndian::write_u16(&mut data[field::FLAGS], raw)
  421. }
  422. /// Set the ACK flag.
  423. #[inline]
  424. pub fn set_ack(&mut self, value: bool) {
  425. let data = self.buffer.as_mut();
  426. let raw = NetworkEndian::read_u16(&data[field::FLAGS]);
  427. let raw = if value {
  428. raw | field::FLG_ACK
  429. } else {
  430. raw & !field::FLG_ACK
  431. };
  432. NetworkEndian::write_u16(&mut data[field::FLAGS], raw)
  433. }
  434. /// Set the URG flag.
  435. #[inline]
  436. pub fn set_urg(&mut self, value: bool) {
  437. let data = self.buffer.as_mut();
  438. let raw = NetworkEndian::read_u16(&data[field::FLAGS]);
  439. let raw = if value {
  440. raw | field::FLG_URG
  441. } else {
  442. raw & !field::FLG_URG
  443. };
  444. NetworkEndian::write_u16(&mut data[field::FLAGS], raw)
  445. }
  446. /// Set the ECE flag.
  447. #[inline]
  448. pub fn set_ece(&mut self, value: bool) {
  449. let data = self.buffer.as_mut();
  450. let raw = NetworkEndian::read_u16(&data[field::FLAGS]);
  451. let raw = if value {
  452. raw | field::FLG_ECE
  453. } else {
  454. raw & !field::FLG_ECE
  455. };
  456. NetworkEndian::write_u16(&mut data[field::FLAGS], raw)
  457. }
  458. /// Set the CWR flag.
  459. #[inline]
  460. pub fn set_cwr(&mut self, value: bool) {
  461. let data = self.buffer.as_mut();
  462. let raw = NetworkEndian::read_u16(&data[field::FLAGS]);
  463. let raw = if value {
  464. raw | field::FLG_CWR
  465. } else {
  466. raw & !field::FLG_CWR
  467. };
  468. NetworkEndian::write_u16(&mut data[field::FLAGS], raw)
  469. }
  470. /// Set the NS flag.
  471. #[inline]
  472. pub fn set_ns(&mut self, value: bool) {
  473. let data = self.buffer.as_mut();
  474. let raw = NetworkEndian::read_u16(&data[field::FLAGS]);
  475. let raw = if value {
  476. raw | field::FLG_NS
  477. } else {
  478. raw & !field::FLG_NS
  479. };
  480. NetworkEndian::write_u16(&mut data[field::FLAGS], raw)
  481. }
  482. /// Set the header length, in octets.
  483. #[inline]
  484. pub fn set_header_len(&mut self, value: u8) {
  485. let data = self.buffer.as_mut();
  486. let raw = NetworkEndian::read_u16(&data[field::FLAGS]);
  487. let raw = (raw & !0xf000) | ((value as u16) / 4) << 12;
  488. NetworkEndian::write_u16(&mut data[field::FLAGS], raw)
  489. }
  490. /// Set the window size field.
  491. #[inline]
  492. pub fn set_window_len(&mut self, value: u16) {
  493. let data = self.buffer.as_mut();
  494. NetworkEndian::write_u16(&mut data[field::WIN_SIZE], value)
  495. }
  496. /// Set the checksum field.
  497. #[inline]
  498. pub fn set_checksum(&mut self, value: u16) {
  499. let data = self.buffer.as_mut();
  500. NetworkEndian::write_u16(&mut data[field::CHECKSUM], value)
  501. }
  502. /// Set the urgent pointer field.
  503. #[inline]
  504. pub fn set_urgent_at(&mut self, value: u16) {
  505. let data = self.buffer.as_mut();
  506. NetworkEndian::write_u16(&mut data[field::URGENT], value)
  507. }
  508. /// Compute and fill in the header checksum.
  509. ///
  510. /// # Panics
  511. /// This function panics unless `src_addr` and `dst_addr` belong to the same family,
  512. /// and that family is IPv4 or IPv6.
  513. pub fn fill_checksum(&mut self, src_addr: &IpAddress, dst_addr: &IpAddress) {
  514. self.set_checksum(0);
  515. let checksum = {
  516. let data = self.buffer.as_ref();
  517. !checksum::combine(&[
  518. checksum::pseudo_header(src_addr, dst_addr, IpProtocol::Tcp, data.len() as u32),
  519. checksum::data(data),
  520. ])
  521. };
  522. self.set_checksum(checksum)
  523. }
  524. /// Return a pointer to the options.
