dhcpv4.rs 46 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345
  1. #[cfg(feature = "async")]
  2. use core::task::Waker;
  3. use crate::iface::Context;
  4. use crate::time::{Duration, Instant};
  5. use crate::wire::dhcpv4::field as dhcpv4_field;
  6. use crate::wire::{
  7. DhcpMessageType, DhcpPacket, DhcpRepr, IpAddress, IpProtocol, Ipv4Address, Ipv4Cidr, Ipv4Repr,
  8. UdpRepr, DHCP_CLIENT_PORT, DHCP_MAX_DNS_SERVER_COUNT, DHCP_SERVER_PORT, UDP_HEADER_LEN,
  9. };
  10. use crate::wire::{DhcpOption, HardwareAddress};
  11. use heapless::Vec;
  12. #[cfg(feature = "async")]
  13. use super::WakerRegistration;
  14. use super::PollAt;
  15. const DEFAULT_LEASE_DURATION: Duration = Duration::from_secs(120);
  16. const DEFAULT_PARAMETER_REQUEST_LIST: &[u8] = &[
  17. dhcpv4_field::OPT_SUBNET_MASK,
  18. dhcpv4_field::OPT_ROUTER,
  19. dhcpv4_field::OPT_DOMAIN_NAME_SERVER,
  20. ];
  21. /// IPv4 configuration data provided by the DHCP server.
  22. #[derive(Debug, Eq, PartialEq, Clone)]
  23. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  24. pub struct Config<'a> {
  25. /// Information on how to reach the DHCP server that responded with DHCP
  26. /// configuration.
  27. pub server: ServerInfo,
  28. /// IP address
  29. pub address: Ipv4Cidr,
  30. /// Router address, also known as default gateway. Does not necessarily
  31. /// match the DHCP server's address.
  32. pub router: Option<Ipv4Address>,
  33. /// DNS servers
  34. pub dns_servers: Vec<Ipv4Address, DHCP_MAX_DNS_SERVER_COUNT>,
  35. /// Received DHCP packet
  36. pub packet: Option<DhcpPacket<&'a [u8]>>,
  37. }
  38. /// Information on how to reach a DHCP server.
  39. #[derive(Debug, Clone, Copy, Eq, PartialEq)]
  40. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  41. pub struct ServerInfo {
  42. /// IP address to use as destination in outgoing packets
  43. pub address: Ipv4Address,
  44. /// Server identifier to use in outgoing packets. Usually equal to server_address,
  45. /// but may differ in some situations (eg DHCP relays)
  46. pub identifier: Ipv4Address,
  47. }
  48. #[derive(Debug)]
  49. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  50. struct DiscoverState {
  51. /// When to send next request
  52. retry_at: Instant,
  53. }
  54. #[derive(Debug)]
  55. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  56. struct RequestState {
  57. /// When to send next request
  58. retry_at: Instant,
  59. /// How many retries have been done
  60. retry: u16,
  61. /// Server we're trying to request from
  62. server: ServerInfo,
  63. /// IP address that we're trying to request.
  64. requested_ip: Ipv4Address,
  65. }
  66. #[derive(Debug)]
  67. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  68. struct RenewState {
  69. /// Active network config
  70. config: Config<'static>,
  71. /// Renew timer. When reached, we will start attempting
  72. /// to renew this lease with the DHCP server.
  73. ///
  74. /// Must be less or equal than `rebind_at`.
  75. renew_at: Instant,
  76. /// Rebind timer. When reached, we will start broadcasting to renew
  77. /// this lease with any DHCP server.
  78. ///
  79. /// Must be greater than or equal to `renew_at`, and less than or
  80. /// equal to `expires_at`.
  81. rebind_at: Instant,
  82. /// Whether the T2 time has elapsed
  83. rebinding: bool,
  84. /// Expiration timer. When reached, this lease is no longer valid, so it must be
  85. /// thrown away and the ethernet interface deconfigured.
  86. expires_at: Instant,
  87. }
  88. #[derive(Debug)]
  89. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  90. enum ClientState {
  91. /// Discovering the DHCP server
  92. Discovering(DiscoverState),
  93. /// Requesting an address
  94. Requesting(RequestState),
  95. /// Having an address, refresh it periodically.
  96. Renewing(RenewState),
  97. }
  98. /// Timeout and retry configuration.
  99. #[derive(Debug, PartialEq, Eq, Copy, Clone)]
  100. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  101. pub struct RetryConfig {
  102. pub discover_timeout: Duration,
  103. /// The REQUEST timeout doubles every 2 tries.
  104. pub initial_request_timeout: Duration,
  105. pub request_retries: u16,
  106. pub min_renew_timeout: Duration,
  107. }
  108. impl Default for RetryConfig {
  109. fn default() -> Self {
  110. Self {
  111. discover_timeout: Duration::from_secs(10),
  112. initial_request_timeout: Duration::from_secs(5),
  113. request_retries: 5,
  114. min_renew_timeout: Duration::from_secs(60),
  115. }
  116. }
  117. }
  118. /// Return value for the `Dhcpv4Socket::poll` function
  119. #[derive(Debug, PartialEq, Eq)]
  120. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  121. pub enum Event<'a> {
  122. /// Configuration has been lost (for example, the lease has expired)
  123. Deconfigured,
  124. /// Configuration has been newly acquired, or modified.
  125. Configured(Config<'a>),
  126. }
  127. #[derive(Debug)]
  128. pub struct Socket<'a> {
  129. /// State of the DHCP client.
  130. state: ClientState,
  131. /// Set to true on config/state change, cleared back to false by the `config` function.
  132. config_changed: bool,
  133. /// xid of the last sent message.
  134. transaction_id: u32,
  135. /// Max lease duration. If set, it sets a maximum cap to the server-provided lease duration.
  136. /// Useful to react faster to IP configuration changes and to test whether renews work correctly.
  137. max_lease_duration: Option<Duration>,
  138. retry_config: RetryConfig,
  139. /// Ignore NAKs.
  140. ignore_naks: bool,
  141. /// Server port config
  142. pub(crate) server_port: u16,
  143. /// Client port config
  144. pub(crate) client_port: u16,
  145. /// A buffer contains options additional to be added to outgoing DHCP
  146. /// packets.
  147. outgoing_options: &'a [DhcpOption<'a>],
  148. /// A buffer containing all requested parameters.
  149. parameter_request_list: Option<&'a [u8]>,
  150. /// Incoming DHCP packets are copied into this buffer, overwriting the previous.
