icmpv4.rs 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642
  1. use byteorder::{ByteOrder, NetworkEndian};
  2. use core::{cmp, fmt};
  3. use super::{Error, Result};
  4. use crate::phy::ChecksumCapabilities;
  5. use crate::wire::ip::checksum;
  6. use crate::wire::{Ipv4Packet, Ipv4Repr};
  7. enum_with_unknown! {
  8. /// Internet protocol control message type.
  9. pub enum Message(u8) {
  10. /// Echo reply
  11. EchoReply = 0,
  12. /// Destination unreachable
  13. DstUnreachable = 3,
  14. /// Message redirect
  15. Redirect = 5,
  16. /// Echo request
  17. EchoRequest = 8,
  18. /// Router advertisement
  19. RouterAdvert = 9,
  20. /// Router solicitation
  21. RouterSolicit = 10,
  22. /// Time exceeded
  23. TimeExceeded = 11,
  24. /// Parameter problem
  25. ParamProblem = 12,
  26. /// Timestamp
  27. Timestamp = 13,
  28. /// Timestamp reply
  29. TimestampReply = 14
  30. }
  31. }
  32. impl fmt::Display for Message {
  33. fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
  34. match *self {
  35. Message::EchoReply => write!(f, "echo reply"),
  36. Message::DstUnreachable => write!(f, "destination unreachable"),
  37. Message::Redirect => write!(f, "message redirect"),
  38. Message::EchoRequest => write!(f, "echo request"),
  39. Message::RouterAdvert => write!(f, "router advertisement"),
  40. Message::RouterSolicit => write!(f, "router solicitation"),
  41. Message::TimeExceeded => write!(f, "time exceeded"),
  42. Message::ParamProblem => write!(f, "parameter problem"),
  43. Message::Timestamp => write!(f, "timestamp"),
  44. Message::TimestampReply => write!(f, "timestamp reply"),
  45. Message::Unknown(id) => write!(f, "{}", id),
  46. }
  47. }
  48. }
  49. enum_with_unknown! {
  50. /// Internet protocol control message subtype for type "Destination Unreachable".
  51. pub enum DstUnreachable(u8) {
  52. /// Destination network unreachable
  53. NetUnreachable = 0,
  54. /// Destination host unreachable
  55. HostUnreachable = 1,
  56. /// Destination protocol unreachable
  57. ProtoUnreachable = 2,
  58. /// Destination port unreachable
  59. PortUnreachable = 3,
  60. /// Fragmentation required, and DF flag set
  61. FragRequired = 4,
  62. /// Source route failed
  63. SrcRouteFailed = 5,
  64. /// Destination network unknown
  65. DstNetUnknown = 6,
  66. /// Destination host unknown
  67. DstHostUnknown = 7,
  68. /// Source host isolated
  69. SrcHostIsolated = 8,
  70. /// Network administratively prohibited
  71. NetProhibited = 9,
  72. /// Host administratively prohibited
  73. HostProhibited = 10,
  74. /// Network unreachable for ToS
  75. NetUnreachToS = 11,
  76. /// Host unreachable for ToS
  77. HostUnreachToS = 12,
  78. /// Communication administratively prohibited
  79. CommProhibited = 13,
  80. /// Host precedence violation
  81. HostPrecedViol = 14,
  82. /// Precedence cutoff in effect
  83. PrecedCutoff = 15
  84. }
  85. }
  86. impl fmt::Display for DstUnreachable {
  87. fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
  88. match *self {
  89. DstUnreachable::NetUnreachable => write!(f, "destination network unreachable"),
  90. DstUnreachable::HostUnreachable => write!(f, "destination host unreachable"),
  91. DstUnreachable::ProtoUnreachable => write!(f, "destination protocol unreachable"),
  92. DstUnreachable::PortUnreachable => write!(f, "destination port unreachable"),
  93. DstUnreachable::FragRequired => write!(f, "fragmentation required, and DF flag set"),
  94. DstUnreachable::SrcRouteFailed => write!(f, "source route failed"),
  95. DstUnreachable::DstNetUnknown => write!(f, "destination network unknown"),
  96. DstUnreachable::DstHostUnknown => write!(f, "destination host unknown"),
  97. DstUnreachable::SrcHostIsolated => write!(f, "source host isolated"),
  98. DstUnreachable::NetProhibited => write!(f, "network administratively prohibited"),
  99. DstUnreachable::HostProhibited => write!(f, "host administratively prohibited"),
  100. DstUnreachable::NetUnreachToS => write!(f, "network unreachable for ToS"),
  101. DstUnreachable::HostUnreachToS => write!(f, "host unreachable for ToS"),
  102. DstUnreachable::CommProhibited => {
  103. write!(f, "communication administratively prohibited")
  104. }
  105. DstUnreachable::HostPrecedViol => write!(f, "host precedence violation"),
  106. DstUnreachable::PrecedCutoff => write!(f, "precedence cutoff in effect"),
  107. DstUnreachable::Unknown(id) => write!(f, "{}", id),
  108. }
  109. }
  110. }
  111. enum_with_unknown! {
  112. /// Internet protocol control message subtype for type "Redirect Message".
