mod.rs 83 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307
  1. // Heads up! Before working on this file you should read the parts
  2. // of RFC 1122 that discuss Ethernet, ARP and IP for any IPv4 work
  3. // and RFCs 8200 and 4861 for any IPv6 and NDISC work.
  4. #[cfg(test)]
  5. mod tests;
  6. #[cfg(feature = "medium-ethernet")]
  7. mod ethernet;
  8. #[cfg(feature = "proto-sixlowpan")]
  9. mod sixlowpan;
  10. #[cfg(feature = "proto-ipv4")]
  11. mod ipv4;
  12. #[cfg(feature = "proto-ipv6")]
  13. mod ipv6;
  14. use core::cmp;
  15. use heapless::Vec;
  16. use managed::{ManagedMap, ManagedSlice};
  17. #[cfg(any(feature = "proto-ipv4", feature = "proto-sixlowpan"))]
  18. use super::fragmentation::PacketAssemblerSet;
  19. use super::socket_set::SocketSet;
  20. use crate::iface::Routes;
  21. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  22. use crate::iface::{NeighborAnswer, NeighborCache};
  23. use crate::phy::{ChecksumCapabilities, Device, DeviceCapabilities, Medium, RxToken, TxToken};
  24. use crate::rand::Rand;
  25. #[cfg(feature = "socket-dns")]
  26. use crate::socket::dns;
  27. use crate::socket::*;
  28. use crate::time::{Duration, Instant};
  29. use crate::wire::*;
  30. use crate::{Error, Result};
  31. const MAX_IP_ADDRS_NUM: usize = 5;
  32. pub(crate) struct FragmentsBuffer<'a> {
  33. #[cfg(feature = "proto-ipv4-fragmentation")]
  34. pub(crate) ipv4_fragments: PacketAssemblerSet<'a, Ipv4FragKey>,
  35. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  36. sixlowpan_fragments: PacketAssemblerSet<'a, SixlowpanFragKey>,
  37. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  38. sixlowpan_fragments_cache_timeout: Duration,
  39. #[cfg(not(any(
  40. feature = "proto-ipv4-fragmentation",
  41. feature = "proto-sixlowpan-fragmentation"
  42. )))]
  43. _lifetime: core::marker::PhantomData<&'a ()>,
  44. }
  45. pub(crate) struct OutPackets<'a> {
  46. #[cfg(feature = "proto-ipv4-fragmentation")]
  47. ipv4_out_packet: Ipv4OutPacket<'a>,
  48. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  49. sixlowpan_out_packet: SixlowpanOutPacket<'a>,
  50. #[cfg(not(feature = "proto-sixlowpan-fragmentation"))]
  51. _lifetime: core::marker::PhantomData<&'a ()>,
  52. }
  53. impl<'a> OutPackets<'a> {
  54. #[cfg(any(
  55. feature = "proto-ipv4-fragmentation",
  56. feature = "proto-sixlowpan-fragmentation"
  57. ))]
  58. /// Returns `true` when all the data of the outgoing buffers are transmitted.
  59. fn all_transmitted(&self) -> bool {
  60. #[cfg(feature = "proto-ipv4-fragmentation")]
  61. if !self.ipv4_out_packet.is_empty() {
  62. return false;
  63. }
  64. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  65. if !self.sixlowpan_out_packet.is_empty() {
  66. return false;
  67. }
  68. true
  69. }
  70. }
  71. #[allow(unused)]
  72. #[cfg(feature = "proto-ipv4-fragmentation")]
  73. pub(crate) struct Ipv4OutPacket<'a> {
  74. /// The buffer that holds the unfragmented 6LoWPAN packet.
  75. buffer: ManagedSlice<'a, u8>,
  76. /// The size of the packet without the IEEE802.15.4 header and the fragmentation headers.
  77. packet_len: usize,
  78. /// The amount of bytes that already have been transmitted.
  79. sent_bytes: usize,
  80. /// The IPv4 representation.
  81. repr: Ipv4Repr,
  82. /// The destination hardware address.
  83. #[cfg(feature = "medium-ethernet")]
  84. dst_hardware_addr: EthernetAddress,
  85. /// The offset of the next fragment.
  86. frag_offset: u16,
  87. /// The identifier of the stream.
  88. ident: u16,
  89. }
  90. #[cfg(feature = "proto-ipv4-fragmentation")]
  91. impl<'a> Ipv4OutPacket<'a> {
  92. pub(crate) fn new(buffer: ManagedSlice<'a, u8>) -> Self {
  93. Self {
  94. buffer,
  95. packet_len: 0,
  96. sent_bytes: 0,
  97. repr: Ipv4Repr {
  98. src_addr: Ipv4Address::default(),
  99. dst_addr: Ipv4Address::default(),
  100. next_header: IpProtocol::Unknown(0),
  101. payload_len: 0,
  102. hop_limit: 0,
  103. },
  104. #[cfg(feature = "medium-ethernet")]
  105. dst_hardware_addr: EthernetAddress::default(),
  106. frag_offset: 0,
  107. ident: 0,
  108. }
  109. }
  110. /// Return `true` when everything is transmitted.
  111. #[inline]
  112. fn finished(&self) -> bool {
  113. self.packet_len == self.sent_bytes
  114. }
  115. /// Returns `true` when there is nothing to transmit.
  116. #[inline]
  117. fn is_empty(&self) -> bool {
  118. self.packet_len == 0
  119. }
  120. // Reset the buffer.
  121. fn reset(&mut self) {
  122. self.packet_len = 0;
  123. self.sent_bytes = 0;
  124. self.repr = Ipv4Repr {
  125. src_addr: Ipv4Address::default(),
  126. dst_addr: Ipv4Address::default(),
  127. next_header: IpProtocol::Unknown(0),
  128. payload_len: 0,
  129. hop_limit: 0,
  130. };
  131. #[cfg(feature = "medium-ethernet")]
  132. {
  133. self.dst_hardware_addr = EthernetAddress::default();
  134. }
  135. }
  136. }
  137. #[allow(unused)]
  138. #[cfg(feature = "proto-sixlowpan")]
  139. pub(crate) struct SixlowpanOutPacket<'a> {
  140. /// The buffer that holds the unfragmented 6LoWPAN packet.
  141. buffer: ManagedSlice<'a, u8>,
  142. /// The size of the packet without the IEEE802.15.4 header and the fragmentation headers.
  143. packet_len: usize,
  144. /// The amount of bytes that already have been transmitted.
  145. sent_bytes: usize,
  146. /// The datagram size that is used for the fragmentation headers.
  147. datagram_size: u16,
  148. /// The datagram tag that is used for the fragmentation headers.
  149. datagram_tag: u16,
  150. datagram_offset: usize,
  151. /// The size of the FRAG_N packets.
  152. fragn_size: usize,
  153. /// The link layer IEEE802.15.4 source address.
  154. ll_dst_addr: Ieee802154Address,
  155. /// The link layer IEEE802.15.4 source address.
  156. ll_src_addr: Ieee802154Address,
  157. }
  158. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  159. impl<'a> SixlowpanOutPacket<'a> {
  160. pub(crate) fn new(buffer: ManagedSlice<'a, u8>) -> Self {
  161. Self {
  162. buffer,
  163. packet_len: 0,
  164. datagram_size: 0,
  165. datagram_tag: 0,
  166. datagram_offset: 0,
  167. sent_bytes: 0,
  168. fragn_size: 0,
  169. ll_dst_addr: Ieee802154Address::Absent,
  170. ll_src_addr: Ieee802154Address::Absent,
  171. }
  172. }
  173. /// Return `true` when everything is transmitted.
  174. #[inline]
  175. fn finished(&self) -> bool {
  176. self.packet_len == self.sent_bytes
  177. }
  178. /// Returns `true` when there is nothing to transmit.
  179. #[inline]
  180. fn is_empty(&self) -> bool {
  181. self.packet_len == 0
  182. }
  183. // Reset the buffer.
  184. fn reset(&mut self) {
  185. self.packet_len = 0;
  186. self.datagram_size = 0;
  187. self.datagram_tag = 0;
  188. self.sent_bytes = 0;
  189. self.fragn_size = 0;
  190. self.ll_dst_addr = Ieee802154Address::Absent;
  191. self.ll_src_addr = Ieee802154Address::Absent;
  192. }
  193. }
  194. macro_rules! check {
  195. ($e:expr) => {
  196. match $e {
  197. Ok(x) => x,
  198. Err(_) => {
  199. // concat!/stringify! doesn't work with defmt macros
  200. #[cfg(not(feature = "defmt"))]
  201. net_trace!(concat!("iface: malformed ", stringify!($e)));
  202. #[cfg(feature = "defmt")]
  203. net_trace!("iface: malformed");
  204. return Default::default();
  205. }
  206. }
  207. };
  208. }
  209. use check;
  210. /// A network interface.
  211. ///
  212. /// The network interface logically owns a number of other data structures; to avoid
  213. /// a dependency on heap allocation, it instead owns a `BorrowMut<[T]>`, which can be
  214. /// a `&mut [T]`, or `Vec<T>` if a heap is available.
  215. pub struct Interface<'a> {
  216. inner: InterfaceInner<'a>,
  217. fragments: FragmentsBuffer<'a>,
  218. out_packets: OutPackets<'a>,
  219. }
  220. /// The device independent part of an Ethernet network interface.
  221. ///
  222. /// Separating the device from the data required for processing and dispatching makes
  223. /// it possible to borrow them independently. For example, the tx and rx tokens borrow
  224. /// the `device` mutably until they're used, which makes it impossible to call other
  225. /// methods on the `Interface` in this time (since its `device` field is borrowed
  226. /// exclusively). However, it is still possible to call methods on its `inner` field.
  227. pub struct InterfaceInner<'a> {
  228. caps: DeviceCapabilities,
  229. now: Instant,
  230. rand: Rand,
  231. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  232. neighbor_cache: Option<NeighborCache<'a>>,
  233. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  234. hardware_addr: Option<HardwareAddress>,
  235. #[cfg(feature = "medium-ieee802154")]
  236. sequence_no: u8,
  237. #[cfg(feature = "medium-ieee802154")]
  238. pan_id: Option<Ieee802154Pan>,
  239. #[cfg(feature = "proto-ipv4-fragmentation")]
  240. ipv4_id: u16,
  241. #[cfg(feature = "proto-sixlowpan")]
  242. sixlowpan_address_context: &'a [SixlowpanAddressContext<'a>],
  243. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  244. tag: u16,
  245. ip_addrs: Vec<IpCidr, MAX_IP_ADDRS_NUM>,
  246. #[cfg(feature = "proto-ipv4")]
  247. any_ip: bool,
  248. routes: Routes<'a>,
  249. #[cfg(feature = "proto-igmp")]
  250. ipv4_multicast_groups: ManagedMap<'a, Ipv4Address, ()>,
  251. /// When to report for (all or) the next multicast group membership via IGMP
  252. #[cfg(feature = "proto-igmp")]
  253. igmp_report_state: IgmpReportState,
  254. }
  255. /// A builder structure used for creating a network interface.
  256. pub struct InterfaceBuilder<'a> {
  257. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  258. hardware_addr: Option<HardwareAddress>,
  259. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  260. neighbor_cache: Option<NeighborCache<'a>>,
  261. #[cfg(feature = "medium-ieee802154")]
  262. pan_id: Option<Ieee802154Pan>,
  263. ip_addrs: Vec<IpCidr, MAX_IP_ADDRS_NUM>,
  264. #[cfg(feature = "proto-ipv4")]
  265. any_ip: bool,
  266. routes: Routes<'a>,
  267. /// Does not share storage with `ipv6_multicast_groups` to avoid IPv6 size overhead.
