1032 lines
34 KiB
Rust
1032 lines
34 KiB
Rust
use crate::socket::SocketHandle;
|
|
use crate::socket::{Context, SocketMeta};
|
|
use crate::time::{Duration, Instant};
|
|
use crate::wire::dhcpv4::field as dhcpv4_field;
|
|
use crate::wire::HardwareAddress;
|
|
use crate::wire::{
|
|
DhcpMessageType, DhcpPacket, DhcpRepr, IpAddress, IpProtocol, Ipv4Address, Ipv4Cidr, Ipv4Repr,
|
|
UdpRepr, DHCP_CLIENT_PORT, DHCP_MAX_DNS_SERVER_COUNT, DHCP_SERVER_PORT, UDP_HEADER_LEN,
|
|
};
|
|
use crate::{Error, Result};
|
|
|
|
use super::{PollAt, Socket};
|
|
|
|
const DISCOVER_TIMEOUT: Duration = Duration::from_secs(10);
|
|
|
|
// timeout doubles every 2 tries.
|
|
// total time 5 + 5 + 10 + 10 + 20 = 50s
|
|
const REQUEST_TIMEOUT: Duration = Duration::from_secs(5);
|
|
const REQUEST_RETRIES: u16 = 5;
|
|
|
|
const MIN_RENEW_TIMEOUT: Duration = Duration::from_secs(60);
|
|
|
|
const DEFAULT_LEASE_DURATION: Duration = Duration::from_secs(120);
|
|
|
|
const PARAMETER_REQUEST_LIST: &[u8] = &[
|
|
dhcpv4_field::OPT_SUBNET_MASK,
|
|
dhcpv4_field::OPT_ROUTER,
|
|
dhcpv4_field::OPT_DOMAIN_NAME_SERVER,
|
|
];
|
|
|
|
/// IPv4 configuration data provided by the DHCP server.
|
|
#[derive(Debug, Eq, PartialEq)]
|
|
#[cfg_attr(feature = "defmt", derive(defmt::Format))]
|
|
pub struct Config {
|
|
/// IP address
|
|
pub address: Ipv4Cidr,
|
|
/// Router address, also known as default gateway. Does not necessarily
|
|
/// match the DHCP server's address.
|
|
pub router: Option<Ipv4Address>,
|
|
/// DNS servers
|
|
pub dns_servers: [Option<Ipv4Address>; DHCP_MAX_DNS_SERVER_COUNT],
|
|
}
|
|
|
|
/// Information on how to reach a DHCP server.
|
|
#[derive(Debug, Clone, Copy)]
|
|
#[cfg_attr(feature = "defmt", derive(defmt::Format))]
|
|
struct ServerInfo {
|
|
/// IP address to use as destination in outgoing packets
|
|
address: Ipv4Address,
|
|
/// Server identifier to use in outgoing packets. Usually equal to server_address,
|
|
/// but may differ in some situations (eg DHCP relays)
|
|
identifier: Ipv4Address,
|
|
}
|
|
|
|
#[derive(Debug)]
|
|
#[cfg_attr(feature = "defmt", derive(defmt::Format))]
|
|
struct DiscoverState {
|
|
/// When to send next request
|
|
retry_at: Instant,
|
|
}
|
|
|
|
#[derive(Debug)]
|
|
#[cfg_attr(feature = "defmt", derive(defmt::Format))]
|
|
struct RequestState {
|
|
/// When to send next request
|
|
retry_at: Instant,
|
|
/// How many retries have been done
|
|
retry: u16,
|
|
/// Server we're trying to request from
|
|
server: ServerInfo,
|
|
/// IP address that we're trying to request.
|
|
requested_ip: Ipv4Address,
|
|
}
|
|
|
|
#[derive(Debug)]
|
|
#[cfg_attr(feature = "defmt", derive(defmt::Format))]
|
|
struct RenewState {
|
|
/// Server that gave us the lease
|
|
server: ServerInfo,
|
|
/// Active network config
|
|
config: Config,
|
|
|
|
/// Renew timer. When reached, we will start attempting
|
|
/// to renew this lease with the DHCP server.
|
|
/// Must be less or equal than `expires_at`.
|
|
renew_at: Instant,
|
|
/// Expiration timer. When reached, this lease is no longer valid, so it must be
|
|
/// thrown away and the ethernet interface deconfigured.
|
|
expires_at: Instant,
|
|
}
|
|
|
|
#[derive(Debug)]
|
|
#[cfg_attr(feature = "defmt", derive(defmt::Format))]
|
|
enum ClientState {
|
|
/// Discovering the DHCP server
|
|
Discovering(DiscoverState),
|
|
/// Requesting an address
|
|
Requesting(RequestState),
|
|
/// Having an address, refresh it periodically.
|
|
Renewing(RenewState),
|
|
}
|
|
|
|
/// Return value for the `Dhcpv4Socket::poll` function
|
|
#[derive(Debug, PartialEq, Eq)]
|
|
#[cfg_attr(feature = "defmt", derive(defmt::Format))]
|
|
pub enum Event<'a> {
|
|
/// Configuration has been lost (for example, the lease has expired)
|
|
Deconfigured,
|
|
/// Configuration has been newly acquired, or modified.
|
|
Configured(&'a Config),
|
|
}
|
|
|
|
#[derive(Debug)]
|
|
pub struct Dhcpv4Socket {
|
|
pub(crate) meta: SocketMeta,
|
|
/// State of the DHCP client.