  113. pub enum Redirect(u8) {
  114. /// Redirect Datagram for the Network
  115. Net = 0,
  116. /// Redirect Datagram for the Host
  117. Host = 1,
  118. /// Redirect Datagram for the ToS & network
  119. NetToS = 2,
  120. /// Redirect Datagram for the ToS & host
  121. HostToS = 3
  122. }
  123. }
  124. enum_with_unknown! {
  125. /// Internet protocol control message subtype for type "Time Exceeded".
  126. pub enum TimeExceeded(u8) {
  127. /// TTL expired in transit
  128. TtlExpired = 0,
  129. /// Fragment reassembly time exceeded
  130. FragExpired = 1
  131. }
  132. }
  133. enum_with_unknown! {
  134. /// Internet protocol control message subtype for type "Parameter Problem".
  135. pub enum ParamProblem(u8) {
  136. /// Pointer indicates the error
  137. AtPointer = 0,
  138. /// Missing a required option
  139. MissingOption = 1,
  140. /// Bad length
  141. BadLength = 2
  142. }
  143. }
  144. /// A read/write wrapper around an Internet Control Message Protocol version 4 packet buffer.
  145. #[derive(Debug, PartialEq, Clone)]
  146. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  147. pub struct Packet<T: AsRef<[u8]>> {
  148. buffer: T,
  149. }
  150. mod field {
  151. use crate::wire::field::*;
  152. pub const TYPE: usize = 0;
  153. pub const CODE: usize = 1;
  154. pub const CHECKSUM: Field = 2..4;
  155. pub const UNUSED: Field = 4..8;
  156. pub const ECHO_IDENT: Field = 4..6;
  157. pub const ECHO_SEQNO: Field = 6..8;
  158. pub const HEADER_END: usize = 8;
  159. }
  160. impl<T: AsRef<[u8]>> Packet<T> {
  161. /// Imbue a raw octet buffer with ICMPv4 packet structure.
  162. pub fn new_unchecked(buffer: T) -> Packet<T> {
  163. Packet { buffer }
  164. }
  165. /// Shorthand for a combination of [new_unchecked] and [check_len].
  166. ///
  167. /// [new_unchecked]: #method.new_unchecked
  168. /// [check_len]: #method.check_len
  169. pub fn new_checked(buffer: T) -> Result<Packet<T>> {
  170. let packet = Self::new_unchecked(buffer);
  171. packet.check_len()?;
  172. Ok(packet)
  173. }
  174. /// Ensure that no accessor method will panic if called.
  175. /// Returns `Err(Error)` if the buffer is too short.
  176. ///
  177. /// The result of this check is invalidated by calling [set_header_len].
  178. ///
  179. /// [set_header_len]: #method.set_header_len
  180. pub fn check_len(&self) -> Result<()> {
  181. let len = self.buffer.as_ref().len();
  182. if len < field::HEADER_END {
  183. Err(Error)
  184. } else {
  185. Ok(())
  186. }
  187. }
  188. /// Consume the packet, returning the underlying buffer.
