icmp.rs 35 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048
  1. use core::cmp;
  2. #[cfg(feature = "async")]
  3. use core::task::Waker;
  4. use crate::phy::ChecksumCapabilities;
  5. #[cfg(feature = "async")]
  6. use crate::socket::WakerRegistration;
  7. use crate::socket::{Context, PollAt};
  8. use crate::storage::{PacketBuffer, PacketMetadata};
  9. use crate::{Error, Result};
  10. use crate::wire::IcmpRepr;
  11. #[cfg(feature = "proto-ipv4")]
  12. use crate::wire::{Icmpv4Packet, Icmpv4Repr, Ipv4Address, Ipv4Repr};
  13. #[cfg(feature = "proto-ipv6")]
  14. use crate::wire::{Icmpv6Packet, Icmpv6Repr, Ipv6Address, Ipv6Repr};
  15. use crate::wire::{IpAddress, IpEndpoint, IpProtocol, IpRepr};
  16. use crate::wire::{UdpPacket, UdpRepr};
  17. /// Type of endpoint to bind the ICMP socket to. See [IcmpSocket::bind] for
  18. /// more details.
  19. ///
  20. /// [IcmpSocket::bind]: struct.IcmpSocket.html#method.bind
  21. #[derive(Debug, PartialEq, Eq, PartialOrd, Ord, Clone, Copy)]
  22. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  23. pub enum Endpoint {
  24. Unspecified,
  25. Ident(u16),
  26. Udp(IpEndpoint),
  27. }
  28. impl Endpoint {
  29. pub fn is_specified(&self) -> bool {
  30. match *self {
  31. Endpoint::Ident(_) => true,
  32. Endpoint::Udp(endpoint) => endpoint.port != 0,
  33. Endpoint::Unspecified => false,
  34. }
  35. }
  36. }
  37. impl Default for Endpoint {
  38. fn default() -> Endpoint {
  39. Endpoint::Unspecified
  40. }
  41. }
  42. /// An ICMP packet metadata.
  43. pub type IcmpPacketMetadata = PacketMetadata<IpAddress>;
  44. /// An ICMP packet ring buffer.
  45. pub type IcmpSocketBuffer<'a> = PacketBuffer<'a, IpAddress>;
  46. /// A ICMP socket
  47. ///
  48. /// An ICMP socket is bound to a specific [IcmpEndpoint] which may
  49. /// be a sepecific UDP port to listen for ICMP error messages related
  50. /// to the port or a specific ICMP identifier value. See [bind] for
  51. /// more details.
  52. ///
  53. /// [IcmpEndpoint]: enum.IcmpEndpoint.html
  54. /// [bind]: #method.bind
  55. #[derive(Debug)]
  56. pub struct IcmpSocket<'a> {
  57. rx_buffer: IcmpSocketBuffer<'a>,
  58. tx_buffer: IcmpSocketBuffer<'a>,
  59. /// The endpoint this socket is communicating with
  60. endpoint: Endpoint,
  61. /// The time-to-live (IPv4) or hop limit (IPv6) value used in outgoing packets.
  62. hop_limit: Option<u8>,
  63. #[cfg(feature = "async")]
  64. rx_waker: WakerRegistration,
  65. #[cfg(feature = "async")]
  66. tx_waker: WakerRegistration,
  67. }
  68. impl<'a> IcmpSocket<'a> {
  69. /// Create an ICMP socket with the given buffers.
  70. pub fn new(rx_buffer: IcmpSocketBuffer<'a>, tx_buffer: IcmpSocketBuffer<'a>) -> IcmpSocket<'a> {
  71. IcmpSocket {
  72. rx_buffer: rx_buffer,
  73. tx_buffer: tx_buffer,
  74. endpoint: Endpoint::default(),
  75. hop_limit: None,
  76. #[cfg(feature = "async")]
  77. rx_waker: WakerRegistration::new(),
  78. #[cfg(feature = "async")]
  79. tx_waker: WakerRegistration::new(),
  80. }
  81. }
  82. /// Register a waker for receive operations.
  83. ///
  84. /// The waker is woken on state changes that might affect the return value
  85. /// of `recv` method calls, such as receiving data, or the socket closing.
  86. ///
  87. /// Notes:
  88. ///
  89. /// - Only one waker can be registered at a time. If another waker was previously registered,
  90. /// it is overwritten and will no longer be woken.
  91. /// - The Waker is woken only once. Once woken, you must register it again to receive more wakes.
  92. /// - "Spurious wakes" are allowed: a wake doesn't guarantee the result of `recv` has
  93. /// necessarily changed.
  94. #[cfg(feature = "async")]
  95. pub fn register_recv_waker(&mut self, waker: &Waker) {
  96. self.rx_waker.register(waker)
  97. }
  98. /// Register a waker for send operations.
  99. ///
  100. /// The waker is woken on state changes that might affect the return value
  101. /// of `send` method calls, such as space becoming available in the transmit
  102. /// buffer, or the socket closing.
  103. ///
  104. /// Notes:
  105. ///
  106. /// - Only one waker can be registered at a time. If another waker was previously registered,
  107. /// it is overwritten and will no longer be woken.
  108. /// - The Waker is woken only once. Once woken, you must register it again to receive more wakes.
  109. /// - "Spurious wakes" are allowed: a wake doesn't guarantee the result of `send` has
  110. /// necessarily changed.
  111. #[cfg(feature = "async")]
  112. pub fn register_send_waker(&mut self, waker: &Waker) {
  113. self.tx_waker.register(waker)
  114. }
  115. /// Return the time-to-live (IPv4) or hop limit (IPv6) value used in outgoing packets.