|
|
state: ClientState,
|
|
/// Set to true on config/state change, cleared back to false by the `config` function.
|
|
config_changed: bool,
|
|
/// xid of the last sent message.
|
|
transaction_id: u32,
|
|
|
|
/// Max lease duration. If set, it sets a maximum cap to the server-provided lease duration.
|
|
/// Useful to react faster to IP configuration changes and to test whether renews work correctly.
|
|
max_lease_duration: Option<Duration>,
|
|
|
|
/// Ignore NAKs.
|
|
ignore_naks: bool,
|
|
}
|
|
|
|
/// DHCP client socket.
|
|
///
|
|
/// The socket acquires an IP address configuration through DHCP autonomously.
|
|
/// You must query the configuration with `.poll()` after every call to `Interface::poll()`,
|
|
/// and apply the configuration to the `Interface`.
|
|
impl Dhcpv4Socket {
|
|
/// Create a DHCPv4 socket
|
|
#[allow(clippy::new_without_default)]
|
|
pub fn new() -> Self {
|
|
Dhcpv4Socket {
|
|
meta: SocketMeta::default(),
|
|
state: ClientState::Discovering(DiscoverState {
|
|
retry_at: Instant::from_millis(0),
|
|
}),
|
|
config_changed: true,
|
|
transaction_id: 1,
|
|
max_lease_duration: None,
|
|
ignore_naks: false,
|
|
}
|
|
}
|
|
|
|
/// Get the configured max lease duration.
|
|
///
|
|
/// See also [`Self::set_max_lease_duration()`]
|
|
pub fn max_lease_duration(&self) -> Option<Duration> {
|
|
self.max_lease_duration
|
|
}
|
|
|
|
/// Set the max lease duration.
|
|
///
|
|
/// When set, the lease duration will be capped at the configured duration if the
|
|
/// DHCP server gives us a longer lease. This is generally not recommended, but
|
|
/// can be useful for debugging or reacting faster to network configuration changes.
|
|
///
|
|
/// If None, no max is applied (the lease duration from the DHCP server is used.)
|
|
pub fn set_max_lease_duration(&mut self, max_lease_duration: Option<Duration>) {
|
|
self.max_lease_duration = max_lease_duration;
|
|
}
|
|
|
|
/// Get whether to ignore NAKs.
|
|
///
|
|
/// See also [`Self::set_ignore_naks()`]
|
|
pub fn ignore_naks(&self) -> bool {
|
|
self.ignore_naks
|
|
}
|
|
|
|
/// Set whether to ignore NAKs.
|
|
///
|
|
/// This is not compliant with the DHCP RFCs, since theoretically
|
|
/// we must stop using the assigned IP when receiving a NAK. This
|
|
/// can increase reliability on broken networks with buggy routers
|
|
/// or rogue DHCP servers, however.
|
|
pub fn set_ignore_naks(&mut self, ignore_naks: bool) {
|
|
self.ignore_naks = ignore_naks;
|
|
}
|
|
|
|
pub(crate) fn poll_at(&self, _cx: &Context) -> PollAt {
|
|
let t = match &self.state {
|
|
ClientState::Discovering(state) => state.retry_at,
|
|
ClientState::Requesting(state) => state.retry_at,
|
|
ClientState::Renewing(state) => state.renew_at.min(state.expires_at),
|
|
};
|
|
PollAt::Time(t)
|
|
}
|
|
|
|
pub(crate) fn process(
|
|
&mut self,
|
|
cx: &Context,
|
|
ip_repr: &Ipv4Repr,
|
|
repr: &UdpRepr,
|
|
payload: &[u8],
|
|
) -> Result<()> {
|
|
let src_ip = ip_repr.src_addr;
|
|
|
|
// This is enforced in interface.rs.