  525. #[inline]
  526. pub fn options_mut(&mut self) -> &mut [u8] {
  527. let header_len = self.header_len();
  528. let data = self.buffer.as_mut();
  529. &mut data[field::OPTIONS(header_len)]
  530. }
  531. /// Return a mutable pointer to the payload data.
  532. #[inline]
  533. pub fn payload_mut(&mut self) -> &mut [u8] {
  534. let header_len = self.header_len() as usize;
  535. let data = self.buffer.as_mut();
  536. &mut data[header_len..]
  537. }
  538. }
  539. impl<T: AsRef<[u8]>> AsRef<[u8]> for Packet<T> {
  540. fn as_ref(&self) -> &[u8] {
  541. self.buffer.as_ref()
  542. }
  543. }
  544. /// A representation of a single TCP option.
  545. #[derive(Debug, PartialEq, Eq, Clone, Copy)]
  546. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  547. pub enum TcpOption<'a> {
  548. EndOfList,
  549. NoOperation,
  550. MaxSegmentSize(u16),
  551. WindowScale(u8),
  552. SackPermitted,
  553. SackRange([Option<(u32, u32)>; 3]),
  554. Unknown { kind: u8, data: &'a [u8] },
  555. }
  556. impl<'a> TcpOption<'a> {
  557. pub fn parse(buffer: &'a [u8]) -> Result<(&'a [u8], TcpOption<'a>)> {
  558. let (length, option);
  559. match *buffer.first().ok_or(Error)? {
  560. field::OPT_END => {
  561. length = 1;
  562. option = TcpOption::EndOfList;
  563. }
  564. field::OPT_NOP => {
  565. length = 1;
  566. option = TcpOption::NoOperation;
  567. }
  568. kind => {
  569. length = *buffer.get(1).ok_or(Error)? as usize;
  570. let data = buffer.get(2..length).ok_or(Error)?;
  571. match (kind, length) {
  572. (field::OPT_END, _) | (field::OPT_NOP, _) => unreachable!(),
  573. (field::OPT_MSS, 4) => {
  574. option = TcpOption::MaxSegmentSize(NetworkEndian::read_u16(data))
  575. }
  576. (field::OPT_MSS, _) => return Err(Error),
  577. (field::OPT_WS, 3) => option = TcpOption::WindowScale(data[0]),
  578. (field::OPT_WS, _) => return Err(Error),
  579. (field::OPT_SACKPERM, 2) => option = TcpOption::SackPermitted,
  580. (field::OPT_SACKPERM, _) => return Err(Error),
  581. (field::OPT_SACKRNG, n) => {
  582. if n < 10 || (n - 2) % 8 != 0 {
  583. return Err(Error);
  584. }
  585. if n > 26 {
  586. // It's possible for a remote to send 4 SACK blocks, but extremely rare.
  587. // Better to "lose" that 4th block and save the extra RAM and CPU
  588. // cycles in the vastly more common case.
  589. //
  590. // RFC 2018: SACK option that specifies n blocks will have a length of
  591. // 8*n+2 bytes, so the 40 bytes available for TCP options can specify a
  592. // maximum of 4 blocks. It is expected that SACK will often be used in
  593. // conjunction with the Timestamp option used for RTTM [...] thus a
  594. // maximum of 3 SACK blocks will be allowed in this case.
  595. net_debug!("sACK with >3 blocks, truncating to 3");
  596. }
  597. let mut sack_ranges: [Option<(u32, u32)>; 3] = [None; 3];
  598. // RFC 2018: Each contiguous block of data queued at the data receiver is
  599. // defined in the SACK option by two 32-bit unsigned integers in network
  600. // byte order[...]
  601. sack_ranges.iter_mut().enumerate().for_each(|(i, nmut)| {
  602. let left = i * 8;
  603. *nmut = if left < data.len() {
  604. let mid = left + 4;
  605. let right = mid + 4;
  606. let range_left = NetworkEndian::read_u32(&data[left..mid]);
  607. let range_right = NetworkEndian::read_u32(&data[mid..right]);
  608. Some((range_left, range_right))
  609. } else {
  610. None
  611. };
  612. });
  613. option = TcpOption::SackRange(sack_ranges);
  614. }
  615. (_, _) => option = TcpOption::Unknown { kind, data },
  616. }
  617. }
  618. }
  619. Ok((&buffer[length..], option))
  620. }
  621. pub fn buffer_len(&self) -> usize {
  622. match *self {
  623. TcpOption::EndOfList => 1,
  624. TcpOption::NoOperation => 1,
  625. TcpOption::MaxSegmentSize(_) => 4,
  626. TcpOption::WindowScale(_) => 3,
  627. TcpOption::SackPermitted => 2,
  628. TcpOption::SackRange(s) => s.iter().filter(|s| s.is_some()).count() * 8 + 2,
  629. TcpOption::Unknown { data, .. } => 2 + data.len(),
  630. }
  631. }
  632. pub fn emit<'b>(&self, buffer: &'b mut [u8]) -> &'b mut [u8] {
  633. let length;
  634. match *self {
  635. TcpOption::EndOfList => {
  636. length = 1;
  637. // There may be padding space which also should be initialized.