  151. receive_packet_buffer: Option<&'a mut [u8]>,
  152. /// Waker registration
  153. #[cfg(feature = "async")]
  154. waker: WakerRegistration,
  155. }
  156. /// DHCP client socket.
  157. ///
  158. /// The socket acquires an IP address configuration through DHCP autonomously.
  159. /// You must query the configuration with `.poll()` after every call to `Interface::poll()`,
  160. /// and apply the configuration to the `Interface`.
  161. impl<'a> Socket<'a> {
  162. /// Create a DHCPv4 socket
  163. #[allow(clippy::new_without_default)]
  164. pub fn new() -> Self {
  165. Socket {
  166. state: ClientState::Discovering(DiscoverState {
  167. retry_at: Instant::from_millis(0),
  168. }),
  169. config_changed: true,
  170. transaction_id: 1,
  171. max_lease_duration: None,
  172. retry_config: RetryConfig::default(),
  173. ignore_naks: false,
  174. outgoing_options: &[],
  175. parameter_request_list: None,
  176. receive_packet_buffer: None,
  177. #[cfg(feature = "async")]
  178. waker: WakerRegistration::new(),
  179. server_port: DHCP_SERVER_PORT,
  180. client_port: DHCP_CLIENT_PORT,
  181. }
  182. }
  183. /// Set the retry/timeouts configuration.
  184. pub fn set_retry_config(&mut self, config: RetryConfig) {
  185. self.retry_config = config;
  186. }
  187. /// Set the outgoing options.
  188. pub fn set_outgoing_options(&mut self, options: &'a [DhcpOption<'a>]) {
  189. self.outgoing_options = options;
  190. }
  191. /// Set the buffer into which incoming DHCP packets are copied into.
  192. pub fn set_receive_packet_buffer(&mut self, buffer: &'a mut [u8]) {
  193. self.receive_packet_buffer = Some(buffer);
  194. }
  195. /// Set the parameter request list.
  196. ///
  197. /// This should contain at least `OPT_SUBNET_MASK` (`1`), `OPT_ROUTER`
  198. /// (`3`), and `OPT_DOMAIN_NAME_SERVER` (`6`).
  199. pub fn set_parameter_request_list(&mut self, parameter_request_list: &'a [u8]) {
  200. self.parameter_request_list = Some(parameter_request_list);
  201. }
  202. /// Get the configured max lease duration.
  203. ///
  204. /// See also [`Self::set_max_lease_duration()`]
  205. pub fn max_lease_duration(&self) -> Option<Duration> {
  206. self.max_lease_duration
  207. }
  208. /// Set the max lease duration.
  209. ///
  210. /// When set, the lease duration will be capped at the configured duration if the
  211. /// DHCP server gives us a longer lease. This is generally not recommended, but
  212. /// can be useful for debugging or reacting faster to network configuration changes.
  213. ///
  214. /// If None, no max is applied (the lease duration from the DHCP server is used.)
  215. pub fn set_max_lease_duration(&mut self, max_lease_duration: Option<Duration>) {
  216. self.max_lease_duration = max_lease_duration;
  217. }
  218. /// Get whether to ignore NAKs.
  219. ///
  220. /// See also [`Self::set_ignore_naks()`]
  221. pub fn ignore_naks(&self) -> bool {
  222. self.ignore_naks
  223. }
  224. /// Set whether to ignore NAKs.
  225. ///
  226. /// This is not compliant with the DHCP RFCs, since theoretically
  227. /// we must stop using the assigned IP when receiving a NAK. This
  228. /// can increase reliability on broken networks with buggy routers
  229. /// or rogue DHCP servers, however.
  230. pub fn set_ignore_naks(&mut self, ignore_naks: bool) {
  231. self.ignore_naks = ignore_naks;
  232. }
  233. /// Set the server/client port
  234. ///
  235. /// Allows you to specify the ports used by DHCP.
  236. /// This is meant to support esoteric usecases allowed by the dhclient program.
  237. pub fn set_ports(&mut self, server_port: u16, client_port: u16) {
  238. self.server_port = server_port;
  239. self.client_port = client_port;
  240. }
  241. pub(crate) fn poll_at(&self, _cx: &mut Context) -> PollAt {
  242. let t = match &self.state {
  243. ClientState::Discovering(state) => state.retry_at,
  244. ClientState::Requesting(state) => state.retry_at,
  245. ClientState::Renewing(state) => if state.rebinding {
  246. state.rebind_at
  247. } else {
  248. state.renew_at.min(state.rebind_at)
  249. }
  250. .min(state.expires_at),
  251. };
  252. PollAt::Time(t)
  253. }
  254. pub(crate) fn process(
  255. &mut self,
  256. cx: &mut Context,
  257. ip_repr: &Ipv4Repr,
  258. repr: &UdpRepr,
  259. payload: &[u8],
  260. ) {
  261. let src_ip = ip_repr.src_addr;
  262. // This is enforced in interface.rs.
  263. assert!(repr.src_port == self.server_port && repr.dst_port == self.client_port);
  264. let dhcp_packet = match DhcpPacket::new_checked(payload) {
  265. Ok(dhcp_packet) => dhcp_packet,
  266. Err(e) => {
  267. net_debug!("DHCP invalid pkt from {}: {:?}", src_ip, e);
  268. return;
  269. }
  270. };
  271. let dhcp_repr = match DhcpRepr::parse(&dhcp_packet) {
  272. Ok(dhcp_repr) => dhcp_repr,
  273. Err(e) => {
  274. net_debug!("DHCP error parsing pkt from {}: {:?}", src_ip, e);
  275. return;
  276. }
  277. };
  278. let Some(HardwareAddress::Ethernet(ethernet_addr)) = cx.hardware_addr() else {
  279. panic!("using DHCPv4 socket with a non-ethernet hardware address.");
  280. };
  281. if dhcp_repr.client_hardware_address != ethernet_addr {
  282. return;
  283. }
  284. if dhcp_repr.transaction_id != self.transaction_id {
  285. return;
  286. }
  287. let server_identifier = match dhcp_repr.server_identifier {
  288. Some(server_identifier) => server_identifier,
  289. None => {
  290. net_debug!(
  291. "DHCP ignoring {:?} because missing server_identifier",
  292. dhcp_repr.message_type
  293. );
  294. return;
  295. }
  296. };
  297. net_debug!(
  298. "DHCP recv {:?} from {}: {:?}",
  299. dhcp_repr.message_type,
  300. src_ip,
  301. dhcp_repr
  302. );
  303. // Copy over the payload into the receive packet buffer.