|
|
assert!(repr.src_port == DHCP_SERVER_PORT && repr.dst_port == DHCP_CLIENT_PORT);
|
|
|
|
let dhcp_packet = match DhcpPacket::new_checked(payload) {
|
|
Ok(dhcp_packet) => dhcp_packet,
|
|
Err(e) => {
|
|
net_debug!("DHCP invalid pkt from {}: {:?}", src_ip, e);
|
|
return Ok(());
|
|
}
|
|
};
|
|
let dhcp_repr = match DhcpRepr::parse(&dhcp_packet) {
|
|
Ok(dhcp_repr) => dhcp_repr,
|
|
Err(e) => {
|
|
net_debug!("DHCP error parsing pkt from {}: {:?}", src_ip, e);
|
|
return Ok(());
|
|
}
|
|
};
|
|
let hardware_addr = if let Some(HardwareAddress::Ethernet(addr)) = cx.hardware_addr {
|
|
addr
|
|
} else {
|
|
return Err(Error::Malformed);
|
|
};
|
|
|
|
if dhcp_repr.client_hardware_address != hardware_addr {
|
|
return Ok(());
|
|
}
|
|
if dhcp_repr.transaction_id != self.transaction_id {
|
|
return Ok(());
|
|
}
|
|
let server_identifier = match dhcp_repr.server_identifier {
|
|
Some(server_identifier) => server_identifier,
|
|
None => {
|
|
net_debug!(
|
|
"DHCP ignoring {:?} because missing server_identifier",
|
|
dhcp_repr.message_type
|
|
);
|
|
return Ok(());
|
|
}
|
|
};
|
|
|
|
net_debug!(
|
|
"DHCP recv {:?} from {}: {:?}",
|
|
dhcp_repr.message_type,
|
|
src_ip,
|
|
dhcp_repr
|
|
);
|
|
|
|
match (&mut self.state, dhcp_repr.message_type) {
|
|
(ClientState::Discovering(_state), DhcpMessageType::Offer) => {
|
|
if !dhcp_repr.your_ip.is_unicast() {
|
|
net_debug!("DHCP ignoring OFFER because your_ip is not unicast");
|
|
return Ok(());
|
|
}
|
|
|
|
self.state = ClientState::Requesting(RequestState {
|
|
retry_at: cx.now,
|
|
retry: 0,
|
|
server: ServerInfo {
|
|
address: src_ip,
|
|
identifier: server_identifier,
|
|
},
|
|
requested_ip: dhcp_repr.your_ip, // use the offered ip
|
|
});
|
|
}
|
|
(ClientState::Requesting(state), DhcpMessageType::Ack) => {
|
|
if let Some((config, renew_at, expires_at)) =
|
|
Self::parse_ack(cx.now, &dhcp_repr, self.max_lease_duration)
|
|
{
|
|
self.config_changed = true;
|
|
self.state = ClientState::Renewing(RenewState {
|
|
server: state.server,
|
|
config,
|
|
renew_at,
|
|
expires_at,
|
|
});
|
|
}
|
|
}
|
|
(ClientState::Requesting(_), DhcpMessageType::Nak) => {
|
|
if !self.ignore_naks {
|
|
self.reset();
|
|
}
|
|
}
|
|
(ClientState::Renewing(state), DhcpMessageType::Ack) => {
|
|
if let Some((config, renew_at, expires_at)) =
|
|
Self::parse_ack(cx.now, &dhcp_repr, self.max_lease_duration)
|
|
{
|
|
state.renew_at = renew_at;
|
|
state.expires_at = expires_at;
|
|
if state.config != config {
|
|
self.config_changed = true;
|
|
state.config = config;
|
|
}
|
|
}
|
|
}
|
|
(ClientState::Renewing(_), DhcpMessageType::Nak) => {
|
|
if !self.ignore_naks {
|
|
self.reset();
|
|
}
|
|
}
|
|
_ => {
|
|
net_debug!(
|
|
"DHCP ignoring {:?}: unexpected in current state",
|
|
dhcp_repr.message_type
|
|
);
|
|
}
|
|
}
|
|
|
|
Ok(())
|
|
}
|
|
|
|
fn parse_ack(
|
|
now: Instant,
|
|
dhcp_repr: &DhcpRepr,
|
|
max_lease_duration: Option<Duration>,
|
|
) -> Option<(Config, Instant, Instant)> {
|
|
let subnet_mask = match dhcp_repr.subnet_mask {
|
|
Some(subnet_mask) => subnet_mask,
|
|
None => {
|
|
net_debug!("DHCP ignoring ACK because missing subnet_mask");
|
|
return None;
|
|
}
|
|
};
|
|
|
|
let prefix_len = match IpAddress::Ipv4(subnet_mask).prefix_len() {
|
|
Some(prefix_len) => prefix_len,
|
|
None => {
|
|
net_debug!("DHCP ignoring ACK because subnet_mask is not a valid mask");
|
|
return None;
|
|
}
|
|
};
|
|
|
|
if !dhcp_repr.your_ip.is_unicast() {
|
|
net_debug!("DHCP ignoring ACK because your_ip is not unicast");
|
|
return None;
|
|
}
|
|
|
|
let mut lease_duration = dhcp_repr
|
|
.lease_duration
|
|
.map(|d| Duration::from_secs(d as _))
|
|
.unwrap_or(DEFAULT_LEASE_DURATION);
|
|
if let Some(max_lease_duration) = max_lease_duration {
|
|
lease_duration = lease_duration.min(max_lease_duration);
|
|
}
|
|
|
|
// Cleanup the DNS servers list, keeping only unicasts/
|
|
// TP-Link TD-W8970 sends 0.0.0.0 as second DNS server if there's only one configured :(
|
|
let mut dns_servers = [None; DHCP_MAX_DNS_SERVER_COUNT];
|
|
if let Some(received) = dhcp_repr.dns_servers {
|
|
let mut i = 0;
|
|
for addr in received.iter().flatten() {
|
|
if addr.is_unicast() {
|
|
// This can never be out-of-bounds since both arrays have length DHCP_MAX_DNS_SERVER_COUNT
|
|
dns_servers[i] = Some(*addr);
|
|
i += 1;
|
|
}
|
|
}
|
|
}
|
|
let config = Config {
|
|
address: Ipv4Cidr::new(dhcp_repr.your_ip, prefix_len),
|
|
router: dhcp_repr.router,
|
|
dns_servers: dns_servers,
|
|
};
|
|
|
|
// RFC 2131 indicates clients should renew a lease halfway through its expiration.