  638. for p in buffer.iter_mut() {
  639. *p = field::OPT_END;
  640. }
  641. }
  642. TcpOption::NoOperation => {
  643. length = 1;
  644. buffer[0] = field::OPT_NOP;
  645. }
  646. _ => {
  647. length = self.buffer_len();
  648. buffer[1] = length as u8;
  649. match self {
  650. &TcpOption::EndOfList | &TcpOption::NoOperation => unreachable!(),
  651. &TcpOption::MaxSegmentSize(value) => {
  652. buffer[0] = field::OPT_MSS;
  653. NetworkEndian::write_u16(&mut buffer[2..], value)
  654. }
  655. &TcpOption::WindowScale(value) => {
  656. buffer[0] = field::OPT_WS;
  657. buffer[2] = value;
  658. }
  659. &TcpOption::SackPermitted => {
  660. buffer[0] = field::OPT_SACKPERM;
  661. }
  662. &TcpOption::SackRange(slice) => {
  663. buffer[0] = field::OPT_SACKRNG;
  664. slice
  665. .iter()
  666. .filter(|s| s.is_some())
  667. .enumerate()
  668. .for_each(|(i, s)| {
  669. let (first, second) = *s.as_ref().unwrap();
  670. let pos = i * 8 + 2;
  671. NetworkEndian::write_u32(&mut buffer[pos..], first);
  672. NetworkEndian::write_u32(&mut buffer[pos + 4..], second);
  673. });
  674. }
  675. &TcpOption::Unknown {
  676. kind,
  677. data: provided,
  678. } => {
  679. buffer[0] = kind;
  680. buffer[2..].copy_from_slice(provided)
  681. }
  682. }
  683. }
  684. }
  685. &mut buffer[length..]
  686. }
  687. }
  688. /// The possible control flags of a Transmission Control Protocol packet.
  689. #[derive(Debug, PartialEq, Eq, Clone, Copy)]
  690. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  691. pub enum Control {
  692. None,
  693. Psh,
  694. Syn,
  695. Fin,
  696. Rst,
  697. }
  698. #[allow(clippy::len_without_is_empty)]
  699. impl Control {
  700. /// Return the length of a control flag, in terms of sequence space.
  701. pub const fn len(self) -> usize {
  702. match self {
  703. Control::Syn | Control::Fin => 1,
  704. _ => 0,
  705. }
  706. }
  707. /// Turn the PSH flag into no flag, and keep the rest as-is.
  708. pub const fn quash_psh(self) -> Control {
  709. match self {
  710. Control::Psh => Control::None,
  711. _ => self,
  712. }
  713. }
  714. }
  715. /// A high-level representation of a Transmission Control Protocol packet.
  716. #[derive(Debug, PartialEq, Eq, Clone, Copy)]
  717. pub struct Repr<'a> {
  718. pub src_port: u16,
  719. pub dst_port: u16,
  720. pub control: Control,
  721. pub seq_number: SeqNumber,
  722. pub ack_number: Option<SeqNumber>,
  723. pub window_len: u16,
  724. pub window_scale: Option<u8>,
  725. pub max_seg_size: Option<u16>,
  726. pub sack_permitted: bool,
  727. pub sack_ranges: [Option<(u32, u32)>; 3],
  728. pub payload: &'a [u8],
  729. }
  730. impl<'a> Repr<'a> {
  731. /// Parse a Transmission Control Protocol packet and return a high-level representation.
  732. pub fn parse<T>(
  733. packet: &Packet<&'a T>,
  734. src_addr: &IpAddress,
  735. dst_addr: &IpAddress,
  736. checksum_caps: &ChecksumCapabilities,
  737. ) -> Result<Repr<'a>>
  738. where
  739. T: AsRef<[u8]> + ?Sized,
  740. {
  741. // Source and destination ports must be present.
