dhcpv4.rs 34 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006
  1. use crate::iface::Context;
  2. use crate::time::{Duration, Instant};
  3. use crate::wire::dhcpv4::field as dhcpv4_field;
  4. use crate::wire::HardwareAddress;
  5. use crate::wire::{
  6. DhcpMessageType, DhcpPacket, DhcpRepr, IpAddress, IpProtocol, Ipv4Address, Ipv4Cidr, Ipv4Repr,
  7. UdpRepr, DHCP_CLIENT_PORT, DHCP_MAX_DNS_SERVER_COUNT, DHCP_SERVER_PORT, UDP_HEADER_LEN,
  8. };
  9. use crate::{Error, Result};
  10. use super::PollAt;
  11. const DISCOVER_TIMEOUT: Duration = Duration::from_secs(10);
  12. // timeout doubles every 2 tries.
  13. // total time 5 + 5 + 10 + 10 + 20 = 50s
  14. const REQUEST_TIMEOUT: Duration = Duration::from_secs(5);
  15. const REQUEST_RETRIES: u16 = 5;
  16. const MIN_RENEW_TIMEOUT: Duration = Duration::from_secs(60);
  17. const DEFAULT_LEASE_DURATION: Duration = Duration::from_secs(120);
  18. const PARAMETER_REQUEST_LIST: &[u8] = &[
  19. dhcpv4_field::OPT_SUBNET_MASK,
  20. dhcpv4_field::OPT_ROUTER,
  21. dhcpv4_field::OPT_DOMAIN_NAME_SERVER,
  22. ];
  23. /// IPv4 configuration data provided by the DHCP server.
  24. #[derive(Debug, Eq, PartialEq, Clone, Copy)]
  25. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  26. pub struct Config {
  27. /// IP address
  28. pub address: Ipv4Cidr,
  29. /// Router address, also known as default gateway. Does not necessarily
  30. /// match the DHCP server's address.
  31. pub router: Option<Ipv4Address>,
  32. /// DNS servers
  33. pub dns_servers: [Option<Ipv4Address>; DHCP_MAX_DNS_SERVER_COUNT],
  34. }
  35. /// Information on how to reach a DHCP server.
  36. #[derive(Debug, Clone, Copy)]
  37. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  38. struct ServerInfo {
  39. /// IP address to use as destination in outgoing packets
  40. address: Ipv4Address,
  41. /// Server identifier to use in outgoing packets. Usually equal to server_address,
  42. /// but may differ in some situations (eg DHCP relays)
  43. identifier: Ipv4Address,
  44. }
  45. #[derive(Debug)]
  46. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  47. struct DiscoverState {
  48. /// When to send next request
  49. retry_at: Instant,
  50. }
  51. #[derive(Debug)]
  52. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  53. struct RequestState {
  54. /// When to send next request
  55. retry_at: Instant,
  56. /// How many retries have been done
  57. retry: u16,
  58. /// Server we're trying to request from
  59. server: ServerInfo,
  60. /// IP address that we're trying to request.
  61. requested_ip: Ipv4Address,
  62. }
  63. #[derive(Debug)]
  64. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  65. struct RenewState {
  66. /// Server that gave us the lease
  67. server: ServerInfo,
  68. /// Active network config
  69. config: Config,
  70. /// Renew timer. When reached, we will start attempting
  71. /// to renew this lease with the DHCP server.
  72. /// Must be less or equal than `expires_at`.
  73. renew_at: Instant,
  74. /// Expiration timer. When reached, this lease is no longer valid, so it must be
  75. /// thrown away and the ethernet interface deconfigured.
  76. expires_at: Instant,
  77. }
  78. #[derive(Debug)]
  79. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  80. enum ClientState {
  81. /// Discovering the DHCP server
  82. Discovering(DiscoverState),
  83. /// Requesting an address
  84. Requesting(RequestState),
  85. /// Having an address, refresh it periodically.
  86. Renewing(RenewState),
  87. }
  88. /// Return value for the `Dhcpv4Socket::poll` function
  89. #[derive(Debug, PartialEq, Eq)]
  90. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  91. pub enum Event {
  92. /// Configuration has been lost (for example, the lease has expired)
  93. Deconfigured,
  94. /// Configuration has been newly acquired, or modified.
  95. Configured(Config),
  96. }
  97. #[derive(Debug)]
  98. pub struct Dhcpv4Socket {
  99. /// State of the DHCP client.
  100. state: ClientState,
  101. /// Set to true on config/state change, cleared back to false by the `config` function.
  102. config_changed: bool,
  103. /// xid of the last sent message.
  104. transaction_id: u32,
  105. /// Max lease duration. If set, it sets a maximum cap to the server-provided lease duration.
  106. /// Useful to react faster to IP configuration changes and to test whether renews work correctly.