  304. if let Some(buffer) = self.receive_packet_buffer.as_mut() {
  305. if let Some(buffer) = buffer.get_mut(..payload.len()) {
  306. buffer.copy_from_slice(payload);
  307. }
  308. }
  309. match (&mut self.state, dhcp_repr.message_type) {
  310. (ClientState::Discovering(_state), DhcpMessageType::Offer) => {
  311. if !dhcp_repr.your_ip.is_unicast() {
  312. net_debug!("DHCP ignoring OFFER because your_ip is not unicast");
  313. return;
  314. }
  315. self.state = ClientState::Requesting(RequestState {
  316. retry_at: cx.now(),
  317. retry: 0,
  318. server: ServerInfo {
  319. address: src_ip,
  320. identifier: server_identifier,
  321. },
  322. requested_ip: dhcp_repr.your_ip, // use the offered ip
  323. });
  324. }
  325. (ClientState::Requesting(state), DhcpMessageType::Ack) => {
  326. if let Some((config, renew_at, rebind_at, expires_at)) =
  327. Self::parse_ack(cx.now(), &dhcp_repr, self.max_lease_duration, state.server)
  328. {
  329. self.state = ClientState::Renewing(RenewState {
  330. config,
  331. renew_at,
  332. rebind_at,
  333. expires_at,
  334. rebinding: false,
  335. });
  336. self.config_changed();
  337. }
  338. }
  339. (ClientState::Requesting(_), DhcpMessageType::Nak) => {
  340. if !self.ignore_naks {
  341. self.reset();
  342. }
  343. }
  344. (ClientState::Renewing(state), DhcpMessageType::Ack) => {
  345. if let Some((config, renew_at, rebind_at, expires_at)) = Self::parse_ack(
  346. cx.now(),
  347. &dhcp_repr,
  348. self.max_lease_duration,
  349. state.config.server,
  350. ) {
  351. state.renew_at = renew_at;
  352. state.rebind_at = rebind_at;
  353. state.rebinding = false;
  354. state.expires_at = expires_at;
  355. // The `receive_packet_buffer` field isn't populated until
  356. // the client asks for the state, but receiving any packet
  357. // will change it, so we indicate that the config has
  358. // changed every time if the receive packet buffer is set,
  359. // but we only write changes to the rest of the config now.
  360. let config_changed =
  361. state.config != config || self.receive_packet_buffer.is_some();
  362. if state.config != config {
  363. state.config = config;
  364. }
  365. if config_changed {
  366. self.config_changed();
  367. }
  368. }
  369. }
  370. (ClientState::Renewing(_), DhcpMessageType::Nak) => {
  371. if !self.ignore_naks {
  372. self.reset();
  373. }
  374. }
  375. _ => {
  376. net_debug!(
  377. "DHCP ignoring {:?}: unexpected in current state",
  378. dhcp_repr.message_type
  379. );
  380. }
  381. }
  382. }
  383. fn parse_ack(
  384. now: Instant,
  385. dhcp_repr: &DhcpRepr,
  386. max_lease_duration: Option<Duration>,
  387. server: ServerInfo,
  388. ) -> Option<(Config<'static>, Instant, Instant, Instant)> {
  389. let subnet_mask = match dhcp_repr.subnet_mask {
  390. Some(subnet_mask) => subnet_mask,
  391. None => {
  392. net_debug!("DHCP ignoring ACK because missing subnet_mask");
  393. return None;
  394. }
  395. };
  396. let prefix_len = match IpAddress::Ipv4(subnet_mask).prefix_len() {
  397. Some(prefix_len) => prefix_len,
  398. None => {
  399. net_debug!("DHCP ignoring ACK because subnet_mask is not a valid mask");
  400. return None;
  401. }
  402. };
  403. if !dhcp_repr.your_ip.is_unicast() {
  404. net_debug!("DHCP ignoring ACK because your_ip is not unicast");
  405. return None;
  406. }
  407. let mut lease_duration = dhcp_repr
  408. .lease_duration
  409. .map(|d| Duration::from_secs(d as _))
  410. .unwrap_or(DEFAULT_LEASE_DURATION);
  411. if let Some(max_lease_duration) = max_lease_duration {
  412. lease_duration = lease_duration.min(max_lease_duration);
  413. }
  414. // Cleanup the DNS servers list, keeping only unicasts/
  415. // TP-Link TD-W8970 sends 0.0.0.0 as second DNS server if there's only one configured :(
  416. let mut dns_servers = Vec::new();
  417. dhcp_repr
  418. .dns_servers
  419. .iter()
  420. .flatten()
  421. .filter(|s| s.is_unicast())
  422. .for_each(|a| {
  423. // This will never produce an error, as both the arrays and `dns_servers`
  424. // have length DHCP_MAX_DNS_SERVER_COUNT
  425. dns_servers.push(*a).ok();
  426. });
  427. let config = Config {
  428. server,
  429. address: Ipv4Cidr::new(dhcp_repr.your_ip, prefix_len),
  430. router: dhcp_repr.router,
  431. dns_servers,
  432. packet: None,
  433. };
  434. // Set renew and rebind times as per RFC 2131:
  435. // Times T1 and T2 are configurable by the server through
  436. // options. T1 defaults to (0.5 * duration_of_lease). T2
  437. // defaults to (0.875 * duration_of_lease).
  438. let (renew_duration, rebind_duration) = match (
  439. dhcp_repr
  440. .renew_duration
  441. .map(|d| Duration::from_secs(d as u64)),
  442. dhcp_repr
  443. .rebind_duration
  444. .map(|d| Duration::from_secs(d as u64)),
  445. ) {
  446. (Some(renew_duration), Some(rebind_duration)) => (renew_duration, rebind_duration),
  447. (None, None) => (lease_duration / 2, lease_duration * 7 / 8),
  448. // RFC 2131 does not say what to do if only one value is
  449. // provided, so:
  450. // If only T1 is provided, set T2 to be 0.75 through the gap
  451. // between T1 and the duration of the lease. If T1 is set to
  452. // the default (0.5 * duration_of_lease), then T2 will also
  453. // be set to the default (0.875 * duration_of_lease).
  454. (Some(renew_duration), None) => (
  455. renew_duration,
  456. renew_duration + (lease_duration - renew_duration) * 3 / 4,
  457. ),
  458. // If only T2 is provided, then T1 will be set to be
  459. // whichever is smaller of the default (0.5 *
  460. // duration_of_lease) or T2.