  268. #[cfg(feature = "proto-igmp")]
  269. ipv4_multicast_groups: ManagedMap<'a, Ipv4Address, ()>,
  270. random_seed: u64,
  271. #[cfg(feature = "proto-ipv4-fragmentation")]
  272. ipv4_fragments: PacketAssemblerSet<'a, Ipv4FragKey>,
  273. #[cfg(feature = "proto-ipv4-fragmentation")]
  274. ipv4_out_buffer: ManagedSlice<'a, u8>,
  275. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  276. sixlowpan_fragments: PacketAssemblerSet<'a, SixlowpanFragKey>,
  277. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  278. sixlowpan_reassembly_buffer_timeout: Duration,
  279. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  280. sixlowpan_out_buffer: ManagedSlice<'a, u8>,
  281. #[cfg(feature = "proto-sixlowpan")]
  282. sixlowpan_address_context: &'a [SixlowpanAddressContext<'a>],
  283. }
  284. impl<'a> InterfaceBuilder<'a> {
  285. /// Create a builder used for creating a network interface using the
  286. /// given device and address.
  287. #[cfg_attr(
  288. all(feature = "medium-ethernet", not(feature = "proto-sixlowpan")),
  289. doc = r##"
  290. # Examples
  291. ```
  292. # use std::collections::BTreeMap;
  293. #[cfg(feature = "proto-ipv4-fragmentation")]
  294. use smoltcp::iface::ReassemblyBuffer;
  295. use smoltcp::iface::{InterfaceBuilder, NeighborCache};
  296. # use smoltcp::phy::{Loopback, Medium};
  297. use smoltcp::wire::{EthernetAddress, IpCidr, IpAddress};
  298. let mut device = // ...
  299. # Loopback::new(Medium::Ethernet);
  300. let hw_addr = // ...
  301. # EthernetAddress::default();
  302. let neighbor_cache = // ...
  303. # NeighborCache::new(BTreeMap::new());
  304. # #[cfg(feature = "proto-ipv4-fragmentation")]
  305. # let ipv4_frag_cache = // ...
  306. # ReassemblyBuffer::new(vec![], BTreeMap::new());
  307. let ip_addrs = // ...
  308. # heapless::Vec::<IpCidr, 5>::new();
  309. let builder = InterfaceBuilder::new()
  310. .hardware_addr(hw_addr.into())
  311. .neighbor_cache(neighbor_cache)
  312. .ip_addrs(ip_addrs);
  313. # #[cfg(feature = "proto-ipv4-fragmentation")]
  314. let builder = builder
  315. .ipv4_reassembly_buffer(ipv4_frag_cache)
  316. .ipv4_fragmentation_buffer(vec![]);
  317. let iface = builder.finalize(&mut device);
  318. ```
  319. "##
  320. )]
  321. #[allow(clippy::new_without_default)]
  322. pub fn new() -> Self {
  323. InterfaceBuilder {
  324. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  325. hardware_addr: None,
  326. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  327. neighbor_cache: None,
  328. #[cfg(feature = "medium-ieee802154")]
  329. pan_id: None,
  330. ip_addrs: Vec::new(),
  331. #[cfg(feature = "proto-ipv4")]
  332. any_ip: false,
  333. routes: Routes::new(ManagedMap::Borrowed(&mut [])),
  334. #[cfg(feature = "proto-igmp")]
  335. ipv4_multicast_groups: ManagedMap::Borrowed(&mut []),
  336. random_seed: 0,
  337. #[cfg(feature = "proto-ipv4-fragmentation")]
  338. ipv4_fragments: PacketAssemblerSet::new(&mut [][..], &mut [][..]),
  339. #[cfg(feature = "proto-ipv4-fragmentation")]
  340. ipv4_out_buffer: ManagedSlice::Borrowed(&mut [][..]),
  341. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  342. sixlowpan_fragments: PacketAssemblerSet::new(&mut [][..], &mut [][..]),
  343. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  344. sixlowpan_reassembly_buffer_timeout: Duration::from_secs(60),
  345. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  346. sixlowpan_out_buffer: ManagedSlice::Borrowed(&mut [][..]),
  347. #[cfg(feature = "proto-sixlowpan")]
  348. sixlowpan_address_context: &[],
  349. }
  350. }
  351. /// Set the random seed for this interface.
  352. ///
  353. /// It is strongly recommended that the random seed is different on each boot,
  354. /// to avoid problems with TCP port/sequence collisions.
  355. ///
  356. /// The seed doesn't have to be cryptographically secure.
  357. pub fn random_seed(mut self, random_seed: u64) -> Self {
  358. self.random_seed = random_seed;
  359. self
  360. }
  361. /// Set the Hardware address the interface will use. See also
  362. /// [hardware_addr].
  363. ///
  364. /// # Panics
  365. /// This function panics if the address is not unicast.
  366. ///
  367. /// [hardware_addr]: struct.Interface.html#method.hardware_addr
  368. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  369. pub fn hardware_addr(mut self, addr: HardwareAddress) -> Self {
  370. InterfaceInner::check_hardware_addr(&addr);
  371. self.hardware_addr = Some(addr);
  372. self
  373. }
  374. /// Set the IEEE802.15.4 PAN ID the interface will use.
  375. ///
  376. /// **NOTE**: we use the same PAN ID for destination and source.
  377. #[cfg(feature = "medium-ieee802154")]
  378. pub fn pan_id(mut self, pan_id: Ieee802154Pan) -> Self {
  379. self.pan_id = Some(pan_id);
  380. self
  381. }
  382. /// Set the IP addresses the interface will use. See also
  383. /// [ip_addrs].
  384. ///
  385. /// # Panics
  386. /// This function panics if any of the addresses are not unicast.
  387. ///
  388. /// [ip_addrs]: struct.Interface.html#method.ip_addrs
  389. pub fn ip_addrs<T>(mut self, ip_addrs: T) -> Self
  390. where
  391. T: Into<Vec<IpCidr, MAX_IP_ADDRS_NUM>>,
  392. {
  393. let ip_addrs = ip_addrs.into();
  394. InterfaceInner::check_ip_addrs(&ip_addrs);
  395. self.ip_addrs = ip_addrs;
  396. self
  397. }
  398. /// Enable or disable the AnyIP capability, allowing packets to be received
  399. /// locally on IPv4 addresses other than the interface's configured [ip_addrs].
  400. /// When AnyIP is enabled and a route prefix in [routes] specifies one of
  401. /// the interface's [ip_addrs] as its gateway, the interface will accept
  402. /// packets addressed to that prefix.
  403. ///
  404. /// # IPv6
  405. ///
  406. /// This option is not available or required for IPv6 as packets sent to
  407. /// the interface are not filtered by IPv6 address.
  408. ///
  409. /// [routes]: struct.Interface.html#method.routes
  410. /// [ip_addrs]: struct.Interface.html#method.ip_addrs
  411. #[cfg(feature = "proto-ipv4")]
  412. pub fn any_ip(mut self, enabled: bool) -> Self {
  413. self.any_ip = enabled;
  414. self
  415. }
  416. /// Set the IP routes the interface will use. See also
  417. /// [routes].
  418. ///
  419. /// [routes]: struct.Interface.html#method.routes
  420. pub fn routes<T>(mut self, routes: T) -> InterfaceBuilder<'a>
  421. where
  422. T: Into<Routes<'a>>,
  423. {
  424. self.routes = routes.into();
  425. self
  426. }
  427. /// Provide storage for multicast groups.
  428. ///
  429. /// Join multicast groups by calling [`join_multicast_group()`] on an `Interface`.
  430. /// Using [`join_multicast_group()`] will send initial membership reports.
  431. ///
  432. /// A previously destroyed interface can be recreated by reusing the multicast group
  433. /// storage, i.e. providing a non-empty storage to `ipv4_multicast_groups()`.
  434. /// Note that this way initial membership reports are **not** sent.
  435. ///
  436. /// [`join_multicast_group()`]: struct.Interface.html#method.join_multicast_group
  437. #[cfg(feature = "proto-igmp")]
  438. pub fn ipv4_multicast_groups<T>(mut self, ipv4_multicast_groups: T) -> Self
  439. where
  440. T: Into<ManagedMap<'a, Ipv4Address, ()>>,
  441. {
  442. self.ipv4_multicast_groups = ipv4_multicast_groups.into();
  443. self
  444. }
  445. /// Set the Neighbor Cache the interface will use.
  446. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  447. pub fn neighbor_cache(mut self, neighbor_cache: NeighborCache<'a>) -> Self {
  448. self.neighbor_cache = Some(neighbor_cache);
  449. self
  450. }
  451. /// Set the IPv4 reassembly buffer the interface will use.
  452. #[cfg(feature = "proto-ipv4-fragmentation")]
  453. pub fn ipv4_reassembly_buffer(mut self, storage: PacketAssemblerSet<'a, Ipv4FragKey>) -> Self {
  454. self.ipv4_fragments = storage;
  455. self
  456. }
  457. /// Set the IPv4 fragments buffer the interface will use.
  458. #[cfg(feature = "proto-ipv4-fragmentation")]
  459. pub fn ipv4_fragmentation_buffer<T>(mut self, storage: T) -> Self
  460. where
  461. T: Into<ManagedSlice<'a, u8>>,
  462. {
  463. self.ipv4_out_buffer = storage.into();
  464. self
  465. }
  466. /// Set the address contexts the interface will use.
  467. #[cfg(feature = "proto-sixlowpan")]
  468. pub fn sixlowpan_address_context(
  469. mut self,
  470. sixlowpan_address_context: &'a [SixlowpanAddressContext<'a>],
  471. ) -> Self {
  472. self.sixlowpan_address_context = sixlowpan_address_context;
  473. self
  474. }
  475. /// Set the 6LoWPAN reassembly buffer the interface will use.
  476. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  477. pub fn sixlowpan_reassembly_buffer(
  478. mut self,
  479. storage: PacketAssemblerSet<'a, SixlowpanFragKey>,
  480. ) -> Self {
  481. self.sixlowpan_fragments = storage;
  482. self
  483. }
  484. /// Set the timeout value the 6LoWPAN reassembly buffer will use.
  485. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  486. pub fn sixlowpan_reassembly_buffer_timeout(mut self, timeout: Duration) -> Self {
  487. if timeout > Duration::from_secs(60) {
  488. net_debug!("RFC 4944 specifies that the reassembly timeout MUST be set to a maximum of 60 seconds");
  489. }
  490. self.sixlowpan_reassembly_buffer_timeout = timeout;
  491. self
  492. }
  493. /// Set the 6LoWPAN fragments buffer the interface will use.
  494. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  495. pub fn sixlowpan_fragmentation_buffer<T>(mut self, storage: T) -> Self
  496. where
  497. T: Into<ManagedSlice<'a, u8>>,
  498. {
  499. self.sixlowpan_out_buffer = storage.into();
  500. self
  501. }
  502. /// Create a network interface using the previously provided configuration.