  107. max_lease_duration: Option<Duration>,
  108. /// Ignore NAKs.
  109. ignore_naks: bool,
  110. }
  111. /// DHCP client socket.
  112. ///
  113. /// The socket acquires an IP address configuration through DHCP autonomously.
  114. /// You must query the configuration with `.poll()` after every call to `Interface::poll()`,
  115. /// and apply the configuration to the `Interface`.
  116. impl Dhcpv4Socket {
  117. /// Create a DHCPv4 socket
  118. #[allow(clippy::new_without_default)]
  119. pub fn new() -> Self {
  120. Dhcpv4Socket {
  121. state: ClientState::Discovering(DiscoverState {
  122. retry_at: Instant::from_millis(0),
  123. }),
  124. config_changed: true,
  125. transaction_id: 1,
  126. max_lease_duration: None,
  127. ignore_naks: false,
  128. }
  129. }
  130. /// Get the configured max lease duration.
  131. ///
  132. /// See also [`Self::set_max_lease_duration()`]
  133. pub fn max_lease_duration(&self) -> Option<Duration> {
  134. self.max_lease_duration
  135. }
  136. /// Set the max lease duration.
  137. ///
  138. /// When set, the lease duration will be capped at the configured duration if the
  139. /// DHCP server gives us a longer lease. This is generally not recommended, but
  140. /// can be useful for debugging or reacting faster to network configuration changes.
  141. ///
  142. /// If None, no max is applied (the lease duration from the DHCP server is used.)
  143. pub fn set_max_lease_duration(&mut self, max_lease_duration: Option<Duration>) {
  144. self.max_lease_duration = max_lease_duration;
  145. }
  146. /// Get whether to ignore NAKs.
  147. ///
  148. /// See also [`Self::set_ignore_naks()`]
  149. pub fn ignore_naks(&self) -> bool {
  150. self.ignore_naks
  151. }
  152. /// Set whether to ignore NAKs.
  153. ///
  154. /// This is not compliant with the DHCP RFCs, since theoretically
  155. /// we must stop using the assigned IP when receiving a NAK. This
  156. /// can increase reliability on broken networks with buggy routers
  157. /// or rogue DHCP servers, however.
  158. pub fn set_ignore_naks(&mut self, ignore_naks: bool) {
  159. self.ignore_naks = ignore_naks;
  160. }
  161. pub(crate) fn poll_at(&self, _cx: &mut Context) -> PollAt {
  162. let t = match &self.state {
  163. ClientState::Discovering(state) => state.retry_at,
  164. ClientState::Requesting(state) => state.retry_at,
  165. ClientState::Renewing(state) => state.renew_at.min(state.expires_at),
  166. };
  167. PollAt::Time(t)
  168. }
  169. pub(crate) fn process(
  170. &mut self,
  171. cx: &mut Context,
  172. ip_repr: &Ipv4Repr,
  173. repr: &UdpRepr,
  174. payload: &[u8],
  175. ) -> Result<()> {
  176. let src_ip = ip_repr.src_addr;
  177. // This is enforced in interface.rs.
  178. assert!(repr.src_port == DHCP_SERVER_PORT && repr.dst_port == DHCP_CLIENT_PORT);
  179. let dhcp_packet = match DhcpPacket::new_checked(payload) {
  180. Ok(dhcp_packet) => dhcp_packet,
  181. Err(e) => {
  182. net_debug!("DHCP invalid pkt from {}: {:?}", src_ip, e);
  183. return Ok(());
  184. }
  185. };
  186. let dhcp_repr = match DhcpRepr::parse(&dhcp_packet) {
  187. Ok(dhcp_repr) => dhcp_repr,
  188. Err(e) => {
  189. net_debug!("DHCP error parsing pkt from {}: {:?}", src_ip, e);
  190. return Ok(());
  191. }
  192. };
  193. let hardware_addr = if let Some(HardwareAddress::Ethernet(addr)) = cx.hardware_addr() {
  194. addr
  195. } else {
  196. return Err(Error::Malformed);
  197. };
  198. if dhcp_repr.client_hardware_address != hardware_addr {
  199. return Ok(());
  200. }
  201. if dhcp_repr.transaction_id != self.transaction_id {
  202. return Ok(());
  203. }
  204. let server_identifier = match dhcp_repr.server_identifier {
  205. Some(server_identifier) => server_identifier,
  206. None => {
  207. net_debug!(
  208. "DHCP ignoring {:?} because missing server_identifier",
