udp.rs 33 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069
  1. use core::cmp::min;
  2. #[cfg(feature = "async")]
  3. use core::task::Waker;
  4. use crate::iface::Context;
  5. use crate::phy::PacketMeta;
  6. use crate::socket::PollAt;
  7. #[cfg(feature = "async")]
  8. use crate::socket::WakerRegistration;
  9. use crate::storage::Empty;
  10. use crate::wire::{IpAddress, IpEndpoint, IpListenEndpoint, IpProtocol, IpRepr, UdpRepr};
  11. /// Metadata for a sent or received UDP packet.
  12. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  13. #[derive(Debug, PartialEq, Eq, Clone, Copy)]
  14. pub struct UdpMetadata {
  15. pub endpoint: IpEndpoint,
  16. /// The IP address to which an incoming datagram was sent, or to which an outgoing datagram
  17. /// will be sent. Incoming datagrams always have this set. On outgoing datagrams, if it is not
  18. /// set, and the socket is not bound to a single address anyway, a suitable address will be
  19. /// determined using the algorithms of RFC 6724 (candidate source address selection) or some
  20. /// heuristic (for IPv4).
  21. pub local_address: Option<IpAddress>,
  22. pub meta: PacketMeta,
  23. }
  24. impl<T: Into<IpEndpoint>> From<T> for UdpMetadata {
  25. fn from(value: T) -> Self {
  26. Self {
  27. endpoint: value.into(),
  28. local_address: None,
  29. meta: PacketMeta::default(),
  30. }
  31. }
  32. }
  33. impl core::fmt::Display for UdpMetadata {
  34. fn fmt(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
  35. #[cfg(feature = "packetmeta-id")]
  36. return write!(f, "{}, PacketID: {:?}", self.endpoint, self.meta);
  37. #[cfg(not(feature = "packetmeta-id"))]
  38. write!(f, "{}", self.endpoint)
  39. }
  40. }
  41. /// A UDP packet metadata.
  42. pub type PacketMetadata = crate::storage::PacketMetadata<UdpMetadata>;
  43. /// A UDP packet ring buffer.
  44. pub type PacketBuffer<'a> = crate::storage::PacketBuffer<'a, UdpMetadata>;
  45. /// Error returned by [`Socket::bind`]
  46. #[derive(Debug, PartialEq, Eq, Clone, Copy)]
  47. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  48. pub enum BindError {
  49. InvalidState,
  50. Unaddressable,
  51. }
  52. impl core::fmt::Display for BindError {
  53. fn fmt(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
  54. match self {
  55. BindError::InvalidState => write!(f, "invalid state"),
  56. BindError::Unaddressable => write!(f, "unaddressable"),
  57. }
  58. }
  59. }
  60. #[cfg(feature = "std")]
  61. impl std::error::Error for BindError {}
  62. /// Error returned by [`Socket::send`]
  63. #[derive(Debug, PartialEq, Eq, Clone, Copy)]
  64. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  65. pub enum SendError {
  66. Unaddressable,
  67. BufferFull,
  68. }
  69. impl core::fmt::Display for SendError {
  70. fn fmt(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
  71. match self {
  72. SendError::Unaddressable => write!(f, "unaddressable"),
  73. SendError::BufferFull => write!(f, "buffer full"),
  74. }
  75. }
  76. }
  77. #[cfg(feature = "std")]
  78. impl std::error::Error for SendError {}
  79. /// Error returned by [`Socket::recv`]
  80. #[derive(Debug, PartialEq, Eq, Clone, Copy)]
  81. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  82. pub enum RecvError {
  83. Exhausted,
  84. Truncated,
  85. }
  86. impl core::fmt::Display for RecvError {
  87. fn fmt(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
  88. match self {
  89. RecvError::Exhausted => write!(f, "exhausted"),
  90. RecvError::Truncated => write!(f, "truncated"),
  91. }
  92. }
  93. }
  94. #[cfg(feature = "std")]
  95. impl std::error::Error for RecvError {}
  96. /// A User Datagram Protocol socket.
  97. ///
  98. /// A UDP socket is bound to a specific endpoint, and owns transmit and receive
  99. /// packet buffers.
  100. #[derive(Debug)]
  101. pub struct Socket<'a> {
  102. endpoint: IpListenEndpoint,
  103. rx_buffer: PacketBuffer<'a>,
  104. tx_buffer: PacketBuffer<'a>,
  105. /// The time-to-live (IPv4) or hop limit (IPv6) value used in outgoing packets.
  106. hop_limit: Option<u8>,
  107. #[cfg(feature = "async")]
  108. rx_waker: WakerRegistration,
  109. #[cfg(feature = "async")]
  110. tx_waker: WakerRegistration,
  111. }
  112. impl<'a> Socket<'a> {
  113. /// Create an UDP socket with the given buffers.
  114. pub fn new(rx_buffer: PacketBuffer<'a>, tx_buffer: PacketBuffer<'a>) -> Socket<'a> {
  115. Socket {
  116. endpoint: IpListenEndpoint::default(),
  117. rx_buffer,
  118. tx_buffer,
  119. hop_limit: None,
  120. #[cfg(feature = "async")]
  121. rx_waker: WakerRegistration::new(),
  122. #[cfg(feature = "async")]
  123. tx_waker: WakerRegistration::new(),
  124. }
  125. }
  126. /// Register a waker for receive operations.