  116. ///
  117. /// See also the [set_hop_limit](#method.set_hop_limit) method
  118. pub fn hop_limit(&self) -> Option<u8> {
  119. self.hop_limit
  120. }
  121. /// Set the time-to-live (IPv4) or hop limit (IPv6) value used in outgoing packets.
  122. ///
  123. /// A socket without an explicitly set hop limit value uses the default [IANA recommended]
  124. /// value (64).
  125. ///
  126. /// # Panics
  127. ///
  128. /// This function panics if a hop limit value of 0 is given. See [RFC 1122 § 3.2.1.7].
  129. ///
  130. /// [IANA recommended]: https://www.iana.org/assignments/ip-parameters/ip-parameters.xhtml
  131. /// [RFC 1122 § 3.2.1.7]: https://tools.ietf.org/html/rfc1122#section-3.2.1.7
  132. pub fn set_hop_limit(&mut self, hop_limit: Option<u8>) {
  133. // A host MUST NOT send a datagram with a hop limit value of 0
  134. if let Some(0) = hop_limit {
  135. panic!("the time-to-live value of a packet must not be zero")
  136. }
  137. self.hop_limit = hop_limit
  138. }
  139. /// Bind the socket to the given endpoint.
  140. ///
  141. /// This function returns `Err(Error::Illegal)` if the socket was open
  142. /// (see [is_open](#method.is_open)), and `Err(Error::Unaddressable)`
  143. /// if `endpoint` is unspecified (see [is_specified]).
  144. ///
  145. /// # Examples
  146. ///
  147. /// ## Bind to ICMP Error messages associated with a specific UDP port:
  148. ///
  149. /// To [recv] ICMP error messages that are associated with a specific local
  150. /// UDP port, the socket may be bound to a given port using [IcmpEndpoint::Udp].
  151. /// This may be useful for applications using UDP attempting to detect and/or
  152. /// diagnose connection problems.
  153. ///
  154. /// ```
  155. /// # use smoltcp::socket::{Socket, IcmpSocket, IcmpSocketBuffer, IcmpPacketMetadata};
  156. /// # let rx_buffer = IcmpSocketBuffer::new(vec![IcmpPacketMetadata::EMPTY], vec![0; 20]);
  157. /// # let tx_buffer = IcmpSocketBuffer::new(vec![IcmpPacketMetadata::EMPTY], vec![0; 20]);
  158. /// use smoltcp::wire::IpEndpoint;
  159. /// use smoltcp::socket::IcmpEndpoint;
  160. ///
  161. /// let mut icmp_socket = // ...
  162. /// # IcmpSocket::new(rx_buffer, tx_buffer);
  163. ///
  164. /// // Bind to ICMP error responses for UDP packets sent from port 53.
  165. /// let endpoint = IpEndpoint::from(53);
  166. /// icmp_socket.bind(IcmpEndpoint::Udp(endpoint)).unwrap();
  167. /// ```
  168. ///
  169. /// ## Bind to a specific ICMP identifier:
  170. ///
  171. /// To [send] and [recv] ICMP packets that are not associated with a specific UDP
  172. /// port, the socket may be bound to a specific ICMP identifier using
  173. /// [IcmpEndpoint::Ident]. This is useful for sending and receiving Echo Request/Reply
  174. /// messages.
  175. ///
  176. /// ```
  177. /// # use smoltcp::socket::{Socket, IcmpSocket, IcmpSocketBuffer, IcmpPacketMetadata};
  178. /// # let rx_buffer = IcmpSocketBuffer::new(vec![IcmpPacketMetadata::EMPTY], vec![0; 20]);
  179. /// # let tx_buffer = IcmpSocketBuffer::new(vec![IcmpPacketMetadata::EMPTY], vec![0; 20]);
  180. /// use smoltcp::socket::IcmpEndpoint;
  181. ///
  182. /// let mut icmp_socket = // ...
  183. /// # IcmpSocket::new(rx_buffer, tx_buffer);
  184. ///
  185. /// // Bind to ICMP messages with the ICMP identifier 0x1234
  186. /// icmp_socket.bind(IcmpEndpoint::Ident(0x1234)).unwrap();
  187. /// ```
  188. ///
  189. /// [is_specified]: enum.IcmpEndpoint.html#method.is_specified
  190. /// [IcmpEndpoint::Ident]: enum.IcmpEndpoint.html#variant.Ident
  191. /// [IcmpEndpoint::Udp]: enum.IcmpEndpoint.html#variant.Udp
  192. /// [send]: #method.send
  193. /// [recv]: #method.recv
  194. pub fn bind<T: Into<Endpoint>>(&mut self, endpoint: T) -> Result<()> {
  195. let endpoint = endpoint.into();
  196. if !endpoint.is_specified() {
  197. return Err(Error::Unaddressable);
  198. }
  199. if self.is_open() {
  200. return Err(Error::Illegal);
  201. }
  202. self.endpoint = endpoint;
  203. #[cfg(feature = "async")]
  204. {
  205. self.rx_waker.wake();
  206. self.tx_waker.wake();
  207. }
  208. Ok(())
  209. }
  210. /// Check whether the transmit buffer is full.
  211. #[inline]
  212. pub fn can_send(&self) -> bool {
  213. !self.tx_buffer.is_full()
  214. }
  215. /// Check whether the receive buffer is not empty.