  209. dhcp_repr.message_type
  210. );
  211. return Ok(());
  212. }
  213. };
  214. net_debug!(
  215. "DHCP recv {:?} from {}: {:?}",
  216. dhcp_repr.message_type,
  217. src_ip,
  218. dhcp_repr
  219. );
  220. match (&mut self.state, dhcp_repr.message_type) {
  221. (ClientState::Discovering(_state), DhcpMessageType::Offer) => {
  222. if !dhcp_repr.your_ip.is_unicast() {
  223. net_debug!("DHCP ignoring OFFER because your_ip is not unicast");
  224. return Ok(());
  225. }
  226. self.state = ClientState::Requesting(RequestState {
  227. retry_at: cx.now(),
  228. retry: 0,
  229. server: ServerInfo {
  230. address: src_ip,
  231. identifier: server_identifier,
  232. },
  233. requested_ip: dhcp_repr.your_ip, // use the offered ip
  234. });
  235. }
  236. (ClientState::Requesting(state), DhcpMessageType::Ack) => {
  237. if let Some((config, renew_at, expires_at)) =
  238. Self::parse_ack(cx.now(), &dhcp_repr, self.max_lease_duration)
  239. {
  240. self.config_changed = true;
  241. self.state = ClientState::Renewing(RenewState {
  242. server: state.server,
  243. config,
  244. renew_at,
  245. expires_at,
  246. });
  247. }
  248. }
  249. (ClientState::Requesting(_), DhcpMessageType::Nak) => {
  250. if !self.ignore_naks {
  251. self.reset();
  252. }
  253. }
  254. (ClientState::Renewing(state), DhcpMessageType::Ack) => {
  255. if let Some((config, renew_at, expires_at)) =
  256. Self::parse_ack(cx.now(), &dhcp_repr, self.max_lease_duration)
  257. {
  258. state.renew_at = renew_at;
  259. state.expires_at = expires_at;
  260. if state.config != config {
  261. self.config_changed = true;
  262. state.config = config;
  263. }
  264. }
  265. }
  266. (ClientState::Renewing(_), DhcpMessageType::Nak) => {
  267. if !self.ignore_naks {
  268. self.reset();
  269. }
  270. }
  271. _ => {
  272. net_debug!(
  273. "DHCP ignoring {:?}: unexpected in current state",
  274. dhcp_repr.message_type
  275. );
  276. }
  277. }
  278. Ok(())
  279. }
  280. fn parse_ack(
  281. now: Instant,
  282. dhcp_repr: &DhcpRepr,
  283. max_lease_duration: Option<Duration>,
  284. ) -> Option<(Config, Instant, Instant)> {
  285. let subnet_mask = match dhcp_repr.subnet_mask {
  286. Some(subnet_mask) => subnet_mask,
  287. None => {
  288. net_debug!("DHCP ignoring ACK because missing subnet_mask");
  289. return None;
  290. }
  291. };
  292. let prefix_len = match IpAddress::Ipv4(subnet_mask).prefix_len() {
  293. Some(prefix_len) => prefix_len,
  294. None => {
  295. net_debug!("DHCP ignoring ACK because subnet_mask is not a valid mask");
  296. return None;
  297. }
  298. };
  299. if !dhcp_repr.your_ip.is_unicast() {
  300. net_debug!("DHCP ignoring ACK because your_ip is not unicast");
  301. return None;
  302. }
  303. let mut lease_duration = dhcp_repr
  304. .lease_duration
  305. .map(|d| Duration::from_secs(d as _))
  306. .unwrap_or(DEFAULT_LEASE_DURATION);
  307. if let Some(max_lease_duration) = max_lease_duration {
  308. lease_duration = lease_duration.min(max_lease_duration);
  309. }
  310. // Cleanup the DNS servers list, keeping only unicasts/
  311. // TP-Link TD-W8970 sends 0.0.0.0 as second DNS server if there's only one configured :(
  312. let mut dns_servers = [None; DHCP_MAX_DNS_SERVER_COUNT];
  313. if let Some(received) = dhcp_repr.dns_servers {
  314. let mut i = 0;
  315. for addr in received.iter().flatten() {
  316. if addr.is_unicast() {
  317. // This can never be out-of-bounds since both arrays have length DHCP_MAX_DNS_SERVER_COUNT
  318. dns_servers[i] = Some(*addr);
  319. i += 1;
  320. }
  321. }
  322. }
  323. let config = Config {
  324. address: Ipv4Cidr::new(dhcp_repr.your_ip, prefix_len),
  325. router: dhcp_repr.router,
  326. dns_servers: dns_servers,
  327. };
  328. // RFC 2131 indicates clients should renew a lease halfway through its expiration.