  127. ///
  128. /// The waker is woken on state changes that might affect the return value
  129. /// of `recv` method calls, such as receiving data, or the socket closing.
  130. ///
  131. /// Notes:
  132. ///
  133. /// - Only one waker can be registered at a time. If another waker was previously registered,
  134. /// it is overwritten and will no longer be woken.
  135. /// - The Waker is woken only once. Once woken, you must register it again to receive more wakes.
  136. /// - "Spurious wakes" are allowed: a wake doesn't guarantee the result of `recv` has
  137. /// necessarily changed.
  138. #[cfg(feature = "async")]
  139. pub fn register_recv_waker(&mut self, waker: &Waker) {
  140. self.rx_waker.register(waker)
  141. }
  142. /// Register a waker for send operations.
  143. ///
  144. /// The waker is woken on state changes that might affect the return value
  145. /// of `send` method calls, such as space becoming available in the transmit
  146. /// buffer, or the socket closing.
  147. ///
  148. /// Notes:
  149. ///
  150. /// - Only one waker can be registered at a time. If another waker was previously registered,
  151. /// it is overwritten and will no longer be woken.
  152. /// - The Waker is woken only once. Once woken, you must register it again to receive more wakes.
  153. /// - "Spurious wakes" are allowed: a wake doesn't guarantee the result of `send` has
  154. /// necessarily changed.
  155. #[cfg(feature = "async")]
  156. pub fn register_send_waker(&mut self, waker: &Waker) {
  157. self.tx_waker.register(waker)
  158. }
  159. /// Return the bound endpoint.
  160. #[inline]
  161. pub fn endpoint(&self) -> IpListenEndpoint {
  162. self.endpoint
  163. }
  164. /// Return the time-to-live (IPv4) or hop limit (IPv6) value used in outgoing packets.
  165. ///
  166. /// See also the [set_hop_limit](#method.set_hop_limit) method
  167. pub fn hop_limit(&self) -> Option<u8> {
  168. self.hop_limit
  169. }
  170. /// Set the time-to-live (IPv4) or hop limit (IPv6) value used in outgoing packets.
  171. ///
  172. /// A socket without an explicitly set hop limit value uses the default [IANA recommended]
  173. /// value (64).
  174. ///
  175. /// # Panics
  176. ///
  177. /// This function panics if a hop limit value of 0 is given. See [RFC 1122 § 3.2.1.7].
  178. ///
  179. /// [IANA recommended]: https://www.iana.org/assignments/ip-parameters/ip-parameters.xhtml
  180. /// [RFC 1122 § 3.2.1.7]: https://tools.ietf.org/html/rfc1122#section-3.2.1.7
  181. pub fn set_hop_limit(&mut self, hop_limit: Option<u8>) {
  182. // A host MUST NOT send a datagram with a hop limit value of 0
  183. if let Some(0) = hop_limit {
  184. panic!("the time-to-live value of a packet must not be zero")
  185. }
  186. self.hop_limit = hop_limit
  187. }
  188. /// Bind the socket to the given endpoint.
  189. ///
  190. /// This function returns `Err(Error::Illegal)` if the socket was open
  191. /// (see [is_open](#method.is_open)), and `Err(Error::Unaddressable)`
  192. /// if the port in the given endpoint is zero.
  193. pub fn bind<T: Into<IpListenEndpoint>>(&mut self, endpoint: T) -> Result<(), BindError> {
  194. let endpoint = endpoint.into();
  195. if endpoint.port == 0 {
  196. return Err(BindError::Unaddressable);
  197. }
  198. if self.is_open() {
  199. return Err(BindError::InvalidState);
  200. }
  201. self.endpoint = endpoint;
  202. #[cfg(feature = "async")]
  203. {
  204. self.rx_waker.wake();
  205. self.tx_waker.wake();
  206. }
  207. Ok(())
  208. }
  209. /// Close the socket.
  210. pub fn close(&mut self) {
  211. // Clear the bound endpoint of the socket.
  212. self.endpoint = IpListenEndpoint::default();
  213. // Reset the RX and TX buffers of the socket.
  214. self.tx_buffer.reset();
  215. self.rx_buffer.reset();
  216. #[cfg(feature = "async")]
  217. {
  218. self.rx_waker.wake();
  219. self.tx_waker.wake();
  220. }
  221. }
  222. /// Check whether the socket is open.
  223. #[inline]
  224. pub fn is_open(&self) -> bool {
  225. self.endpoint.port != 0
  226. }
  227. /// Check whether the transmit buffer is full.
  228. #[inline]
  229. pub fn can_send(&self) -> bool {
  230. !self.tx_buffer.is_full()
  231. }
  232. /// Check whether the receive buffer is not empty.
  233. #[inline]
  234. pub fn can_recv(&self) -> bool {
  235. !self.rx_buffer.is_empty()
  236. }
  237. /// Return the maximum number packets the socket can receive.
  238. #[inline]
  239. pub fn packet_recv_capacity(&self) -> usize {
  240. self.rx_buffer.packet_capacity()
  241. }
  242. /// Return the maximum number packets the socket can transmit.