  461. (None, Some(rebind_duration)) => {
  462. ((lease_duration / 2).min(rebind_duration), rebind_duration)
  463. }
  464. };
  465. let renew_at = now + renew_duration;
  466. let rebind_at = now + rebind_duration;
  467. let expires_at = now + lease_duration;
  468. Some((config, renew_at, rebind_at, expires_at))
  469. }
  470. #[cfg(not(test))]
  471. fn random_transaction_id(cx: &mut Context) -> u32 {
  472. cx.rand().rand_u32()
  473. }
  474. #[cfg(test)]
  475. fn random_transaction_id(_cx: &mut Context) -> u32 {
  476. 0x12345678
  477. }
  478. pub(crate) fn dispatch<F, E>(&mut self, cx: &mut Context, emit: F) -> Result<(), E>
  479. where
  480. F: FnOnce(&mut Context, (Ipv4Repr, UdpRepr, DhcpRepr)) -> Result<(), E>,
  481. {
  482. // note: Dhcpv4Socket is only usable in ethernet mediums, so the
  483. // unwrap can never fail.
  484. let Some(HardwareAddress::Ethernet(ethernet_addr)) = cx.hardware_addr() else {
  485. panic!("using DHCPv4 socket with a non-ethernet hardware address.");
  486. };
  487. // Worst case biggest IPv4 header length.
  488. // 0x0f * 4 = 60 bytes.
  489. const MAX_IPV4_HEADER_LEN: usize = 60;
  490. // We don't directly modify self.transaction_id because sending the packet
  491. // may fail. We only want to update state after succesfully sending.
  492. let next_transaction_id = Self::random_transaction_id(cx);
  493. let mut dhcp_repr = DhcpRepr {
  494. message_type: DhcpMessageType::Discover,
  495. transaction_id: next_transaction_id,
  496. secs: 0,
  497. client_hardware_address: ethernet_addr,
  498. client_ip: Ipv4Address::UNSPECIFIED,
  499. your_ip: Ipv4Address::UNSPECIFIED,
  500. server_ip: Ipv4Address::UNSPECIFIED,
  501. router: None,
  502. subnet_mask: None,
  503. relay_agent_ip: Ipv4Address::UNSPECIFIED,
  504. broadcast: false,
  505. requested_ip: None,
  506. client_identifier: Some(ethernet_addr),
  507. server_identifier: None,
  508. parameter_request_list: Some(
  509. self.parameter_request_list
  510. .unwrap_or(DEFAULT_PARAMETER_REQUEST_LIST),
  511. ),
  512. max_size: Some((cx.ip_mtu() - MAX_IPV4_HEADER_LEN - UDP_HEADER_LEN) as u16),
  513. lease_duration: None,
  514. renew_duration: None,
  515. rebind_duration: None,
  516. dns_servers: None,
  517. additional_options: self.outgoing_options,
  518. };
  519. let udp_repr = UdpRepr {
  520. src_port: self.client_port,
  521. dst_port: self.server_port,
  522. };
  523. let mut ipv4_repr = Ipv4Repr {
  524. src_addr: Ipv4Address::UNSPECIFIED,
  525. dst_addr: Ipv4Address::BROADCAST,
  526. next_header: IpProtocol::Udp,
  527. payload_len: 0, // filled right before emit
  528. hop_limit: 64,
  529. };
  530. match &mut self.state {
  531. ClientState::Discovering(state) => {
  532. if cx.now() < state.retry_at {
  533. return Ok(());
  534. }
  535. // send packet
  536. net_debug!(
  537. "DHCP send DISCOVER to {}: {:?}",
  538. ipv4_repr.dst_addr,
  539. dhcp_repr
  540. );
  541. ipv4_repr.payload_len = udp_repr.header_len() + dhcp_repr.buffer_len();
  542. emit(cx, (ipv4_repr, udp_repr, dhcp_repr))?;
  543. // Update state AFTER the packet has been successfully sent.
  544. state.retry_at = cx.now() + self.retry_config.discover_timeout;
  545. self.transaction_id = next_transaction_id;
  546. Ok(())
  547. }
  548. ClientState::Requesting(state) => {
  549. if cx.now() < state.retry_at {
  550. return Ok(());
  551. }
  552. if state.retry >= self.retry_config.request_retries {
  553. net_debug!("DHCP request retries exceeded, restarting discovery");
  554. self.reset();
  555. return Ok(());
  556. }
  557. dhcp_repr.message_type = DhcpMessageType::Request;
  558. dhcp_repr.requested_ip = Some(state.requested_ip);
  559. dhcp_repr.server_identifier = Some(state.server.identifier);
  560. net_debug!(
  561. "DHCP send request to {}: {:?}",
  562. ipv4_repr.dst_addr,
  563. dhcp_repr
  564. );
  565. ipv4_repr.payload_len = udp_repr.header_len() + dhcp_repr.buffer_len();
  566. emit(cx, (ipv4_repr, udp_repr, dhcp_repr))?;
  567. // Exponential backoff: Double every 2 retries.
  568. state.retry_at = cx.now()
  569. + (self.retry_config.initial_request_timeout << (state.retry as u32 / 2));
  570. state.retry += 1;
  571. self.transaction_id = next_transaction_id;
  572. Ok(())
  573. }
  574. ClientState::Renewing(state) => {
  575. let now = cx.now();
  576. if state.expires_at <= now {
  577. net_debug!("DHCP lease expired");
  578. self.reset();
  579. // return Ok so we get polled again
  580. return Ok(());
  581. }
  582. if now < state.renew_at || state.rebinding && now < state.rebind_at {
  583. return Ok(());
  584. }
  585. state.rebinding |= now >= state.rebind_at;
  586. ipv4_repr.src_addr = state.config.address.address();
  587. // Renewing is unicast to the original server, rebinding is broadcast
  588. if !state.rebinding {
  589. ipv4_repr.dst_addr = state.config.server.address;
  590. }
  591. dhcp_repr.message_type = DhcpMessageType::Request;
  592. dhcp_repr.client_ip = state.config.address.address();
  593. net_debug!("DHCP send renew to {}: {:?}", ipv4_repr.dst_addr, dhcp_repr);
  594. ipv4_repr.payload_len = udp_repr.header_len() + dhcp_repr.buffer_len();
  595. emit(cx, (ipv4_repr, udp_repr, dhcp_repr))?;
  596. // In both RENEWING and REBINDING states, if the client receives no
  597. // response to its DHCPREQUEST message, the client SHOULD wait one-half
  598. // of the remaining time until T2 (in RENEWING state) and one-half of
  599. // the remaining lease time (in REBINDING state), down to a minimum of
  600. // 60 seconds, before retransmitting the DHCPREQUEST message.