  329. let renew_at = now + lease_duration / 2;
  330. let expires_at = now + lease_duration;
  331. Some((config, renew_at, expires_at))
  332. }
  333. #[cfg(not(test))]
  334. fn random_transaction_id(cx: &mut Context) -> u32 {
  335. cx.rand().rand_u32()
  336. }
  337. #[cfg(test)]
  338. fn random_transaction_id(_cx: &mut Context) -> u32 {
  339. 0x12345678
  340. }
  341. pub(crate) fn dispatch<F>(&mut self, cx: &mut Context, emit: F) -> Result<()>
  342. where
  343. F: FnOnce(&mut Context, (Ipv4Repr, UdpRepr, DhcpRepr)) -> Result<()>,
  344. {
  345. // note: Dhcpv4Socket is only usable in ethernet mediums, so the
  346. // unwrap can never fail.
  347. let ethernet_addr = if let Some(HardwareAddress::Ethernet(addr)) = cx.hardware_addr() {
  348. addr
  349. } else {
  350. return Err(Error::Malformed);
  351. };
  352. // Worst case biggest IPv4 header length.
  353. // 0x0f * 4 = 60 bytes.
  354. const MAX_IPV4_HEADER_LEN: usize = 60;
  355. // We don't directly modify self.transaction_id because sending the packet
  356. // may fail. We only want to update state after succesfully sending.
  357. let next_transaction_id = Self::random_transaction_id(cx);
  358. let mut dhcp_repr = DhcpRepr {
  359. message_type: DhcpMessageType::Discover,
  360. transaction_id: next_transaction_id,
  361. client_hardware_address: ethernet_addr,
  362. client_ip: Ipv4Address::UNSPECIFIED,
  363. your_ip: Ipv4Address::UNSPECIFIED,
  364. server_ip: Ipv4Address::UNSPECIFIED,
  365. router: None,
  366. subnet_mask: None,
  367. relay_agent_ip: Ipv4Address::UNSPECIFIED,
  368. broadcast: false,
  369. requested_ip: None,
  370. client_identifier: Some(ethernet_addr),
  371. server_identifier: None,
  372. parameter_request_list: Some(PARAMETER_REQUEST_LIST),
  373. max_size: Some((cx.ip_mtu() - MAX_IPV4_HEADER_LEN - UDP_HEADER_LEN) as u16),
  374. lease_duration: None,
  375. dns_servers: None,
  376. };
  377. let udp_repr = UdpRepr {
  378. src_port: DHCP_CLIENT_PORT,
  379. dst_port: DHCP_SERVER_PORT,
  380. };
  381. let mut ipv4_repr = Ipv4Repr {
  382. src_addr: Ipv4Address::UNSPECIFIED,
  383. dst_addr: Ipv4Address::BROADCAST,
  384. protocol: IpProtocol::Udp,
  385. payload_len: 0, // filled right before emit
  386. hop_limit: 64,
  387. };
  388. match &mut self.state {
  389. ClientState::Discovering(state) => {
  390. if cx.now() < state.retry_at {
  391. return Err(Error::Exhausted);
  392. }
  393. // send packet
  394. net_debug!(
  395. "DHCP send DISCOVER to {}: {:?}",
  396. ipv4_repr.dst_addr,
  397. dhcp_repr
  398. );
  399. ipv4_repr.payload_len = udp_repr.header_len() + dhcp_repr.buffer_len();
  400. emit(cx, (ipv4_repr, udp_repr, dhcp_repr))?;
  401. // Update state AFTER the packet has been successfully sent.
  402. state.retry_at = cx.now() + DISCOVER_TIMEOUT;
  403. self.transaction_id = next_transaction_id;
  404. Ok(())
  405. }
  406. ClientState::Requesting(state) => {
  407. if cx.now() < state.retry_at {
  408. return Err(Error::Exhausted);
  409. }
  410. if state.retry >= REQUEST_RETRIES {
  411. net_debug!("DHCP request retries exceeded, restarting discovery");
  412. self.reset();
  413. // return Ok so we get polled again
  414. return Ok(());
  415. }
  416. dhcp_repr.message_type = DhcpMessageType::Request;
  417. dhcp_repr.requested_ip = Some(state.requested_ip);
  418. dhcp_repr.server_identifier = Some(state.server.identifier);
  419. net_debug!(
  420. "DHCP send request to {}: {:?}",
  421. ipv4_repr.dst_addr,
  422. dhcp_repr
  423. );
  424. ipv4_repr.payload_len = udp_repr.header_len() + dhcp_repr.buffer_len();
  425. emit(cx, (ipv4_repr, udp_repr, dhcp_repr))?;
  426. // Exponential backoff: Double every 2 retries.