  503. ///
  504. /// # Panics
  505. /// If a required option is not provided, this function will panic. Required
  506. /// options are:
  507. ///
  508. /// - [ethernet_addr]
  509. /// - [neighbor_cache]
  510. ///
  511. /// [ethernet_addr]: #method.ethernet_addr
  512. /// [neighbor_cache]: #method.neighbor_cache
  513. pub fn finalize<D>(self, device: &mut D) -> Interface<'a>
  514. where
  515. D: Device + ?Sized,
  516. {
  517. let caps = device.capabilities();
  518. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  519. let (hardware_addr, neighbor_cache) = match caps.medium {
  520. #[cfg(feature = "medium-ethernet")]
  521. Medium::Ethernet => (
  522. Some(
  523. self.hardware_addr
  524. .expect("hardware_addr required option was not set"),
  525. ),
  526. Some(
  527. self.neighbor_cache
  528. .expect("neighbor_cache required option was not set"),
  529. ),
  530. ),
  531. #[cfg(feature = "medium-ip")]
  532. Medium::Ip => {
  533. assert!(
  534. self.hardware_addr.is_none(),
  535. "hardware_addr is set, but device medium is IP"
  536. );
  537. assert!(
  538. self.neighbor_cache.is_none(),
  539. "neighbor_cache is set, but device medium is IP"
  540. );
  541. (None, None)
  542. }
  543. #[cfg(feature = "medium-ieee802154")]
  544. Medium::Ieee802154 => (
  545. Some(
  546. self.hardware_addr
  547. .expect("hardware_addr required option was not set"),
  548. ),
  549. Some(
  550. self.neighbor_cache
  551. .expect("neighbor_cache required option was not set"),
  552. ),
  553. ),
  554. };
  555. let mut rand = Rand::new(self.random_seed);
  556. #[cfg(feature = "medium-ieee802154")]
  557. let mut sequence_no;
  558. #[cfg(feature = "medium-ieee802154")]
  559. loop {
  560. sequence_no = (rand.rand_u32() & 0xff) as u8;
  561. if sequence_no != 0 {
  562. break;
  563. }
  564. }
  565. #[cfg(feature = "proto-sixlowpan")]
  566. let mut tag;
  567. #[cfg(feature = "proto-sixlowpan")]
  568. loop {
  569. tag = rand.rand_u16();
  570. if tag != 0 {
  571. break;
  572. }
  573. }
  574. #[cfg(feature = "proto-ipv4")]
  575. let mut ipv4_id;
  576. #[cfg(feature = "proto-ipv4")]
  577. loop {
  578. ipv4_id = rand.rand_u16();
  579. if ipv4_id != 0 {
  580. break;
  581. }
  582. }
  583. Interface {
  584. fragments: FragmentsBuffer {
  585. #[cfg(feature = "proto-ipv4-fragmentation")]
  586. ipv4_fragments: self.ipv4_fragments,
  587. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  588. sixlowpan_fragments: self.sixlowpan_fragments,
  589. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  590. sixlowpan_fragments_cache_timeout: self.sixlowpan_reassembly_buffer_timeout,
  591. #[cfg(not(any(
  592. feature = "proto-ipv4-fragmentation",
  593. feature = "proto-sixlowpan-fragmentation"
  594. )))]
  595. _lifetime: core::marker::PhantomData,
  596. },
  597. out_packets: OutPackets {
  598. #[cfg(feature = "proto-ipv4-fragmentation")]
  599. ipv4_out_packet: Ipv4OutPacket::new(self.ipv4_out_buffer),
  600. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  601. sixlowpan_out_packet: SixlowpanOutPacket::new(self.sixlowpan_out_buffer),
  602. #[cfg(not(feature = "proto-sixlowpan-fragmentation"))]
  603. _lifetime: core::marker::PhantomData,
  604. },
  605. inner: InterfaceInner {
  606. now: Instant::from_secs(0),
  607. caps,
  608. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  609. hardware_addr,
  610. ip_addrs: self.ip_addrs,
  611. #[cfg(feature = "proto-ipv4")]
  612. any_ip: self.any_ip,
  613. routes: self.routes,
  614. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  615. neighbor_cache,
  616. #[cfg(feature = "proto-igmp")]
  617. ipv4_multicast_groups: self.ipv4_multicast_groups,
  618. #[cfg(feature = "proto-igmp")]
  619. igmp_report_state: IgmpReportState::Inactive,
  620. #[cfg(feature = "medium-ieee802154")]
  621. sequence_no,
  622. #[cfg(feature = "medium-ieee802154")]
  623. pan_id: self.pan_id,
  624. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  625. tag,
  626. #[cfg(feature = "proto-ipv4-fragmentation")]
  627. ipv4_id,
  628. #[cfg(feature = "proto-sixlowpan")]
  629. sixlowpan_address_context: &[],
  630. rand,
  631. },
  632. }
  633. }
  634. }
  635. #[derive(Debug, PartialEq)]
  636. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  637. #[cfg(feature = "medium-ethernet")]
  638. enum EthernetPacket<'a> {
  639. #[cfg(feature = "proto-ipv4")]
  640. Arp(ArpRepr),
  641. Ip(IpPacket<'a>),
  642. }
  643. #[derive(Debug, PartialEq)]
  644. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  645. pub(crate) enum IpPacket<'a> {
  646. #[cfg(feature = "proto-ipv4")]
  647. Icmpv4((Ipv4Repr, Icmpv4Repr<'a>)),
  648. #[cfg(feature = "proto-igmp")]
  649. Igmp((Ipv4Repr, IgmpRepr)),
  650. #[cfg(feature = "proto-ipv6")]
  651. Icmpv6((Ipv6Repr, Icmpv6Repr<'a>)),
  652. #[cfg(feature = "socket-raw")]
  653. Raw((IpRepr, &'a [u8])),
  654. #[cfg(any(feature = "socket-udp", feature = "socket-dns"))]
  655. Udp((IpRepr, UdpRepr, &'a [u8])),
  656. #[cfg(feature = "socket-tcp")]
  657. Tcp((IpRepr, TcpRepr<'a>)),
  658. #[cfg(feature = "socket-dhcpv4")]
  659. Dhcpv4((Ipv4Repr, UdpRepr, DhcpRepr<'a>)),
  660. }
  661. impl<'a> IpPacket<'a> {
  662. pub(crate) fn ip_repr(&self) -> IpRepr {
  663. match self {
  664. #[cfg(feature = "proto-ipv4")]
  665. IpPacket::Icmpv4((ipv4_repr, _)) => IpRepr::Ipv4(*ipv4_repr),
  666. #[cfg(feature = "proto-igmp")]
  667. IpPacket::Igmp((ipv4_repr, _)) => IpRepr::Ipv4(*ipv4_repr),
  668. #[cfg(feature = "proto-ipv6")]
  669. IpPacket::Icmpv6((ipv6_repr, _)) => IpRepr::Ipv6(*ipv6_repr),
  670. #[cfg(feature = "socket-raw")]
  671. IpPacket::Raw((ip_repr, _)) => ip_repr.clone(),
  672. #[cfg(any(feature = "socket-udp", feature = "socket-dns"))]
  673. IpPacket::Udp((ip_repr, _, _)) => ip_repr.clone(),
  674. #[cfg(feature = "socket-tcp")]
  675. IpPacket::Tcp((ip_repr, _)) => ip_repr.clone(),
  676. #[cfg(feature = "socket-dhcpv4")]
  677. IpPacket::Dhcpv4((ipv4_repr, _, _)) => IpRepr::Ipv4(*ipv4_repr),
  678. }
  679. }
  680. pub(crate) fn emit_payload(
  681. &self,
  682. _ip_repr: &IpRepr,
  683. payload: &mut [u8],
  684. caps: &DeviceCapabilities,
  685. ) {
  686. match self {
  687. #[cfg(feature = "proto-ipv4")]
  688. IpPacket::Icmpv4((_, icmpv4_repr)) => {
  689. icmpv4_repr.emit(&mut Icmpv4Packet::new_unchecked(payload), &caps.checksum)
  690. }
  691. #[cfg(feature = "proto-igmp")]
  692. IpPacket::Igmp((_, igmp_repr)) => {
  693. igmp_repr.emit(&mut IgmpPacket::new_unchecked(payload))
  694. }
  695. #[cfg(feature = "proto-ipv6")]
  696. IpPacket::Icmpv6((_, icmpv6_repr)) => icmpv6_repr.emit(
  697. &_ip_repr.src_addr(),
  698. &_ip_repr.dst_addr(),
  699. &mut Icmpv6Packet::new_unchecked(payload),
  700. &caps.checksum,
  701. ),
  702. #[cfg(feature = "socket-raw")]
  703. IpPacket::Raw((_, raw_packet)) => payload.copy_from_slice(raw_packet),
  704. #[cfg(any(feature = "socket-udp", feature = "socket-dns"))]
  705. IpPacket::Udp((_, udp_repr, inner_payload)) => udp_repr.emit(
  706. &mut UdpPacket::new_unchecked(payload),
  707. &_ip_repr.src_addr(),
  708. &_ip_repr.dst_addr(),
  709. inner_payload.len(),
  710. |buf| buf.copy_from_slice(inner_payload),
  711. &caps.checksum,
  712. ),
  713. #[cfg(feature = "socket-tcp")]
  714. IpPacket::Tcp((_, mut tcp_repr)) => {
  715. // This is a terrible hack to make TCP performance more acceptable on systems
  716. // where the TCP buffers are significantly larger than network buffers,
  717. // e.g. a 64 kB TCP receive buffer (and so, when empty, a 64k window)
  718. // together with four 1500 B Ethernet receive buffers. If left untreated,
  719. // this would result in our peer pushing our window and sever packet loss.
  720. //
  721. // I'm really not happy about this "solution" but I don't know what else to do.
  722. if let Some(max_burst_size) = caps.max_burst_size {
  723. let mut max_segment_size = caps.max_transmission_unit;
  724. max_segment_size -= _ip_repr.header_len();
  725. max_segment_size -= tcp_repr.header_len();
  726. let max_window_size = max_burst_size * max_segment_size;
  727. if tcp_repr.window_len as usize > max_window_size {
  728. tcp_repr.window_len = max_window_size as u16;
  729. }
  730. }
  731. tcp_repr.emit(
  732. &mut TcpPacket::new_unchecked(payload),
  733. &_ip_repr.src_addr(),
  734. &_ip_repr.dst_addr(),
  735. &caps.checksum,
  736. );
  737. }
  738. #[cfg(feature = "socket-dhcpv4")]
  739. IpPacket::Dhcpv4((_, udp_repr, dhcp_repr)) => udp_repr.emit(
  740. &mut UdpPacket::new_unchecked(payload),
  741. &_ip_repr.src_addr(),
  742. &_ip_repr.dst_addr(),
  743. dhcp_repr.buffer_len(),
  744. |buf| dhcp_repr.emit(&mut DhcpPacket::new_unchecked(buf)).unwrap(),
  745. &caps.checksum,
  746. ),
  747. }
  748. }
  749. }
  750. #[cfg(any(feature = "proto-ipv4", feature = "proto-ipv6"))]
  751. fn icmp_reply_payload_len(len: usize, mtu: usize, header_len: usize) -> usize {
  752. // Send back as much of the original payload as will fit within
  753. // the minimum MTU required by IPv4. See RFC 1812 § 4.3.2.3 for
  754. // more details.
  755. //
  756. // Since the entire network layer packet must fit within the minimum
  757. // MTU supported, the payload must not exceed the following:
  758. //
  759. // <min mtu> - IP Header Size * 2 - ICMPv4 DstUnreachable hdr size
  760. cmp::min(len, mtu - header_len * 2 - 8)
  761. }
  762. #[cfg(feature = "proto-igmp")]
  763. enum IgmpReportState {
  764. Inactive,
  765. ToGeneralQuery {
  766. version: IgmpVersion,
  767. timeout: Instant,
  768. interval: Duration,
  769. next_index: usize,
  770. },
  771. ToSpecificQuery {
  772. version: IgmpVersion,
  773. timeout: Instant,
  774. group: Ipv4Address,
  775. },
  776. }
  777. impl<'a> Interface<'a> {
  778. /// Get the socket context.
  779. ///
  780. /// The context is needed for some socket methods.
  781. pub fn context(&mut self) -> &mut InterfaceInner<'a> {
  782. &mut self.inner
  783. }
  784. /// Get the HardwareAddress address of the interface.
  785. ///
  786. /// # Panics
  787. /// This function panics if the medium is not Ethernet or Ieee802154.