  189. pub fn into_inner(self) -> T {
  190. self.buffer
  191. }
  192. /// Return the message type field.
  193. #[inline]
  194. pub fn msg_type(&self) -> Message {
  195. let data = self.buffer.as_ref();
  196. Message::from(data[field::TYPE])
  197. }
  198. /// Return the message code field.
  199. #[inline]
  200. pub fn msg_code(&self) -> u8 {
  201. let data = self.buffer.as_ref();
  202. data[field::CODE]
  203. }
  204. /// Return the checksum field.
  205. #[inline]
  206. pub fn checksum(&self) -> u16 {
  207. let data = self.buffer.as_ref();
  208. NetworkEndian::read_u16(&data[field::CHECKSUM])
  209. }
  210. /// Return the identifier field (for echo request and reply packets).
  211. ///
  212. /// # Panics
  213. /// This function may panic if this packet is not an echo request or reply packet.
  214. #[inline]
  215. pub fn echo_ident(&self) -> u16 {
  216. let data = self.buffer.as_ref();
  217. NetworkEndian::read_u16(&data[field::ECHO_IDENT])
  218. }
  219. /// Return the sequence number field (for echo request and reply packets).
  220. ///
  221. /// # Panics
  222. /// This function may panic if this packet is not an echo request or reply packet.
  223. #[inline]
  224. pub fn echo_seq_no(&self) -> u16 {
  225. let data = self.buffer.as_ref();
  226. NetworkEndian::read_u16(&data[field::ECHO_SEQNO])
  227. }
  228. /// Return the header length.
  229. /// The result depends on the value of the message type field.
  230. pub fn header_len(&self) -> usize {
  231. match self.msg_type() {
  232. Message::EchoRequest => field::ECHO_SEQNO.end,
  233. Message::EchoReply => field::ECHO_SEQNO.end,
  234. Message::DstUnreachable => field::UNUSED.end,
  235. _ => field::UNUSED.end, // make a conservative assumption
  236. }
  237. }
  238. /// Validate the header checksum.
  239. ///
  240. /// # Fuzzing
  241. /// This function always returns `true` when fuzzing.
  242. pub fn verify_checksum(&self) -> bool {
  243. if cfg!(fuzzing) {
  244. return true;
  245. }
  246. let data = self.buffer.as_ref();
  247. checksum::data(data) == !0
  248. }
  249. }
  250. impl<'a, T: AsRef<[u8]> + ?Sized> Packet<&'a T> {
  251. /// Return a pointer to the type-specific data.
  252. #[inline]
  253. pub fn data(&self) -> &'a [u8] {
  254. let data = self.buffer.as_ref();
  255. &data[self.header_len()..]
  256. }
  257. }
  258. impl<T: AsRef<[u8]> + AsMut<[u8]>> Packet<T> {
  259. /// Set the message type field.
  260. #[inline]
  261. pub fn set_msg_type(&mut self, value: Message) {
  262. let data = self.buffer.as_mut();
  263. data[field::TYPE] = value.into()
  264. }
  265. /// Set the message code field.
  266. #[inline]
  267. pub fn set_msg_code(&mut self, value: u8) {
  268. let data = self.buffer.as_mut();
  269. data[field::CODE] = value
  270. }
  271. /// Set the checksum field.
  272. #[inline]
  273. pub fn set_checksum(&mut self, value: u16) {
  274. let data = self.buffer.as_mut();
  275. NetworkEndian::write_u16(&mut data[field::CHECKSUM], value)
  276. }
  277. /// Set the identifier field (for echo request and reply packets).
  278. ///
  279. /// # Panics
  280. /// This function may panic if this packet is not an echo request or reply packet.
  281. #[inline]
  282. pub fn set_echo_ident(&mut self, value: u16) {
  283. let data = self.buffer.as_mut();
  284. NetworkEndian::write_u16(&mut data[field::ECHO_IDENT], value)
  285. }
  286. /// Set the sequence number field (for echo request and reply packets).