  601. if state.rebinding {
  602. state.rebind_at = now
  603. + self
  604. .retry_config
  605. .min_renew_timeout
  606. .max((state.expires_at - now) / 2);
  607. } else {
  608. state.renew_at = now
  609. + self
  610. .retry_config
  611. .min_renew_timeout
  612. .max((state.rebind_at - now) / 2)
  613. .min(state.rebind_at - now);
  614. }
  615. self.transaction_id = next_transaction_id;
  616. Ok(())
  617. }
  618. }
  619. }
  620. /// Reset state and restart discovery phase.
  621. ///
  622. /// Use this to speed up acquisition of an address in a new
  623. /// network if a link was down and it is now back up.
  624. pub fn reset(&mut self) {
  625. net_trace!("DHCP reset");
  626. if let ClientState::Renewing(_) = &self.state {
  627. self.config_changed();
  628. }
  629. self.state = ClientState::Discovering(DiscoverState {
  630. retry_at: Instant::from_millis(0),
  631. });
  632. }
  633. /// Query the socket for configuration changes.
  634. ///
  635. /// The socket has an internal "configuration changed" flag. If
  636. /// set, this function returns the configuration and resets the flag.
  637. pub fn poll(&mut self) -> Option<Event> {
  638. if !self.config_changed {
  639. None
  640. } else if let ClientState::Renewing(state) = &self.state {
  641. self.config_changed = false;
  642. Some(Event::Configured(Config {
  643. server: state.config.server,
  644. address: state.config.address,
  645. router: state.config.router,
  646. dns_servers: state.config.dns_servers.clone(),
  647. packet: self
  648. .receive_packet_buffer
  649. .as_deref()
  650. .map(DhcpPacket::new_unchecked),
  651. }))
  652. } else {
  653. self.config_changed = false;
  654. Some(Event::Deconfigured)
  655. }
  656. }
  657. /// This function _must_ be called when the configuration provided to the
  658. /// interface, by this DHCP socket, changes. It will update the `config_changed` field
  659. /// so that a subsequent call to `poll` will yield an event, and wake a possible waker.
  660. pub(crate) fn config_changed(&mut self) {
  661. self.config_changed = true;
  662. #[cfg(feature = "async")]
  663. self.waker.wake();
  664. }
  665. /// Register a waker.
  666. ///
  667. /// The waker is woken on state changes that might affect the return value
  668. /// of `poll` method calls, which indicates a new state in the DHCP configuration
  669. /// provided by this DHCP socket.
  670. ///
  671. /// Notes:
  672. ///
  673. /// - Only one waker can be registered at a time. If another waker was previously registered,
  674. /// it is overwritten and will no longer be woken.
  675. /// - The Waker is woken only once. Once woken, you must register it again to receive more wakes.
  676. #[cfg(feature = "async")]
  677. pub fn register_waker(&mut self, waker: &Waker) {
  678. self.waker.register(waker)
  679. }
  680. }
  681. #[cfg(test)]
  682. mod test {
  683. use std::ops::{Deref, DerefMut};
  684. use super::*;
  685. use crate::wire::EthernetAddress;
  686. // =========================================================================================//
  687. // Helper functions
  688. struct TestSocket {
  689. socket: Socket<'static>,
  690. cx: Context,
  691. }
  692. impl Deref for TestSocket {
  693. type Target = Socket<'static>;
  694. fn deref(&self) -> &Self::Target {
  695. &self.socket
  696. }
  697. }
  698. impl DerefMut for TestSocket {
  699. fn deref_mut(&mut self) -> &mut Self::Target {
  700. &mut self.socket
  701. }
  702. }
  703. fn send(
  704. s: &mut TestSocket,
  705. timestamp: Instant,
  706. (ip_repr, udp_repr, dhcp_repr): (Ipv4Repr, UdpRepr, DhcpRepr),
  707. ) {
  708. s.cx.set_now(timestamp);
  709. net_trace!("send: {:?}", ip_repr);
  710. net_trace!(" {:?}", udp_repr);
  711. net_trace!(" {:?}", dhcp_repr);
  712. let mut payload = vec![0; dhcp_repr.buffer_len()];
  713. dhcp_repr
  714. .emit(&mut DhcpPacket::new_unchecked(&mut payload))
  715. .unwrap();
  716. s.socket.process(&mut s.cx, &ip_repr, &udp_repr, &payload)
  717. }
  718. fn recv(s: &mut TestSocket, timestamp: Instant, reprs: &[(Ipv4Repr, UdpRepr, DhcpRepr)]) {
  719. s.cx.set_now(timestamp);
  720. let mut i = 0;
  721. while s.socket.poll_at(&mut s.cx) <= PollAt::Time(timestamp) {
  722. let _ = s
  723. .socket
  724. .dispatch(&mut s.cx, |_, (mut ip_repr, udp_repr, dhcp_repr)| {
  725. assert_eq!(ip_repr.next_header, IpProtocol::Udp);
  726. assert_eq!(
  727. ip_repr.payload_len,
  728. udp_repr.header_len() + dhcp_repr.buffer_len()
  729. );
  730. // We validated the payload len, change it to 0 to make equality testing easier
  731. ip_repr.payload_len = 0;
  732. net_trace!("recv: {:?}", ip_repr);
  733. net_trace!(" {:?}", udp_repr);
  734. net_trace!(" {:?}", dhcp_repr);
  735. let got_repr = (ip_repr, udp_repr, dhcp_repr);
  736. match reprs.get(i) {
  737. Some(want_repr) => assert_eq!(want_repr, &got_repr),
  738. None => panic!("Too many reprs emitted"),
  739. }
  740. i += 1;
  741. Ok::<_, ()>(())
  742. });
  743. }
  744. assert_eq!(i, reprs.len());
  745. }
  746. macro_rules! send {
  747. ($socket:ident, $repr:expr) =>
  748. (send!($socket, time 0, $repr));
  749. ($socket:ident, time $time:expr, $repr:expr) =>