  243. #[inline]
  244. pub fn packet_send_capacity(&self) -> usize {
  245. self.tx_buffer.packet_capacity()
  246. }
  247. /// Return the maximum number of bytes inside the recv buffer.
  248. #[inline]
  249. pub fn payload_recv_capacity(&self) -> usize {
  250. self.rx_buffer.payload_capacity()
  251. }
  252. /// Return the maximum number of bytes inside the transmit buffer.
  253. #[inline]
  254. pub fn payload_send_capacity(&self) -> usize {
  255. self.tx_buffer.payload_capacity()
  256. }
  257. /// Enqueue a packet to be sent to a given remote endpoint, and return a pointer
  258. /// to its payload.
  259. ///
  260. /// This function returns `Err(Error::Exhausted)` if the transmit buffer is full,
  261. /// `Err(Error::Unaddressable)` if local or remote port, or remote address are unspecified,
  262. /// and `Err(Error::Truncated)` if there is not enough transmit buffer capacity
  263. /// to ever send this packet.
  264. pub fn send(
  265. &mut self,
  266. size: usize,
  267. meta: impl Into<UdpMetadata>,
  268. ) -> Result<&mut [u8], SendError> {
  269. let meta = meta.into();
  270. if self.endpoint.port == 0 {
  271. return Err(SendError::Unaddressable);
  272. }
  273. if meta.endpoint.addr.is_unspecified() {
  274. return Err(SendError::Unaddressable);
  275. }
  276. if meta.endpoint.port == 0 {
  277. return Err(SendError::Unaddressable);
  278. }
  279. let payload_buf = self
  280. .tx_buffer
  281. .enqueue(size, meta)
  282. .map_err(|_| SendError::BufferFull)?;
  283. net_trace!(
  284. "udp:{}:{}: buffer to send {} octets",
  285. self.endpoint,
  286. meta.endpoint,
  287. size
  288. );
  289. Ok(payload_buf)
  290. }
  291. /// Enqueue a packet to be send to a given remote endpoint and pass the buffer
  292. /// to the provided closure. The closure then returns the size of the data written
  293. /// into the buffer.
  294. ///
  295. /// Also see [send](#method.send).
  296. pub fn send_with<F>(
  297. &mut self,
  298. max_size: usize,
  299. meta: impl Into<UdpMetadata>,
  300. f: F,
  301. ) -> Result<usize, SendError>
  302. where
  303. F: FnOnce(&mut [u8]) -> usize,
  304. {
  305. let meta = meta.into();
  306. if self.endpoint.port == 0 {
  307. return Err(SendError::Unaddressable);
  308. }
  309. if meta.endpoint.addr.is_unspecified() {
  310. return Err(SendError::Unaddressable);
  311. }
  312. if meta.endpoint.port == 0 {
  313. return Err(SendError::Unaddressable);
  314. }
  315. let size = self
  316. .tx_buffer
  317. .enqueue_with_infallible(max_size, meta, f)
  318. .map_err(|_| SendError::BufferFull)?;
  319. net_trace!(
  320. "udp:{}:{}: buffer to send {} octets",
  321. self.endpoint,
  322. meta.endpoint,
  323. size
  324. );
  325. Ok(size)
  326. }
  327. /// Enqueue a packet to be sent to a given remote endpoint, and fill it from a slice.
  328. ///
  329. /// See also [send](#method.send).
  330. pub fn send_slice(
  331. &mut self,
  332. data: &[u8],
  333. meta: impl Into<UdpMetadata>,
  334. ) -> Result<(), SendError> {
  335. self.send(data.len(), meta)?.copy_from_slice(data);
  336. Ok(())
  337. }
  338. /// Dequeue a packet received from a remote endpoint, and return the endpoint as well
  339. /// as a pointer to the payload.
  340. ///
  341. /// This function returns `Err(Error::Exhausted)` if the receive buffer is empty.
  342. pub fn recv(&mut self) -> Result<(&[u8], UdpMetadata), RecvError> {
  343. let (remote_endpoint, payload_buf) =
  344. self.rx_buffer.dequeue().map_err(|_| RecvError::Exhausted)?;
  345. net_trace!(
  346. "udp:{}:{}: receive {} buffered octets",
  347. self.endpoint,
  348. remote_endpoint.endpoint,
  349. payload_buf.len()
  350. );
  351. Ok((payload_buf, remote_endpoint))
  352. }
  353. /// Dequeue a packet received from a remote endpoint, copy the payload into the given slice,
  354. /// and return the amount of octets copied as well as the endpoint.
  355. ///
  356. /// **Note**: when the size of the provided buffer is smaller than the size of the payload,
  357. /// the packet is dropped and a `RecvError::Truncated` error is returned.
  358. ///
  359. /// See also [recv](#method.recv).
  360. pub fn recv_slice(&mut self, data: &mut [u8]) -> Result<(usize, UdpMetadata), RecvError> {
  361. let (buffer, endpoint) = self.recv().map_err(|_| RecvError::Exhausted)?;
  362. if data.len() < buffer.len() {
  363. return Err(RecvError::Truncated);
  364. }
  365. let length = min(data.len(), buffer.len());
  366. data[..length].copy_from_slice(&buffer[..length]);
  367. Ok((length, endpoint))
  368. }
  369. /// Peek at a packet received from a remote endpoint, and return the endpoint as well
  370. /// as a pointer to the payload without removing the packet from the receive buffer.
