smoltcp/wire/ipv6fragment.rs
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283
use super::{Error, Result};
use core::fmt;
use byteorder::{ByteOrder, NetworkEndian};
/// A read/write wrapper around an IPv6 Fragment Header.
#[derive(Debug, PartialEq, Eq)]
#[cfg_attr(feature = "defmt", derive(defmt::Format))]
pub struct Header<T: AsRef<[u8]>> {
buffer: T,
}
// Format of the Fragment Header
//
// +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
// | Next Header | Reserved | Fragment Offset |Res|M|
// +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
// | Identification |
// +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
//
// See https://tools.ietf.org/html/rfc8200#section-4.5 for details.
//
// **NOTE**: The fields start counting after the header length field.
mod field {
use crate::wire::field::*;
// 16-bit field containing the fragment offset, reserved and more fragments values.
pub const FR_OF_M: Field = 0..2;
// 32-bit field identifying the fragmented packet
pub const IDENT: Field = 2..6;
/// 1 bit flag indicating if there are more fragments coming.
pub const M: usize = 1;
}
impl<T: AsRef<[u8]>> Header<T> {
/// Create a raw octet buffer with an IPv6 Fragment Header structure.
pub const fn new_unchecked(buffer: T) -> Header<T> {
Header { buffer }
}
/// Shorthand for a combination of [new_unchecked] and [check_len].
///
/// [new_unchecked]: #method.new_unchecked
/// [check_len]: #method.check_len
pub fn new_checked(buffer: T) -> Result<Header<T>> {
let header = Self::new_unchecked(buffer);
header.check_len()?;
Ok(header)
}
/// Ensure that no accessor method will panic if called.
/// Returns `Err(Error)` if the buffer is too short.
pub fn check_len(&self) -> Result<()> {
let data = self.buffer.as_ref();
let len = data.len();
if len < field::IDENT.end {
Err(Error)
} else {
Ok(())
}
}
/// Consume the header, returning the underlying buffer.
pub fn into_inner(self) -> T {
self.buffer
}
/// Return the fragment offset field.
#[inline]
pub fn frag_offset(&self) -> u16 {
let data = self.buffer.as_ref();
NetworkEndian::read_u16(&data[field::FR_OF_M]) >> 3
}
/// Return more fragment flag field.
#[inline]
pub fn more_frags(&self) -> bool {
let data = self.buffer.as_ref();
(data[field::M] & 0x1) == 1
}
/// Return the fragment identification value field.
#[inline]
pub fn ident(&self) -> u32 {
let data = self.buffer.as_ref();
NetworkEndian::read_u32(&data[field::IDENT])
}
}
impl<T: AsRef<[u8]> + AsMut<[u8]>> Header<T> {
/// Set reserved fields.
///
/// Set 8-bit reserved field after the next header field.
/// Set 2-bit reserved field between fragment offset and more fragments.
#[inline]
pub fn clear_reserved(&mut self) {
let data = self.buffer.as_mut();
// Retain the higher order 5 bits and lower order 1 bit
data[field::M] &= 0xf9;
}
/// Set the fragment offset field.
#[inline]
pub fn set_frag_offset(&mut self, value: u16) {
let data = self.buffer.as_mut();
// Retain the lower order 3 bits
let raw = ((value & 0x1fff) << 3) | ((data[field::M] & 0x7) as u16);
NetworkEndian::write_u16(&mut data[field::FR_OF_M], raw);
}
/// Set the more fragments flag field.
#[inline]
pub fn set_more_frags(&mut self, value: bool) {
let data = self.buffer.as_mut();
// Retain the high order 7 bits
let raw = (data[field::M] & 0xfe) | (value as u8 & 0x1);
data[field::M] = raw;
}
/// Set the fragmentation identification field.
#[inline]
pub fn set_ident(&mut self, value: u32) {
let data = self.buffer.as_mut();
NetworkEndian::write_u32(&mut data[field::IDENT], value);
}
}
impl<'a, T: AsRef<[u8]> + ?Sized> fmt::Display for Header<&'a T> {
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
match Repr::parse(self) {
Ok(repr) => write!(f, "{repr}"),
Err(err) => {
write!(f, "IPv6 Fragment ({err})")?;
Ok(())
}
}
}
}
/// A high-level representation of an IPv6 Fragment header.