|
|
let renew_at = now + lease_duration / 2;
|
|
let expires_at = now + lease_duration;
|
|
|
|
Some((config, renew_at, expires_at))
|
|
}
|
|
|
|
#[cfg(not(test))]
|
|
fn random_transaction_id() -> u32 {
|
|
crate::rand::rand_u32()
|
|
}
|
|
|
|
#[cfg(test)]
|
|
fn random_transaction_id() -> u32 {
|
|
0x12345678
|
|
}
|
|
|
|
pub(crate) fn dispatch<F>(&mut self, cx: &Context, emit: F) -> Result<()>
|
|
where
|
|
F: FnOnce((Ipv4Repr, UdpRepr, DhcpRepr)) -> Result<()>,
|
|
{
|
|
// note: Dhcpv4Socket is only usable in ethernet mediums, so the
|
|
// unwrap can never fail.
|
|
let ethernet_addr = if let Some(HardwareAddress::Ethernet(addr)) = cx.hardware_addr {
|
|
addr
|
|
} else {
|
|
return Err(Error::Malformed);
|
|
};
|
|
|
|
// Worst case biggest IPv4 header length.
|
|
// 0x0f * 4 = 60 bytes.
|
|
const MAX_IPV4_HEADER_LEN: usize = 60;
|
|
|
|
// We don't directly modify self.transaction_id because sending the packet
|
|
// may fail. We only want to update state after succesfully sending.
|
|
let next_transaction_id = Self::random_transaction_id();
|
|
|
|
let mut dhcp_repr = DhcpRepr {
|
|
message_type: DhcpMessageType::Discover,
|
|
transaction_id: next_transaction_id,
|
|
client_hardware_address: ethernet_addr,
|
|
client_ip: Ipv4Address::UNSPECIFIED,
|
|
your_ip: Ipv4Address::UNSPECIFIED,
|
|
server_ip: Ipv4Address::UNSPECIFIED,
|
|
router: None,
|
|
subnet_mask: None,
|
|
relay_agent_ip: Ipv4Address::UNSPECIFIED,
|
|
broadcast: false,
|
|
requested_ip: None,
|
|
client_identifier: Some(ethernet_addr),
|
|
server_identifier: None,
|
|
parameter_request_list: Some(PARAMETER_REQUEST_LIST),
|
|
max_size: Some((cx.caps.ip_mtu() - MAX_IPV4_HEADER_LEN - UDP_HEADER_LEN) as u16),
|
|
lease_duration: None,
|
|
dns_servers: None,
|
|
};
|
|
|
|
let udp_repr = UdpRepr {
|
|
src_port: DHCP_CLIENT_PORT,
|
|
dst_port: DHCP_SERVER_PORT,
|
|
};
|
|
|
|
let mut ipv4_repr = Ipv4Repr {
|
|
src_addr: Ipv4Address::UNSPECIFIED,
|
|
dst_addr: Ipv4Address::BROADCAST,
|
|
protocol: IpProtocol::Udp,
|
|
payload_len: 0, // filled right before emit
|
|
hop_limit: 64,
|
|
};
|
|
|
|
match &mut self.state {
|
|
ClientState::Discovering(state) => {
|
|
if cx.now < state.retry_at {
|
|
return Err(Error::Exhausted);
|
|
}
|
|
|
|
// send packet
|
|
net_debug!(
|
|
"DHCP send DISCOVER to {}: {:?}",
|
|
ipv4_repr.dst_addr,
|
|
dhcp_repr
|
|
);
|
|
ipv4_repr.payload_len = udp_repr.header_len() + dhcp_repr.buffer_len();
|
|
emit((ipv4_repr, udp_repr, dhcp_repr))?;
|
|
|
|
// Update state AFTER the packet has been successfully sent.
|
|
state.retry_at = cx.now + DISCOVER_TIMEOUT;
|
|
self.transaction_id = next_transaction_id;
|
|
Ok(())
|
|
}
|
|
ClientState::Requesting(state) => {
|
|
if cx.now < state.retry_at {
|
|
return Err(Error::Exhausted);
|
|
}
|
|
|
|
if state.retry >= REQUEST_RETRIES {
|
|
net_debug!("DHCP request retries exceeded, restarting discovery");
|
|
self.reset();
|
|
// return Ok so we get polled again
|
|
return Ok(());
|
|
}
|
|
|
|
dhcp_repr.message_type = DhcpMessageType::Request;
|
|
dhcp_repr.requested_ip = Some(state.requested_ip);
|
|
dhcp_repr.server_identifier = Some(state.server.identifier);
|
|
|
|
net_debug!(
|
|
"DHCP send request to {}: {:?}",
|
|
ipv4_repr.dst_addr,
|
|
dhcp_repr
|
|
);
|
|
ipv4_repr.payload_len = udp_repr.header_len() + dhcp_repr.buffer_len();
|
|
emit((ipv4_repr, udp_repr, dhcp_repr))?;
|
|
|
|
// Exponential backoff: Double every 2 retries.