  371. /// This function otherwise behaves identically to [recv](#method.recv).
  372. ///
  373. /// It returns `Err(Error::Exhausted)` if the receive buffer is empty.
  374. pub fn peek(&mut self) -> Result<(&[u8], &UdpMetadata), RecvError> {
  375. let endpoint = self.endpoint;
  376. self.rx_buffer.peek().map_err(|_| RecvError::Exhausted).map(
  377. |(remote_endpoint, payload_buf)| {
  378. net_trace!(
  379. "udp:{}:{}: peek {} buffered octets",
  380. endpoint,
  381. remote_endpoint.endpoint,
  382. payload_buf.len()
  383. );
  384. (payload_buf, remote_endpoint)
  385. },
  386. )
  387. }
  388. /// Peek at a packet received from a remote endpoint, copy the payload into the given slice,
  389. /// and return the amount of octets copied as well as the endpoint without removing the
  390. /// packet from the receive buffer.
  391. /// This function otherwise behaves identically to [recv_slice](#method.recv_slice).
  392. ///
  393. /// **Note**: when the size of the provided buffer is smaller than the size of the payload,
  394. /// no data is copied into the provided buffer and a `RecvError::Truncated` error is returned.
  395. ///
  396. /// See also [peek](#method.peek).
  397. pub fn peek_slice(&mut self, data: &mut [u8]) -> Result<(usize, &UdpMetadata), RecvError> {
  398. let (buffer, endpoint) = self.peek()?;
  399. if data.len() < buffer.len() {
  400. return Err(RecvError::Truncated);
  401. }
  402. let length = min(data.len(), buffer.len());
  403. data[..length].copy_from_slice(&buffer[..length]);
  404. Ok((length, endpoint))
  405. }
  406. pub(crate) fn accepts(&self, cx: &mut Context, ip_repr: &IpRepr, repr: &UdpRepr) -> bool {
  407. if self.endpoint.port != repr.dst_port {
  408. return false;
  409. }
  410. if self.endpoint.addr.is_some()
  411. && self.endpoint.addr != Some(ip_repr.dst_addr())
  412. && !cx.is_broadcast(&ip_repr.dst_addr())
  413. && !ip_repr.dst_addr().is_multicast()
  414. {
  415. return false;
  416. }
  417. true
  418. }
  419. pub(crate) fn process(
  420. &mut self,
  421. cx: &mut Context,
  422. meta: PacketMeta,
  423. ip_repr: &IpRepr,
  424. repr: &UdpRepr,
  425. payload: &[u8],
  426. ) {
  427. debug_assert!(self.accepts(cx, ip_repr, repr));
  428. let size = payload.len();
  429. let remote_endpoint = IpEndpoint {
  430. addr: ip_repr.src_addr(),
  431. port: repr.src_port,
  432. };
  433. net_trace!(
  434. "udp:{}:{}: receiving {} octets",
  435. self.endpoint,
  436. remote_endpoint,
  437. size
  438. );
  439. let metadata = UdpMetadata {
  440. endpoint: remote_endpoint,
  441. local_address: Some(ip_repr.dst_addr()),
  442. meta,
  443. };
  444. match self.rx_buffer.enqueue(size, metadata) {
  445. Ok(buf) => buf.copy_from_slice(payload),
  446. Err(_) => net_trace!(
  447. "udp:{}:{}: buffer full, dropped incoming packet",
  448. self.endpoint,
  449. remote_endpoint
  450. ),
  451. }
  452. #[cfg(feature = "async")]
  453. self.rx_waker.wake();
  454. }
  455. pub(crate) fn dispatch<F, E>(&mut self, cx: &mut Context, emit: F) -> Result<(), E>
  456. where
  457. F: FnOnce(&mut Context, PacketMeta, (IpRepr, UdpRepr, &[u8])) -> Result<(), E>,
  458. {
  459. let endpoint = self.endpoint;
  460. let hop_limit = self.hop_limit.unwrap_or(64);
  461. let res = self.tx_buffer.dequeue_with(|packet_meta, payload_buf| {
  462. let src_addr = if let Some(s) = packet_meta.local_address {
  463. s
  464. } else {
  465. match endpoint.addr {
  466. Some(addr) => addr,
  467. None => match cx.get_source_address(&packet_meta.endpoint.addr) {
  468. Some(addr) => addr,
  469. None => {
  470. net_trace!(
  471. "udp:{}:{}: cannot find suitable source address, dropping.",
  472. endpoint,
  473. packet_meta.endpoint
  474. );
  475. return Ok(());
  476. }
  477. },
  478. }
  479. };
  480. net_trace!(