  287. ///
  288. /// # Panics
  289. /// This function may panic if this packet is not an echo request or reply packet.
  290. #[inline]
  291. pub fn set_echo_seq_no(&mut self, value: u16) {
  292. let data = self.buffer.as_mut();
  293. NetworkEndian::write_u16(&mut data[field::ECHO_SEQNO], value)
  294. }
  295. /// Compute and fill in the header checksum.
  296. pub fn fill_checksum(&mut self) {
  297. self.set_checksum(0);
  298. let checksum = {
  299. let data = self.buffer.as_ref();
  300. !checksum::data(data)
  301. };
  302. self.set_checksum(checksum)
  303. }
  304. }
  305. impl<'a, T: AsRef<[u8]> + AsMut<[u8]> + ?Sized> Packet<&'a mut T> {
  306. /// Return a mutable pointer to the type-specific data.
  307. #[inline]
  308. pub fn data_mut(&mut self) -> &mut [u8] {
  309. let range = self.header_len()..;
  310. let data = self.buffer.as_mut();
  311. &mut data[range]
  312. }
  313. }
  314. impl<T: AsRef<[u8]>> AsRef<[u8]> for Packet<T> {
  315. fn as_ref(&self) -> &[u8] {
  316. self.buffer.as_ref()
  317. }
  318. }
  319. /// A high-level representation of an Internet Control Message Protocol version 4 packet header.
  320. #[derive(Debug, PartialEq, Eq, Clone, Copy)]
  321. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  322. #[non_exhaustive]
  323. pub enum Repr<'a> {
  324. EchoRequest {
  325. ident: u16,
  326. seq_no: u16,
  327. data: &'a [u8],
  328. },
  329. EchoReply {
  330. ident: u16,
  331. seq_no: u16,
  332. data: &'a [u8],
  333. },
  334. DstUnreachable {
  335. reason: DstUnreachable,
  336. header: Ipv4Repr,
  337. data: &'a [u8],
  338. },
  339. }
  340. impl<'a> Repr<'a> {
  341. /// Parse an Internet Control Message Protocol version 4 packet and return
  342. /// a high-level representation.
  343. pub fn parse<T>(
  344. packet: &Packet<&'a T>,
  345. checksum_caps: &ChecksumCapabilities,
  346. ) -> Result<Repr<'a>>
  347. where
  348. T: AsRef<[u8]> + ?Sized,
  349. {
  350. // Valid checksum is expected.
  351. if checksum_caps.icmpv4.rx() && !packet.verify_checksum() {
  352. return Err(Error);
  353. }
  354. match (packet.msg_type(), packet.msg_code()) {
  355. (Message::EchoRequest, 0) => Ok(Repr::EchoRequest {
  356. ident: packet.echo_ident(),
  357. seq_no: packet.echo_seq_no(),
  358. data: packet.data(),
  359. }),
  360. (Message::EchoReply, 0) => Ok(Repr::EchoReply {
  361. ident: packet.echo_ident(),
  362. seq_no: packet.echo_seq_no(),
  363. data: packet.data(),
  364. }),
  365. (Message::DstUnreachable, code) => {
  366. let ip_packet = Ipv4Packet::new_checked(packet.data())?;
  367. let payload = &packet.data()[ip_packet.header_len() as usize..];
  368. // RFC 792 requires exactly eight bytes to be returned.
  369. // We allow more, since there isn't a reason not to, but require at least eight.
  370. if payload.len() < 8 {
  371. return Err(Error);
  372. }
  373. Ok(Repr::DstUnreachable {
  374. reason: DstUnreachable::from(code),
  375. header: Ipv4Repr {
  376. src_addr: ip_packet.src_addr(),
  377. dst_addr: ip_packet.dst_addr(),
  378. next_header: ip_packet.next_header(),
  379. payload_len: payload.len(),
  380. hop_limit: ip_packet.hop_limit(),
  381. },
  382. data: payload,
  383. })
  384. }
  385. _ => Err(Error),
  386. }
  387. }
  388. /// Return the length of a packet that will be emitted from this high-level representation.