|
|
state.retry_at = cx.now + (REQUEST_TIMEOUT << (state.retry as u32 / 2));
|
|
state.retry += 1;
|
|
|
|
self.transaction_id = next_transaction_id;
|
|
Ok(())
|
|
}
|
|
ClientState::Renewing(state) => {
|
|
if state.expires_at <= cx.now {
|
|
net_debug!("DHCP lease expired");
|
|
self.reset();
|
|
// return Ok so we get polled again
|
|
return Ok(());
|
|
}
|
|
|
|
if cx.now < state.renew_at {
|
|
return Err(Error::Exhausted);
|
|
}
|
|
|
|
ipv4_repr.src_addr = state.config.address.address();
|
|
ipv4_repr.dst_addr = state.server.address;
|
|
dhcp_repr.message_type = DhcpMessageType::Request;
|
|
dhcp_repr.client_ip = state.config.address.address();
|
|
|
|
net_debug!("DHCP send renew to {}: {:?}", ipv4_repr.dst_addr, dhcp_repr);
|
|
ipv4_repr.payload_len = udp_repr.header_len() + dhcp_repr.buffer_len();
|
|
emit((ipv4_repr, udp_repr, dhcp_repr))?;
|
|
|
|
// In both RENEWING and REBINDING states, if the client receives no
|
|
// response to its DHCPREQUEST message, the client SHOULD wait one-half
|
|
// of the remaining time until T2 (in RENEWING state) and one-half of
|
|
// the remaining lease time (in REBINDING state), down to a minimum of
|
|
// 60 seconds, before retransmitting the DHCPREQUEST message.
|
|
state.renew_at = cx.now + MIN_RENEW_TIMEOUT.max((state.expires_at - cx.now) / 2);
|
|
|
|
self.transaction_id = next_transaction_id;
|
|
Ok(())
|
|
}
|
|
}
|
|
}
|
|
|
|
/// Return the socket handle.
|
|
#[inline]
|
|
pub fn handle(&self) -> SocketHandle {
|
|
self.meta.handle
|
|
}
|
|
|
|
/// Reset state and restart discovery phase.
|
|
///
|
|
/// Use this to speed up acquisition of an address in a new
|
|
/// network if a link was down and it is now back up.
|
|
pub fn reset(&mut self) {
|
|
net_trace!("DHCP reset");
|
|
if let ClientState::Renewing(_) = &self.state {
|
|
self.config_changed = true;
|
|
}
|
|
self.state = ClientState::Discovering(DiscoverState {
|
|
retry_at: Instant::from_millis(0),
|
|
});
|
|
}
|
|
|
|
/// Query the socket for configuration changes.
|
|
///
|
|
/// The socket has an internal "configuration changed" flag. If
|
|
/// set, this function returns the configuration and resets the flag.
|
|
pub fn poll(&mut self) -> Option<Event<'_>> {
|
|
if !self.config_changed {
|
|
None
|
|
} else if let ClientState::Renewing(state) = &self.state {
|
|
self.config_changed = false;
|
|
Some(Event::Configured(&state.config))
|
|
} else {
|
|
self.config_changed = false;
|
|
Some(Event::Deconfigured)
|
|
}
|
|
}
|
|
}
|
|
|
|
impl<'a> From<Dhcpv4Socket> for Socket<'a> {
|
|
fn from(val: Dhcpv4Socket) -> Self {
|
|
Socket::Dhcpv4(val)
|
|
}
|
|
}
|
|
|
|
#[cfg(test)]
|
|
mod test {
|
|
|
|
use super::*;
|
|
use crate::wire::EthernetAddress;
|
|
|
|
// =========================================================================================//
|
|
// Helper functions
|
|
|
|
fn send(
|
|
socket: &mut Dhcpv4Socket,
|
|
timestamp: Instant,
|
|
(ip_repr, udp_repr, dhcp_repr): (Ipv4Repr, UdpRepr, DhcpRepr),
|
|
) -> Result<()> {
|
|
net_trace!("send: {:?}", ip_repr);
|
|
net_trace!(" {:?}", udp_repr);
|
|
net_trace!(" {:?}", dhcp_repr);
|
|
|
|
let mut payload = vec![0; dhcp_repr.buffer_len()];
|
|
dhcp_repr
|
|
.emit(&mut DhcpPacket::new_unchecked(&mut payload))
|
|
.unwrap();
|
|
|
|
let mut cx = Context::DUMMY.clone();
|
|
cx.now = timestamp;
|
|
socket.process(&cx, &ip_repr, &udp_repr, &payload)
|
|
}
|
|
|
|
fn recv(
|
|
socket: &mut Dhcpv4Socket,
|
|
timestamp: Instant,
|
|
reprs: &[(Ipv4Repr, UdpRepr, DhcpRepr)],
|
|
) {
|
|
let mut cx = Context::DUMMY.clone();
|
|
cx.now = timestamp;
|
|
|
|
let mut i = 0;
|
|
|
|
while socket.poll_at(&cx) <= PollAt::Time(timestamp) {
|
|
let _ = socket.dispatch(&cx, |(mut ip_repr, udp_repr, dhcp_repr)| {
|
|
assert_eq!(ip_repr.protocol, IpProtocol::Udp);
|
|
assert_eq!(
|
|
ip_repr.payload_len,
|
|
udp_repr.header_len() + dhcp_repr.buffer_len()
|
|
);
|
|
|
|
// We validated the payload len, change it to 0 to make equality testing easier
|
|
ip_repr.payload_len = 0;
|
|
|
|
net_trace!("recv: {:?}", ip_repr);
|
|
net_trace!(" {:?}", udp_repr);
|
|
net_trace!(" {:?}", dhcp_repr);