  216. #[inline]
  217. pub fn can_recv(&self) -> bool {
  218. !self.rx_buffer.is_empty()
  219. }
  220. /// Return the maximum number packets the socket can receive.
  221. #[inline]
  222. pub fn packet_recv_capacity(&self) -> usize {
  223. self.rx_buffer.packet_capacity()
  224. }
  225. /// Return the maximum number packets the socket can transmit.
  226. #[inline]
  227. pub fn packet_send_capacity(&self) -> usize {
  228. self.tx_buffer.packet_capacity()
  229. }
  230. /// Return the maximum number of bytes inside the recv buffer.
  231. #[inline]
  232. pub fn payload_recv_capacity(&self) -> usize {
  233. self.rx_buffer.payload_capacity()
  234. }
  235. /// Return the maximum number of bytes inside the transmit buffer.
  236. #[inline]
  237. pub fn payload_send_capacity(&self) -> usize {
  238. self.tx_buffer.payload_capacity()
  239. }
  240. /// Check whether the socket is open.
  241. #[inline]
  242. pub fn is_open(&self) -> bool {
  243. self.endpoint != Endpoint::Unspecified
  244. }
  245. /// Enqueue a packet to be sent to a given remote address, and return a pointer
  246. /// to its payload.
  247. ///
  248. /// This function returns `Err(Error::Exhausted)` if the transmit buffer is full,
  249. /// `Err(Error::Truncated)` if the requested size is larger than the packet buffer
  250. /// size, and `Err(Error::Unaddressable)` if the remote address is unspecified.
  251. pub fn send(&mut self, size: usize, endpoint: IpAddress) -> Result<&mut [u8]> {
  252. if endpoint.is_unspecified() {
  253. return Err(Error::Unaddressable);
  254. }
  255. let packet_buf = self.tx_buffer.enqueue(size, endpoint)?;
  256. net_trace!("icmp:{}: buffer to send {} octets", endpoint, size);
  257. Ok(packet_buf)
  258. }
  259. /// Enqueue a packet to be sent to a given remote address, and fill it from a slice.
  260. ///
  261. /// See also [send](#method.send).
  262. pub fn send_slice(&mut self, data: &[u8], endpoint: IpAddress) -> Result<()> {
  263. let packet_buf = self.send(data.len(), endpoint)?;
  264. packet_buf.copy_from_slice(data);
  265. Ok(())
  266. }
  267. /// Dequeue a packet received from a remote endpoint, and return the `IpAddress` as well
  268. /// as a pointer to the payload.
  269. ///
  270. /// This function returns `Err(Error::Exhausted)` if the receive buffer is empty.
  271. pub fn recv(&mut self) -> Result<(&[u8], IpAddress)> {
  272. let (endpoint, packet_buf) = self.rx_buffer.dequeue()?;
  273. net_trace!(
  274. "icmp:{}: receive {} buffered octets",
  275. endpoint,
  276. packet_buf.len()
  277. );
  278. Ok((packet_buf, endpoint))
  279. }
  280. /// Dequeue a packet received from a remote endpoint, copy the payload into the given slice,
  281. /// and return the amount of octets copied as well as the `IpAddress`
  282. ///
  283. /// See also [recv](#method.recv).
  284. pub fn recv_slice(&mut self, data: &mut [u8]) -> Result<(usize, IpAddress)> {
  285. let (buffer, endpoint) = self.recv()?;
  286. let length = cmp::min(data.len(), buffer.len());
  287. data[..length].copy_from_slice(&buffer[..length]);
  288. Ok((length, endpoint))
  289. }
  290. /// Filter determining which packets received by the interface are appended to
  291. /// the given sockets received buffer.
  292. pub(crate) fn accepts(&self, cx: &mut Context, ip_repr: &IpRepr, icmp_repr: &IcmpRepr) -> bool {
  293. match (&self.endpoint, icmp_repr) {
  294. // If we are bound to ICMP errors associated to a UDP port, only
  295. // accept Destination Unreachable messages with the data containing
  296. // a UDP packet send from the local port we are bound to.
  297. #[cfg(feature = "proto-ipv4")]
  298. (
  299. &Endpoint::Udp(endpoint),
  300. &IcmpRepr::Ipv4(Icmpv4Repr::DstUnreachable { data, .. }),
  301. ) if endpoint.addr.is_unspecified() || endpoint.addr == ip_repr.dst_addr() => {
  302. let packet = UdpPacket::new_unchecked(data);
  303. match UdpRepr::parse(
  304. &packet,
  305. &ip_repr.src_addr(),
  306. &ip_repr.dst_addr(),
  307. &cx.checksum_caps(),
  308. ) {
  309. Ok(repr) => endpoint.port == repr.src_port,
  310. Err(_) => false,
  311. }
  312. }
  313. #[cfg(feature = "proto-ipv6")]
  314. (
  315. &Endpoint::Udp(endpoint),
  316. &IcmpRepr::Ipv6(Icmpv6Repr::DstUnreachable { data, .. }),
  317. ) if endpoint.addr.is_unspecified() || endpoint.addr == ip_repr.dst_addr() => {
  318. let packet = UdpPacket::new_unchecked(data);
  319. match UdpRepr::parse(
  320. &packet,
  321. &ip_repr.src_addr(),
  322. &ip_repr.dst_addr(),
  323. &cx.checksum_caps(),
  324. ) {
  325. Ok(repr) => endpoint.port == repr.src_port,
  326. Err(_) => false,
  327. }
  328. }
  329. // If we are bound to a specific ICMP identifier value, only accept an
  330. // Echo Request/Reply with the identifier field matching the endpoint
  331. // port.