  427. state.retry_at = cx.now() + (REQUEST_TIMEOUT << (state.retry as u32 / 2));
  428. state.retry += 1;
  429. self.transaction_id = next_transaction_id;
  430. Ok(())
  431. }
  432. ClientState::Renewing(state) => {
  433. if state.expires_at <= cx.now() {
  434. net_debug!("DHCP lease expired");
  435. self.reset();
  436. // return Ok so we get polled again
  437. return Ok(());
  438. }
  439. if cx.now() < state.renew_at {
  440. return Err(Error::Exhausted);
  441. }
  442. ipv4_repr.src_addr = state.config.address.address();
  443. ipv4_repr.dst_addr = state.server.address;
  444. dhcp_repr.message_type = DhcpMessageType::Request;
  445. dhcp_repr.client_ip = state.config.address.address();
  446. net_debug!("DHCP send renew to {}: {:?}", ipv4_repr.dst_addr, dhcp_repr);
  447. ipv4_repr.payload_len = udp_repr.header_len() + dhcp_repr.buffer_len();
  448. emit(cx, (ipv4_repr, udp_repr, dhcp_repr))?;
  449. // In both RENEWING and REBINDING states, if the client receives no
  450. // response to its DHCPREQUEST message, the client SHOULD wait one-half
  451. // of the remaining time until T2 (in RENEWING state) and one-half of
  452. // the remaining lease time (in REBINDING state), down to a minimum of
  453. // 60 seconds, before retransmitting the DHCPREQUEST message.
  454. state.renew_at =
  455. cx.now() + MIN_RENEW_TIMEOUT.max((state.expires_at - cx.now()) / 2);
  456. self.transaction_id = next_transaction_id;
  457. Ok(())
  458. }
  459. }
  460. }
  461. /// Reset state and restart discovery phase.
  462. ///
  463. /// Use this to speed up acquisition of an address in a new
  464. /// network if a link was down and it is now back up.
  465. pub fn reset(&mut self) {
  466. net_trace!("DHCP reset");
  467. if let ClientState::Renewing(_) = &self.state {
  468. self.config_changed = true;
  469. }
  470. self.state = ClientState::Discovering(DiscoverState {
  471. retry_at: Instant::from_millis(0),
  472. });
  473. }
  474. /// Query the socket for configuration changes.
  475. ///
  476. /// The socket has an internal "configuration changed" flag. If
  477. /// set, this function returns the configuration and resets the flag.
  478. pub fn poll(&mut self) -> Option<Event> {
  479. if !self.config_changed {
  480. None
  481. } else if let ClientState::Renewing(state) = &self.state {
  482. self.config_changed = false;
  483. Some(Event::Configured(state.config))
  484. } else {
  485. self.config_changed = false;
  486. Some(Event::Deconfigured)
  487. }
  488. }
  489. }
  490. #[cfg(test)]
  491. mod test {
  492. use std::ops::{Deref, DerefMut};
  493. use super::*;
  494. use crate::wire::EthernetAddress;
  495. // =========================================================================================//
  496. // Helper functions
  497. struct TestSocket {
  498. socket: Dhcpv4Socket,
  499. cx: Context<'static>,
  500. }
  501. impl Deref for TestSocket {
  502. type Target = Dhcpv4Socket;
  503. fn deref(&self) -> &Self::Target {
  504. &self.socket
  505. }
  506. }
  507. impl DerefMut for TestSocket {
  508. fn deref_mut(&mut self) -> &mut Self::Target {
  509. &mut self.socket
  510. }
  511. }
  512. fn send(
  513. s: &mut TestSocket,
  514. timestamp: Instant,
  515. (ip_repr, udp_repr, dhcp_repr): (Ipv4Repr, UdpRepr, DhcpRepr),
  516. ) -> Result<()> {
  517. s.cx.set_now(timestamp);
  518. net_trace!("send: {:?}", ip_repr);
  519. net_trace!(" {:?}", udp_repr);
  520. net_trace!(" {:?}", dhcp_repr);
  521. let mut payload = vec![0; dhcp_repr.buffer_len()];
  522. dhcp_repr
  523. .emit(&mut DhcpPacket::new_unchecked(&mut payload))
  524. .unwrap();
  525. s.socket.process(&mut s.cx, &ip_repr, &udp_repr, &payload)
  526. }
  527. fn recv(s: &mut TestSocket, timestamp: Instant, reprs: &[(Ipv4Repr, UdpRepr, DhcpRepr)]) {
  528. s.cx.set_now(timestamp);
  529. let mut i = 0;
  530. while s.socket.poll_at(&mut s.cx) <= PollAt::Time(timestamp) {
  531. let _ = s
  532. .socket
  533. .dispatch(&mut s.cx, |_, (mut ip_repr, udp_repr, dhcp_repr)| {
  534. assert_eq!(ip_repr.protocol, IpProtocol::Udp);
  535. assert_eq!(
  536. ip_repr.payload_len,