#[derive(Debug, PartialEq, Eq, Clone, Copy)]
#[cfg_attr(feature = "defmt", derive(defmt::Format))]
pub struct Repr {
/// The offset of the data following this header, relative to the start of the Fragmentable
/// Part of the original packet.
pub frag_offset: u16,
/// When there are more fragments following this header
pub more_frags: bool,
/// The identification for every packet that is fragmented.
pub ident: u32,
}
impl Repr {
/// Parse an IPv6 Fragment Header and return a high-level representation.
pub fn parse<T>(header: &Header<&T>) -> Result<Repr>
where
T: AsRef<[u8]> + ?Sized,
{
Ok(Repr {
frag_offset: header.frag_offset(),
more_frags: header.more_frags(),
ident: header.ident(),
})
}
/// Return the length, in bytes, of a header that will be emitted from this high-level
/// representation.
pub const fn buffer_len(&self) -> usize {
field::IDENT.end
}
/// Emit a high-level representation into an IPv6 Fragment Header.
pub fn emit<T: AsRef<[u8]> + AsMut<[u8]> + ?Sized>(&self, header: &mut Header<&mut T>) {
header.clear_reserved();
header.set_frag_offset(self.frag_offset);
header.set_more_frags(self.more_frags);
header.set_ident(self.ident);
}
}
impl fmt::Display for Repr {
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
write!(
f,
"IPv6 Fragment offset={} more={} ident={}",
self.frag_offset, self.more_frags, self.ident
)
}
}
#[cfg(test)]
mod test {
use super::*;
// A Fragment Header with more fragments remaining
static BYTES_HEADER_MORE_FRAG: [u8; 6] = [0x0, 0x1, 0x0, 0x0, 0x30, 0x39];
// A Fragment Header with no more fragments remaining
static BYTES_HEADER_LAST_FRAG: [u8; 6] = [0xa, 0x0, 0x0, 0x1, 0x9, 0x32];
#[test]
fn test_check_len() {
// less than 6 bytes
assert_eq!(
Err(Error),
Header::new_unchecked(&BYTES_HEADER_MORE_FRAG[..5]).check_len()
);
// valid
assert_eq!(
Ok(()),
Header::new_unchecked(&BYTES_HEADER_MORE_FRAG).check_len()
);
}
#[test]
fn test_header_deconstruct() {
let header = Header::new_unchecked(&BYTES_HEADER_MORE_FRAG);
assert_eq!(header.frag_offset(), 0);
assert!(header.more_frags());
assert_eq!(header.ident(), 12345);
let header = Header::new_unchecked(&BYTES_HEADER_LAST_FRAG);
assert_eq!(header.frag_offset(), 320);
assert!(!header.more_frags());
assert_eq!(header.ident(), 67890);
}
#[test]
fn test_repr_parse_valid() {
let header = Header::new_unchecked(&BYTES_HEADER_MORE_FRAG);
let repr = Repr::parse(&header).unwrap();
assert_eq!(
repr,
Repr {
frag_offset: 0,
more_frags: true,
ident: 12345
}
);
let header = Header::new_unchecked(&BYTES_HEADER_LAST_FRAG);
let repr = Repr::parse(&header).unwrap();
assert_eq!(
repr,
Repr {
frag_offset: 320,
more_frags: false,
ident: 67890
}
);
}
#[test]
fn test_repr_emit() {
let repr = Repr {
frag_offset: 0,
more_frags: true,
ident: 12345,
};
let mut bytes = [0u8; 6];
let mut header = Header::new_unchecked(&mut bytes);
repr.emit(&mut header);
assert_eq!(header.into_inner(), &BYTES_HEADER_MORE_FRAG[0..6]);
let repr = Repr {
frag_offset: 320,
more_frags: false,
ident: 67890,
};
let mut bytes = [0u8; 6];
let mut header = Header::new_unchecked(&mut bytes);
repr.emit(&mut header);
assert_eq!(header.into_inner(), &BYTES_HEADER_LAST_FRAG[0..6]);
}
#[test]
fn test_buffer_len() {
let header = Header::new_unchecked(&BYTES_HEADER_MORE_FRAG);
let repr = Repr::parse(&header).unwrap();
assert_eq!(repr.buffer_len(), BYTES_HEADER_MORE_FRAG.len());
}
}