  788. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  789. pub fn hardware_addr(&self) -> HardwareAddress {
  790. #[cfg(all(feature = "medium-ethernet", not(feature = "medium-ieee802154")))]
  791. assert!(self.inner.caps.medium == Medium::Ethernet);
  792. #[cfg(all(feature = "medium-ieee802154", not(feature = "medium-ethernet")))]
  793. assert!(self.inner.caps.medium == Medium::Ieee802154);
  794. #[cfg(all(feature = "medium-ieee802154", feature = "medium-ethernet"))]
  795. assert!(
  796. self.inner.caps.medium == Medium::Ethernet
  797. || self.inner.caps.medium == Medium::Ieee802154
  798. );
  799. self.inner.hardware_addr.unwrap()
  800. }
  801. /// Set the HardwareAddress address of the interface.
  802. ///
  803. /// # Panics
  804. /// This function panics if the address is not unicast, and if the medium is not Ethernet or
  805. /// Ieee802154.
  806. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  807. pub fn set_hardware_addr(&mut self, addr: HardwareAddress) {
  808. #[cfg(all(feature = "medium-ethernet", not(feature = "medium-ieee802154")))]
  809. assert!(self.inner.caps.medium == Medium::Ethernet);
  810. #[cfg(all(feature = "medium-ieee802154", not(feature = "medium-ethernet")))]
  811. assert!(self.inner.caps.medium == Medium::Ieee802154);
  812. #[cfg(all(feature = "medium-ieee802154", feature = "medium-ethernet"))]
  813. assert!(
  814. self.inner.caps.medium == Medium::Ethernet
  815. || self.inner.caps.medium == Medium::Ieee802154
  816. );
  817. InterfaceInner::check_hardware_addr(&addr);
  818. self.inner.hardware_addr = Some(addr);
  819. }
  820. /// Add an address to a list of subscribed multicast IP addresses.
  821. ///
  822. /// Returns `Ok(announce_sent)` if the address was added successfully, where `annouce_sent`
  823. /// indicates whether an initial immediate announcement has been sent.
  824. pub fn join_multicast_group<D, T: Into<IpAddress>>(
  825. &mut self,
  826. device: &mut D,
  827. addr: T,
  828. timestamp: Instant,
  829. ) -> Result<bool>
  830. where
  831. D: Device + ?Sized,
  832. {
  833. self.inner.now = timestamp;
  834. match addr.into() {
  835. #[cfg(feature = "proto-igmp")]
  836. IpAddress::Ipv4(addr) => {
  837. let is_not_new = self
  838. .inner
  839. .ipv4_multicast_groups
  840. .insert(addr, ())
  841. .map_err(|_| Error::Exhausted)?
  842. .is_some();
  843. if is_not_new {
  844. Ok(false)
  845. } else if let Some(pkt) = self.inner.igmp_report_packet(IgmpVersion::Version2, addr)
  846. {
  847. // Send initial membership report
  848. let tx_token = device.transmit().ok_or(Error::Exhausted)?;
  849. self.inner.dispatch_ip(tx_token, pkt, None)?;
  850. Ok(true)
  851. } else {
  852. Ok(false)
  853. }
  854. }
  855. // Multicast is not yet implemented for other address families
  856. #[allow(unreachable_patterns)]
  857. _ => Err(Error::Unaddressable),
  858. }
  859. }
  860. /// Remove an address from the subscribed multicast IP addresses.
  861. ///
  862. /// Returns `Ok(leave_sent)` if the address was removed successfully, where `leave_sent`
  863. /// indicates whether an immediate leave packet has been sent.
  864. pub fn leave_multicast_group<D, T: Into<IpAddress>>(
  865. &mut self,
  866. device: &mut D,
  867. addr: T,
  868. timestamp: Instant,
  869. ) -> Result<bool>
  870. where
  871. D: Device + ?Sized,
  872. {
  873. self.inner.now = timestamp;
  874. match addr.into() {
  875. #[cfg(feature = "proto-igmp")]
  876. IpAddress::Ipv4(addr) => {
  877. let was_not_present = self.inner.ipv4_multicast_groups.remove(&addr).is_none();
  878. if was_not_present {
  879. Ok(false)
  880. } else if let Some(pkt) = self.inner.igmp_leave_packet(addr) {
  881. // Send group leave packet
  882. let tx_token = device.transmit().ok_or(Error::Exhausted)?;
  883. self.inner.dispatch_ip(tx_token, pkt, None)?;
  884. Ok(true)
  885. } else {
  886. Ok(false)
  887. }
  888. }
  889. // Multicast is not yet implemented for other address families
  890. #[allow(unreachable_patterns)]
  891. _ => Err(Error::Unaddressable),
  892. }
  893. }
  894. /// Check whether the interface listens to given destination multicast IP address.
  895. pub fn has_multicast_group<T: Into<IpAddress>>(&self, addr: T) -> bool {
  896. self.inner.has_multicast_group(addr)
  897. }
  898. /// Get the IP addresses of the interface.
  899. pub fn ip_addrs(&self) -> &[IpCidr] {
  900. self.inner.ip_addrs.as_ref()
  901. }
  902. /// Get the first IPv4 address if present.
  903. #[cfg(feature = "proto-ipv4")]
  904. pub fn ipv4_addr(&self) -> Option<Ipv4Address> {
  905. self.ip_addrs()
  906. .iter()
  907. .find_map(|cidr| match cidr.address() {
  908. IpAddress::Ipv4(addr) => Some(addr),
  909. #[allow(unreachable_patterns)]
  910. _ => None,
  911. })
  912. }
  913. /// Update the IP addresses of the interface.
  914. ///
  915. /// # Panics
  916. /// This function panics if any of the addresses are not unicast.
  917. pub fn update_ip_addrs<F: FnOnce(&mut Vec<IpCidr, MAX_IP_ADDRS_NUM>)>(&mut self, f: F) {
  918. f(&mut self.inner.ip_addrs);
  919. InterfaceInner::flush_cache(&mut self.inner);
  920. InterfaceInner::check_ip_addrs(&self.inner.ip_addrs)
  921. }
  922. /// Check whether the interface has the given IP address assigned.
  923. pub fn has_ip_addr<T: Into<IpAddress>>(&self, addr: T) -> bool {
  924. self.inner.has_ip_addr(addr)
  925. }
  926. /// Get the first IPv4 address of the interface.
  927. #[cfg(feature = "proto-ipv4")]
  928. pub fn ipv4_address(&self) -> Option<Ipv4Address> {
  929. self.inner.ipv4_address()
  930. }
  931. pub fn routes(&self) -> &Routes<'a> {
  932. &self.inner.routes
  933. }
  934. pub fn routes_mut(&mut self) -> &mut Routes<'a> {
  935. &mut self.inner.routes
  936. }
  937. /// Transmit packets queued in the given sockets, and receive packets queued
  938. /// in the device.
  939. ///
  940. /// This function returns a boolean value indicating whether any packets were
  941. /// processed or emitted, and thus, whether the readiness of any socket might
  942. /// have changed.
  943. ///
  944. /// # Errors
  945. /// This method will routinely return errors in response to normal network
  946. /// activity as well as certain boundary conditions such as buffer exhaustion.
  947. /// These errors are provided as an aid for troubleshooting, and are meant
  948. /// to be logged and ignored.
  949. ///
  950. /// As a special case, `Err(Error::Unrecognized)` is returned in response to
  951. /// packets containing any unsupported protocol, option, or form, which is
  952. /// a very common occurrence and on a production system it should not even
  953. /// be logged.
  954. pub fn poll<D>(
  955. &mut self,
  956. timestamp: Instant,
  957. device: &mut D,
  958. sockets: &mut SocketSet<'_>,
  959. ) -> Result<bool>
  960. where
  961. D: Device + ?Sized,
  962. {
  963. self.inner.now = timestamp;
  964. #[cfg(feature = "proto-ipv4-fragmentation")]
  965. self.fragments
  966. .ipv4_fragments
  967. .remove_when(|frag| Ok(timestamp >= frag.expires_at()?))?;
  968. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  969. self.fragments
  970. .sixlowpan_fragments
  971. .remove_when(|frag| Ok(timestamp >= frag.expires_at()?))?;
  972. #[cfg(feature = "proto-ipv4-fragmentation")]
  973. match self.ipv4_egress(device) {
  974. Ok(true) => return Ok(true),
  975. Err(e) => {
  976. net_debug!("failed to transmit: {}", e);
  977. return Err(e);
  978. }
  979. _ => (),
  980. }
  981. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  982. match self.sixlowpan_egress(device) {
  983. Ok(true) => return Ok(true),
  984. Err(e) => {
  985. net_debug!("failed to transmit: {}", e);
  986. return Err(e);
  987. }
  988. _ => (),
  989. }
  990. let mut readiness_may_have_changed = false;
  991. loop {
  992. let processed_any = self.socket_ingress(device, sockets);
  993. let emitted_any = self.socket_egress(device, sockets);
  994. #[cfg(feature = "proto-igmp")]
  995. self.igmp_egress(device)?;
  996. if processed_any || emitted_any {
  997. readiness_may_have_changed = true;
  998. } else {
  999. break;
  1000. }
  1001. }
  1002. Ok(readiness_may_have_changed)
  1003. }
  1004. /// Return a _soft deadline_ for calling [poll] the next time.
  1005. /// The [Instant] returned is the time at which you should call [poll] next.
  1006. /// It is harmless (but wastes energy) to call it before the [Instant], and
  1007. /// potentially harmful (impacting quality of service) to call it after the
  1008. /// [Instant]
  1009. ///
  1010. /// [poll]: #method.poll
  1011. /// [Instant]: struct.Instant.html
  1012. pub fn poll_at(&mut self, timestamp: Instant, sockets: &SocketSet<'_>) -> Option<Instant> {
  1013. self.inner.now = timestamp;
  1014. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  1015. if !self.out_packets.all_transmitted() {
  1016. return Some(Instant::from_millis(0));
  1017. }
  1018. let inner = &mut self.inner;
  1019. sockets
  1020. .items()
  1021. .filter_map(move |item| {
  1022. let socket_poll_at = item.socket.poll_at(inner);
  1023. match item
  1024. .meta
  1025. .poll_at(socket_poll_at, |ip_addr| inner.has_neighbor(&ip_addr))
  1026. {
  1027. PollAt::Ingress => None,
  1028. PollAt::Time(instant) => Some(instant),
  1029. PollAt::Now => Some(Instant::from_millis(0)),
  1030. }
  1031. })
  1032. .min()
  1033. }
  1034. /// Return an _advisory wait time_ for calling [poll] the next time.
  1035. /// The [Duration] returned is the time left to wait before calling [poll] next.
  1036. /// It is harmless (but wastes energy) to call it before the [Duration] has passed,
  1037. /// and potentially harmful (impacting quality of service) to call it after the
  1038. /// [Duration] has passed.
