2021-09-16 11:25:28 -07:00
|
|
|
use bytes::{Bytes, BytesMut};
|
2021-09-20 08:03:39 -07:00
|
|
|
use internet_checksum::Checksum;
|
|
|
|
use pnet::packet::Packet;
|
2022-04-16 01:41:19 -07:00
|
|
|
use pnet::packet::{ip, ipv4, ipv6, tcp};
|
2021-09-16 11:25:28 -07:00
|
|
|
use std::convert::TryInto;
|
2022-04-16 01:41:19 -07:00
|
|
|
use std::net::{IpAddr, SocketAddr};
|
2021-09-16 11:25:28 -07:00
|
|
|
|
|
|
|
const IPV4_HEADER_LEN: usize = 20;
|
2022-04-16 01:41:19 -07:00
|
|
|
const IPV6_HEADER_LEN: usize = 40;
|
2021-09-16 11:25:28 -07:00
|
|
|
const TCP_HEADER_LEN: usize = 20;
|
|
|
|
pub const MAX_PACKET_LEN: usize = 1500;
|
|
|
|
|
2022-04-16 01:41:19 -07:00
|
|
|
pub enum IPPacket<'p> {
|
|
|
|
V4(ipv4::Ipv4Packet<'p>),
|
|
|
|
V6(ipv6::Ipv6Packet<'p>),
|
|
|
|
}
|
|
|
|
|
|
|
|
impl<'a> IPPacket<'a> {
|
|
|
|
pub fn get_source(&self) -> IpAddr {
|
|
|
|
match self {
|
|
|
|
IPPacket::V4(p) => IpAddr::V4(p.get_source()),
|
|
|
|
IPPacket::V6(p) => IpAddr::V6(p.get_source()),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn get_destination(&self) -> IpAddr {
|
|
|
|
match self {
|
|
|
|
IPPacket::V4(p) => IpAddr::V4(p.get_destination()),
|
|
|
|
IPPacket::V6(p) => IpAddr::V6(p.get_destination()),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-09-16 11:25:28 -07:00
|
|
|
pub fn build_tcp_packet(
|
2022-04-16 01:41:19 -07:00
|
|
|
local_addr: SocketAddr,
|
|
|
|
remote_addr: SocketAddr,
|
2021-09-16 11:25:28 -07:00
|
|
|
seq: u32,
|
|
|
|
ack: u32,
|
|
|
|
flags: u16,
|
|
|
|
payload: Option<&[u8]>,
|
|
|
|
) -> Bytes {
|
2022-04-16 01:41:19 -07:00
|
|
|
let ip_header_len = match local_addr {
|
|
|
|
SocketAddr::V4(_) => IPV4_HEADER_LEN,
|
|
|
|
SocketAddr::V6(_) => IPV6_HEADER_LEN,
|
|
|
|
};
|
2021-09-16 11:25:28 -07:00
|
|
|
let wscale = (flags & tcp::TcpFlags::SYN) != 0;
|
2021-09-22 21:53:52 -07:00
|
|
|
let tcp_header_len = TCP_HEADER_LEN + if wscale { 4 } else { 0 }; // nop + wscale
|
|
|
|
let tcp_total_len = tcp_header_len + payload.map_or(0, |payload| payload.len());
|
2022-04-16 01:41:19 -07:00
|
|
|
let total_len = ip_header_len + tcp_total_len;
|
2021-09-16 11:25:28 -07:00
|
|
|
let mut buf = BytesMut::with_capacity(total_len);
|
|
|
|
buf.resize(total_len, 0);
|
|
|
|
|
2022-04-16 01:41:19 -07:00
|
|
|
let mut ip_buf = buf.split_to(ip_header_len);
|
2021-09-16 11:25:28 -07:00
|
|
|
let mut tcp_buf = buf.split_to(tcp_total_len);
|
|
|
|
assert_eq!(0, buf.len());
|
|
|
|
|
2022-04-16 01:41:19 -07:00
|
|
|
match (local_addr, remote_addr) {
|
|
|
|
(SocketAddr::V4(local), SocketAddr::V4(remote)) => {
|
|
|
|
let mut v4 = ipv4::MutableIpv4Packet::new(&mut ip_buf).unwrap();
|
|
|
|
v4.set_version(4);
|
|
|
|