|
|
|
|
let got_repr = (ip_repr, udp_repr, dhcp_repr);
|
|
match reprs.get(i) {
|
|
Some(want_repr) => assert_eq!(want_repr, &got_repr),
|
|
None => panic!("Too many reprs emitted"),
|
|
}
|
|
i += 1;
|
|
Ok(())
|
|
});
|
|
}
|
|
|
|
if i != reprs.len() {
|
|
panic!("Too few reprs emitted. Wanted {}, got {}", reprs.len(), i);
|
|
}
|
|
}
|
|
|
|
macro_rules! send {
|
|
($socket:ident, $repr:expr) =>
|
|
(send!($socket, time 0, $repr));
|
|
($socket:ident, $repr:expr, $result:expr) =>
|
|
(send!($socket, time 0, $repr, $result));
|
|
($socket:ident, time $time:expr, $repr:expr) =>
|
|
(send!($socket, time $time, $repr, Ok(( ))));
|
|
($socket:ident, time $time:expr, $repr:expr, $result:expr) =>
|
|
(assert_eq!(send(&mut $socket, Instant::from_millis($time), $repr), $result));
|
|
}
|
|
|
|
macro_rules! recv {
|
|
($socket:ident, $reprs:expr) => ({
|
|
recv!($socket, time 0, $reprs);
|
|
});
|
|
($socket:ident, time $time:expr, $reprs:expr) => ({
|
|
recv(&mut $socket, Instant::from_millis($time), &$reprs);
|
|
});
|
|
}
|
|
|
|
#[cfg(feature = "log")]
|
|
fn init_logger() {
|
|
struct Logger;
|
|
static LOGGER: Logger = Logger;
|
|
|
|
impl log::Log for Logger {
|
|
fn enabled(&self, _metadata: &log::Metadata) -> bool {
|
|
true
|
|
}
|
|
|
|
fn log(&self, record: &log::Record) {
|
|
println!("{}", record.args());
|
|
}
|
|
|
|
fn flush(&self) {}
|
|
}
|
|
|
|
// If it fails, that just means we've already set it to the same value.
|
|
let _ = log::set_logger(&LOGGER);
|
|
log::set_max_level(log::LevelFilter::Trace);
|
|
|
|
println!();
|
|
}
|
|
|
|
// =========================================================================================//
|
|
// Constants
|
|
|
|
const TXID: u32 = 0x12345678;
|
|
|
|
const MY_IP: Ipv4Address = Ipv4Address([192, 168, 1, 42]);
|
|
const SERVER_IP: Ipv4Address = Ipv4Address([192, 168, 1, 1]);
|
|
const DNS_IP_1: Ipv4Address = Ipv4Address([1, 1, 1, 1]);
|
|
const DNS_IP_2: Ipv4Address = Ipv4Address([1, 1, 1, 2]);
|
|
const DNS_IP_3: Ipv4Address = Ipv4Address([1, 1, 1, 3]);
|
|
const DNS_IPS: [Option<Ipv4Address>; DHCP_MAX_DNS_SERVER_COUNT] =
|
|
[Some(DNS_IP_1), Some(DNS_IP_2), Some(DNS_IP_3)];
|
|
const MASK_24: Ipv4Address = Ipv4Address([255, 255, 255, 0]);
|
|
|
|
const MY_MAC: EthernetAddress = EthernetAddress([0x02, 0x02, 0x02, 0x02, 0x02, 0x02]);
|
|
|
|
const IP_BROADCAST: Ipv4Repr = Ipv4Repr {
|
|
src_addr: Ipv4Address::UNSPECIFIED,
|
|
dst_addr: Ipv4Address::BROADCAST,
|
|
protocol: IpProtocol::Udp,
|
|
payload_len: 0,
|
|
hop_limit: 64,
|
|
};
|
|
|
|
const IP_SERVER_BROADCAST: Ipv4Repr = Ipv4Repr {
|
|
src_addr: SERVER_IP,
|
|
dst_addr: Ipv4Address::BROADCAST,
|
|
protocol: IpProtocol::Udp,
|
|
payload_len: 0,
|
|
hop_limit: 64,
|
|
};
|
|
|
|
const IP_RECV: Ipv4Repr = Ipv4Repr {
|
|
src_addr: SERVER_IP,
|
|
dst_addr: MY_IP,
|
|
protocol: IpProtocol::Udp,
|
|
payload_len: 0,
|
|
hop_limit: 64,
|
|
};
|
|
|
|
const IP_SEND: Ipv4Repr = Ipv4Repr {
|
|
src_addr: MY_IP,
|
|
dst_addr: SERVER_IP,
|
|
protocol: IpProtocol::Udp,
|
|
payload_len: 0,
|
|
hop_limit: 64,
|
|
};
|
|
|
|
const UDP_SEND: UdpRepr = UdpRepr {
|
|
src_port: 68,
|
|
dst_port: 67,
|
|
};
|
|
const UDP_RECV: UdpRepr = UdpRepr {
|
|
src_port: 67,
|
|
dst_port: 68,
|
|
};
|
|
|
|
const DHCP_DEFAULT: DhcpRepr = DhcpRepr {
|
|
message_type: DhcpMessageType::Unknown(99),
|
|
transaction_id: TXID,
|
|
client_hardware_address: MY_MAC,
|
|
client_ip: Ipv4Address::UNSPECIFIED,
|
|
your_ip: Ipv4Address::UNSPECIFIED,
|
|
server_ip: Ipv4Address::UNSPECIFIED,
|
|
router: None,
|
|
subnet_mask: None,
|
|
relay_agent_ip: Ipv4Address::UNSPECIFIED,
|
|
broadcast: false,
|
|
requested_ip: None,
|
|
client_identifier: None,
|
|
server_identifier: None,
|
|
parameter_request_list: None,
|
|
dns_servers: None,
|
|
max_size: None,
|
|
lease_duration: None,
|
|
};
|
|
|
|
const DHCP_DISCOVER: DhcpRepr = DhcpRepr {
|
|
message_type: DhcpMessageType::Discover,
|
|
client_identifier: Some(MY_MAC),
|
|
parameter_request_list: Some(&[1, 3, 6]),
|
|
max_size: Some(1432),
|
|
..DHCP_DEFAULT
|
|
};
|
|
|
|
const DHCP_OFFER: DhcpRepr = DhcpRepr {