  750. (send(&mut $socket, Instant::from_millis($time), $repr));
  751. }
  752. macro_rules! recv {
  753. ($socket:ident, $reprs:expr) => ({
  754. recv!($socket, time 0, $reprs);
  755. });
  756. ($socket:ident, time $time:expr, $reprs:expr) => ({
  757. recv(&mut $socket, Instant::from_millis($time), &$reprs);
  758. });
  759. }
  760. // =========================================================================================//
  761. // Constants
  762. const TXID: u32 = 0x12345678;
  763. const MY_IP: Ipv4Address = Ipv4Address([192, 168, 1, 42]);
  764. const SERVER_IP: Ipv4Address = Ipv4Address([192, 168, 1, 1]);
  765. const DNS_IP_1: Ipv4Address = Ipv4Address([1, 1, 1, 1]);
  766. const DNS_IP_2: Ipv4Address = Ipv4Address([1, 1, 1, 2]);
  767. const DNS_IP_3: Ipv4Address = Ipv4Address([1, 1, 1, 3]);
  768. const DNS_IPS: &[Ipv4Address] = &[DNS_IP_1, DNS_IP_2, DNS_IP_3];
  769. const MASK_24: Ipv4Address = Ipv4Address([255, 255, 255, 0]);
  770. const MY_MAC: EthernetAddress = EthernetAddress([0x02, 0x02, 0x02, 0x02, 0x02, 0x02]);
  771. const IP_BROADCAST: Ipv4Repr = Ipv4Repr {
  772. src_addr: Ipv4Address::UNSPECIFIED,
  773. dst_addr: Ipv4Address::BROADCAST,
  774. next_header: IpProtocol::Udp,
  775. payload_len: 0,
  776. hop_limit: 64,
  777. };
  778. const IP_BROADCAST_ADDRESSED: Ipv4Repr = Ipv4Repr {
  779. src_addr: MY_IP,
  780. dst_addr: Ipv4Address::BROADCAST,
  781. next_header: IpProtocol::Udp,
  782. payload_len: 0,
  783. hop_limit: 64,
  784. };
  785. const IP_SERVER_BROADCAST: Ipv4Repr = Ipv4Repr {
  786. src_addr: SERVER_IP,
  787. dst_addr: Ipv4Address::BROADCAST,
  788. next_header: IpProtocol::Udp,
  789. payload_len: 0,
  790. hop_limit: 64,
  791. };
  792. const IP_RECV: Ipv4Repr = Ipv4Repr {
  793. src_addr: SERVER_IP,
  794. dst_addr: MY_IP,
  795. next_header: IpProtocol::Udp,
  796. payload_len: 0,
  797. hop_limit: 64,
  798. };
  799. const IP_SEND: Ipv4Repr = Ipv4Repr {
  800. src_addr: MY_IP,
  801. dst_addr: SERVER_IP,
  802. next_header: IpProtocol::Udp,
  803. payload_len: 0,
  804. hop_limit: 64,
  805. };
  806. const UDP_SEND: UdpRepr = UdpRepr {
  807. src_port: DHCP_CLIENT_PORT,
  808. dst_port: DHCP_SERVER_PORT,
  809. };
  810. const UDP_RECV: UdpRepr = UdpRepr {
  811. src_port: DHCP_SERVER_PORT,
  812. dst_port: DHCP_CLIENT_PORT,
  813. };
  814. const DIFFERENT_CLIENT_PORT: u16 = 6800;
  815. const DIFFERENT_SERVER_PORT: u16 = 6700;
  816. const UDP_SEND_DIFFERENT_PORT: UdpRepr = UdpRepr {
  817. src_port: DIFFERENT_CLIENT_PORT,
  818. dst_port: DIFFERENT_SERVER_PORT,
  819. };
  820. const UDP_RECV_DIFFERENT_PORT: UdpRepr = UdpRepr {
  821. src_port: DIFFERENT_SERVER_PORT,
  822. dst_port: DIFFERENT_CLIENT_PORT,
  823. };
  824. const DHCP_DEFAULT: DhcpRepr = DhcpRepr {
  825. message_type: DhcpMessageType::Unknown(99),
  826. transaction_id: TXID,
  827. secs: 0,
  828. client_hardware_address: MY_MAC,
  829. client_ip: Ipv4Address::UNSPECIFIED,
  830. your_ip: Ipv4Address::UNSPECIFIED,
  831. server_ip: Ipv4Address::UNSPECIFIED,
  832. router: None,
  833. subnet_mask: None,
  834. relay_agent_ip: Ipv4Address::UNSPECIFIED,
  835. broadcast: false,
  836. requested_ip: None,
  837. client_identifier: None,
  838. server_identifier: None,
  839. parameter_request_list: None,
  840. dns_servers: None,
  841. max_size: None,
  842. renew_duration: None,
  843. rebind_duration: None,
  844. lease_duration: None,
  845. additional_options: &[],
  846. };
  847. const DHCP_DISCOVER: DhcpRepr = DhcpRepr {
  848. message_type: DhcpMessageType::Discover,
  849. client_identifier: Some(MY_MAC),
  850. parameter_request_list: Some(&[1, 3, 6]),
  851. max_size: Some(1432),
  852. ..DHCP_DEFAULT
  853. };
  854. fn dhcp_offer() -> DhcpRepr<'static> {
  855. DhcpRepr {
  856. message_type: DhcpMessageType::Offer,
  857. server_ip: SERVER_IP,
  858. server_identifier: Some(SERVER_IP),
  859. your_ip: MY_IP,
  860. router: Some(SERVER_IP),
  861. subnet_mask: Some(MASK_24),
  862. dns_servers: Some(Vec::from_slice(DNS_IPS).unwrap()),
  863. lease_duration: Some(1000),
  864. ..DHCP_DEFAULT
  865. }
  866. }
  867. const DHCP_REQUEST: DhcpRepr = DhcpRepr {
  868. message_type: DhcpMessageType::Request,
  869. client_identifier: Some(MY_MAC),
  870. server_identifier: Some(SERVER_IP),
  871. max_size: Some(1432),
  872. requested_ip: Some(MY_IP),
  873. parameter_request_list: Some(&[1, 3, 6]),
  874. ..DHCP_DEFAULT
  875. };
  876. fn dhcp_ack() -> DhcpRepr<'static> {
  877. DhcpRepr {
  878. message_type: DhcpMessageType::Ack,
  879. server_ip: SERVER_IP,
  880. server_identifier: Some(SERVER_IP),
  881. your_ip: MY_IP,
  882. router: Some(SERVER_IP),
  883. subnet_mask: Some(MASK_24),
  884. dns_servers: Some(Vec::from_slice(DNS_IPS).unwrap()),
  885. lease_duration: Some(1000),
  886. ..DHCP_DEFAULT
  887. }
  888. }
  889. const DHCP_NAK: DhcpRepr = DhcpRepr {
  890. message_type: DhcpMessageType::Nak,
  891. server_ip: SERVER_IP,
  892. server_identifier: Some(SERVER_IP),
  893. ..DHCP_DEFAULT
  894. };
  895. const DHCP_RENEW: DhcpRepr = DhcpRepr {
  896. message_type: DhcpMessageType::Request,
  897. client_identifier: Some(MY_MAC),
  898. // NO server_identifier in renew requests, only in first one!