  481. "udp:{}:{}: sending {} octets",
  482. endpoint,
  483. packet_meta.endpoint,
  484. payload_buf.len()
  485. );
  486. let repr = UdpRepr {
  487. src_port: endpoint.port,
  488. dst_port: packet_meta.endpoint.port,
  489. };
  490. let ip_repr = IpRepr::new(
  491. src_addr,
  492. packet_meta.endpoint.addr,
  493. IpProtocol::Udp,
  494. repr.header_len() + payload_buf.len(),
  495. hop_limit,
  496. );
  497. emit(cx, packet_meta.meta, (ip_repr, repr, payload_buf))
  498. });
  499. match res {
  500. Err(Empty) => Ok(()),
  501. Ok(Err(e)) => Err(e),
  502. Ok(Ok(())) => {
  503. #[cfg(feature = "async")]
  504. self.tx_waker.wake();
  505. Ok(())
  506. }
  507. }
  508. }
  509. pub(crate) fn poll_at(&self, _cx: &mut Context) -> PollAt {
  510. if self.tx_buffer.is_empty() {
  511. PollAt::Ingress
  512. } else {
  513. PollAt::Now
  514. }
  515. }
  516. }
  517. #[cfg(test)]
  518. mod test {
  519. use super::*;
  520. use crate::wire::{IpRepr, UdpRepr};
  521. use crate::phy::Medium;
  522. use crate::tests::setup;
  523. use rstest::*;
  524. fn buffer(packets: usize) -> PacketBuffer<'static> {
  525. PacketBuffer::new(
  526. (0..packets)
  527. .map(|_| PacketMetadata::EMPTY)
  528. .collect::<Vec<_>>(),
  529. vec![0; 16 * packets],
  530. )
  531. }
  532. fn socket(
  533. rx_buffer: PacketBuffer<'static>,
  534. tx_buffer: PacketBuffer<'static>,
  535. ) -> Socket<'static> {
  536. Socket::new(rx_buffer, tx_buffer)
  537. }
  538. const LOCAL_PORT: u16 = 53;
  539. const REMOTE_PORT: u16 = 49500;
  540. cfg_if::cfg_if! {
  541. if #[cfg(feature = "proto-ipv4")] {
  542. use crate::wire::Ipv4Address as IpvXAddress;
  543. use crate::wire::Ipv4Repr as IpvXRepr;
  544. use IpRepr::Ipv4 as IpReprIpvX;
  545. const LOCAL_ADDR: IpvXAddress = IpvXAddress([192, 168, 1, 1]);
  546. const REMOTE_ADDR: IpvXAddress = IpvXAddress([192, 168, 1, 2]);
  547. const OTHER_ADDR: IpvXAddress = IpvXAddress([192, 168, 1, 3]);
  548. } else {
  549. use crate::wire::Ipv6Address as IpvXAddress;
  550. use crate::wire::Ipv6Repr as IpvXRepr;
  551. use IpRepr::Ipv6 as IpReprIpvX;
  552. const LOCAL_ADDR: IpvXAddress = IpvXAddress([
  553. 0xfe, 0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1,
  554. ]);
  555. const REMOTE_ADDR: IpvXAddress = IpvXAddress([
  556. 0xfe, 0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 2,
  557. ]);
  558. const OTHER_ADDR: IpvXAddress = IpvXAddress([
  559. 0xfe, 0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 3,
  560. ]);
  561. }
  562. }
  563. pub const LOCAL_END: IpEndpoint = IpEndpoint {
  564. addr: LOCAL_ADDR.into_address(),
  565. port: LOCAL_PORT,
  566. };
  567. pub const REMOTE_END: IpEndpoint = IpEndpoint {
  568. addr: REMOTE_ADDR.into_address(),
  569. port: REMOTE_PORT,
  570. };
  571. fn remote_metadata_with_local() -> UdpMetadata {
  572. // Would be great as a const once we have const `.into()`.
  573. UdpMetadata {
  574. local_address: Some(LOCAL_ADDR.into()),
  575. ..REMOTE_END.into()
  576. }
  577. }
  578. pub const LOCAL_IP_REPR: IpRepr = IpReprIpvX(IpvXRepr {
  579. src_addr: LOCAL_ADDR,
  580. dst_addr: REMOTE_ADDR,
  581. next_header: IpProtocol::Udp,
  582. payload_len: 8 + 6,
  583. hop_limit: 64,
  584. });
  585. pub const REMOTE_IP_REPR: IpRepr = IpReprIpvX(IpvXRepr {
  586. src_addr: REMOTE_ADDR,
  587. dst_addr: LOCAL_ADDR,
  588. next_header: IpProtocol::Udp,
  589. payload_len: 8 + 6,
  590. hop_limit: 64,
  591. });
  592. pub const BAD_IP_REPR: IpRepr = IpReprIpvX(IpvXRepr {
  593. src_addr: REMOTE_ADDR,
  594. dst_addr: OTHER_ADDR,
  595. next_header: IpProtocol::Udp,
  596. payload_len: 8 + 6,
  597. hop_limit: 64,
  598. });
  599. const LOCAL_UDP_REPR: UdpRepr = UdpRepr {
  600. src_port: LOCAL_PORT,
  601. dst_port: REMOTE_PORT,
  602. };
  603. const REMOTE_UDP_REPR: UdpRepr = UdpRepr {