  332. #[cfg(feature = "proto-ipv4")]
  333. (
  334. &Endpoint::Ident(bound_ident),
  335. &IcmpRepr::Ipv4(Icmpv4Repr::EchoRequest { ident, .. }),
  336. )
  337. | (
  338. &Endpoint::Ident(bound_ident),
  339. &IcmpRepr::Ipv4(Icmpv4Repr::EchoReply { ident, .. }),
  340. ) => ident == bound_ident,
  341. #[cfg(feature = "proto-ipv6")]
  342. (
  343. &Endpoint::Ident(bound_ident),
  344. &IcmpRepr::Ipv6(Icmpv6Repr::EchoRequest { ident, .. }),
  345. )
  346. | (
  347. &Endpoint::Ident(bound_ident),
  348. &IcmpRepr::Ipv6(Icmpv6Repr::EchoReply { ident, .. }),
  349. ) => ident == bound_ident,
  350. _ => false,
  351. }
  352. }
  353. pub(crate) fn process(
  354. &mut self,
  355. _cx: &mut Context,
  356. ip_repr: &IpRepr,
  357. icmp_repr: &IcmpRepr,
  358. ) -> Result<()> {
  359. match *icmp_repr {
  360. #[cfg(feature = "proto-ipv4")]
  361. IcmpRepr::Ipv4(ref icmp_repr) => {
  362. let packet_buf = self
  363. .rx_buffer
  364. .enqueue(icmp_repr.buffer_len(), ip_repr.src_addr())?;
  365. icmp_repr.emit(
  366. &mut Icmpv4Packet::new_unchecked(packet_buf),
  367. &ChecksumCapabilities::default(),
  368. );
  369. net_trace!(
  370. "icmp:{}: receiving {} octets",
  371. icmp_repr.buffer_len(),
  372. packet_buf.len()
  373. );
  374. }
  375. #[cfg(feature = "proto-ipv6")]
  376. IcmpRepr::Ipv6(ref icmp_repr) => {
  377. let packet_buf = self
  378. .rx_buffer
  379. .enqueue(icmp_repr.buffer_len(), ip_repr.src_addr())?;
  380. icmp_repr.emit(
  381. &ip_repr.src_addr(),
  382. &ip_repr.dst_addr(),
  383. &mut Icmpv6Packet::new_unchecked(packet_buf),
  384. &ChecksumCapabilities::default(),
  385. );
  386. net_trace!(
  387. "icmp:{}: receiving {} octets",
  388. icmp_repr.buffer_len(),
  389. packet_buf.len()
  390. );
  391. }
  392. }
  393. #[cfg(feature = "async")]
  394. self.rx_waker.wake();
  395. Ok(())
  396. }
  397. pub(crate) fn dispatch<F>(&mut self, cx: &mut Context, emit: F) -> Result<()>
  398. where
  399. F: FnOnce(&mut Context, (IpRepr, IcmpRepr)) -> Result<()>,
  400. {
  401. let hop_limit = self.hop_limit.unwrap_or(64);
  402. self.tx_buffer.dequeue_with(|remote_endpoint, packet_buf| {
  403. net_trace!(
  404. "icmp:{}: sending {} octets",
  405. remote_endpoint,
  406. packet_buf.len()
  407. );
  408. match *remote_endpoint {
  409. #[cfg(feature = "proto-ipv4")]
  410. IpAddress::Ipv4(ipv4_addr) => {
  411. let packet = Icmpv4Packet::new_unchecked(&*packet_buf);
  412. let repr = Icmpv4Repr::parse(&packet, &ChecksumCapabilities::ignored())?;
  413. let ip_repr = IpRepr::Ipv4(Ipv4Repr {
  414. src_addr: Ipv4Address::default(),
  415. dst_addr: ipv4_addr,
  416. next_header: IpProtocol::Icmp,
  417. payload_len: repr.buffer_len(),
  418. hop_limit: hop_limit,
  419. });
  420. emit(cx, (ip_repr, IcmpRepr::Ipv4(repr)))
  421. }
  422. #[cfg(feature = "proto-ipv6")]
  423. IpAddress::Ipv6(ipv6_addr) => {
  424. let packet = Icmpv6Packet::new_unchecked(&*packet_buf);
  425. let src_addr = Ipv6Address::default();
  426. let repr = Icmpv6Repr::parse(
  427. &src_addr.into(),
  428. &ipv6_addr.into(),
  429. &packet,
  430. &ChecksumCapabilities::ignored(),
  431. )?;
  432. let ip_repr = IpRepr::Ipv6(Ipv6Repr {
  433. src_addr: src_addr,
  434. dst_addr: ipv6_addr,
  435. next_header: IpProtocol::Icmpv6,
  436. payload_len: repr.buffer_len(),
  437. hop_limit: hop_limit,
  438. });
  439. emit(cx, (ip_repr, IcmpRepr::Ipv6(repr)))
  440. }
  441. _ => Err(Error::Unaddressable),
  442. }
  443. })?;
  444. #[cfg(feature = "async")]
  445. self.tx_waker.wake();
  446. Ok(())
  447. }
  448. pub(crate) fn poll_at(&self, _cx: &mut Context) -> PollAt {
  449. if self.tx_buffer.is_empty() {
  450. PollAt::Ingress
  451. } else {
  452. PollAt::Now
  453. }
  454. }
  455. }
  456. #[cfg(test)]
  457. mod tests_common {
  458. pub use super::*;
  459. pub use crate::phy::DeviceCapabilities;
  460. pub use crate::wire::IpAddress;
  461. pub fn buffer(packets: usize) -> IcmpSocketBuffer<'static> {