  537. udp_repr.header_len() + dhcp_repr.buffer_len()
  538. );
  539. // We validated the payload len, change it to 0 to make equality testing easier
  540. ip_repr.payload_len = 0;
  541. net_trace!("recv: {:?}", ip_repr);
  542. net_trace!(" {:?}", udp_repr);
  543. net_trace!(" {:?}", dhcp_repr);
  544. let got_repr = (ip_repr, udp_repr, dhcp_repr);
  545. match reprs.get(i) {
  546. Some(want_repr) => assert_eq!(want_repr, &got_repr),
  547. None => panic!("Too many reprs emitted"),
  548. }
  549. i += 1;
  550. Ok(())
  551. });
  552. }
  553. assert_eq!(i, reprs.len());
  554. }
  555. macro_rules! send {
  556. ($socket:ident, $repr:expr) =>
  557. (send!($socket, time 0, $repr));
  558. ($socket:ident, time $time:expr, $repr:expr) =>
  559. (send!($socket, time $time, $repr, Ok(( ))));
  560. ($socket:ident, time $time:expr, $repr:expr, $result:expr) =>
  561. (assert_eq!(send(&mut $socket, Instant::from_millis($time), $repr), $result));
  562. }
  563. macro_rules! recv {
  564. ($socket:ident, $reprs:expr) => ({
  565. recv!($socket, time 0, $reprs);
  566. });
  567. ($socket:ident, time $time:expr, $reprs:expr) => ({
  568. recv(&mut $socket, Instant::from_millis($time), &$reprs);
  569. });
  570. }
  571. // =========================================================================================//
  572. // Constants
  573. const TXID: u32 = 0x12345678;
  574. const MY_IP: Ipv4Address = Ipv4Address([192, 168, 1, 42]);
  575. const SERVER_IP: Ipv4Address = Ipv4Address([192, 168, 1, 1]);
  576. const DNS_IP_1: Ipv4Address = Ipv4Address([1, 1, 1, 1]);
  577. const DNS_IP_2: Ipv4Address = Ipv4Address([1, 1, 1, 2]);
  578. const DNS_IP_3: Ipv4Address = Ipv4Address([1, 1, 1, 3]);
  579. const DNS_IPS: [Option<Ipv4Address>; DHCP_MAX_DNS_SERVER_COUNT] =
  580. [Some(DNS_IP_1), Some(DNS_IP_2), Some(DNS_IP_3)];
  581. const MASK_24: Ipv4Address = Ipv4Address([255, 255, 255, 0]);
  582. const MY_MAC: EthernetAddress = EthernetAddress([0x02, 0x02, 0x02, 0x02, 0x02, 0x02]);
  583. const IP_BROADCAST: Ipv4Repr = Ipv4Repr {
  584. src_addr: Ipv4Address::UNSPECIFIED,
  585. dst_addr: Ipv4Address::BROADCAST,
  586. protocol: IpProtocol::Udp,
  587. payload_len: 0,
  588. hop_limit: 64,
  589. };
  590. const IP_SERVER_BROADCAST: Ipv4Repr = Ipv4Repr {
  591. src_addr: SERVER_IP,
  592. dst_addr: Ipv4Address::BROADCAST,
  593. protocol: IpProtocol::Udp,
  594. payload_len: 0,
  595. hop_limit: 64,
  596. };
  597. const IP_RECV: Ipv4Repr = Ipv4Repr {
  598. src_addr: SERVER_IP,
  599. dst_addr: MY_IP,
  600. protocol: IpProtocol::Udp,
  601. payload_len: 0,
  602. hop_limit: 64,
  603. };
  604. const IP_SEND: Ipv4Repr = Ipv4Repr {
  605. src_addr: MY_IP,
  606. dst_addr: SERVER_IP,
  607. protocol: IpProtocol::Udp,
  608. payload_len: 0,
  609. hop_limit: 64,
  610. };
  611. const UDP_SEND: UdpRepr = UdpRepr {
  612. src_port: 68,
  613. dst_port: 67,
  614. };
  615. const UDP_RECV: UdpRepr = UdpRepr {
  616. src_port: 67,
  617. dst_port: 68,
  618. };
  619. const DHCP_DEFAULT: DhcpRepr = DhcpRepr {
  620. message_type: DhcpMessageType::Unknown(99),
  621. transaction_id: TXID,
  622. client_hardware_address: MY_MAC,
  623. client_ip: Ipv4Address::UNSPECIFIED,
  624. your_ip: Ipv4Address::UNSPECIFIED,
  625. server_ip: Ipv4Address::UNSPECIFIED,
  626. router: None,
  627. subnet_mask: None,
  628. relay_agent_ip: Ipv4Address::UNSPECIFIED,
  629. broadcast: false,
  630. requested_ip: None,
  631. client_identifier: None,
  632. server_identifier: None,
  633. parameter_request_list: None,
  634. dns_servers: None,
  635. max_size: None,
  636. lease_duration: None,
  637. };
  638. const DHCP_DISCOVER: DhcpRepr = DhcpRepr {
  639. message_type: DhcpMessageType::Discover,
  640. client_identifier: Some(MY_MAC),
  641. parameter_request_list: Some(&[1, 3, 6]),
  642. max_size: Some(1432),
  643. ..DHCP_DEFAULT
  644. };
  645. const DHCP_OFFER: DhcpRepr = DhcpRepr {
  646. message_type: DhcpMessageType::Offer,
  647. server_ip: SERVER_IP,
  648. server_identifier: Some(SERVER_IP),
  649. your_ip: MY_IP,
  650. router: Some(SERVER_IP),
  651. subnet_mask: Some(MASK_24),
  652. dns_servers: Some(DNS_IPS),