  604. src_port: REMOTE_PORT,
  605. dst_port: LOCAL_PORT,
  606. };
  607. const PAYLOAD: &[u8] = b"abcdef";
  608. #[test]
  609. fn test_bind_unaddressable() {
  610. let mut socket = socket(buffer(0), buffer(0));
  611. assert_eq!(socket.bind(0), Err(BindError::Unaddressable));
  612. }
  613. #[test]
  614. fn test_bind_twice() {
  615. let mut socket = socket(buffer(0), buffer(0));
  616. assert_eq!(socket.bind(1), Ok(()));
  617. assert_eq!(socket.bind(2), Err(BindError::InvalidState));
  618. }
  619. #[test]
  620. #[should_panic(expected = "the time-to-live value of a packet must not be zero")]
  621. fn test_set_hop_limit_zero() {
  622. let mut s = socket(buffer(0), buffer(1));
  623. s.set_hop_limit(Some(0));
  624. }
  625. #[test]
  626. fn test_send_unaddressable() {
  627. let mut socket = socket(buffer(0), buffer(1));
  628. assert_eq!(
  629. socket.send_slice(b"abcdef", REMOTE_END),
  630. Err(SendError::Unaddressable)
  631. );
  632. assert_eq!(socket.bind(LOCAL_PORT), Ok(()));
  633. assert_eq!(
  634. socket.send_slice(
  635. b"abcdef",
  636. IpEndpoint {
  637. addr: IpvXAddress::UNSPECIFIED.into(),
  638. ..REMOTE_END
  639. }
  640. ),
  641. Err(SendError::Unaddressable)
  642. );
  643. assert_eq!(
  644. socket.send_slice(
  645. b"abcdef",
  646. IpEndpoint {
  647. port: 0,
  648. ..REMOTE_END
  649. }
  650. ),
  651. Err(SendError::Unaddressable)
  652. );
  653. assert_eq!(socket.send_slice(b"abcdef", REMOTE_END), Ok(()));
  654. }
  655. #[test]
  656. fn test_send_with_source() {
  657. let mut socket = socket(buffer(0), buffer(1));
  658. assert_eq!(socket.bind(LOCAL_PORT), Ok(()));
  659. assert_eq!(
  660. socket.send_slice(b"abcdef", remote_metadata_with_local()),
  661. Ok(())
  662. );
  663. }
  664. #[rstest]
  665. #[case::ip(Medium::Ip)]
  666. #[cfg(feature = "medium-ip")]
  667. #[case::ethernet(Medium::Ethernet)]
  668. #[cfg(feature = "medium-ethernet")]
  669. #[case::ieee802154(Medium::Ieee802154)]
  670. #[cfg(feature = "medium-ieee802154")]
  671. fn test_send_dispatch(#[case] medium: Medium) {
  672. let (mut iface, _, _) = setup(medium);
  673. let cx = iface.context();
  674. let mut socket = socket(buffer(0), buffer(1));
  675. assert_eq!(socket.bind(LOCAL_END), Ok(()));
  676. assert!(socket.can_send());
  677. assert_eq!(
  678. socket.dispatch(cx, |_, _, _| unreachable!()),
  679. Ok::<_, ()>(())
  680. );
  681. assert_eq!(socket.send_slice(b"abcdef", REMOTE_END), Ok(()));
  682. assert_eq!(
  683. socket.send_slice(b"123456", REMOTE_END),
  684. Err(SendError::BufferFull)
  685. );
  686. assert!(!socket.can_send());
  687. assert_eq!(
  688. socket.dispatch(cx, |_, _, (ip_repr, udp_repr, payload)| {
  689. assert_eq!(ip_repr, LOCAL_IP_REPR);
  690. assert_eq!(udp_repr, LOCAL_UDP_REPR);
  691. assert_eq!(payload, PAYLOAD);
  692. Err(())
  693. }),
  694. Err(())
  695. );
  696. assert!(!socket.can_send());
  697. assert_eq!(
  698. socket.dispatch(cx, |_, _, (ip_repr, udp_repr, payload)| {
  699. assert_eq!(ip_repr, LOCAL_IP_REPR);
  700. assert_eq!(udp_repr, LOCAL_UDP_REPR);
  701. assert_eq!(payload, PAYLOAD);
  702. Ok::<_, ()>(())
  703. }),
  704. Ok(())
  705. );
  706. assert!(socket.can_send());
  707. }
  708. #[rstest]
  709. #[case::ip(Medium::Ip)]
  710. #[cfg(feature = "medium-ip")]
  711. #[case::ethernet(Medium::Ethernet)]
  712. #[cfg(feature = "medium-ethernet")]
  713. #[case::ieee802154(Medium::Ieee802154)]
  714. #[cfg(feature = "medium-ieee802154")]
  715. fn test_recv_process(#[case] medium: Medium) {
  716. let (mut iface, _, _) = setup(medium);
  717. let cx = iface.context();
  718. let mut socket = socket(buffer(1), buffer(0));
  719. assert_eq!(socket.bind(LOCAL_PORT), Ok(()));
  720. assert!(!socket.can_recv());
  721. assert_eq!(socket.recv(), Err(RecvError::Exhausted));