|
|
message_type: DhcpMessageType::Offer,
|
|
server_ip: SERVER_IP,
|
|
server_identifier: Some(SERVER_IP),
|
|
|
|
your_ip: MY_IP,
|
|
router: Some(SERVER_IP),
|
|
subnet_mask: Some(MASK_24),
|
|
dns_servers: Some(DNS_IPS),
|
|
lease_duration: Some(1000),
|
|
|
|
..DHCP_DEFAULT
|
|
};
|
|
|
|
const DHCP_REQUEST: DhcpRepr = DhcpRepr {
|
|
message_type: DhcpMessageType::Request,
|
|
client_identifier: Some(MY_MAC),
|
|
server_identifier: Some(SERVER_IP),
|
|
max_size: Some(1432),
|
|
|
|
requested_ip: Some(MY_IP),
|
|
parameter_request_list: Some(&[1, 3, 6]),
|
|
..DHCP_DEFAULT
|
|
};
|
|
|
|
const DHCP_ACK: DhcpRepr = DhcpRepr {
|
|
message_type: DhcpMessageType::Ack,
|
|
server_ip: SERVER_IP,
|
|
server_identifier: Some(SERVER_IP),
|
|
|
|
your_ip: MY_IP,
|
|
router: Some(SERVER_IP),
|
|
subnet_mask: Some(MASK_24),
|
|
dns_servers: Some(DNS_IPS),
|
|
lease_duration: Some(1000),
|
|
|
|
..DHCP_DEFAULT
|
|
};
|
|
|
|
const DHCP_NAK: DhcpRepr = DhcpRepr {
|
|
message_type: DhcpMessageType::Nak,
|
|
server_ip: SERVER_IP,
|
|
server_identifier: Some(SERVER_IP),
|
|
..DHCP_DEFAULT
|
|
};
|
|
|
|
const DHCP_RENEW: DhcpRepr = DhcpRepr {
|
|
message_type: DhcpMessageType::Request,
|
|
client_identifier: Some(MY_MAC),
|
|
// NO server_identifier in renew requests, only in first one!
|
|
client_ip: MY_IP,
|
|
max_size: Some(1432),
|
|
|
|
requested_ip: None,
|
|
parameter_request_list: Some(&[1, 3, 6]),
|
|
..DHCP_DEFAULT
|
|
};
|
|
|
|
// =========================================================================================//
|
|
// Tests
|
|
|
|
fn socket() -> Dhcpv4Socket {
|
|
#[cfg(feature = "log")]
|
|
init_logger();
|
|
|
|
let mut s = Dhcpv4Socket::new();
|
|
assert_eq!(s.poll(), Some(Event::Deconfigured));
|
|
s
|
|
}
|
|
|
|
fn socket_bound() -> Dhcpv4Socket {
|
|
let mut s = socket();
|
|
s.state = ClientState::Renewing(RenewState {
|
|
config: Config {
|
|
address: Ipv4Cidr::new(MY_IP, 24),
|
|
dns_servers: DNS_IPS,
|
|
router: Some(SERVER_IP),
|
|
},
|
|
server: ServerInfo {
|
|
address: SERVER_IP,
|
|
identifier: SERVER_IP,
|
|
},
|
|
renew_at: Instant::from_secs(500),
|
|
expires_at: Instant::from_secs(1000),
|
|
});
|
|
|
|
s
|
|
}
|
|
|
|
#[test]
|
|
fn test_bind() {
|
|
let mut s = socket();
|
|
|
|
recv!(s, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
|
|
assert_eq!(s.poll(), None);
|
|
send!(s, (IP_RECV, UDP_RECV, DHCP_OFFER));
|
|
assert_eq!(s.poll(), None);
|
|
recv!(s, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
|
|
assert_eq!(s.poll(), None);
|
|
send!(s, (IP_RECV, UDP_RECV, DHCP_ACK));
|
|
|
|
assert_eq!(
|
|
s.poll(),
|
|
Some(Event::Configured(&Config {
|
|
address: Ipv4Cidr::new(MY_IP, 24),
|
|
dns_servers: DNS_IPS,
|
|
router: Some(SERVER_IP),
|
|
}))
|
|
);
|
|
|
|
match &s.state {
|
|
ClientState::Renewing(r) => {
|
|
assert_eq!(r.renew_at, Instant::from_secs(500));
|
|
assert_eq!(r.expires_at, Instant::from_secs(1000));
|
|
}
|
|
_ => panic!("Invalid state"),
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn test_discover_retransmit() {
|
|
let mut s = socket();
|
|
|
|
recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
|
|
recv!(s, time 1_000, []);
|
|
recv!(s, time 10_000, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
|
|
recv!(s, time 11_000, []);
|
|
recv!(s, time 20_000, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
|
|
|
|
// check after retransmits it still works
|
|
send!(s, time 20_000, (IP_RECV, UDP_RECV, DHCP_OFFER));
|
|
recv!(s, time 20_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
|
|
}
|
|
|
|
#[test]
|
|
fn test_request_retransmit() {
|
|
let mut s = socket();
|
|
|
|
recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
|
|
send!(s, time 0, (IP_RECV, UDP_RECV, DHCP_OFFER));
|
|
recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
|
|
recv!(s, time 1_000, []);
|
|
recv!(s, time 5_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
|
|
recv!(s, time 6_000, []);
|
|
recv!(s, time 10_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
|
|
recv!(s, time 15_000, []);
|
|
recv!(s, time 20_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