  1039. ///
  1040. /// [poll]: #method.poll
  1041. /// [Duration]: struct.Duration.html
  1042. pub fn poll_delay(&mut self, timestamp: Instant, sockets: &SocketSet<'_>) -> Option<Duration> {
  1043. match self.poll_at(timestamp, sockets) {
  1044. Some(poll_at) if timestamp < poll_at => Some(poll_at - timestamp),
  1045. Some(_) => Some(Duration::from_millis(0)),
  1046. _ => None,
  1047. }
  1048. }
  1049. fn socket_ingress<D>(&mut self, device: &mut D, sockets: &mut SocketSet<'_>) -> bool
  1050. where
  1051. D: Device + ?Sized,
  1052. {
  1053. let mut processed_any = false;
  1054. let Self {
  1055. inner,
  1056. fragments: ref mut _fragments,
  1057. out_packets: _out_packets,
  1058. } = self;
  1059. while let Some((rx_token, tx_token)) = device.receive() {
  1060. let res = rx_token.consume(inner.now, |frame| {
  1061. match inner.caps.medium {
  1062. #[cfg(feature = "medium-ethernet")]
  1063. Medium::Ethernet => {
  1064. if let Some(packet) = inner.process_ethernet(sockets, &frame, _fragments) {
  1065. if let Err(err) = inner.dispatch(tx_token, packet, Some(_out_packets)) {
  1066. net_debug!("Failed to send response: {}", err);
  1067. }
  1068. }
  1069. }
  1070. #[cfg(feature = "medium-ip")]
  1071. Medium::Ip => {
  1072. if let Some(packet) = inner.process_ip(sockets, &frame, _fragments) {
  1073. if let Err(err) =
  1074. inner.dispatch_ip(tx_token, packet, Some(_out_packets))
  1075. {
  1076. net_debug!("Failed to send response: {}", err);
  1077. }
  1078. }
  1079. }
  1080. #[cfg(feature = "medium-ieee802154")]
  1081. Medium::Ieee802154 => {
  1082. if let Some(packet) = inner.process_ieee802154(sockets, &frame, _fragments)
  1083. {
  1084. if let Err(err) =
  1085. inner.dispatch_ip(tx_token, packet, Some(_out_packets))
  1086. {
  1087. net_debug!("Failed to send response: {}", err);
  1088. }
  1089. }
  1090. }
  1091. }
  1092. processed_any = true;
  1093. Ok(())
  1094. });
  1095. if let Err(err) = res {
  1096. net_debug!("Failed to consume RX token: {}", err);
  1097. }
  1098. }
  1099. processed_any
  1100. }
  1101. fn socket_egress<D>(&mut self, device: &mut D, sockets: &mut SocketSet<'_>) -> bool
  1102. where
  1103. D: Device + ?Sized,
  1104. {
  1105. let Self {
  1106. inner,
  1107. out_packets: _out_packets,
  1108. ..
  1109. } = self;
  1110. let _caps = device.capabilities();
  1111. let mut emitted_any = false;
  1112. for item in sockets.items_mut() {
  1113. if !item
  1114. .meta
  1115. .egress_permitted(inner.now, |ip_addr| inner.has_neighbor(&ip_addr))
  1116. {
  1117. continue;
  1118. }
  1119. let mut neighbor_addr = None;
  1120. let mut respond = |inner: &mut InterfaceInner, response: IpPacket| {
  1121. neighbor_addr = Some(response.ip_repr().dst_addr());
  1122. let t = device.transmit().ok_or_else(|| {
  1123. net_debug!("failed to transmit IP: {}", Error::Exhausted);
  1124. Error::Exhausted
  1125. })?;
  1126. #[cfg(any(
  1127. feature = "proto-ipv4-fragmentation",
  1128. feature = "proto-sixlowpan-fragmentation"
  1129. ))]
  1130. inner.dispatch_ip(t, response, Some(_out_packets))?;
  1131. #[cfg(not(any(
  1132. feature = "proto-ipv4-fragmentation",
  1133. feature = "proto-sixlowpan-fragmentation"
  1134. )))]
  1135. inner.dispatch_ip(t, response, None)?;
  1136. emitted_any = true;
  1137. Ok(())
  1138. };
  1139. let result = match &mut item.socket {
  1140. #[cfg(feature = "socket-raw")]
  1141. Socket::Raw(socket) => socket.dispatch(inner, |inner, response| {
  1142. respond(inner, IpPacket::Raw(response))
  1143. }),
  1144. #[cfg(feature = "socket-icmp")]
  1145. Socket::Icmp(socket) => socket.dispatch(inner, |inner, response| match response {
  1146. #[cfg(feature = "proto-ipv4")]
  1147. (IpRepr::Ipv4(ipv4_repr), IcmpRepr::Ipv4(icmpv4_repr)) => {
  1148. respond(inner, IpPacket::Icmpv4((ipv4_repr, icmpv4_repr)))
  1149. }
  1150. #[cfg(feature = "proto-ipv6")]
  1151. (IpRepr::Ipv6(ipv6_repr), IcmpRepr::Ipv6(icmpv6_repr)) => {
  1152. respond(inner, IpPacket::Icmpv6((ipv6_repr, icmpv6_repr)))
  1153. }
  1154. #[allow(unreachable_patterns)]
  1155. _ => unreachable!(),
  1156. }),
  1157. #[cfg(feature = "socket-udp")]
  1158. Socket::Udp(socket) => socket.dispatch(inner, |inner, response| {
  1159. respond(inner, IpPacket::Udp(response))
  1160. }),
  1161. #[cfg(feature = "socket-tcp")]
  1162. Socket::Tcp(socket) => socket.dispatch(inner, |inner, response| {
  1163. respond(inner, IpPacket::Tcp(response))
  1164. }),
  1165. #[cfg(feature = "socket-dhcpv4")]
  1166. Socket::Dhcpv4(socket) => socket.dispatch(inner, |inner, response| {
  1167. respond(inner, IpPacket::Dhcpv4(response))
  1168. }),
  1169. #[cfg(feature = "socket-dns")]
  1170. Socket::Dns(ref mut socket) => socket.dispatch(inner, |inner, response| {
  1171. respond(inner, IpPacket::Udp(response))
  1172. }),
  1173. };
  1174. match result {
  1175. Err(Error::Exhausted) => break, // Device buffer full.
  1176. Err(Error::Unaddressable) => {
  1177. // `NeighborCache` already takes care of rate limiting the neighbor discovery
  1178. // requests from the socket. However, without an additional rate limiting
  1179. // mechanism, we would spin on every socket that has yet to discover its
  1180. // neighbor.
  1181. item.meta.neighbor_missing(
  1182. inner.now,
  1183. neighbor_addr.expect("non-IP response packet"),
  1184. );
  1185. break;
  1186. }
  1187. Err(err) => {
  1188. net_debug!(
  1189. "{}: cannot dispatch egress packet: {}",
  1190. item.meta.handle,
  1191. err
  1192. );
  1193. }
  1194. Ok(()) => {}
  1195. }
  1196. }
  1197. emitted_any
  1198. }
  1199. /// Depending on `igmp_report_state` and the therein contained
  1200. /// timeouts, send IGMP membership reports.
  1201. #[cfg(feature = "proto-igmp")]
  1202. fn igmp_egress<D>(&mut self, device: &mut D) -> Result<bool>
  1203. where
  1204. D: Device + ?Sized,
  1205. {
  1206. match self.inner.igmp_report_state {
  1207. IgmpReportState::ToSpecificQuery {
  1208. version,
  1209. timeout,
  1210. group,
  1211. } if self.inner.now >= timeout => {
  1212. if let Some(pkt) = self.inner.igmp_report_packet(version, group) {
  1213. // Send initial membership report
  1214. let tx_token = device.transmit().ok_or(Error::Exhausted)?;
  1215. self.inner.dispatch_ip(tx_token, pkt, None)?;
  1216. }
  1217. self.inner.igmp_report_state = IgmpReportState::Inactive;
  1218. Ok(true)
  1219. }
  1220. IgmpReportState::ToGeneralQuery {
  1221. version,
  1222. timeout,
  1223. interval,
  1224. next_index,
  1225. } if self.inner.now >= timeout => {
  1226. let addr = self
  1227. .inner
  1228. .ipv4_multicast_groups
  1229. .iter()
  1230. .nth(next_index)
  1231. .map(|(addr, ())| *addr);
  1232. match addr {
  1233. Some(addr) => {
  1234. if let Some(pkt) = self.inner.igmp_report_packet(version, addr) {
  1235. // Send initial membership report
  1236. let tx_token = device.transmit().ok_or(Error::Exhausted)?;
  1237. self.inner.dispatch_ip(tx_token, pkt, None)?;
  1238. }
  1239. let next_timeout = (timeout + interval).max(self.inner.now);
  1240. self.inner.igmp_report_state = IgmpReportState::ToGeneralQuery {
  1241. version,
  1242. timeout: next_timeout,
  1243. interval,
  1244. next_index: next_index + 1,
  1245. };
  1246. Ok(true)
  1247. }
  1248. None => {
  1249. self.inner.igmp_report_state = IgmpReportState::Inactive;
  1250. Ok(false)
  1251. }
  1252. }
  1253. }
  1254. _ => Ok(false),
  1255. }
  1256. }
  1257. /// Process fragments that still need to be sent for IPv4 packets.
  1258. ///
  1259. /// This function returns a boolean value indicating whether any packets were
  1260. /// processed or emitted, and thus, whether the readiness of any socket might
  1261. /// have changed.
  1262. #[cfg(feature = "proto-ipv4-fragmentation")]
  1263. fn ipv4_egress<D>(&mut self, device: &mut D) -> Result<bool>
  1264. where
  1265. D: Device + ?Sized,
  1266. {
  1267. // Reset the buffer when we transmitted everything.
  1268. if self.out_packets.ipv4_out_packet.finished() {
  1269. self.out_packets.ipv4_out_packet.reset();
  1270. }
  1271. if self.out_packets.ipv4_out_packet.is_empty() {
  1272. return Ok(false);
  1273. }
  1274. let Ipv4OutPacket {
  1275. packet_len,
  1276. sent_bytes,
  1277. ..
  1278. } = &self.out_packets.ipv4_out_packet;
  1279. if *packet_len > *sent_bytes {
  1280. match device.transmit() {
  1281. Some(tx_token) => self
  1282. .inner
  1283. .dispatch_ipv4_out_packet(tx_token, &mut self.out_packets.ipv4_out_packet),
  1284. None => Err(Error::Exhausted),
  1285. }
  1286. .map(|_| true)
  1287. } else {
  1288. Ok(false)
  1289. }
  1290. }
  1291. /// Process fragments that still need to be sent for 6LoWPAN packets.
  1292. ///
  1293. /// This function returns a boolean value indicating whether any packets were
  1294. /// processed or emitted, and thus, whether the readiness of any socket might
  1295. /// have changed.
  1296. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  1297. fn sixlowpan_egress<D>(&mut self, device: &mut D) -> Result<bool>
  1298. where
  1299. D: Device + ?Sized,
  1300. {
  1301. // Reset the buffer when we transmitted everything.
  1302. if self.out_packets.sixlowpan_out_packet.finished() {
  1303. self.out_packets.sixlowpan_out_packet.reset();
  1304. }
  1305. if self.out_packets.sixlowpan_out_packet.is_empty() {
  1306. return Ok(false);
  1307. }
  1308. let SixlowpanOutPacket {
  1309. packet_len,
  1310. sent_bytes,
  1311. ..