  899. client_ip: MY_IP,
  900. max_size: Some(1432),
  901. requested_ip: None,
  902. parameter_request_list: Some(&[1, 3, 6]),
  903. ..DHCP_DEFAULT
  904. };
  905. const DHCP_REBIND: DhcpRepr = DhcpRepr {
  906. message_type: DhcpMessageType::Request,
  907. client_identifier: Some(MY_MAC),
  908. // NO server_identifier in renew requests, only in first one!
  909. client_ip: MY_IP,
  910. max_size: Some(1432),
  911. requested_ip: None,
  912. parameter_request_list: Some(&[1, 3, 6]),
  913. ..DHCP_DEFAULT
  914. };
  915. // =========================================================================================//
  916. // Tests
  917. fn socket() -> TestSocket {
  918. let mut s = Socket::new();
  919. assert_eq!(s.poll(), Some(Event::Deconfigured));
  920. TestSocket {
  921. socket: s,
  922. cx: Context::mock(),
  923. }
  924. }
  925. fn socket_different_port() -> TestSocket {
  926. let mut s = Socket::new();
  927. s.set_ports(DIFFERENT_SERVER_PORT, DIFFERENT_CLIENT_PORT);
  928. assert_eq!(s.poll(), Some(Event::Deconfigured));
  929. TestSocket {
  930. socket: s,
  931. cx: Context::mock(),
  932. }
  933. }
  934. fn socket_bound() -> TestSocket {
  935. let mut s = socket();
  936. s.state = ClientState::Renewing(RenewState {
  937. config: Config {
  938. server: ServerInfo {
  939. address: SERVER_IP,
  940. identifier: SERVER_IP,
  941. },
  942. address: Ipv4Cidr::new(MY_IP, 24),
  943. dns_servers: Vec::from_slice(DNS_IPS).unwrap(),
  944. router: Some(SERVER_IP),
  945. packet: None,
  946. },
  947. renew_at: Instant::from_secs(500),
  948. rebind_at: Instant::from_secs(875),
  949. rebinding: false,
  950. expires_at: Instant::from_secs(1000),
  951. });
  952. s
  953. }
  954. #[test]
  955. fn test_bind() {
  956. let mut s = socket();
  957. recv!(s, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  958. assert_eq!(s.poll(), None);
  959. send!(s, (IP_RECV, UDP_RECV, dhcp_offer()));
  960. assert_eq!(s.poll(), None);
  961. recv!(s, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  962. assert_eq!(s.poll(), None);
  963. send!(s, (IP_RECV, UDP_RECV, dhcp_ack()));
  964. assert_eq!(
  965. s.poll(),
  966. Some(Event::Configured(Config {
  967. server: ServerInfo {
  968. address: SERVER_IP,
  969. identifier: SERVER_IP,
  970. },
  971. address: Ipv4Cidr::new(MY_IP, 24),
  972. dns_servers: Vec::from_slice(DNS_IPS).unwrap(),
  973. router: Some(SERVER_IP),
  974. packet: None,
  975. }))
  976. );
  977. match &s.state {
  978. ClientState::Renewing(r) => {
  979. assert_eq!(r.renew_at, Instant::from_secs(500));
  980. assert_eq!(r.rebind_at, Instant::from_secs(875));
  981. assert_eq!(r.expires_at, Instant::from_secs(1000));
  982. }
  983. _ => panic!("Invalid state"),
  984. }
  985. }
  986. #[test]
  987. fn test_bind_different_ports() {
  988. let mut s = socket_different_port();
  989. recv!(s, [(IP_BROADCAST, UDP_SEND_DIFFERENT_PORT, DHCP_DISCOVER)]);
  990. assert_eq!(s.poll(), None);
  991. send!(s, (IP_RECV, UDP_RECV_DIFFERENT_PORT, dhcp_offer()));
  992. assert_eq!(s.poll(), None);
  993. recv!(s, [(IP_BROADCAST, UDP_SEND_DIFFERENT_PORT, DHCP_REQUEST)]);
  994. assert_eq!(s.poll(), None);
  995. send!(s, (IP_RECV, UDP_RECV_DIFFERENT_PORT, dhcp_ack()));
  996. assert_eq!(
  997. s.poll(),
  998. Some(Event::Configured(Config {
  999. server: ServerInfo {
  1000. address: SERVER_IP,
  1001. identifier: SERVER_IP,
  1002. },
  1003. address: Ipv4Cidr::new(MY_IP, 24),
  1004. dns_servers: Vec::from_slice(DNS_IPS).unwrap(),
  1005. router: Some(SERVER_IP),
  1006. packet: None,
  1007. }))
  1008. );
  1009. match &s.state {
  1010. ClientState::Renewing(r) => {
  1011. assert_eq!(r.renew_at, Instant::from_secs(500));
  1012. assert_eq!(r.rebind_at, Instant::from_secs(875));
  1013. assert_eq!(r.expires_at, Instant::from_secs(1000));
  1014. }
  1015. _ => panic!("Invalid state"),
  1016. }
  1017. }
  1018. #[test]
  1019. fn test_discover_retransmit() {
  1020. let mut s = socket();
  1021. recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  1022. recv!(s, time 1_000, []);
  1023. recv!(s, time 10_000, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  1024. recv!(s, time 11_000, []);
  1025. recv!(s, time 20_000, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  1026. // check after retransmits it still works
  1027. send!(s, time 20_000, (IP_RECV, UDP_RECV, dhcp_offer()));
  1028. recv!(s, time 20_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  1029. }
  1030. #[test]
  1031. fn test_request_retransmit() {
  1032. let mut s = socket();
  1033. recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  1034. send!(s, time 0, (IP_RECV, UDP_RECV, dhcp_offer()));
  1035. recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  1036. recv!(s, time 1_000, []);
  1037. recv!(s, time 5_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  1038. recv!(s, time 6_000, []);
  1039. recv!(s, time 10_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  1040. recv!(s, time 15_000, []);
  1041. recv!(s, time 20_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  1042. // check after retransmits it still works
  1043. send!(s, time 20_000, (IP_RECV, UDP_RECV, dhcp_ack()));
  1044. match &s.state {
  1045. ClientState::Renewing(r) => {
  1046. assert_eq!(r.renew_at, Instant::from_secs(20 + 500));
  1047. assert_eq!(r.expires_at, Instant::from_secs(20 + 1000));
  1048. }
  1049. _ => panic!("Invalid state"),
  1050. }
  1051. }
  1052. #[test]
  1053. fn test_request_timeout() {
  1054. let mut s = socket();
  1055. recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  1056. send!(s, time 0, (IP_RECV, UDP_RECV, dhcp_offer()));
  1057. recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  1058. recv!(s, time 5_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  1059. recv!(s, time 10_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  1060. recv!(s, time 20_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  1061. recv!(s, time 30_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  1062. // After 5 tries and 70 seconds, it gives up.