  742. if packet.src_port() == 0 {
  743. return Err(Error);
  744. }
  745. if packet.dst_port() == 0 {
  746. return Err(Error);
  747. }
  748. // Valid checksum is expected.
  749. if checksum_caps.tcp.rx() && !packet.verify_checksum(src_addr, dst_addr) {
  750. return Err(Error);
  751. }
  752. let control = match (packet.syn(), packet.fin(), packet.rst(), packet.psh()) {
  753. (false, false, false, false) => Control::None,
  754. (false, false, false, true) => Control::Psh,
  755. (true, false, false, _) => Control::Syn,
  756. (false, true, false, _) => Control::Fin,
  757. (false, false, true, _) => Control::Rst,
  758. _ => return Err(Error),
  759. };
  760. let ack_number = match packet.ack() {
  761. true => Some(packet.ack_number()),
  762. false => None,
  763. };
  764. // The PSH flag is ignored.
  765. // The URG flag and the urgent field is ignored. This behavior is standards-compliant,
  766. // however, most deployed systems (e.g. Linux) are *not* standards-compliant, and would
  767. // cut the byte at the urgent pointer from the stream.
  768. let mut max_seg_size = None;
  769. let mut window_scale = None;
  770. let mut options = packet.options();
  771. let mut sack_permitted = false;
  772. let mut sack_ranges = [None, None, None];
  773. while !options.is_empty() {
  774. let (next_options, option) = TcpOption::parse(options)?;
  775. match option {
  776. TcpOption::EndOfList => break,
  777. TcpOption::NoOperation => (),
  778. TcpOption::MaxSegmentSize(value) => max_seg_size = Some(value),
  779. TcpOption::WindowScale(value) => {
  780. // RFC 1323: Thus, the shift count must be limited to 14 (which allows windows
  781. // of 2**30 = 1 Gigabyte). If a Window Scale option is received with a shift.cnt
  782. // value exceeding 14, the TCP should log the error but use 14 instead of the
  783. // specified value.
  784. window_scale = if value > 14 {
  785. net_debug!(
  786. "{}:{}:{}:{}: parsed window scaling factor >14, setting to 14",
  787. src_addr,
  788. packet.src_port(),
  789. dst_addr,
  790. packet.dst_port()
  791. );
  792. Some(14)
  793. } else {
  794. Some(value)
  795. };
  796. }
  797. TcpOption::SackPermitted => sack_permitted = true,
  798. TcpOption::SackRange(slice) => sack_ranges = slice,
  799. _ => (),
  800. }
  801. options = next_options;
  802. }
  803. Ok(Repr {
  804. src_port: packet.src_port(),
  805. dst_port: packet.dst_port(),
  806. control: control,
  807. seq_number: packet.seq_number(),
  808. ack_number: ack_number,
  809. window_len: packet.window_len(),
  810. window_scale: window_scale,
  811. max_seg_size: max_seg_size,
  812. sack_permitted: sack_permitted,
  813. sack_ranges: sack_ranges,
  814. payload: packet.payload(),
  815. })
  816. }
  817. /// Return the length of a header that will be emitted from this high-level representation.
  818. ///
  819. /// This should be used for buffer space calculations.
  820. /// The TCP header length is a multiple of 4.
  821. pub fn header_len(&self) -> usize {
  822. let mut length = field::URGENT.end;
  823. if self.max_seg_size.is_some() {
  824. length += 4
  825. }
  826. if self.window_scale.is_some() {
  827. length += 3
  828. }
  829. if self.sack_permitted {
  830. length += 2;
  831. }
  832. let sack_range_len: usize = self
  833. .sack_ranges
  834. .iter()
  835. .map(|o| o.map(|_| 8).unwrap_or(0))
  836. .sum();
  837. if sack_range_len > 0 {
  838. length += sack_range_len + 2;
  839. }
  840. if length % 4 != 0 {
  841. length += 4 - length % 4;
  842. }
  843. length
  844. }
  845. /// Return the length of a packet that will be emitted from this high-level representation.
  846. pub fn buffer_len(&self) -> usize {
  847. self.header_len() + self.payload.len()
  848. }
  849. /// Emit a high-level representation into a Transmission Control Protocol packet.