  1312. } = &self.out_packets.sixlowpan_out_packet;
  1313. if *packet_len > *sent_bytes {
  1314. match device.transmit() {
  1315. Some(tx_token) => self.inner.dispatch_ieee802154_out_packet(
  1316. tx_token,
  1317. &mut self.out_packets.sixlowpan_out_packet,
  1318. ),
  1319. None => Err(Error::Exhausted),
  1320. }
  1321. .map(|_| true)
  1322. } else {
  1323. Ok(false)
  1324. }
  1325. }
  1326. }
  1327. impl<'a> InterfaceInner<'a> {
  1328. #[allow(unused)] // unused depending on which sockets are enabled
  1329. pub(crate) fn now(&self) -> Instant {
  1330. self.now
  1331. }
  1332. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  1333. #[allow(unused)] // unused depending on which sockets are enabled
  1334. pub(crate) fn hardware_addr(&self) -> Option<HardwareAddress> {
  1335. self.hardware_addr
  1336. }
  1337. #[allow(unused)] // unused depending on which sockets are enabled
  1338. pub(crate) fn checksum_caps(&self) -> ChecksumCapabilities {
  1339. self.caps.checksum.clone()
  1340. }
  1341. #[allow(unused)] // unused depending on which sockets are enabled
  1342. pub(crate) fn ip_mtu(&self) -> usize {
  1343. self.caps.ip_mtu()
  1344. }
  1345. #[allow(unused)] // unused depending on which sockets are enabled, and in tests
  1346. pub(crate) fn rand(&mut self) -> &mut Rand {
  1347. &mut self.rand
  1348. }
  1349. #[allow(unused)] // unused depending on which sockets are enabled
  1350. pub(crate) fn get_source_address(&mut self, dst_addr: IpAddress) -> Option<IpAddress> {
  1351. let v = dst_addr.version();
  1352. for cidr in self.ip_addrs.iter() {
  1353. let addr = cidr.address();
  1354. if addr.version() == v {
  1355. return Some(addr);
  1356. }
  1357. }
  1358. None
  1359. }
  1360. #[cfg(feature = "proto-ipv4")]
  1361. #[allow(unused)]
  1362. pub(crate) fn get_source_address_ipv4(
  1363. &mut self,
  1364. _dst_addr: Ipv4Address,
  1365. ) -> Option<Ipv4Address> {
  1366. for cidr in self.ip_addrs.iter() {
  1367. #[allow(irrefutable_let_patterns)] // if only ipv4 is enabled
  1368. if let IpCidr::Ipv4(cidr) = cidr {
  1369. return Some(cidr.address());
  1370. }
  1371. }
  1372. None
  1373. }
  1374. #[cfg(feature = "proto-ipv6")]
  1375. #[allow(unused)]
  1376. pub(crate) fn get_source_address_ipv6(
  1377. &mut self,
  1378. _dst_addr: Ipv6Address,
  1379. ) -> Option<Ipv6Address> {
  1380. for cidr in self.ip_addrs.iter() {
  1381. #[allow(irrefutable_let_patterns)] // if only ipv6 is enabled
  1382. if let IpCidr::Ipv6(cidr) = cidr {
  1383. return Some(cidr.address());
  1384. }
  1385. }
  1386. None
  1387. }
  1388. #[cfg(test)]
  1389. pub(crate) fn mock() -> Self {
  1390. Self {
  1391. caps: DeviceCapabilities {
  1392. #[cfg(feature = "medium-ethernet")]
  1393. medium: crate::phy::Medium::Ethernet,
  1394. #[cfg(all(not(feature = "medium-ethernet"), feature = "medium-ip"))]
  1395. medium: crate::phy::Medium::Ip,
  1396. #[cfg(all(not(feature = "medium-ethernet"), feature = "medium-ieee802154"))]
  1397. medium: crate::phy::Medium::Ieee802154,
  1398. checksum: crate::phy::ChecksumCapabilities {
  1399. #[cfg(feature = "proto-ipv4")]
  1400. icmpv4: crate::phy::Checksum::Both,
  1401. #[cfg(feature = "proto-ipv6")]
  1402. icmpv6: crate::phy::Checksum::Both,
  1403. ipv4: crate::phy::Checksum::Both,
  1404. tcp: crate::phy::Checksum::Both,
  1405. udp: crate::phy::Checksum::Both,
  1406. },
  1407. max_burst_size: None,
  1408. #[cfg(feature = "medium-ethernet")]
  1409. max_transmission_unit: 1514,
  1410. #[cfg(not(feature = "medium-ethernet"))]
  1411. max_transmission_unit: 1500,
  1412. },
  1413. now: Instant::from_millis_const(0),
  1414. ip_addrs: Vec::from_slice(&[
  1415. #[cfg(feature = "proto-ipv4")]
  1416. IpCidr::Ipv4(Ipv4Cidr::new(Ipv4Address::new(192, 168, 1, 1), 24)),
  1417. #[cfg(feature = "proto-ipv6")]
  1418. IpCidr::Ipv6(Ipv6Cidr::new(
  1419. Ipv6Address([0xfe, 0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1]),
  1420. 64,
  1421. )),
  1422. ])
  1423. .unwrap(),
  1424. rand: Rand::new(1234),
  1425. routes: Routes::new(&mut [][..]),
  1426. #[cfg(feature = "proto-ipv4")]
  1427. any_ip: false,
  1428. #[cfg(feature = "medium-ieee802154")]
  1429. pan_id: Some(crate::wire::Ieee802154Pan(0xabcd)),
  1430. #[cfg(feature = "medium-ieee802154")]
  1431. sequence_no: 1,
  1432. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  1433. tag: 1,
  1434. #[cfg(feature = "proto-sixlowpan")]
  1435. sixlowpan_address_context: &[],
  1436. #[cfg(feature = "proto-ipv4-fragmentation")]
  1437. ipv4_id: 1,
  1438. #[cfg(feature = "medium-ethernet")]
  1439. hardware_addr: Some(crate::wire::HardwareAddress::Ethernet(
  1440. crate::wire::EthernetAddress([0x02, 0x02, 0x02, 0x02, 0x02, 0x02]),
  1441. )),
  1442. #[cfg(all(not(feature = "medium-ethernet"), feature = "medium-ieee802154"))]
  1443. hardware_addr: Some(crate::wire::HardwareAddress::Ieee802154(
  1444. crate::wire::Ieee802154Address::Extended([
  1445. 0x02, 0x02, 0x02, 0x02, 0x02, 0x02, 0x2, 0x2,
  1446. ]),
  1447. )),
  1448. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  1449. neighbor_cache: None,
  1450. #[cfg(feature = "proto-igmp")]
  1451. igmp_report_state: IgmpReportState::Inactive,
  1452. #[cfg(feature = "proto-igmp")]
  1453. ipv4_multicast_groups: ManagedMap::Borrowed(&mut []),
  1454. }
  1455. }
  1456. #[cfg(test)]
  1457. #[allow(unused)] // unused depending on which sockets are enabled
  1458. pub(crate) fn set_now(&mut self, now: Instant) {
  1459. self.now = now
  1460. }
  1461. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  1462. fn check_hardware_addr(addr: &HardwareAddress) {
  1463. if !addr.is_unicast() {
  1464. panic!("Ethernet address {} is not unicast", addr)
  1465. }
  1466. }
  1467. fn check_ip_addrs(addrs: &[IpCidr]) {
  1468. for cidr in addrs {
  1469. if !cidr.address().is_unicast() && !cidr.address().is_unspecified() {
  1470. panic!("IP address {} is not unicast", cidr.address())
  1471. }
  1472. }
  1473. }
  1474. #[cfg(feature = "medium-ieee802154")]
  1475. fn get_sequence_number(&mut self) -> u8 {
  1476. let no = self.sequence_no;
  1477. self.sequence_no = self.sequence_no.wrapping_add(1);
  1478. no
  1479. }
  1480. #[cfg(feature = "proto-ipv4-fragmentation")]
  1481. fn get_ipv4_ident(&mut self) -> u16 {
  1482. let ipv4_id = self.ipv4_id;
  1483. self.ipv4_id = self.ipv4_id.wrapping_add(1);
  1484. ipv4_id
  1485. }
  1486. #[cfg(feature = "proto-sixlowpan-fragmentation")]
  1487. fn get_sixlowpan_fragment_tag(&mut self) -> u16 {
  1488. let tag = self.tag;
  1489. self.tag = self.tag.wrapping_add(1);
  1490. tag
  1491. }
  1492. /// Determine if the given `Ipv6Address` is the solicited node
  1493. /// multicast address for a IPv6 addresses assigned to the interface.
  1494. /// See [RFC 4291 § 2.7.1] for more details.
  1495. ///
  1496. /// [RFC 4291 § 2.7.1]: https://tools.ietf.org/html/rfc4291#section-2.7.1
  1497. #[cfg(feature = "proto-ipv6")]
  1498. pub fn has_solicited_node(&self, addr: Ipv6Address) -> bool {
  1499. self.ip_addrs.iter().any(|cidr| {
  1500. match *cidr {
  1501. IpCidr::Ipv6(cidr) if cidr.address() != Ipv6Address::LOOPBACK => {
  1502. // Take the lower order 24 bits of the IPv6 address and
  1503. // append those bits to FF02:0:0:0:0:1:FF00::/104.
  1504. addr.as_bytes()[14..] == cidr.address().as_bytes()[14..]
  1505. }
  1506. _ => false,
  1507. }
  1508. })
  1509. }
  1510. /// Check whether the interface has the given IP address assigned.
  1511. fn has_ip_addr<T: Into<IpAddress>>(&self, addr: T) -> bool {
  1512. let addr = addr.into();
  1513. self.ip_addrs.iter().any(|probe| probe.address() == addr)
  1514. }
  1515. /// Get the first IPv4 address of the interface.
  1516. #[cfg(feature = "proto-ipv4")]
  1517. pub fn ipv4_address(&self) -> Option<Ipv4Address> {
  1518. self.ip_addrs.iter().find_map(|addr| match *addr {
  1519. IpCidr::Ipv4(cidr) => Some(cidr.address()),
  1520. #[cfg(feature = "proto-ipv6")]
  1521. IpCidr::Ipv6(_) => None,
  1522. })
  1523. }
  1524. /// Check whether the interface listens to given destination multicast IP address.
  1525. ///
  1526. /// If built without feature `proto-igmp` this function will
  1527. /// always return `false`.
  1528. pub fn has_multicast_group<T: Into<IpAddress>>(&self, addr: T) -> bool {
  1529. match addr.into() {
  1530. #[cfg(feature = "proto-igmp")]
  1531. IpAddress::Ipv4(key) => {
  1532. key == Ipv4Address::MULTICAST_ALL_SYSTEMS
  1533. || self.ipv4_multicast_groups.get(&key).is_some()
  1534. }
  1535. #[allow(unreachable_patterns)]
  1536. _ => false,
  1537. }
  1538. }
  1539. #[cfg(feature = "medium-ip")]
  1540. fn process_ip<'frame, T: AsRef<[u8]>>(
  1541. &mut self,
  1542. sockets: &mut SocketSet,
  1543. ip_payload: &'frame T,
  1544. _fragments: &'frame mut FragmentsBuffer<'a>,
  1545. ) -> Option<IpPacket<'frame>> {
  1546. match IpVersion::of_packet(ip_payload.as_ref()) {
  1547. #[cfg(feature = "proto-ipv4")]
  1548. Ok(IpVersion::Ipv4) => {
  1549. let ipv4_packet = check!(Ipv4Packet::new_checked(ip_payload));
  1550. #[cfg(feature = "proto-ipv4-fragmentation")]
  1551. {
  1552. self.process_ipv4(sockets, &ipv4_packet, Some(&mut _fragments.ipv4_fragments))
  1553. }
  1554. #[cfg(not(feature = "proto-ipv4-fragmentation"))]
  1555. {
  1556. self.process_ipv4(sockets, &ipv4_packet, None)
  1557. }
  1558. }
  1559. #[cfg(feature = "proto-ipv6")]
  1560. Ok(IpVersion::Ipv6) => {
  1561. let ipv6_packet = check!(Ipv6Packet::new_checked(ip_payload));
  1562. self.process_ipv6(sockets, &ipv6_packet)
  1563. }
  1564. // Drop all other traffic.
  1565. _ => None,
  1566. }
  1567. }
  1568. #[cfg(feature = "socket-raw")]
  1569. fn raw_socket_filter<'frame>(
  1570. &mut self,
  1571. sockets: &mut SocketSet,
  1572. ip_repr: &IpRepr,
  1573. ip_payload: &'frame [u8],
  1574. ) -> bool {
  1575. let mut handled_by_raw_socket = false;
  1576. // Pass every IP packet to all raw sockets we have registered.
