315 lines
9.6 KiB
C
315 lines
9.6 KiB
C
|
#include "tcp_helper.h"
|
||
|
|
||
|
#include "lwip/priv/tcp_priv.h"
|
||
|
#include "lwip/stats.h"
|
||
|
#include "lwip/pbuf.h"
|
||
|
#include "lwip/inet_chksum.h"
|
||
|
#include "lwip/ip_addr.h"
|
||
|
|
||
|
#if !LWIP_STATS || !TCP_STATS || !MEMP_STATS
|
||
|
#error "This tests needs TCP- and MEMP-statistics enabled"
|
||
|
#endif
|
||
|
|
||
|
/** Remove all pcbs on the given list. */
|
||
|
static void
|
||
|
tcp_remove(struct tcp_pcb* pcb_list)
|
||
|
{
|
||
|
struct tcp_pcb *pcb = pcb_list;
|
||
|
struct tcp_pcb *pcb2;
|
||
|
|
||
|
while(pcb != NULL) {
|
||
|
pcb2 = pcb;
|
||
|
pcb = pcb->next;
|
||
|
tcp_abort(pcb2);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
/** Remove all pcbs on listen-, active- and time-wait-list (bound- isn't exported). */
|
||
|
void
|
||
|
tcp_remove_all(void)
|
||
|
{
|
||
|
tcp_remove(tcp_listen_pcbs.pcbs);
|
||
|
tcp_remove(tcp_active_pcbs);
|
||
|
tcp_remove(tcp_tw_pcbs);
|
||
|
fail_unless(MEMP_STATS_GET(used, MEMP_TCP_PCB) == 0);
|
||
|
fail_unless(MEMP_STATS_GET(used, MEMP_TCP_PCB_LISTEN) == 0);
|
||
|
fail_unless(MEMP_STATS_GET(used, MEMP_TCP_SEG) == 0);
|
||
|
fail_unless(MEMP_STATS_GET(used, MEMP_PBUF_POOL) == 0);
|
||
|
}
|
||
|
|
||
|
/** Create a TCP segment usable for passing to tcp_input */
|
||
|
static struct pbuf*
|
||
|
tcp_create_segment_wnd(ip_addr_t* src_ip, ip_addr_t* dst_ip,
|
||
|
u16_t src_port, u16_t dst_port, void* data, size_t data_len,
|
||
|
u32_t seqno, u32_t ackno, u8_t headerflags, u16_t wnd)
|
||
|
{
|
||
|
struct pbuf *p, *q;
|
||
|
struct ip_hdr* iphdr;
|
||
|
struct tcp_hdr* tcphdr;
|
||
|
u16_t pbuf_len = (u16_t)(sizeof(struct ip_hdr) + sizeof(struct tcp_hdr) + data_len);
|
||
|
LWIP_ASSERT("data_len too big", data_len <= 0xFFFF);
|
||
|
|
||
|
p = pbuf_alloc(PBUF_RAW, pbuf_len, PBUF_POOL);
|
||
|
EXPECT_RETNULL(p != NULL);
|
||
|
/* first pbuf must be big enough to hold the headers */
|
||
|
EXPECT_RETNULL(p->len >= (sizeof(struct ip_hdr) + sizeof(struct tcp_hdr)));
|
||
|
if (data_len > 0) {
|
||
|
/* first pbuf must be big enough to hold at least 1 data byte, too */
|
||
|
EXPECT_RETNULL(p->len > (sizeof(struct ip_hdr) + sizeof(struct tcp_hdr)));
|
||
|
}
|
||
|
|
||
|
for(q = p; q != NULL; q = q->next) {
|
||
|
memset(q->payload, 0, q->len);
|
||
|
}
|
||
|
|
||
|
iphdr = (struct ip_hdr*)p->payload;
|
||
|
/* fill IP header */
|
||
|
iphdr->dest.addr = ip_2_ip4(dst_ip)->addr;
|
||
|
iphdr->src.addr = ip_2_ip4(src_ip)->addr;
|
||
|
IPH_VHL_SET(iphdr, 4, IP_HLEN / 4);
|
||
|
IPH_TOS_SET(iphdr, 0);
|
||
|
IPH_LEN_SET(iphdr, htons(p->tot_len));
|
||
|
IPH_CHKSUM_SET(iphdr, inet_chksum(iphdr, IP_HLEN));
|
||
|
|
||
|
/* let p point to TCP header */
|
||
|
pbuf_header(p, -(s16_t)sizeof(struct ip_hdr));
|
||
|
|
||
|
tcphdr = (struct tcp_hdr*)p->payload;
|
||
|
tcphdr->src = htons(src_port);
|
||
|
tcphdr->dest = htons(dst_port);
|
||