  850. pub fn emit<T>(
  851. &self,
  852. packet: &mut Packet<&mut T>,
  853. src_addr: &IpAddress,
  854. dst_addr: &IpAddress,
  855. checksum_caps: &ChecksumCapabilities,
  856. ) where
  857. T: AsRef<[u8]> + AsMut<[u8]> + ?Sized,
  858. {
  859. packet.set_src_port(self.src_port);
  860. packet.set_dst_port(self.dst_port);
  861. packet.set_seq_number(self.seq_number);
  862. packet.set_ack_number(self.ack_number.unwrap_or(SeqNumber(0)));
  863. packet.set_window_len(self.window_len);
  864. packet.set_header_len(self.header_len() as u8);
  865. packet.clear_flags();
  866. match self.control {
  867. Control::None => (),
  868. Control::Psh => packet.set_psh(true),
  869. Control::Syn => packet.set_syn(true),
  870. Control::Fin => packet.set_fin(true),
  871. Control::Rst => packet.set_rst(true),
  872. }
  873. packet.set_ack(self.ack_number.is_some());
  874. {
  875. let mut options = packet.options_mut();
  876. if let Some(value) = self.max_seg_size {
  877. let tmp = options;
  878. options = TcpOption::MaxSegmentSize(value).emit(tmp);
  879. }
  880. if let Some(value) = self.window_scale {
  881. let tmp = options;
  882. options = TcpOption::WindowScale(value).emit(tmp);
  883. }
  884. if self.sack_permitted {
  885. let tmp = options;
  886. options = TcpOption::SackPermitted.emit(tmp);
  887. } else if self.ack_number.is_some() && self.sack_ranges.iter().any(|s| s.is_some()) {
  888. let tmp = options;
  889. options = TcpOption::SackRange(self.sack_ranges).emit(tmp);
  890. }
  891. if !options.is_empty() {
  892. TcpOption::EndOfList.emit(options);
  893. }
  894. }
  895. packet.set_urgent_at(0);
  896. packet.payload_mut()[..self.payload.len()].copy_from_slice(self.payload);
  897. if checksum_caps.tcp.tx() {
  898. packet.fill_checksum(src_addr, dst_addr)
  899. } else {
  900. // make sure we get a consistently zeroed checksum,
  901. // since implementations might rely on it
  902. packet.set_checksum(0);
  903. }
  904. }
  905. /// Return the length of the segment, in terms of sequence space.
  906. pub const fn segment_len(&self) -> usize {
  907. self.payload.len() + self.control.len()
  908. }
  909. /// Return whether the segment has no flags set (except PSH) and no data.
  910. pub const fn is_empty(&self) -> bool {
  911. match self.control {
  912. _ if !self.payload.is_empty() => false,
  913. Control::Syn | Control::Fin | Control::Rst => false,
  914. Control::None | Control::Psh => true,
  915. }
  916. }
  917. }
  918. impl<'a, T: AsRef<[u8]> + ?Sized> fmt::Display for Packet<&'a T> {
  919. fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
  920. // Cannot use Repr::parse because we don't have the IP addresses.
  921. write!(f, "TCP src={} dst={}", self.src_port(), self.dst_port())?;
  922. if self.syn() {
  923. write!(f, " syn")?
  924. }
  925. if self.fin() {
  926. write!(f, " fin")?
  927. }
  928. if self.rst() {
  929. write!(f, " rst")?
  930. }
  931. if self.psh() {
  932. write!(f, " psh")?
  933. }
  934. if self.ece() {
  935. write!(f, " ece")?
  936. }
  937. if self.cwr() {
  938. write!(f, " cwr")?
  939. }
  940. if self.ns() {
  941. write!(f, " ns")?