|
|
|
|
// check after retransmits it still works
|
|
send!(s, time 20_000, (IP_RECV, UDP_RECV, DHCP_ACK));
|
|
|
|
match &s.state {
|
|
ClientState::Renewing(r) => {
|
|
assert_eq!(r.renew_at, Instant::from_secs(20 + 500));
|
|
assert_eq!(r.expires_at, Instant::from_secs(20 + 1000));
|
|
}
|
|
_ => panic!("Invalid state"),
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn test_request_timeout() {
|
|
let mut s = socket();
|
|
|
|
recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
|
|
send!(s, time 0, (IP_RECV, UDP_RECV, DHCP_OFFER));
|
|
recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
|
|
recv!(s, time 5_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
|
|
recv!(s, time 10_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
|
|
recv!(s, time 20_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
|
|
recv!(s, time 30_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
|
|
|
|
// After 5 tries and 70 seconds, it gives up.
|
|
// 5 + 5 + 10 + 10 + 20 = 70
|
|
recv!(s, time 70_000, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
|
|
|
|
// check it still works
|
|
send!(s, time 60_000, (IP_RECV, UDP_RECV, DHCP_OFFER));
|
|
recv!(s, time 60_000, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
|
|
}
|
|
|
|
#[test]
|
|
fn test_request_nak() {
|
|
let mut s = socket();
|
|
|
|
recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
|
|
send!(s, time 0, (IP_RECV, UDP_RECV, DHCP_OFFER));
|
|
recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_REQUEST)]);
|
|
send!(s, time 0, (IP_SERVER_BROADCAST, UDP_RECV, DHCP_NAK));
|
|
recv!(s, time 0, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
|
|
}
|
|
|
|
#[test]
|
|
fn test_renew() {
|
|
let mut s = socket_bound();
|
|
|
|
recv!(s, []);
|
|
assert_eq!(s.poll(), None);
|
|
recv!(s, time 500_000, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
|
|
assert_eq!(s.poll(), None);
|
|
|
|
match &s.state {
|
|
ClientState::Renewing(r) => {
|
|
// the expiration still hasn't been bumped, because
|
|
// we haven't received the ACK yet
|
|
assert_eq!(r.expires_at, Instant::from_secs(1000));
|
|
}
|
|
_ => panic!("Invalid state"),
|
|
}
|
|
|
|
send!(s, time 500_000, (IP_RECV, UDP_RECV, DHCP_ACK));
|
|
assert_eq!(s.poll(), None);
|
|
|
|
match &s.state {
|
|
ClientState::Renewing(r) => {
|
|
// NOW the expiration gets bumped
|
|
assert_eq!(r.renew_at, Instant::from_secs(500 + 500));
|
|
assert_eq!(r.expires_at, Instant::from_secs(500 + 1000));
|
|
}
|
|
_ => panic!("Invalid state"),
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn test_renew_retransmit() {
|
|
let mut s = socket_bound();
|
|
|
|
recv!(s, []);
|
|
recv!(s, time 500_000, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
|
|
recv!(s, time 749_000, []);
|
|
recv!(s, time 750_000, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
|
|
recv!(s, time 874_000, []);
|
|
recv!(s, time 875_000, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
|
|
|
|
// check it still works
|
|
send!(s, time 875_000, (IP_RECV, UDP_RECV, DHCP_ACK));
|
|
match &s.state {
|
|
ClientState::Renewing(r) => {
|
|
// NOW the expiration gets bumped
|
|
assert_eq!(r.renew_at, Instant::from_secs(875 + 500));
|
|
assert_eq!(r.expires_at, Instant::from_secs(875 + 1000));
|
|
}
|
|
_ => panic!("Invalid state"),
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn test_renew_timeout() {
|
|
let mut s = socket_bound();
|
|
|
|
recv!(s, []);
|
|
recv!(s, time 500_000, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
|
|
recv!(s, time 999_000, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
|
|
recv!(s, time 1_000_000, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
|
|
match &s.state {
|
|
ClientState::Discovering(_) => {}
|
|
_ => panic!("Invalid state"),
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn test_renew_nak() {
|
|
let mut s = socket_bound();
|
|
|
|
recv!(s, time 500_000, [(IP_SEND, UDP_SEND, DHCP_RENEW)]);
|
|
send!(s, time 500_000, (IP_SERVER_BROADCAST, UDP_RECV, DHCP_NAK));
|
|
recv!(s, time 500_000, [(IP_BROADCAST, UDP_SEND, DHCP_DISCOVER)]);
|
|
}
|
|
}
|