v4.set_header_length(IPV4_HEADER_LEN as u8 / 4);
|
|
|
|
v4.set_next_level_protocol(ip::IpNextHeaderProtocols::Tcp);
|
|
|
|
v4.set_ttl(64);
|
|
|
|
v4.set_source(*local.ip());
|
|
|
|
v4.set_destination(*remote.ip());
|
|
|
|
v4.set_total_length(total_len.try_into().unwrap());
|
|
|
|
v4.set_flags(ipv4::Ipv4Flags::DontFragment);
|
|
|
|
let mut cksm = Checksum::new();
|
|
|
|
cksm.add_bytes(v4.packet());
|
|
|
|
v4.set_checksum(u16::from_be_bytes(cksm.checksum()));
|
|
|
|
}
|
|
|
|
(SocketAddr::V6(local), SocketAddr::V6(remote)) => {
|
|
|
|
let mut v6 = ipv6::MutableIpv6Packet::new(&mut ip_buf).unwrap();
|
|
|
|
v6.set_version(6);
|
|
|
|
v6.set_payload_length(tcp_total_len.try_into().unwrap());
|
|
|
|
v6.set_next_header(ip::IpNextHeaderProtocols::Tcp);
|
|
|
|
v6.set_hop_limit(64);
|
|
|
|
v6.set_source(*local.ip());
|
|
|
|
v6.set_destination(*remote.ip());
|
|
|
|
}
|
|
|
|
_ => unreachable!(),
|
|
|
|
};
|
2021-09-16 11:25:28 -07:00
|
|
|
|
|
|
|
let mut tcp = tcp::MutableTcpPacket::new(&mut tcp_buf).unwrap();
|
|
|
|
tcp.set_window(0xffff);
|
|
|
|
tcp.set_source(local_addr.port());
|
|
|
|
tcp.set_destination(remote_addr.port());
|
|
|
|
tcp.set_sequence(seq);
|
|
|
|
tcp.set_acknowledgement(ack);
|
|
|
|
tcp.set_flags(flags);
|
|
|
|
tcp.set_data_offset(TCP_HEADER_LEN as u8 / 4 + if wscale { 1 } else { 0 });
|
|
|
|
if wscale {
|
|
|
|
let wscale = tcp::TcpOption::wscale(14);
|
2021-09-16 23:57:32 -07:00
|
|
|
tcp.set_options(&[tcp::TcpOption::nop(), wscale]);
|
2021-09-16 11:25:28 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
if let Some(payload) = payload {
|
|
|
|
tcp.set_payload(payload);
|
|
|
|
}
|
|
|
|
|
2021-09-20 08:03:39 -07:00
|
|
|
let mut cksm = Checksum::new();
|
|
|
|
let ip::IpNextHeaderProtocol(tcp_protocol) = ip::IpNextHeaderProtocols::Tcp;
|
2022-04-16 01:41:19 -07:00
|
|
|
|
|
|
|
match (local_addr, remote_addr) {
|
|
|
|
(SocketAddr::V4(local), SocketAddr::V4(remote)) => {
|
|
|
|
cksm.add_bytes(&local.ip().octets());
|
|
|
|
cksm.add_bytes(&remote.ip().octets());
|
|
|
|
|
|
|
|
let mut pseudo = [0u8, tcp_protocol, 0, 0];
|
|
|
|
pseudo[2..].copy_from_slice(&(tcp_total_len as u16).to_be_bytes());
|
|
|
|
cksm.add_bytes(&pseudo);
|
|
|
|
}
|
|
|
|
(SocketAddr::V6(local), SocketAddr::V6(remote)) => {
|
|
|
|
cksm.add_bytes(&local.ip().octets());
|
|
|
|
cksm.add_bytes(&remote.ip().octets());
|
|
|
|
|
|
|
|
let mut pseudo = [0u8, 0, 0, 0, 0, 0, 0, tcp_protocol];
|
|
|
|
pseudo[0..4].copy_from_slice(&(tcp_total_len as u32).to_be_bytes());
|
|
|
|
cksm.add_bytes(&pseudo);
|
|
|
|
}
|
|
|
|
_ => unreachable!(),
|
|
|
|
};
|
|
|
|
|
2021-09-22 21:53:52 -07:00
|
|
|
cksm.add_bytes(tcp.packet());
|