  462. IcmpSocketBuffer::new(
  463. vec![IcmpPacketMetadata::EMPTY; packets],
  464. vec![0; 66 * packets],
  465. )
  466. }
  467. pub fn socket(
  468. rx_buffer: IcmpSocketBuffer<'static>,
  469. tx_buffer: IcmpSocketBuffer<'static>,
  470. ) -> IcmpSocket<'static> {
  471. IcmpSocket::new(rx_buffer, tx_buffer)
  472. }
  473. pub const LOCAL_PORT: u16 = 53;
  474. pub static UDP_REPR: UdpRepr = UdpRepr {
  475. src_port: 53,
  476. dst_port: 9090,
  477. };
  478. pub static UDP_PAYLOAD: &[u8] = &[0xff; 10];
  479. }
  480. #[cfg(all(test, feature = "proto-ipv4"))]
  481. mod test_ipv4 {
  482. use super::tests_common::*;
  483. use crate::wire::Icmpv4DstUnreachable;
  484. const REMOTE_IPV4: Ipv4Address = Ipv4Address([0x7f, 0x00, 0x00, 0x02]);
  485. const LOCAL_IPV4: Ipv4Address = Ipv4Address([0x7f, 0x00, 0x00, 0x01]);
  486. const LOCAL_END_V4: IpEndpoint = IpEndpoint {
  487. addr: IpAddress::Ipv4(LOCAL_IPV4),
  488. port: LOCAL_PORT,
  489. };
  490. static ECHOV4_REPR: Icmpv4Repr = Icmpv4Repr::EchoRequest {
  491. ident: 0x1234,
  492. seq_no: 0x5678,
  493. data: &[0xff; 16],
  494. };
  495. static LOCAL_IPV4_REPR: IpRepr = IpRepr::Ipv4(Ipv4Repr {
  496. src_addr: Ipv4Address::UNSPECIFIED,
  497. dst_addr: REMOTE_IPV4,
  498. next_header: IpProtocol::Icmp,
  499. payload_len: 24,
  500. hop_limit: 0x40,
  501. });
  502. static REMOTE_IPV4_REPR: IpRepr = IpRepr::Ipv4(Ipv4Repr {
  503. src_addr: REMOTE_IPV4,
  504. dst_addr: LOCAL_IPV4,
  505. next_header: IpProtocol::Icmp,
  506. payload_len: 24,
  507. hop_limit: 0x40,
  508. });
  509. #[test]
  510. fn test_send_unaddressable() {
  511. let mut socket = socket(buffer(0), buffer(1));
  512. assert_eq!(
  513. socket.send_slice(b"abcdef", IpAddress::default()),
  514. Err(Error::Unaddressable)
  515. );
  516. assert_eq!(socket.send_slice(b"abcdef", REMOTE_IPV4.into()), Ok(()));
  517. }
  518. #[test]
  519. fn test_send_dispatch() {
  520. let mut socket = socket(buffer(0), buffer(1));
  521. let mut cx = Context::mock();
  522. let checksum = ChecksumCapabilities::default();
  523. assert_eq!(
  524. socket.dispatch(&mut cx, |_, _| unreachable!()),
  525. Err(Error::Exhausted)
  526. );
  527. // This buffer is too long
  528. assert_eq!(
  529. socket.send_slice(&[0xff; 67], REMOTE_IPV4.into()),
  530. Err(Error::Truncated)
  531. );
  532. assert!(socket.can_send());
  533. let mut bytes = [0xff; 24];
  534. let mut packet = Icmpv4Packet::new_unchecked(&mut bytes);
  535. ECHOV4_REPR.emit(&mut packet, &checksum);
  536. assert_eq!(
  537. socket.send_slice(&packet.into_inner()[..], REMOTE_IPV4.into()),
  538. Ok(())
  539. );
  540. assert_eq!(
  541. socket.send_slice(b"123456", REMOTE_IPV4.into()),
  542. Err(Error::Exhausted)
  543. );
  544. assert!(!socket.can_send());
  545. assert_eq!(
  546. socket.dispatch(&mut cx, |_, (ip_repr, icmp_repr)| {
  547. assert_eq!(ip_repr, LOCAL_IPV4_REPR);
  548. assert_eq!(icmp_repr, ECHOV4_REPR.into());
  549. Err(Error::Unaddressable)
  550. }),
  551. Err(Error::Unaddressable)
  552. );
  553. // buffer is not taken off of the tx queue due to the error
  554. assert!(!socket.can_send());
  555. assert_eq!(
  556. socket.dispatch(&mut cx, |_, (ip_repr, icmp_repr)| {
  557. assert_eq!(ip_repr, LOCAL_IPV4_REPR);
  558. assert_eq!(icmp_repr, ECHOV4_REPR.into());
  559. Ok(())
  560. }),
  561. Ok(())
  562. );
  563. // buffer is taken off of the queue this time
  564. assert!(socket.can_send());
  565. }
  566. #[test]
  567. fn test_set_hop_limit_v4() {
  568. let mut s = socket(buffer(0), buffer(1));
  569. let mut cx = Context::mock();
  570. let checksum = ChecksumCapabilities::default();
  571. let mut bytes = [0xff; 24];
  572. let mut packet = Icmpv4Packet::new_unchecked(&mut bytes);
  573. ECHOV4_REPR.emit(&mut packet, &checksum);
  574. s.set_hop_limit(Some(0x2a));
  575. assert_eq!(
  576. s.send_slice(&packet.into_inner()[..], REMOTE_IPV4.into()),