  389. pub fn buffer_len(&self) -> usize {
  390. match self {
  391. &Repr::EchoRequest { data, .. } | &Repr::EchoReply { data, .. } => {
  392. field::ECHO_SEQNO.end + data.len()
  393. }
  394. &Repr::DstUnreachable { header, data, .. } => {
  395. field::UNUSED.end + header.buffer_len() + data.len()
  396. }
  397. }
  398. }
  399. /// Emit a high-level representation into an Internet Control Message Protocol version 4
  400. /// packet.
  401. pub fn emit<T>(&self, packet: &mut Packet<&mut T>, checksum_caps: &ChecksumCapabilities)
  402. where
  403. T: AsRef<[u8]> + AsMut<[u8]> + ?Sized,
  404. {
  405. packet.set_msg_code(0);
  406. match *self {
  407. Repr::EchoRequest {
  408. ident,
  409. seq_no,
  410. data,
  411. } => {
  412. packet.set_msg_type(Message::EchoRequest);
  413. packet.set_msg_code(0);
  414. packet.set_echo_ident(ident);
  415. packet.set_echo_seq_no(seq_no);
  416. let data_len = cmp::min(packet.data_mut().len(), data.len());
  417. packet.data_mut()[..data_len].copy_from_slice(&data[..data_len])
  418. }
  419. Repr::EchoReply {
  420. ident,
  421. seq_no,
  422. data,
  423. } => {
  424. packet.set_msg_type(Message::EchoReply);
  425. packet.set_msg_code(0);
  426. packet.set_echo_ident(ident);
  427. packet.set_echo_seq_no(seq_no);
  428. let data_len = cmp::min(packet.data_mut().len(), data.len());
  429. packet.data_mut()[..data_len].copy_from_slice(&data[..data_len])
  430. }
  431. Repr::DstUnreachable {
  432. reason,
  433. header,
  434. data,
  435. } => {
  436. packet.set_msg_type(Message::DstUnreachable);
  437. packet.set_msg_code(reason.into());
  438. let mut ip_packet = Ipv4Packet::new_unchecked(packet.data_mut());
  439. header.emit(&mut ip_packet, checksum_caps);
  440. let payload = &mut ip_packet.into_inner()[header.buffer_len()..];
  441. payload.copy_from_slice(data)
  442. }
  443. }
  444. if checksum_caps.icmpv4.tx() {
  445. packet.fill_checksum()
  446. } else {
  447. // make sure we get a consistently zeroed checksum,
  448. // since implementations might rely on it
  449. packet.set_checksum(0);
  450. }
  451. }
  452. }
  453. impl<'a, T: AsRef<[u8]> + ?Sized> fmt::Display for Packet<&'a T> {
  454. fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
  455. match Repr::parse(self, &ChecksumCapabilities::default()) {
  456. Ok(repr) => write!(f, "{}", repr),
  457. Err(err) => {
  458. write!(f, "ICMPv4 ({})", err)?;
  459. write!(f, " type={:?}", self.msg_type())?;
  460. match self.msg_type() {
  461. Message::DstUnreachable => {
  462. write!(f, " code={:?}", DstUnreachable::from(self.msg_code()))
  463. }
  464. _ => write!(f, " code={}", self.msg_code()),
  465. }
  466. }
  467. }
  468. }
  469. }
  470. impl<'a> fmt::Display for Repr<'a> {
  471. fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
  472. match *self {
  473. Repr::EchoRequest {
  474. ident,
  475. seq_no,
  476. data,
  477. } => write!(
  478. f,
  479. "ICMPv4 echo request id={} seq={} len={}",
  480. ident,
  481. seq_no,
  482. data.len()
  483. ),
  484. Repr::EchoReply {
  485. ident,
  486. seq_no,
  487. data,
  488. } => write!(
  489. f,
  490. "ICMPv4 echo reply id={} seq={} len={}",