  722. assert!(socket.accepts(cx, &REMOTE_IP_REPR, &REMOTE_UDP_REPR));
  723. socket.process(
  724. cx,
  725. PacketMeta::default(),
  726. &REMOTE_IP_REPR,
  727. &REMOTE_UDP_REPR,
  728. PAYLOAD,
  729. );
  730. assert!(socket.can_recv());
  731. assert!(socket.accepts(cx, &REMOTE_IP_REPR, &REMOTE_UDP_REPR));
  732. socket.process(
  733. cx,
  734. PacketMeta::default(),
  735. &REMOTE_IP_REPR,
  736. &REMOTE_UDP_REPR,
  737. PAYLOAD,
  738. );
  739. assert_eq!(
  740. socket.recv(),
  741. Ok((&b"abcdef"[..], remote_metadata_with_local()))
  742. );
  743. assert!(!socket.can_recv());
  744. }
  745. #[rstest]
  746. #[case::ip(Medium::Ip)]
  747. #[cfg(feature = "medium-ip")]
  748. #[case::ethernet(Medium::Ethernet)]
  749. #[cfg(feature = "medium-ethernet")]
  750. #[case::ieee802154(Medium::Ieee802154)]
  751. #[cfg(feature = "medium-ieee802154")]
  752. fn test_peek_process(#[case] medium: Medium) {
  753. let (mut iface, _, _) = setup(medium);
  754. let cx = iface.context();
  755. let mut socket = socket(buffer(1), buffer(0));
  756. assert_eq!(socket.bind(LOCAL_PORT), Ok(()));
  757. assert_eq!(socket.peek(), Err(RecvError::Exhausted));
  758. socket.process(
  759. cx,
  760. PacketMeta::default(),
  761. &REMOTE_IP_REPR,
  762. &REMOTE_UDP_REPR,
  763. PAYLOAD,
  764. );
  765. assert_eq!(
  766. socket.peek(),
  767. Ok((&b"abcdef"[..], &remote_metadata_with_local(),))
  768. );
  769. assert_eq!(
  770. socket.recv(),
  771. Ok((&b"abcdef"[..], remote_metadata_with_local(),))
  772. );
  773. assert_eq!(socket.peek(), Err(RecvError::Exhausted));
  774. }
  775. #[rstest]
  776. #[case::ip(Medium::Ip)]
  777. #[cfg(feature = "medium-ip")]
  778. #[case::ethernet(Medium::Ethernet)]
  779. #[cfg(feature = "medium-ethernet")]
  780. #[case::ieee802154(Medium::Ieee802154)]
  781. #[cfg(feature = "medium-ieee802154")]
  782. fn test_recv_truncated_slice(#[case] medium: Medium) {
  783. let (mut iface, _, _) = setup(medium);
  784. let cx = iface.context();
  785. let mut socket = socket(buffer(1), buffer(0));
  786. assert_eq!(socket.bind(LOCAL_PORT), Ok(()));
  787. assert!(socket.accepts(cx, &REMOTE_IP_REPR, &REMOTE_UDP_REPR));
  788. socket.process(
  789. cx,
  790. PacketMeta::default(),
  791. &REMOTE_IP_REPR,
  792. &REMOTE_UDP_REPR,
  793. PAYLOAD,
  794. );
  795. let mut slice = [0; 4];
  796. assert_eq!(socket.recv_slice(&mut slice[..]), Err(RecvError::Truncated));
  797. }
  798. #[rstest]
  799. #[case::ip(Medium::Ip)]
  800. #[cfg(feature = "medium-ip")]
  801. #[case::ethernet(Medium::Ethernet)]
  802. #[cfg(feature = "medium-ethernet")]
  803. #[case::ieee802154(Medium::Ieee802154)]
  804. #[cfg(feature = "medium-ieee802154")]
  805. fn test_peek_truncated_slice(#[case] medium: Medium) {
  806. let (mut iface, _, _) = setup(medium);
  807. let cx = iface.context();
  808. let mut socket = socket(buffer(1), buffer(0));
  809. assert_eq!(socket.bind(LOCAL_PORT), Ok(()));
  810. socket.process(
  811. cx,
  812. PacketMeta::default(),
  813. &REMOTE_IP_REPR,
  814. &REMOTE_UDP_REPR,
  815. PAYLOAD,
  816. );
  817. let mut slice = [0; 4];
  818. assert_eq!(socket.peek_slice(&mut slice[..]), Err(RecvError::Truncated));
  819. assert_eq!(socket.recv_slice(&mut slice[..]), Err(RecvError::Truncated));
  820. assert_eq!(socket.peek_slice(&mut slice[..]), Err(RecvError::Exhausted));
  821. }
  822. #[rstest]
  823. #[case::ip(Medium::Ip)]
  824. #[cfg(feature = "medium-ip")]
  825. #[case::ethernet(Medium::Ethernet)]
  826. #[cfg(feature = "medium-ethernet")]
  827. #[case::ieee802154(Medium::Ieee802154)]
  828. #[cfg(feature = "medium-ieee802154")]
  829. fn test_set_hop_limit(#[case] medium: Medium) {
  830. let (mut iface, _, _) = setup(medium);
  831. let cx = iface.context();
  832. let mut s = socket(buffer(0), buffer(1));