  1577. for raw_socket in sockets
  1578. .items_mut()
  1579. .filter_map(|i| raw::Socket::downcast_mut(&mut i.socket))
  1580. {
  1581. if raw_socket.accepts(ip_repr) {
  1582. raw_socket.process(self, ip_repr, ip_payload);
  1583. handled_by_raw_socket = true;
  1584. }
  1585. }
  1586. handled_by_raw_socket
  1587. }
  1588. /// Checks if an incoming packet has a broadcast address for the interfaces
  1589. /// associated ipv4 addresses.
  1590. #[cfg(feature = "proto-ipv4")]
  1591. fn is_subnet_broadcast(&self, address: Ipv4Address) -> bool {
  1592. self.ip_addrs
  1593. .iter()
  1594. .filter_map(|own_cidr| match own_cidr {
  1595. IpCidr::Ipv4(own_ip) => Some(own_ip.broadcast()?),
  1596. #[cfg(feature = "proto-ipv6")]
  1597. IpCidr::Ipv6(_) => None,
  1598. })
  1599. .any(|broadcast_address| address == broadcast_address)
  1600. }
  1601. /// Checks if an ipv4 address is broadcast, taking into account subnet broadcast addresses
  1602. #[cfg(feature = "proto-ipv4")]
  1603. fn is_broadcast_v4(&self, address: Ipv4Address) -> bool {
  1604. address.is_broadcast() || self.is_subnet_broadcast(address)
  1605. }
  1606. /// Checks if an ipv4 address is unicast, taking into account subnet broadcast addresses
  1607. #[cfg(feature = "proto-ipv4")]
  1608. fn is_unicast_v4(&self, address: Ipv4Address) -> bool {
  1609. address.is_unicast() && !self.is_subnet_broadcast(address)
  1610. }
  1611. #[cfg(any(feature = "socket-udp", feature = "socket-dns"))]
  1612. fn process_udp<'frame>(
  1613. &mut self,
  1614. sockets: &mut SocketSet,
  1615. ip_repr: IpRepr,
  1616. udp_repr: UdpRepr,
  1617. handled_by_raw_socket: bool,
  1618. udp_payload: &'frame [u8],
  1619. ip_payload: &'frame [u8],
  1620. ) -> Option<IpPacket<'frame>> {
  1621. #[cfg(feature = "socket-udp")]
  1622. for udp_socket in sockets
  1623. .items_mut()
  1624. .filter_map(|i| udp::Socket::downcast_mut(&mut i.socket))
  1625. {
  1626. if udp_socket.accepts(self, &ip_repr, &udp_repr) {
  1627. udp_socket.process(self, &ip_repr, &udp_repr, udp_payload);
  1628. return None;
  1629. }
  1630. }
  1631. #[cfg(feature = "socket-dns")]
  1632. for dns_socket in sockets
  1633. .items_mut()
  1634. .filter_map(|i| dns::Socket::downcast_mut(&mut i.socket))
  1635. {
  1636. if dns_socket.accepts(&ip_repr, &udp_repr) {
  1637. dns_socket.process(self, &ip_repr, &udp_repr, udp_payload);
  1638. return None;
  1639. }
  1640. }
  1641. // The packet wasn't handled by a socket, send an ICMP port unreachable packet.
  1642. match ip_repr {
  1643. #[cfg(feature = "proto-ipv4")]
  1644. IpRepr::Ipv4(_) if handled_by_raw_socket => None,
  1645. #[cfg(feature = "proto-ipv6")]
  1646. IpRepr::Ipv6(_) if handled_by_raw_socket => None,
  1647. #[cfg(feature = "proto-ipv4")]
  1648. IpRepr::Ipv4(ipv4_repr) => {
  1649. let payload_len =
  1650. icmp_reply_payload_len(ip_payload.len(), IPV4_MIN_MTU, ipv4_repr.buffer_len());
  1651. let icmpv4_reply_repr = Icmpv4Repr::DstUnreachable {
  1652. reason: Icmpv4DstUnreachable::PortUnreachable,
  1653. header: ipv4_repr,
  1654. data: &ip_payload[0..payload_len],
  1655. };
  1656. self.icmpv4_reply(ipv4_repr, icmpv4_reply_repr)
  1657. }
  1658. #[cfg(feature = "proto-ipv6")]
  1659. IpRepr::Ipv6(ipv6_repr) => {
  1660. let payload_len =
  1661. icmp_reply_payload_len(ip_payload.len(), IPV6_MIN_MTU, ipv6_repr.buffer_len());
  1662. let icmpv6_reply_repr = Icmpv6Repr::DstUnreachable {
  1663. reason: Icmpv6DstUnreachable::PortUnreachable,
  1664. header: ipv6_repr,
  1665. data: &ip_payload[0..payload_len],
  1666. };
  1667. self.icmpv6_reply(ipv6_repr, icmpv6_reply_repr)
  1668. }
  1669. }
  1670. }
  1671. #[cfg(feature = "socket-tcp")]
  1672. pub(crate) fn process_tcp<'frame>(
  1673. &mut self,
  1674. sockets: &mut SocketSet,
  1675. ip_repr: IpRepr,
  1676. ip_payload: &'frame [u8],
  1677. ) -> Option<IpPacket<'frame>> {
  1678. let (src_addr, dst_addr) = (ip_repr.src_addr(), ip_repr.dst_addr());
  1679. let tcp_packet = check!(TcpPacket::new_checked(ip_payload));
  1680. let tcp_repr = check!(TcpRepr::parse(
  1681. &tcp_packet,
  1682. &src_addr,
  1683. &dst_addr,
  1684. &self.caps.checksum
  1685. ));
  1686. for tcp_socket in sockets
  1687. .items_mut()
  1688. .filter_map(|i| tcp::Socket::downcast_mut(&mut i.socket))
  1689. {
  1690. if tcp_socket.accepts(self, &ip_repr, &tcp_repr) {
  1691. return tcp_socket
  1692. .process(self, &ip_repr, &tcp_repr)
  1693. .map(IpPacket::Tcp);
  1694. }
  1695. }
  1696. if tcp_repr.control == TcpControl::Rst {
  1697. // Never reply to a TCP RST packet with another TCP RST packet.
  1698. None
  1699. } else {
  1700. // The packet wasn't handled by a socket, send a TCP RST packet.
  1701. Some(IpPacket::Tcp(tcp::Socket::rst_reply(&ip_repr, &tcp_repr)))
  1702. }
  1703. }
  1704. #[cfg(feature = "medium-ethernet")]
  1705. fn dispatch<Tx>(
  1706. &mut self,
  1707. tx_token: Tx,
  1708. packet: EthernetPacket,
  1709. _out_packet: Option<&mut OutPackets<'_>>,
  1710. ) -> Result<()>
  1711. where
  1712. Tx: TxToken,
  1713. {
  1714. match packet {
  1715. #[cfg(feature = "proto-ipv4")]
  1716. EthernetPacket::Arp(arp_repr) => {
  1717. let dst_hardware_addr = match arp_repr {
  1718. ArpRepr::EthernetIpv4 {
  1719. target_hardware_addr,
  1720. ..
  1721. } => target_hardware_addr,
  1722. };
  1723. self.dispatch_ethernet(tx_token, arp_repr.buffer_len(), |mut frame| {
  1724. frame.set_dst_addr(dst_hardware_addr);
  1725. frame.set_ethertype(EthernetProtocol::Arp);
  1726. let mut packet = ArpPacket::new_unchecked(frame.payload_mut());
  1727. arp_repr.emit(&mut packet);
  1728. })
  1729. }
  1730. EthernetPacket::Ip(packet) => self.dispatch_ip(tx_token, packet, _out_packet),
  1731. }
  1732. }
  1733. fn in_same_network(&self, addr: &IpAddress) -> bool {
  1734. self.ip_addrs.iter().any(|cidr| cidr.contains_addr(addr))
  1735. }
  1736. fn route(&self, addr: &IpAddress, timestamp: Instant) -> Result<IpAddress> {
  1737. // Send directly.
  1738. if self.in_same_network(addr) || addr.is_broadcast() {
  1739. return Ok(*addr);
  1740. }
  1741. // Route via a router.
  1742. match self.routes.lookup(addr, timestamp) {
  1743. Some(router_addr) => Ok(router_addr),
  1744. None => Err(Error::Unaddressable),
  1745. }
  1746. }
  1747. fn has_neighbor(&self, addr: &IpAddress) -> bool {
  1748. match self.route(addr, self.now) {
  1749. Ok(_routed_addr) => match self.caps.medium {
  1750. #[cfg(feature = "medium-ethernet")]
  1751. Medium::Ethernet => self
  1752. .neighbor_cache
  1753. .as_ref()
  1754. .unwrap()
  1755. .lookup(&_routed_addr, self.now)
  1756. .found(),
  1757. #[cfg(feature = "medium-ieee802154")]
  1758. Medium::Ieee802154 => self
  1759. .neighbor_cache
  1760. .as_ref()
  1761. .unwrap()
  1762. .lookup(&_routed_addr, self.now)
  1763. .found(),
  1764. #[cfg(feature = "medium-ip")]
  1765. Medium::Ip => true,
  1766. },
  1767. Err(_) => false,
  1768. }
  1769. }
  1770. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  1771. fn lookup_hardware_addr<Tx>(
  1772. &mut self,
  1773. tx_token: Tx,
  1774. src_addr: &IpAddress,
  1775. dst_addr: &IpAddress,
  1776. ) -> Result<(HardwareAddress, Tx)>
  1777. where
  1778. Tx: TxToken,
  1779. {
  1780. if dst_addr.is_broadcast() {
  1781. let hardware_addr = match self.caps.medium {
  1782. #[cfg(feature = "medium-ethernet")]
  1783. Medium::Ethernet => HardwareAddress::Ethernet(EthernetAddress::BROADCAST),
  1784. #[cfg(feature = "medium-ieee802154")]
  1785. Medium::Ieee802154 => HardwareAddress::Ieee802154(Ieee802154Address::BROADCAST),
  1786. #[cfg(feature = "medium-ip")]
  1787. Medium::Ip => unreachable!(),
  1788. };
  1789. return Ok((hardware_addr, tx_token));
  1790. }
  1791. if dst_addr.is_multicast() {
  1792. let b = dst_addr.as_bytes();
  1793. let hardware_addr = match *dst_addr {
  1794. #[cfg(feature = "proto-ipv4")]
  1795. IpAddress::Ipv4(_addr) => {
  1796. HardwareAddress::Ethernet(EthernetAddress::from_bytes(&[
  1797. 0x01,
  1798. 0x00,
  1799. 0x5e,
  1800. b[1] & 0x7F,
  1801. b[2],
  1802. b[3],
  1803. ]))
  1804. }
  1805. #[cfg(feature = "proto-ipv6")]
  1806. IpAddress::Ipv6(_addr) => match self.caps.medium {
  1807. #[cfg(feature = "medium-ethernet")]
  1808. Medium::Ethernet => HardwareAddress::Ethernet(EthernetAddress::from_bytes(&[
  1809. 0x33, 0x33, b[12], b[13], b[14], b[15],
  1810. ])),
  1811. #[cfg(feature = "medium-ieee802154")]
  1812. Medium::Ieee802154 => {
  1813. // Not sure if this is correct
  1814. HardwareAddress::Ieee802154(Ieee802154Address::BROADCAST)
  1815. }
  1816. #[cfg(feature = "medium-ip")]
  1817. Medium::Ip => unreachable!(),
  1818. },
  1819. };
  1820. return Ok((hardware_addr, tx_token));
  1821. }
  1822. let dst_addr = self.route(dst_addr, self.now)?;
  1823. match self
  1824. .neighbor_cache
  1825. .as_mut()
  1826. .unwrap()
  1827. .lookup(&dst_addr, self.now)
  1828. {
  1829. NeighborAnswer::Found(hardware_addr) => return Ok((hardware_addr, tx_token)),
  1830. NeighborAnswer::RateLimited => return Err(Error::Unaddressable),
  1831. _ => (), // XXX
  1832. }
  1833. match (src_addr, dst_addr) {
  1834. #[cfg(feature = "proto-ipv4")]
  1835. (&IpAddress::Ipv4(src_addr), IpAddress::Ipv4(dst_addr)) => {
  1836. net_debug!(
  1837. "address {} not in neighbor cache, sending ARP request",
  1838. dst_addr
  1839. );
  1840. let src_hardware_addr =
  1841. if let Some(HardwareAddress::Ethernet(addr)) = self.hardware_addr {
  1842. addr
  1843. } else {
  1844. return Err(Error::Malformed);
  1845. };
  1846. let arp_repr = ArpRepr::EthernetIpv4 {
  1847. operation: ArpOperation::Request,
  1848. source_hardware_addr: src_hardware_addr,
  1849. source_protocol_addr: src_addr,
  1850. target_hardware_addr: EthernetAddress::BROADCAST,
  1851. target_protocol_addr: dst_addr,
  1852. };
  1853. self.dispatch_ethernet(tx_token, arp_repr.buffer_len(), |mut frame| {
  1854. frame.set_dst_addr(EthernetAddress::BROADCAST);
  1855. frame.set_ethertype(EthernetProtocol::Arp);
  1856. arp_repr.emit(&mut ArpPacket::new_unchecked(frame.payload_mut()))
  1857. })?;
  1858. }
  1859. #[cfg(feature = "proto-ipv6")]
  1860. (&IpAddress::Ipv6(src_addr), IpAddress::Ipv6(dst_addr)) => {
  1861. net_debug!(
  1862. "address {} not in neighbor cache, sending Neighbor Solicitation",
  1863. dst_addr
  1864. );
  1865. let solicit = Icmpv6Repr::Ndisc(NdiscRepr::NeighborSolicit {
  1866. target_addr: dst_addr,
  1867. lladdr: Some(self.hardware_addr.unwrap().into()),
  1868. });
  1869. let packet = IpPacket::Icmpv6((
  1870. Ipv6Repr {
  1871. src_addr,
  1872. dst_addr: dst_addr.solicited_node(),
  1873. next_header: IpProtocol::Icmpv6,
  1874. payload_len: solicit.buffer_len(),
  1875. hop_limit: 0xff,
  1876. },
  1877. solicit,
  1878. ));
  1879. self.dispatch_ip(tx_token, packet, None)?;
  1880. }
  1881. #[allow(unreachable_patterns)]
  1882. _ => (),
  1883. }
  1884. // The request got dispatched, limit the rate on the cache.