  653. lease_duration: Some(1000),
  654. ..DHCP_DEFAULT
  655. };
  656. const DHCP_REQUEST: DhcpRepr = DhcpRepr {
  657. message_type: DhcpMessageType::Request,
  658. client_identifier: Some(MY_MAC),
  659. server_identifier: Some(SERVER_IP),
  660. max_size: Some(1432),
  661. requested_ip: Some(MY_IP),
  662. parameter_request_list: Some(&[1, 3, 6]),
  663. ..DHCP_DEFAULT
  664. };
  665. const DHCP_ACK: DhcpRepr = DhcpRepr {
  666. message_type: DhcpMessageType::Ack,
  667. server_ip: SERVER_IP,
  668. server_identifier: Some(SERVER_IP),
  669. your_ip: MY_IP,
  670. router: Some(SERVER_IP),
  671. subnet_mask: Some(MASK_24),
  672. dns_servers: Some(DNS_IPS),
  673. lease_duration: Some(1000),
  674. ..DHCP_DEFAULT
  675. };
  676. const DHCP_NAK: DhcpRepr = DhcpRepr {
  677. message_type: DhcpMessageType::Nak,
  678. server_ip: SERVER_IP,
  679. server_identifier: Some(SERVER_IP),
  680. ..DHCP_DEFAULT
  681. };
  682. const DHCP_RENEW: DhcpRepr = DhcpRepr {
  683. message_type: DhcpMessageType::Request,
  684. client_identifier: Some(MY_MAC),
  685. // NO server_identifier in renew requests, only in first one!
  686. client_ip: MY_IP,
  687. max_size: Some(1432),
  688. requested_ip: None,
  689. parameter_request_list: Some(&[1, 3, 6]),
  690. ..DHCP_DEFAULT
  691. };
  692. // =========================================================================================//
  693. // Tests
  694. fn socket() -> TestSocket {
  695. let mut s = Dhcpv4Socket::new();
  696. assert_eq!(s.poll(), Some(Event::Deconfigured));
  697. TestSocket {
  698. socket: s,
  699. cx: Context::mock(),
  700. }
  701. }
  702. fn socket_bound() -> TestSocket {
  703. let mut s = socket();
  704. s.state = ClientState::Renewing(RenewState {
  705. config: Config {
  706. address: Ipv4Cidr::new(MY_IP, 24),
  707. dns_servers: DNS_IPS,
  708. router: Some(SERVER_IP),
  709. },
  710. server: ServerInfo {
  711. address: SERVER_IP,
  712. identifier: SERVER_IP,
  713. },
  714. renew_at: Instant::from_secs(500),
  715. expires_at: Instant::from_secs(1000),
  716. });
  717. s
  718. }
  719. #[test]
  720. fn test_bind() {
  721. let mut s = socket();
  722. recv!(s, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  723. assert_eq!(s.poll(), None);
  724. send!(s, (IP_RECV, UDP_RECV, DHCP_OFFER));
  725. assert_eq!(s.poll(), None);
  726. recv!(s, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  727. assert_eq!(s.poll(), None);
  728. send!(s, (IP_RECV, UDP_RECV, DHCP_ACK));
  729. assert_eq!(
  730. s.poll(),
  731. Some(Event::Configured(Config {
  732. address: Ipv4Cidr::new(MY_IP, 24),
  733. dns_servers: DNS_IPS,
  734. router: Some(SERVER_IP),
  735. }))
  736. );
  737. match &s.state {
  738. ClientState::Renewing(r) => {
  739. assert_eq!(r.renew_at, Instant::from_secs(500));
  740. assert_eq!(r.expires_at, Instant::from_secs(1000));
  741. }
  742. _ => panic!("Invalid state"),
  743. }
  744. }
  745. #[test]
  746. fn test_discover_retransmit() {
  747. let mut s = socket();
  748. recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  749. recv!(s, time 1_000, []);
  750. recv!(s, time 10_000, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  751. recv!(s, time 11_000, []);
  752. recv!(s, time 20_000, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  753. // check after retransmits it still works
  754. send!(s, time 20_000, (IP_RECV, UDP_RECV, DHCP_OFFER));
  755. recv!(s, time 20_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  756. }
  757. #[test]
  758. fn test_request_retransmit() {
  759. let mut s = socket();
  760. recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  761. send!(s, time 0, (IP_RECV, UDP_RECV, DHCP_OFFER));
  762. recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  763. recv!(s, time 1_000, []);
  764. recv!(s, time 5_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  765. recv!(s, time 6_000, []);
  766. recv!(s, time 10_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  767. recv!(s, time 15_000, []);
  768. recv!(s, time 20_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  769. // check after retransmits it still works