2021-09-20 08:03:39 -07:00
|
|
|
tcp.set_checksum(u16::from_be_bytes(cksm.checksum()));
|
2021-09-16 11:25:28 -07:00
|
|
|
|
2022-04-16 01:41:19 -07:00
|
|
|
ip_buf.unsplit(tcp_buf);
|
|
|
|
ip_buf.freeze()
|
2021-09-16 11:25:28 -07:00
|
|
|
}
|
|
|
|
|
2022-04-16 01:41:19 -07:00
|
|
|
pub fn parse_ip_packet(buf: &Bytes) -> Option<(IPPacket, tcp::TcpPacket)> {
|
|
|
|
if buf[0] >> 4 == 4 {
|
|
|
|
let v4 = ipv4::Ipv4Packet::new(buf).unwrap();
|
|
|
|
if v4.get_next_level_protocol() != ip::IpNextHeaderProtocols::Tcp {
|
|
|
|
return None;
|
|
|
|
}
|
|
|
|
|
|
|
|
let tcp = tcp::TcpPacket::new(&buf[IPV4_HEADER_LEN..]).unwrap();
|
|
|
|
Some((IPPacket::V4(v4), tcp))
|
|
|
|
} else if buf[0] >> 4 == 6 {
|
|
|
|
let v6 = ipv6::Ipv6Packet::new(buf).unwrap();
|
|
|
|
if v6.get_next_header() != ip::IpNextHeaderProtocols::Tcp {
|
|
|
|
return None;
|
|
|
|
}
|
2021-09-16 11:25:28 -07:00
|
|
|
|
2022-04-16 01:41:19 -07:00
|
|
|
let tcp = tcp::TcpPacket::new(&buf[IPV6_HEADER_LEN..]).unwrap();
|
|
|
|
Some((IPPacket::V6(v6), tcp))
|
|
|
|
} else {
|
|
|
|
None
|
|
|
|
}
|
2021-09-16 11:25:28 -07:00
|
|
|
}
|
2021-09-20 08:03:39 -07:00
|
|
|
|
|
|
|
#[cfg(all(test, feature = "benchmark"))]
|
|
|
|
mod benchmarks {
|
|
|
|
extern crate test;
|
|
|
|
use super::*;
|
|
|
|
use test::{black_box, Bencher};
|
|
|
|
|
|
|
|
#[bench]
|
|
|
|
fn bench_build_tcp_packet_1460(b: &mut Bencher) {
|
|
|
|
let local_addr = "127.0.0.1:1234".parse().unwrap();
|
|
|
|
let remote_addr = "127.0.0.2:1234".parse().unwrap();
|
|
|
|
let payload = black_box([123u8; 1460]);
|
|
|
|
b.iter(|| {
|
|
|
|
build_tcp_packet(
|
|
|
|
local_addr,
|
|
|
|
remote_addr,
|
|
|
|
123,
|
|
|
|
456,
|
|
|
|
tcp::TcpFlags::ACK,
|
|
|
|
Some(&payload),
|
|
|
|
)
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
#[bench]
|
|
|
|
fn bench_build_tcp_packet_512(b: &mut Bencher) {
|
|
|
|
let local_addr = "127.0.0.1:1234".parse().unwrap();
|
|
|
|
let remote_addr = "127.0.0.2:1234".parse().unwrap();
|
|
|
|
let payload = black_box([123u8; 512]);
|
|
|
|
b.iter(|| {
|
|
|
|
build_tcp_packet(
|
|
|
|
local_addr,
|
|
|
|
remote_addr,
|
|
|
|
123,
|
|
|
|
456,
|
|
|
|
tcp::TcpFlags::ACK,
|
|
|
|
Some(&payload),
|
|
|
|
)
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
#[bench]
|
|
|
|
fn bench_build_tcp_packet_128(b: &mut Bencher) {
|
|
|
|
let local_addr = "127.0.0.1:1234".parse().unwrap();
|
|
|
|
let remote_addr = "127.0.0.2:1234".parse().unwrap();
|
|
|
|
let payload = black_box([123u8; 128]);
|
|
|
|
b.iter(|| {
|
|
|
|
build_tcp_packet(
|
|
|
|
local_addr,
|
|
|
|
remote_addr,
|
|
|
|
123,
|
|
|
|
456,
|
|
|
|
tcp::TcpFlags::ACK,
|
|
|
|
Some(&payload),
|
|
|
|
)
|
|
|
|
});
|
|
|
|
}
|
|
|
|
}
|