  491. ident,
  492. seq_no,
  493. data.len()
  494. ),
  495. Repr::DstUnreachable { reason, .. } => {
  496. write!(f, "ICMPv4 destination unreachable ({})", reason)
  497. }
  498. }
  499. }
  500. }
  501. use crate::wire::pretty_print::{PrettyIndent, PrettyPrint};
  502. impl<T: AsRef<[u8]>> PrettyPrint for Packet<T> {
  503. fn pretty_print(
  504. buffer: &dyn AsRef<[u8]>,
  505. f: &mut fmt::Formatter,
  506. indent: &mut PrettyIndent,
  507. ) -> fmt::Result {
  508. let packet = match Packet::new_checked(buffer) {
  509. Err(err) => return write!(f, "{}({})", indent, err),
  510. Ok(packet) => packet,
  511. };
  512. write!(f, "{}{}", indent, packet)?;
  513. match packet.msg_type() {
  514. Message::DstUnreachable => {
  515. indent.increase(f)?;
  516. super::Ipv4Packet::<&[u8]>::pretty_print(&packet.data(), f, indent)
  517. }
  518. _ => Ok(()),
  519. }
  520. }
  521. }
  522. #[cfg(test)]
  523. mod test {
  524. use super::*;
  525. static ECHO_PACKET_BYTES: [u8; 12] = [
  526. 0x08, 0x00, 0x8e, 0xfe, 0x12, 0x34, 0xab, 0xcd, 0xaa, 0x00, 0x00, 0xff,
  527. ];
  528. static ECHO_DATA_BYTES: [u8; 4] = [0xaa, 0x00, 0x00, 0xff];
  529. #[test]
  530. fn test_echo_deconstruct() {
  531. let packet = Packet::new_unchecked(&ECHO_PACKET_BYTES[..]);
  532. assert_eq!(packet.msg_type(), Message::EchoRequest);
  533. assert_eq!(packet.msg_code(), 0);
  534. assert_eq!(packet.checksum(), 0x8efe);
  535. assert_eq!(packet.echo_ident(), 0x1234);
  536. assert_eq!(packet.echo_seq_no(), 0xabcd);
  537. assert_eq!(packet.data(), &ECHO_DATA_BYTES[..]);
  538. assert!(packet.verify_checksum());
  539. }
  540. #[test]
  541. fn test_echo_construct() {
  542. let mut bytes = vec![0xa5; 12];
  543. let mut packet = Packet::new_unchecked(&mut bytes);
  544. packet.set_msg_type(Message::EchoRequest);
  545. packet.set_msg_code(0);
  546. packet.set_echo_ident(0x1234);
  547. packet.set_echo_seq_no(0xabcd);
  548. packet.data_mut().copy_from_slice(&ECHO_DATA_BYTES[..]);
  549. packet.fill_checksum();
  550. assert_eq!(&packet.into_inner()[..], &ECHO_PACKET_BYTES[..]);
  551. }
  552. fn echo_packet_repr() -> Repr<'static> {
  553. Repr::EchoRequest {
  554. ident: 0x1234,
  555. seq_no: 0xabcd,
  556. data: &ECHO_DATA_BYTES,
  557. }
  558. }
  559. #[test]
  560. fn test_echo_parse() {
  561. let packet = Packet::new_unchecked(&ECHO_PACKET_BYTES[..]);
  562. let repr = Repr::parse(&packet, &ChecksumCapabilities::default()).unwrap();
  563. assert_eq!(repr, echo_packet_repr());
  564. }
  565. #[test]
  566. fn test_echo_emit() {
  567. let repr = echo_packet_repr();
  568. let mut bytes = vec![0xa5; repr.buffer_len()];
  569. let mut packet = Packet::new_unchecked(&mut bytes);
  570. repr.emit(&mut packet, &ChecksumCapabilities::default());
  571. assert_eq!(&packet.into_inner()[..], &ECHO_PACKET_BYTES[..]);
  572. }
  573. #[test]
  574. fn test_check_len() {
  575. let bytes = [0x0b, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00];
  576. assert_eq!(Packet::new_checked(&[]), Err(Error));
  577. assert_eq!(Packet::new_checked(&bytes[..4]), Err(Error));
  578. assert!(Packet::new_checked(&bytes[..]).is_ok());
  579. }
  580. }