  577. Ok(())
  578. );
  579. assert_eq!(
  580. s.dispatch(&mut cx, |_, (ip_repr, _)| {
  581. assert_eq!(
  582. ip_repr,
  583. IpRepr::Ipv4(Ipv4Repr {
  584. src_addr: Ipv4Address::UNSPECIFIED,
  585. dst_addr: REMOTE_IPV4,
  586. next_header: IpProtocol::Icmp,
  587. payload_len: ECHOV4_REPR.buffer_len(),
  588. hop_limit: 0x2a,
  589. })
  590. );
  591. Ok(())
  592. }),
  593. Ok(())
  594. );
  595. }
  596. #[test]
  597. fn test_recv_process() {
  598. let mut socket = socket(buffer(1), buffer(1));
  599. let mut cx = Context::mock();
  600. assert_eq!(socket.bind(Endpoint::Ident(0x1234)), Ok(()));
  601. assert!(!socket.can_recv());
  602. assert_eq!(socket.recv(), Err(Error::Exhausted));
  603. let checksum = ChecksumCapabilities::default();
  604. let mut bytes = [0xff; 24];
  605. let mut packet = Icmpv4Packet::new_unchecked(&mut bytes);
  606. ECHOV4_REPR.emit(&mut packet, &checksum);
  607. let data = &packet.into_inner()[..];
  608. assert!(socket.accepts(&mut cx, &REMOTE_IPV4_REPR, &ECHOV4_REPR.into()));
  609. assert_eq!(
  610. socket.process(&mut cx, &REMOTE_IPV4_REPR, &ECHOV4_REPR.into()),
  611. Ok(())
  612. );
  613. assert!(socket.can_recv());
  614. assert!(socket.accepts(&mut cx, &REMOTE_IPV4_REPR, &ECHOV4_REPR.into()));
  615. assert_eq!(
  616. socket.process(&mut cx, &REMOTE_IPV4_REPR, &ECHOV4_REPR.into()),
  617. Err(Error::Exhausted)
  618. );
  619. assert_eq!(socket.recv(), Ok((data, REMOTE_IPV4.into())));
  620. assert!(!socket.can_recv());
  621. }
  622. #[test]
  623. fn test_accept_bad_id() {
  624. let mut socket = socket(buffer(1), buffer(1));
  625. let mut cx = Context::mock();
  626. assert_eq!(socket.bind(Endpoint::Ident(0x1234)), Ok(()));
  627. let checksum = ChecksumCapabilities::default();
  628. let mut bytes = [0xff; 20];
  629. let mut packet = Icmpv4Packet::new_unchecked(&mut bytes);
  630. let icmp_repr = Icmpv4Repr::EchoRequest {
  631. ident: 0x4321,
  632. seq_no: 0x5678,
  633. data: &[0xff; 16],
  634. };
  635. icmp_repr.emit(&mut packet, &checksum);
  636. // Ensure that a packet with an identifier that isn't the bound
  637. // ID is not accepted
  638. assert!(!socket.accepts(&mut cx, &REMOTE_IPV4_REPR, &icmp_repr.into()));
  639. }
  640. #[test]
  641. fn test_accepts_udp() {
  642. let mut socket = socket(buffer(1), buffer(1));
  643. let mut cx = Context::mock();
  644. assert_eq!(socket.bind(Endpoint::Udp(LOCAL_END_V4)), Ok(()));
  645. let checksum = ChecksumCapabilities::default();
  646. let mut bytes = [0xff; 18];
  647. let mut packet = UdpPacket::new_unchecked(&mut bytes);
  648. UDP_REPR.emit(
  649. &mut packet,
  650. &REMOTE_IPV4.into(),
  651. &LOCAL_IPV4.into(),
  652. UDP_PAYLOAD.len(),
  653. |buf| buf.copy_from_slice(UDP_PAYLOAD),
  654. &checksum,
  655. );
  656. let data = &packet.into_inner()[..];
  657. let icmp_repr = Icmpv4Repr::DstUnreachable {
  658. reason: Icmpv4DstUnreachable::PortUnreachable,
  659. header: Ipv4Repr {
  660. src_addr: LOCAL_IPV4,
  661. dst_addr: REMOTE_IPV4,
  662. next_header: IpProtocol::Icmp,
  663. payload_len: 12,
  664. hop_limit: 0x40,
  665. },
  666. data: data,
  667. };
  668. let ip_repr = IpRepr::Ipv4(Ipv4Repr {
  669. src_addr: REMOTE_IPV4,
  670. dst_addr: LOCAL_IPV4,
  671. next_header: IpProtocol::Icmp,
  672. payload_len: icmp_repr.buffer_len(),
  673. hop_limit: 0x40,
  674. });
  675. assert!(!socket.can_recv());
  676. // Ensure we can accept ICMP error response to the bound
  677. // UDP port
  678. assert!(socket.accepts(&mut cx, &ip_repr, &icmp_repr.into()));
  679. assert_eq!(socket.process(&mut cx, &ip_repr, &icmp_repr.into()), Ok(()));
  680. assert!(socket.can_recv());
  681. let mut bytes = [0x00; 46];
  682. let mut packet = Icmpv4Packet::new_unchecked(&mut bytes[..]);
  683. icmp_repr.emit(&mut packet, &checksum);
  684. assert_eq!(
  685. socket.recv(),
  686. Ok((&packet.into_inner()[..], REMOTE_IPV4.into()))
  687. );
  688. assert!(!socket.can_recv());