  1885. self.neighbor_cache.as_mut().unwrap().limit_rate(self.now);
  1886. Err(Error::Unaddressable)
  1887. }
  1888. fn flush_cache(&mut self) {
  1889. #[cfg(any(feature = "medium-ethernet", feature = "medium-ieee802154"))]
  1890. if let Some(cache) = self.neighbor_cache.as_mut() {
  1891. cache.flush()
  1892. }
  1893. }
  1894. fn dispatch_ip<Tx: TxToken>(
  1895. &mut self,
  1896. tx_token: Tx,
  1897. packet: IpPacket,
  1898. _out_packet: Option<&mut OutPackets<'_>>,
  1899. ) -> Result<()> {
  1900. let mut ip_repr = packet.ip_repr();
  1901. assert!(!ip_repr.dst_addr().is_unspecified());
  1902. // Dispatch IEEE802.15.4:
  1903. #[cfg(feature = "medium-ieee802154")]
  1904. if matches!(self.caps.medium, Medium::Ieee802154) {
  1905. let (dst_hardware_addr, tx_token) = match self.lookup_hardware_addr(
  1906. tx_token,
  1907. &ip_repr.src_addr(),
  1908. &ip_repr.dst_addr(),
  1909. )? {
  1910. (HardwareAddress::Ieee802154(addr), tx_token) => (addr, tx_token),
  1911. _ => unreachable!(),
  1912. };
  1913. return self.dispatch_ieee802154(dst_hardware_addr, tx_token, packet, _out_packet);
  1914. }
  1915. // Dispatch IP/Ethernet:
  1916. let caps = self.caps.clone();
  1917. #[cfg(feature = "proto-ipv4-fragmentation")]
  1918. let ipv4_id = self.get_ipv4_ident();
  1919. // First we calculate the total length that we will have to emit.
  1920. let mut total_len = ip_repr.buffer_len();
  1921. // Add the size of the Ethernet header if the medium is Ethernet.
  1922. #[cfg(feature = "medium-ethernet")]
  1923. if matches!(self.caps.medium, Medium::Ethernet) {
  1924. total_len = EthernetFrame::<&[u8]>::buffer_len(total_len);
  1925. }
  1926. // If the medium is Ethernet, then we need to retrieve the destination hardware address.
  1927. #[cfg(feature = "medium-ethernet")]
  1928. let (dst_hardware_addr, tx_token) = match self.caps.medium {
  1929. Medium::Ethernet => {
  1930. match self.lookup_hardware_addr(
  1931. tx_token,
  1932. &ip_repr.src_addr(),
  1933. &ip_repr.dst_addr(),
  1934. )? {
  1935. (HardwareAddress::Ethernet(addr), tx_token) => (addr, tx_token),
  1936. #[cfg(feature = "medium-ieee802154")]
  1937. (HardwareAddress::Ieee802154(_), _) => unreachable!(),
  1938. }
  1939. }
  1940. _ => (EthernetAddress([0; 6]), tx_token),
  1941. };
  1942. // Emit function for the Ethernet header.
  1943. #[cfg(feature = "medium-ethernet")]
  1944. let emit_ethernet = |repr: &IpRepr, tx_buffer: &mut [u8]| {
  1945. let mut frame = EthernetFrame::new_unchecked(tx_buffer);
  1946. let src_addr = if let Some(HardwareAddress::Ethernet(addr)) = self.hardware_addr {
  1947. addr
  1948. } else {
  1949. return Err(Error::Malformed);
  1950. };
  1951. frame.set_src_addr(src_addr);
  1952. frame.set_dst_addr(dst_hardware_addr);
  1953. match repr.version() {
  1954. #[cfg(feature = "proto-ipv4")]
  1955. IpVersion::Ipv4 => frame.set_ethertype(EthernetProtocol::Ipv4),
  1956. #[cfg(feature = "proto-ipv6")]
  1957. IpVersion::Ipv6 => frame.set_ethertype(EthernetProtocol::Ipv6),
  1958. }
  1959. Ok(())
  1960. };
  1961. // Emit function for the IP header and payload.
  1962. let emit_ip = |repr: &IpRepr, mut tx_buffer: &mut [u8]| {
  1963. repr.emit(&mut tx_buffer, &self.caps.checksum);
  1964. let payload = &mut tx_buffer[repr.header_len()..];
  1965. packet.emit_payload(repr, payload, &caps);
  1966. };
  1967. let total_ip_len = ip_repr.buffer_len();
  1968. match ip_repr {
  1969. #[cfg(feature = "proto-ipv4")]
  1970. IpRepr::Ipv4(ref mut repr) => {
  1971. // If we have an IPv4 packet, then we need to check if we need to fragment it.
  1972. if total_ip_len > self.caps.max_transmission_unit {
  1973. #[cfg(feature = "proto-ipv4-fragmentation")]
  1974. {
  1975. net_debug!("start fragmentation");
  1976. let Ipv4OutPacket {
  1977. buffer,
  1978. packet_len,
  1979. sent_bytes,
  1980. repr: out_packet_repr,
  1981. frag_offset,
  1982. ident,
  1983. #[cfg(feature = "medium-ethernet")]
  1984. dst_hardware_addr: dst_address,
  1985. } = &mut _out_packet.unwrap().ipv4_out_packet;
  1986. // Calculate how much we will send now (including the Ethernet header).
  1987. let tx_len = self.caps.max_transmission_unit;
  1988. let ip_header_len = repr.buffer_len();
  1989. let first_frag_ip_len = self.caps.ip_mtu();
  1990. if buffer.len() < first_frag_ip_len {
  1991. net_debug!(
  1992. "Fragmentation buffer is too small, at least {} needed",
  1993. first_frag_ip_len
  1994. );
  1995. return Err(Error::Exhausted);
  1996. }
  1997. #[cfg(feature = "medium-ethernet")]
  1998. {
  1999. *dst_address = dst_hardware_addr;
  2000. }
  2001. // Save the total packet len (without the Ethernet header, but with the first
  2002. // IP header).
  2003. *packet_len = total_ip_len;
  2004. // Save the IP header for other fragments.
  2005. *out_packet_repr = *repr;
  2006. // Save how much bytes we will send now.
  2007. *sent_bytes = first_frag_ip_len;
  2008. // Modify the IP header
  2009. repr.payload_len = first_frag_ip_len - repr.buffer_len();
  2010. // Emit the IP header to the buffer.
  2011. emit_ip(&ip_repr, buffer);
  2012. let mut ipv4_packet = Ipv4Packet::new_unchecked(&mut buffer[..]);
  2013. *ident = ipv4_id;
  2014. ipv4_packet.set_ident(ipv4_id);
  2015. ipv4_packet.set_more_frags(true);
  2016. ipv4_packet.set_dont_frag(false);
  2017. ipv4_packet.set_frag_offset(0);
  2018. if caps.checksum.ipv4.tx() {
  2019. ipv4_packet.fill_checksum();
  2020. }
  2021. // Transmit the first packet.
  2022. tx_token.consume(self.now, tx_len, |mut tx_buffer| {
  2023. #[cfg(feature = "medium-ethernet")]
  2024. if matches!(self.caps.medium, Medium::Ethernet) {
  2025. emit_ethernet(&ip_repr, tx_buffer)?;
  2026. tx_buffer = &mut tx_buffer[EthernetFrame::<&[u8]>::header_len()..];
  2027. }
  2028. // Change the offset for the next packet.
  2029. *frag_offset = (first_frag_ip_len - ip_header_len) as u16;
  2030. // Copy the IP header and the payload.
  2031. tx_buffer[..first_frag_ip_len]
  2032. .copy_from_slice(&buffer[..first_frag_ip_len]);
  2033. Ok(())
  2034. })
  2035. }
  2036. #[cfg(not(feature = "proto-ipv4-fragmentation"))]
  2037. {
  2038. net_debug!("Enable the `proto-ipv4-fragmentation` feature for fragmentation support.");
  2039. Ok(())
  2040. }
  2041. } else {
  2042. // No fragmentation is required.
  2043. tx_token.consume(self.now, total_len, |mut tx_buffer| {
  2044. #[cfg(feature = "medium-ethernet")]
  2045. if matches!(self.caps.medium, Medium::Ethernet) {
  2046. emit_ethernet(&ip_repr, tx_buffer)?;
  2047. tx_buffer = &mut tx_buffer[EthernetFrame::<&[u8]>::header_len()..];
  2048. }
  2049. emit_ip(&ip_repr, tx_buffer);
  2050. Ok(())
  2051. })
  2052. }
  2053. }
  2054. // We don't support IPv6 fragmentation yet.
  2055. #[cfg(feature = "proto-ipv6")]
  2056. IpRepr::Ipv6(_) => tx_token.consume(self.now, total_len, |mut tx_buffer| {
  2057. #[cfg(feature = "medium-ethernet")]
  2058. if matches!(self.caps.medium, Medium::Ethernet) {
  2059. emit_ethernet(&ip_repr, tx_buffer)?;
  2060. tx_buffer = &mut tx_buffer[EthernetFrame::<&[u8]>::header_len()..];
  2061. }
  2062. emit_ip(&ip_repr, tx_buffer);
  2063. Ok(())
  2064. }),
  2065. }
  2066. }
  2067. }