  833. assert_eq!(s.bind(LOCAL_END), Ok(()));
  834. s.set_hop_limit(Some(0x2a));
  835. assert_eq!(s.send_slice(b"abcdef", REMOTE_END), Ok(()));
  836. assert_eq!(
  837. s.dispatch(cx, |_, _, (ip_repr, _, _)| {
  838. assert_eq!(
  839. ip_repr,
  840. IpReprIpvX(IpvXRepr {
  841. src_addr: LOCAL_ADDR,
  842. dst_addr: REMOTE_ADDR,
  843. next_header: IpProtocol::Udp,
  844. payload_len: 8 + 6,
  845. hop_limit: 0x2a,
  846. })
  847. );
  848. Ok::<_, ()>(())
  849. }),
  850. Ok(())
  851. );
  852. }
  853. #[rstest]
  854. #[case::ip(Medium::Ip)]
  855. #[cfg(feature = "medium-ip")]
  856. #[case::ethernet(Medium::Ethernet)]
  857. #[cfg(feature = "medium-ethernet")]
  858. #[case::ieee802154(Medium::Ieee802154)]
  859. #[cfg(feature = "medium-ieee802154")]
  860. fn test_doesnt_accept_wrong_port(#[case] medium: Medium) {
  861. let (mut iface, _, _) = setup(medium);
  862. let cx = iface.context();
  863. let mut socket = socket(buffer(1), buffer(0));
  864. assert_eq!(socket.bind(LOCAL_PORT), Ok(()));
  865. let mut udp_repr = REMOTE_UDP_REPR;
  866. assert!(socket.accepts(cx, &REMOTE_IP_REPR, &udp_repr));
  867. udp_repr.dst_port += 1;
  868. assert!(!socket.accepts(cx, &REMOTE_IP_REPR, &udp_repr));
  869. }
  870. #[rstest]
  871. #[case::ip(Medium::Ip)]
  872. #[cfg(feature = "medium-ip")]
  873. #[case::ethernet(Medium::Ethernet)]
  874. #[cfg(feature = "medium-ethernet")]
  875. #[case::ieee802154(Medium::Ieee802154)]
  876. #[cfg(feature = "medium-ieee802154")]
  877. fn test_doesnt_accept_wrong_ip(#[case] medium: Medium) {
  878. let (mut iface, _, _) = setup(medium);
  879. let cx = iface.context();
  880. let mut port_bound_socket = socket(buffer(1), buffer(0));
  881. assert_eq!(port_bound_socket.bind(LOCAL_PORT), Ok(()));
  882. assert!(port_bound_socket.accepts(cx, &BAD_IP_REPR, &REMOTE_UDP_REPR));
  883. let mut ip_bound_socket = socket(buffer(1), buffer(0));
  884. assert_eq!(ip_bound_socket.bind(LOCAL_END), Ok(()));
  885. assert!(!ip_bound_socket.accepts(cx, &BAD_IP_REPR, &REMOTE_UDP_REPR));
  886. }
  887. #[test]
  888. fn test_send_large_packet() {
  889. // buffer(4) creates a payload buffer of size 16*4
  890. let mut socket = socket(buffer(0), buffer(4));
  891. assert_eq!(socket.bind(LOCAL_END), Ok(()));
  892. let too_large = b"0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdefx";
  893. assert_eq!(
  894. socket.send_slice(too_large, REMOTE_END),
  895. Err(SendError::BufferFull)
  896. );
  897. assert_eq!(socket.send_slice(&too_large[..16 * 4], REMOTE_END), Ok(()));
  898. }
  899. #[rstest]
  900. #[case::ip(Medium::Ip)]
  901. #[cfg(feature = "medium-ip")]
  902. #[case::ethernet(Medium::Ethernet)]
  903. #[cfg(feature = "medium-ethernet")]
  904. #[case::ieee802154(Medium::Ieee802154)]
  905. #[cfg(feature = "medium-ieee802154")]
  906. fn test_process_empty_payload(#[case] medium: Medium) {
  907. let meta = Box::leak(Box::new([PacketMetadata::EMPTY]));
  908. let recv_buffer = PacketBuffer::new(&mut meta[..], vec![]);
  909. let mut socket = socket(recv_buffer, buffer(0));
  910. let (mut iface, _, _) = setup(medium);
  911. let cx = iface.context();
  912. assert_eq!(socket.bind(LOCAL_PORT), Ok(()));
  913. let repr = UdpRepr {
  914. src_port: REMOTE_PORT,
  915. dst_port: LOCAL_PORT,
  916. };
  917. socket.process(cx, PacketMeta::default(), &REMOTE_IP_REPR, &repr, &[]);
  918. assert_eq!(socket.recv(), Ok((&[][..], remote_metadata_with_local())));
  919. }
  920. #[test]
  921. fn test_closing() {
  922. let meta = Box::leak(Box::new([PacketMetadata::EMPTY]));
  923. let recv_buffer = PacketBuffer::new(&mut meta[..], vec![]);
  924. let mut socket = socket(recv_buffer, buffer(0));
  925. assert_eq!(socket.bind(LOCAL_PORT), Ok(()));
  926. assert!(socket.is_open());
  927. socket.close();
  928. assert!(!socket.is_open());
  929. }
  930. }