  689. }
  690. }
  691. #[cfg(all(test, feature = "proto-ipv6"))]
  692. mod test_ipv6 {
  693. use super::tests_common::*;
  694. use crate::wire::Icmpv6DstUnreachable;
  695. const REMOTE_IPV6: Ipv6Address =
  696. Ipv6Address([0xfe, 0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1]);
  697. const LOCAL_IPV6: Ipv6Address =
  698. Ipv6Address([0xfe, 0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 2]);
  699. const LOCAL_END_V6: IpEndpoint = IpEndpoint {
  700. addr: IpAddress::Ipv6(LOCAL_IPV6),
  701. port: LOCAL_PORT,
  702. };
  703. static ECHOV6_REPR: Icmpv6Repr = Icmpv6Repr::EchoRequest {
  704. ident: 0x1234,
  705. seq_no: 0x5678,
  706. data: &[0xff; 16],
  707. };
  708. static LOCAL_IPV6_REPR: IpRepr = IpRepr::Ipv6(Ipv6Repr {
  709. src_addr: Ipv6Address::UNSPECIFIED,
  710. dst_addr: REMOTE_IPV6,
  711. next_header: IpProtocol::Icmpv6,
  712. payload_len: 24,
  713. hop_limit: 0x40,
  714. });
  715. static REMOTE_IPV6_REPR: IpRepr = IpRepr::Ipv6(Ipv6Repr {
  716. src_addr: REMOTE_IPV6,
  717. dst_addr: LOCAL_IPV6,
  718. next_header: IpProtocol::Icmpv6,
  719. payload_len: 24,
  720. hop_limit: 0x40,
  721. });
  722. #[test]
  723. fn test_send_unaddressable() {
  724. let mut socket = socket(buffer(0), buffer(1));
  725. assert_eq!(
  726. socket.send_slice(b"abcdef", IpAddress::default()),
  727. Err(Error::Unaddressable)
  728. );
  729. assert_eq!(socket.send_slice(b"abcdef", REMOTE_IPV6.into()), Ok(()));
  730. }
  731. #[test]
  732. fn test_send_dispatch() {
  733. let mut socket = socket(buffer(0), buffer(1));
  734. let mut cx = Context::mock();
  735. let checksum = ChecksumCapabilities::default();
  736. assert_eq!(
  737. socket.dispatch(&mut cx, |_, _| unreachable!()),
  738. Err(Error::Exhausted)
  739. );
  740. // This buffer is too long
  741. assert_eq!(
  742. socket.send_slice(&[0xff; 67], REMOTE_IPV6.into()),
  743. Err(Error::Truncated)
  744. );
  745. assert!(socket.can_send());
  746. let mut bytes = vec![0xff; 24];
  747. let mut packet = Icmpv6Packet::new_unchecked(&mut bytes);
  748. ECHOV6_REPR.emit(
  749. &LOCAL_IPV6.into(),
  750. &REMOTE_IPV6.into(),
  751. &mut packet,
  752. &checksum,
  753. );
  754. assert_eq!(
  755. socket.send_slice(&packet.into_inner()[..], REMOTE_IPV6.into()),
  756. Ok(())
  757. );
  758. assert_eq!(
  759. socket.send_slice(b"123456", REMOTE_IPV6.into()),
  760. Err(Error::Exhausted)
  761. );
  762. assert!(!socket.can_send());
  763. assert_eq!(
  764. socket.dispatch(&mut cx, |_, (ip_repr, icmp_repr)| {
  765. assert_eq!(ip_repr, LOCAL_IPV6_REPR);
  766. assert_eq!(icmp_repr, ECHOV6_REPR.into());
  767. Err(Error::Unaddressable)
  768. }),
  769. Err(Error::Unaddressable)
  770. );
  771. // buffer is not taken off of the tx queue due to the error
  772. assert!(!socket.can_send());
  773. assert_eq!(
  774. socket.dispatch(&mut cx, |_, (ip_repr, icmp_repr)| {
  775. assert_eq!(ip_repr, LOCAL_IPV6_REPR);
  776. assert_eq!(icmp_repr, ECHOV6_REPR.into());
  777. Ok(())
  778. }),
  779. Ok(())
  780. );
  781. // buffer is taken off of the queue this time
  782. assert!(socket.can_send());
  783. }
  784. #[test]
  785. fn test_set_hop_limit() {
  786. let mut s = socket(buffer(0), buffer(1));
  787. let mut cx = Context::mock();
  788. let checksum = ChecksumCapabilities::default();
  789. let mut bytes = vec![0xff; 24];
  790. let mut packet = Icmpv6Packet::new_unchecked(&mut bytes);
  791. ECHOV6_REPR.emit(
  792. &LOCAL_IPV6.into(),
  793. &REMOTE_IPV6.into(),
  794. &mut packet,
  795. &checksum,
  796. );
  797. s.set_hop_limit(Some(0x2a));
  798. assert_eq!(
  799. s.send_slice(&packet.into_inner()[..], REMOTE_IPV6.into()),
  800. Ok(())
  801. );
  802. assert_eq!(
  803. s.dispatch(&mut cx, |_, (ip_repr, _)| {
  804. assert_eq!(
  805. ip_repr,
  806. IpRepr::Ipv6(Ipv6Repr {
  807. src_addr: Ipv6Address::UNSPECIFIED,
  808. dst_addr: REMOTE_IPV6,
  809. next_header: IpProtocol::Icmpv6,