  942. }
  943. write!(f, " seq={}", self.seq_number())?;
  944. if self.ack() {
  945. write!(f, " ack={}", self.ack_number())?;
  946. }
  947. write!(f, " win={}", self.window_len())?;
  948. if self.urg() {
  949. write!(f, " urg={}", self.urgent_at())?;
  950. }
  951. write!(f, " len={}", self.payload().len())?;
  952. let mut options = self.options();
  953. while !options.is_empty() {
  954. let (next_options, option) = match TcpOption::parse(options) {
  955. Ok(res) => res,
  956. Err(err) => return write!(f, " ({err})"),
  957. };
  958. match option {
  959. TcpOption::EndOfList => break,
  960. TcpOption::NoOperation => (),
  961. TcpOption::MaxSegmentSize(value) => write!(f, " mss={value}")?,
  962. TcpOption::WindowScale(value) => write!(f, " ws={value}")?,
  963. TcpOption::SackPermitted => write!(f, " sACK")?,
  964. TcpOption::SackRange(slice) => write!(f, " sACKr{slice:?}")?, // debug print conveniently includes the []s
  965. TcpOption::Unknown { kind, .. } => write!(f, " opt({kind})")?,
  966. }
  967. options = next_options;
  968. }
  969. Ok(())
  970. }
  971. }
  972. impl<'a> fmt::Display for Repr<'a> {
  973. fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
  974. write!(f, "TCP src={} dst={}", self.src_port, self.dst_port)?;
  975. match self.control {
  976. Control::Syn => write!(f, " syn")?,
  977. Control::Fin => write!(f, " fin")?,
  978. Control::Rst => write!(f, " rst")?,
  979. Control::Psh => write!(f, " psh")?,
  980. Control::None => (),
  981. }
  982. write!(f, " seq={}", self.seq_number)?;
  983. if let Some(ack_number) = self.ack_number {
  984. write!(f, " ack={ack_number}")?;
  985. }
  986. write!(f, " win={}", self.window_len)?;
  987. write!(f, " len={}", self.payload.len())?;
  988. if let Some(max_seg_size) = self.max_seg_size {
  989. write!(f, " mss={max_seg_size}")?;
  990. }
  991. Ok(())
  992. }
  993. }
  994. #[cfg(feature = "defmt")]
  995. impl<'a> defmt::Format for Repr<'a> {
  996. fn format(&self, fmt: defmt::Formatter) {
  997. defmt::write!(fmt, "TCP src={} dst={}", self.src_port, self.dst_port);
  998. match self.control {
  999. Control::Syn => defmt::write!(fmt, " syn"),
  1000. Control::Fin => defmt::write!(fmt, " fin"),
  1001. Control::Rst => defmt::write!(fmt, " rst"),
  1002. Control::Psh => defmt::write!(fmt, " psh"),
  1003. Control::None => (),
  1004. }
  1005. defmt::write!(fmt, " seq={}", self.seq_number);
  1006. if let Some(ack_number) = self.ack_number {
  1007. defmt::write!(fmt, " ack={}", ack_number);
  1008. }
  1009. defmt::write!(fmt, " win={}", self.window_len);
  1010. defmt::write!(fmt, " len={}", self.payload.len());
  1011. if let Some(max_seg_size) = self.max_seg_size {
  1012. defmt::write!(fmt, " mss={}", max_seg_size);
  1013. }
  1014. }
  1015. }
  1016. use crate::wire::pretty_print::{PrettyIndent, PrettyPrint};
  1017. impl<T: AsRef<[u8]>> PrettyPrint for Packet<T> {
  1018. fn pretty_print(
  1019. buffer: &dyn AsRef<[u8]>,
  1020. f: &mut fmt::Formatter,
  1021. indent: &mut PrettyIndent,
  1022. ) -> fmt::Result {
  1023. match Packet::new_checked(buffer) {
  1024. Err(err) => write!(f, "{indent}({err})"),
  1025. Ok(packet) => write!(f, "{indent}{packet}"),
  1026. }
  1027. }
  1028. }
  1029. #[cfg(test)]
  1030. mod test {
  1031. use super::*;
  1032. #[cfg(feature = "proto-ipv4")]
  1033. use crate::wire::Ipv4Address;
  1034. #[cfg(feature = "proto-ipv4")]
  1035. const SRC_ADDR: Ipv4Address = Ipv4Address([192, 168, 1, 1]);
  1036. #[cfg(feature = "proto-ipv4")]
  1037. const DST_ADDR: Ipv4Address = Ipv4Address([192, 168, 1, 2]);
  1038. #[cfg(feature = "proto-ipv4")]
  1039. static PACKET_BYTES: [u8; 28] = [
  1040. 0xbf, 0x00, 0x00, 0x50, 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, 0x60, 0x35, 0x01,
  1041. 0x23, 0x01, 0xb6, 0x02, 0x01, 0x03, 0x03, 0x0c, 0x01, 0xaa, 0x00, 0x00, 0xff,
  1042. ];
  1043. #[cfg(feature = "proto-ipv4")]
  1044. static OPTION_BYTES: [u8; 4] = [0x03, 0x03, 0x0c, 0x01];
  1045. #[cfg(feature = "proto-ipv4")]
  1046. static PAYLOAD_BYTES: [u8; 4] = [0xaa, 0x00, 0x00, 0xff];
  1047. #[test]