  770. send!(s, time 20_000, (IP_RECV, UDP_RECV, DHCP_ACK));
  771. match &s.state {
  772. ClientState::Renewing(r) => {
  773. assert_eq!(r.renew_at, Instant::from_secs(20 + 500));
  774. assert_eq!(r.expires_at, Instant::from_secs(20 + 1000));
  775. }
  776. _ => panic!("Invalid state"),
  777. }
  778. }
  779. #[test]
  780. fn test_request_timeout() {
  781. let mut s = socket();
  782. recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  783. send!(s, time 0, (IP_RECV, UDP_RECV, DHCP_OFFER));
  784. recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  785. recv!(s, time 5_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  786. recv!(s, time 10_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  787. recv!(s, time 20_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  788. recv!(s, time 30_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  789. // After 5 tries and 70 seconds, it gives up.
  790. // 5 + 5 + 10 + 10 + 20 = 70
  791. recv!(s, time 70_000, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  792. // check it still works
  793. send!(s, time 60_000, (IP_RECV, UDP_RECV, DHCP_OFFER));
  794. recv!(s, time 60_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  795. }
  796. #[test]
  797. fn test_request_nak() {
  798. let mut s = socket();
  799. recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  800. send!(s, time 0, (IP_RECV, UDP_RECV, DHCP_OFFER));
  801. recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  802. send!(s, time 0, (IP_SERVER_BROADCAST, UDP_RECV, DHCP_NAK));
  803. recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  804. }
  805. #[test]
  806. fn test_renew() {
  807. let mut s = socket_bound();
  808. recv!(s, []);
  809. assert_eq!(s.poll(), None);
  810. recv!(s, time 500_000, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
  811. assert_eq!(s.poll(), None);
  812. match &s.state {
  813. ClientState::Renewing(r) => {
  814. // the expiration still hasn't been bumped, because
  815. // we haven't received the ACK yet
  816. assert_eq!(r.expires_at, Instant::from_secs(1000));
  817. }
  818. _ => panic!("Invalid state"),
  819. }
  820. send!(s, time 500_000, (IP_RECV, UDP_RECV, DHCP_ACK));
  821. assert_eq!(s.poll(), None);
  822. match &s.state {
  823. ClientState::Renewing(r) => {
  824. // NOW the expiration gets bumped
  825. assert_eq!(r.renew_at, Instant::from_secs(500 + 500));
  826. assert_eq!(r.expires_at, Instant::from_secs(500 + 1000));
  827. }
  828. _ => panic!("Invalid state"),
  829. }
  830. }
  831. #[test]
  832. fn test_renew_retransmit() {
  833. let mut s = socket_bound();
  834. recv!(s, []);
  835. recv!(s, time 500_000, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
  836. recv!(s, time 749_000, []);
  837. recv!(s, time 750_000, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
  838. recv!(s, time 874_000, []);
  839. recv!(s, time 875_000, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
  840. // check it still works
  841. send!(s, time 875_000, (IP_RECV, UDP_RECV, DHCP_ACK));
  842. match &s.state {
  843. ClientState::Renewing(r) => {
  844. // NOW the expiration gets bumped
  845. assert_eq!(r.renew_at, Instant::from_secs(875 + 500));
  846. assert_eq!(r.expires_at, Instant::from_secs(875 + 1000));
  847. }
  848. _ => panic!("Invalid state"),
  849. }
  850. }
  851. #[test]
  852. fn test_renew_timeout() {
  853. let mut s = socket_bound();
  854. recv!(s, []);
  855. recv!(s, time 500_000, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
  856. recv!(s, time 999_000, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
  857. recv!(s, time 1_000_000, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  858. match &s.state {
  859. ClientState::Discovering(_) => {}
  860. _ => panic!("Invalid state"),
  861. }
  862. }
  863. #[test]
  864. fn test_renew_nak() {
  865. let mut s = socket_bound();
  866. recv!(s, time 500_000, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
  867. send!(s, time 500_000, (IP_SERVER_BROADCAST, UDP_RECV, DHCP_NAK));
  868. recv!(s, time 500_000, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  869. }
  870. }