  810. payload_len: ECHOV6_REPR.buffer_len(),
  811. hop_limit: 0x2a,
  812. })
  813. );
  814. Ok(())
  815. }),
  816. Ok(())
  817. );
  818. }
  819. #[test]
  820. fn test_recv_process() {
  821. let mut socket = socket(buffer(1), buffer(1));
  822. let mut cx = Context::mock();
  823. assert_eq!(socket.bind(Endpoint::Ident(0x1234)), Ok(()));
  824. assert!(!socket.can_recv());
  825. assert_eq!(socket.recv(), Err(Error::Exhausted));
  826. let checksum = ChecksumCapabilities::default();
  827. let mut bytes = [0xff; 24];
  828. let mut packet = Icmpv6Packet::new_unchecked(&mut bytes);
  829. ECHOV6_REPR.emit(
  830. &LOCAL_IPV6.into(),
  831. &REMOTE_IPV6.into(),
  832. &mut packet,
  833. &checksum,
  834. );
  835. let data = &packet.into_inner()[..];
  836. assert!(socket.accepts(&mut cx, &REMOTE_IPV6_REPR, &ECHOV6_REPR.into()));
  837. assert_eq!(
  838. socket.process(&mut cx, &REMOTE_IPV6_REPR, &ECHOV6_REPR.into()),
  839. Ok(())
  840. );
  841. assert!(socket.can_recv());
  842. assert!(socket.accepts(&mut cx, &REMOTE_IPV6_REPR, &ECHOV6_REPR.into()));
  843. assert_eq!(
  844. socket.process(&mut cx, &REMOTE_IPV6_REPR, &ECHOV6_REPR.into()),
  845. Err(Error::Exhausted)
  846. );
  847. assert_eq!(socket.recv(), Ok((data, REMOTE_IPV6.into())));
  848. assert!(!socket.can_recv());
  849. }
  850. #[test]
  851. fn test_accept_bad_id() {
  852. let mut socket = socket(buffer(1), buffer(1));
  853. let mut cx = Context::mock();
  854. assert_eq!(socket.bind(Endpoint::Ident(0x1234)), Ok(()));
  855. let checksum = ChecksumCapabilities::default();
  856. let mut bytes = [0xff; 20];
  857. let mut packet = Icmpv6Packet::new_unchecked(&mut bytes);
  858. let icmp_repr = Icmpv6Repr::EchoRequest {
  859. ident: 0x4321,
  860. seq_no: 0x5678,
  861. data: &[0xff; 16],
  862. };
  863. icmp_repr.emit(
  864. &LOCAL_IPV6.into(),
  865. &REMOTE_IPV6.into(),
  866. &mut packet,
  867. &checksum,
  868. );
  869. // Ensure that a packet with an identifier that isn't the bound
  870. // ID is not accepted
  871. assert!(!socket.accepts(&mut cx, &REMOTE_IPV6_REPR, &icmp_repr.into()));
  872. }
  873. #[test]
  874. fn test_accepts_udp() {
  875. let mut socket = socket(buffer(1), buffer(1));
  876. let mut cx = Context::mock();
  877. assert_eq!(socket.bind(Endpoint::Udp(LOCAL_END_V6)), Ok(()));
  878. let checksum = ChecksumCapabilities::default();
  879. let mut bytes = [0xff; 18];
  880. let mut packet = UdpPacket::new_unchecked(&mut bytes);
  881. UDP_REPR.emit(
  882. &mut packet,
  883. &REMOTE_IPV6.into(),
  884. &LOCAL_IPV6.into(),
  885. UDP_PAYLOAD.len(),
  886. |buf| buf.copy_from_slice(UDP_PAYLOAD),
  887. &checksum,
  888. );
  889. let data = &packet.into_inner()[..];
  890. let icmp_repr = Icmpv6Repr::DstUnreachable {
  891. reason: Icmpv6DstUnreachable::PortUnreachable,
  892. header: Ipv6Repr {
  893. src_addr: LOCAL_IPV6,
  894. dst_addr: REMOTE_IPV6,
  895. next_header: IpProtocol::Icmpv6,
  896. payload_len: 12,
  897. hop_limit: 0x40,
  898. },
  899. data: data,
  900. };
  901. let ip_repr = IpRepr::Ipv6(Ipv6Repr {
  902. src_addr: REMOTE_IPV6,
  903. dst_addr: LOCAL_IPV6,
  904. next_header: IpProtocol::Icmpv6,
  905. payload_len: icmp_repr.buffer_len(),
  906. hop_limit: 0x40,
  907. });
  908. assert!(!socket.can_recv());
  909. // Ensure we can accept ICMP error response to the bound
  910. // UDP port
  911. assert!(socket.accepts(&mut cx, &ip_repr, &icmp_repr.into()));
  912. assert_eq!(socket.process(&mut cx, &ip_repr, &icmp_repr.into()), Ok(()));
  913. assert!(socket.can_recv());
  914. let mut bytes = [0x00; 66];
  915. let mut packet = Icmpv6Packet::new_unchecked(&mut bytes[..]);
  916. icmp_repr.emit(
  917. &LOCAL_IPV6.into(),
  918. &REMOTE_IPV6.into(),
  919. &mut packet,
  920. &checksum,
  921. );
  922. assert_eq!(
  923. socket.recv(),
  924. Ok((&packet.into_inner()[..], REMOTE_IPV6.into()))
  925. );
  926. assert!(!socket.can_recv());
  927. }
  928. }