  1048. #[cfg(feature = "proto-ipv4")]
  1049. fn test_deconstruct() {
  1050. let packet = Packet::new_unchecked(&PACKET_BYTES[..]);
  1051. assert_eq!(packet.src_port(), 48896);
  1052. assert_eq!(packet.dst_port(), 80);
  1053. assert_eq!(packet.seq_number(), SeqNumber(0x01234567));
  1054. assert_eq!(packet.ack_number(), SeqNumber(0x89abcdefu32 as i32));
  1055. assert_eq!(packet.header_len(), 24);
  1056. assert!(packet.fin());
  1057. assert!(!packet.syn());
  1058. assert!(packet.rst());
  1059. assert!(!packet.psh());
  1060. assert!(packet.ack());
  1061. assert!(packet.urg());
  1062. assert_eq!(packet.window_len(), 0x0123);
  1063. assert_eq!(packet.urgent_at(), 0x0201);
  1064. assert_eq!(packet.checksum(), 0x01b6);
  1065. assert_eq!(packet.options(), &OPTION_BYTES[..]);
  1066. assert_eq!(packet.payload(), &PAYLOAD_BYTES[..]);
  1067. assert!(packet.verify_checksum(&SRC_ADDR.into(), &DST_ADDR.into()));
  1068. }
  1069. #[test]
  1070. #[cfg(feature = "proto-ipv4")]
  1071. fn test_construct() {
  1072. let mut bytes = vec![0xa5; PACKET_BYTES.len()];
  1073. let mut packet = Packet::new_unchecked(&mut bytes);
  1074. packet.set_src_port(48896);
  1075. packet.set_dst_port(80);
  1076. packet.set_seq_number(SeqNumber(0x01234567));
  1077. packet.set_ack_number(SeqNumber(0x89abcdefu32 as i32));
  1078. packet.set_header_len(24);
  1079. packet.clear_flags();
  1080. packet.set_fin(true);
  1081. packet.set_syn(false);
  1082. packet.set_rst(true);
  1083. packet.set_psh(false);
  1084. packet.set_ack(true);
  1085. packet.set_urg(true);
  1086. packet.set_window_len(0x0123);
  1087. packet.set_urgent_at(0x0201);
  1088. packet.set_checksum(0xEEEE);
  1089. packet.options_mut().copy_from_slice(&OPTION_BYTES[..]);
  1090. packet.payload_mut().copy_from_slice(&PAYLOAD_BYTES[..]);
  1091. packet.fill_checksum(&SRC_ADDR.into(), &DST_ADDR.into());
  1092. assert_eq!(&*packet.into_inner(), &PACKET_BYTES[..]);
  1093. }
  1094. #[test]
  1095. #[cfg(feature = "proto-ipv4")]
  1096. fn test_truncated() {
  1097. let packet = Packet::new_unchecked(&PACKET_BYTES[..23]);
  1098. assert_eq!(packet.check_len(), Err(Error));
  1099. }
  1100. #[test]
  1101. fn test_impossible_len() {
  1102. let mut bytes = vec![0; 20];
  1103. let mut packet = Packet::new_unchecked(&mut bytes);
  1104. packet.set_header_len(10);
  1105. assert_eq!(packet.check_len(), Err(Error));
  1106. }
  1107. #[cfg(feature = "proto-ipv4")]
  1108. static SYN_PACKET_BYTES: [u8; 24] = [
  1109. 0xbf, 0x00, 0x00, 0x50, 0x01, 0x23, 0x45, 0x67, 0x00, 0x00, 0x00, 0x00, 0x50, 0x02, 0x01,
  1110. 0x23, 0x7a, 0x8d, 0x00, 0x00, 0xaa, 0x00, 0x00, 0xff,
  1111. ];
  1112. #[cfg(feature = "proto-ipv4")]
  1113. fn packet_repr() -> Repr<'static> {
  1114. Repr {
  1115. src_port: 48896,
  1116. dst_port: 80,
  1117. seq_number: SeqNumber(0x01234567),
  1118. ack_number: None,
  1119. window_len: 0x0123,
  1120. window_scale: None,
  1121. control: Control::Syn,
  1122. max_seg_size: None,
  1123. sack_permitted: false,
  1124. sack_ranges: [None, None, None],
  1125. payload: &PAYLOAD_BYTES,
  1126. }
  1127. }
  1128. #[test]
  1129. #[cfg(feature = "proto-ipv4")]
  1130. fn test_parse() {
  1131. let packet = Packet::new_unchecked(&SYN_PACKET_BYTES[..]);
  1132. let repr = Repr::parse(
  1133. &packet,
  1134. &SRC_ADDR.into(),
  1135. &DST_ADDR.into(),
  1136. &ChecksumCapabilities::default(),
  1137. )
  1138. .unwrap();
  1139. assert_eq!(repr, packet_repr());
  1140. }
  1141. #[test]
  1142. #[cfg(feature = "proto-ipv4")]
  1143. fn test_emit() {
  1144. let repr = packet_repr();
  1145. let mut bytes = vec![0xa5; repr.buffer_len()];
  1146. let mut packet = Packet::new_unchecked(&mut bytes);
  1147. repr.emit(
  1148. &mut packet,
  1149. &SRC_ADDR.into(),
  1150. &DST_ADDR.into(),
  1151. &ChecksumCapabilities::default(),
  1152. );
  1153. assert_eq!(&*packet.into_inner(), &SYN_PACKET_BYTES[..]);
  1154. }
  1155. #[test]
  1156. #[cfg(feature = "proto-ipv4")]
  1157. fn test_header_len_multiple_of_4() {
  1158. let mut repr = packet_repr();
  1159. repr.window_scale = Some(0); // This TCP Option needs 3 bytes.