  1063. // 5 + 5 + 10 + 10 + 20 = 70
  1064. recv!(s, time 70_000, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  1065. // check it still works
  1066. send!(s, time 60_000, (IP_RECV, UDP_RECV, dhcp_offer()));
  1067. recv!(s, time 60_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  1068. }
  1069. #[test]
  1070. fn test_request_nak() {
  1071. let mut s = socket();
  1072. recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  1073. send!(s, time 0, (IP_RECV, UDP_RECV, dhcp_offer()));
  1074. recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
  1075. send!(s, time 0, (IP_SERVER_BROADCAST, UDP_RECV, DHCP_NAK));
  1076. recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  1077. }
  1078. #[test]
  1079. fn test_renew() {
  1080. let mut s = socket_bound();
  1081. recv!(s, []);
  1082. assert_eq!(s.poll(), None);
  1083. recv!(s, time 500_000, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
  1084. assert_eq!(s.poll(), None);
  1085. match &s.state {
  1086. ClientState::Renewing(r) => {
  1087. // the expiration still hasn't been bumped, because
  1088. // we haven't received the ACK yet
  1089. assert_eq!(r.expires_at, Instant::from_secs(1000));
  1090. }
  1091. _ => panic!("Invalid state"),
  1092. }
  1093. send!(s, time 500_000, (IP_RECV, UDP_RECV, dhcp_ack()));
  1094. assert_eq!(s.poll(), None);
  1095. match &s.state {
  1096. ClientState::Renewing(r) => {
  1097. // NOW the expiration gets bumped
  1098. assert_eq!(r.renew_at, Instant::from_secs(500 + 500));
  1099. assert_eq!(r.expires_at, Instant::from_secs(500 + 1000));
  1100. }
  1101. _ => panic!("Invalid state"),
  1102. }
  1103. }
  1104. #[test]
  1105. fn test_renew_rebind_retransmit() {
  1106. let mut s = socket_bound();
  1107. recv!(s, []);
  1108. // First renew attempt at T1
  1109. recv!(s, time 499_000, []);
  1110. recv!(s, time 500_000, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
  1111. // Next renew attempt at half way to T2
  1112. recv!(s, time 687_000, []);
  1113. recv!(s, time 687_500, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
  1114. // Next renew attempt at half way again to T2
  1115. recv!(s, time 781_000, []);
  1116. recv!(s, time 781_250, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
  1117. // Next renew attempt 60s later (minimum interval)
  1118. recv!(s, time 841_000, []);
  1119. recv!(s, time 841_250, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
  1120. // No more renews due to minimum interval
  1121. recv!(s, time 874_000, []);
  1122. // First rebind attempt
  1123. recv!(s, time 875_000, [(IP_BROADCAST_ADDRESSED, UDP_SEND, DHCP_REBIND)]);
  1124. // Next rebind attempt half way to expiry
  1125. recv!(s, time 937_000, []);
  1126. recv!(s, time 937_500, [(IP_BROADCAST_ADDRESSED, UDP_SEND, DHCP_REBIND)]);
  1127. // Next rebind attempt 60s later (minimum interval)
  1128. recv!(s, time 997_000, []);
  1129. recv!(s, time 997_500, [(IP_BROADCAST_ADDRESSED, UDP_SEND, DHCP_REBIND)]);
  1130. // check it still works
  1131. send!(s, time 999_000, (IP_RECV, UDP_RECV, dhcp_ack()));
  1132. match &s.state {
  1133. ClientState::Renewing(r) => {
  1134. // NOW the expiration gets bumped
  1135. assert_eq!(r.renew_at, Instant::from_secs(999 + 500));
  1136. assert_eq!(r.expires_at, Instant::from_secs(999 + 1000));
  1137. }
  1138. _ => panic!("Invalid state"),
  1139. }
  1140. }
  1141. #[test]
  1142. fn test_renew_rebind_timeout() {
  1143. let mut s = socket_bound();
  1144. recv!(s, []);
  1145. // First renew attempt at T1
  1146. recv!(s, time 500_000, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
  1147. // Next renew attempt at half way to T2
  1148. recv!(s, time 687_500, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
  1149. // Next renew attempt at half way again to T2
  1150. recv!(s, time 781_250, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
  1151. // Next renew attempt 60s later (minimum interval)
  1152. recv!(s, time 841_250, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
  1153. // TODO uncomment below part of test
  1154. // // First rebind attempt
  1155. // recv!(s, time 875_000, [(IP_BROADCAST_ADDRESSED, UDP_SEND, DHCP_REBIND)]);
  1156. // // Next rebind attempt half way to expiry
  1157. // recv!(s, time 937_500, [(IP_BROADCAST_ADDRESSED, UDP_SEND, DHCP_REBIND)]);
  1158. // // Next rebind attempt 60s later (minimum interval)
  1159. // recv!(s, time 997_500, [(IP_BROADCAST_ADDRESSED, UDP_SEND, DHCP_REBIND)]);
  1160. // No more rebinds due to minimum interval
  1161. recv!(s, time 1_000_000, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  1162. match &s.state {
  1163. ClientState::Discovering(_) => {}
  1164. _ => panic!("Invalid state"),
  1165. }
  1166. }
  1167. #[test]
  1168. fn test_renew_nak() {
  1169. let mut s = socket_bound();
  1170. recv!(s, time 500_000, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
  1171. send!(s, time 500_000, (IP_SERVER_BROADCAST, UDP_RECV, DHCP_NAK));
  1172. recv!(s, time 500_000, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
  1173. }
  1174. }