  1160. assert_eq!(repr.header_len() % 4, 0); // Should e.g. be 28 instead of 27.
  1161. }
  1162. macro_rules! assert_option_parses {
  1163. ($opt:expr, $data:expr) => {{
  1164. assert_eq!(TcpOption::parse($data), Ok((&[][..], $opt)));
  1165. let buffer = &mut [0; 40][..$opt.buffer_len()];
  1166. assert_eq!($opt.emit(buffer), &mut []);
  1167. assert_eq!(&*buffer, $data);
  1168. }};
  1169. }
  1170. #[test]
  1171. fn test_tcp_options() {
  1172. assert_option_parses!(TcpOption::EndOfList, &[0x00]);
  1173. assert_option_parses!(TcpOption::NoOperation, &[0x01]);
  1174. assert_option_parses!(TcpOption::MaxSegmentSize(1500), &[0x02, 0x04, 0x05, 0xdc]);
  1175. assert_option_parses!(TcpOption::WindowScale(12), &[0x03, 0x03, 0x0c]);
  1176. assert_option_parses!(TcpOption::SackPermitted, &[0x4, 0x02]);
  1177. assert_option_parses!(
  1178. TcpOption::SackRange([Some((500, 1500)), None, None]),
  1179. &[0x05, 0x0a, 0x00, 0x00, 0x01, 0xf4, 0x00, 0x00, 0x05, 0xdc]
  1180. );
  1181. assert_option_parses!(
  1182. TcpOption::SackRange([Some((875, 1225)), Some((1500, 2500)), None]),
  1183. &[
  1184. 0x05, 0x12, 0x00, 0x00, 0x03, 0x6b, 0x00, 0x00, 0x04, 0xc9, 0x00, 0x00, 0x05, 0xdc,
  1185. 0x00, 0x00, 0x09, 0xc4
  1186. ]
  1187. );
  1188. assert_option_parses!(
  1189. TcpOption::SackRange([
  1190. Some((875000, 1225000)),
  1191. Some((1500000, 2500000)),
  1192. Some((876543210, 876654320))
  1193. ]),
  1194. &[
  1195. 0x05, 0x1a, 0x00, 0x0d, 0x59, 0xf8, 0x00, 0x12, 0xb1, 0x28, 0x00, 0x16, 0xe3, 0x60,
  1196. 0x00, 0x26, 0x25, 0xa0, 0x34, 0x3e, 0xfc, 0xea, 0x34, 0x40, 0xae, 0xf0
  1197. ]
  1198. );
  1199. assert_option_parses!(
  1200. TcpOption::Unknown {
  1201. kind: 12,
  1202. data: &[1, 2, 3][..]
  1203. },
  1204. &[0x0c, 0x05, 0x01, 0x02, 0x03]
  1205. )
  1206. }
  1207. #[test]
  1208. fn test_malformed_tcp_options() {
  1209. assert_eq!(TcpOption::parse(&[]), Err(Error));
  1210. assert_eq!(TcpOption::parse(&[0xc]), Err(Error));
  1211. assert_eq!(TcpOption::parse(&[0xc, 0x05, 0x01, 0x02]), Err(Error));
  1212. assert_eq!(TcpOption::parse(&[0xc, 0x01]), Err(Error));
  1213. assert_eq!(TcpOption::parse(&[0x2, 0x02]), Err(Error));
  1214. assert_eq!(TcpOption::parse(&[0x3, 0x02]), Err(Error));
  1215. }
  1216. }