|
tcphdr->seqno = htonl(seqno);
|
||
|
tcphdr->ackno = htonl(ackno);
|
||
|
TCPH_HDRLEN_SET(tcphdr, sizeof(struct tcp_hdr)/4);
|
||
|
TCPH_FLAGS_SET(tcphdr, headerflags);
|
||
|
tcphdr->wnd = htons(wnd);
|
||
|
|
||
|
if (data_len > 0) {
|
||
|
/* let p point to TCP data */
|
||
|
pbuf_header(p, -(s16_t)sizeof(struct tcp_hdr));
|
||
|
/* copy data */
|
||
|
pbuf_take(p, data, (u16_t)data_len);
|
||
|
/* let p point to TCP header again */
|
||
|
pbuf_header(p, sizeof(struct tcp_hdr));
|
||
|
}
|
||
|
|
||
|
/* calculate checksum */
|
||
|
|
||
|
tcphdr->chksum = ip_chksum_pseudo(p,
|
||
|
IP_PROTO_TCP, p->tot_len, src_ip, dst_ip);
|
||
|
|
||
|
pbuf_header(p, sizeof(struct ip_hdr));
|
||
|
|
||
|
return p;
|
||
|
}
|
||
|
|
||
|
/** Create a TCP segment usable for passing to tcp_input */
|
||
|
struct pbuf*
|
||
|
tcp_create_segment(ip_addr_t* src_ip, ip_addr_t* dst_ip,
|
||
|
u16_t src_port, u16_t dst_port, void* data, size_t data_len,
|
||
|
u32_t seqno, u32_t ackno, u8_t headerflags)
|
||
|
{
|
||
|
return tcp_create_segment_wnd(src_ip, dst_ip, src_port, dst_port, data,
|
||
|
data_len, seqno, ackno, headerflags, TCP_WND);
|
||
|
}
|
||
|
|
||
|
/** Create a TCP segment usable for passing to tcp_input
|
||
|
* - IP-addresses, ports, seqno and ackno are taken from pcb
|
||
|
* - seqno and ackno can be altered with an offset
|
||
|
*/
|
||
|
struct pbuf*
|
||
|
tcp_create_rx_segment(struct tcp_pcb* pcb, void* data, size_t data_len, u32_t seqno_offset,
|
||
|
u32_t ackno_offset, u8_t headerflags)
|
||
|
{
|
||
|
return tcp_create_segment(&pcb->remote_ip, &pcb->local_ip, pcb->remote_port, pcb->local_port,
|
||
|
data, data_len, pcb->rcv_nxt + seqno_offset, pcb->lastack + ackno_offset, headerflags);
|
||
|
}
|
||
|
|
||
|
/** Create a TCP segment usable for passing to tcp_input
|
||
|
* - IP-addresses, ports, seqno and ackno are taken from pcb
|
||
|
* - seqno and ackno can be altered with an offset
|
||
|
* - TCP window can be adjusted
|
||
|
*/
|
||
|
struct pbuf* tcp_create_rx_segment_wnd(struct tcp_pcb* pcb, void* data, size_t data_len,
|
||
|
u32_t seqno_offset, u32_t ackno_offset, u8_t headerflags, u16_t wnd)
|
||
|
{
|
||
|
return tcp_create_segment_wnd(&pcb->remote_ip, &pcb->local_ip, pcb->remote_port, pcb->local_port,
|
||
|
data, data_len, pcb->rcv_nxt + seqno_offset, pcb->lastack + ackno_offset, headerflags, wnd);
|
||
|
}
|
||
|
|
||
|
/** Safely bring a tcp_pcb into the requested state */
|
||
|
void
|
||
|
tcp_set_state(struct tcp_pcb* pcb, enum tcp_state state, ip_addr_t* local_ip,
|
||
|
ip_addr_t* remote_ip, u16_t local_port, u16_t remote_port)
|
||
|
{
|
||
|
u32_t iss;
|
||
|
|
||
|
/* @todo: are these all states? */
|
||
|
/* @todo: remove from previous list */
|
||
|
pcb->state = state;
|
||
|
|
||
|
iss = tcp_next_iss(pcb);
|
||
|
pcb->snd_wl2 = iss;
|
||
|
pcb->snd_nxt = iss;
|
||
|
pcb->lastack = iss;
|
||
|
pcb->snd_lbb = iss;
|
||
|
|
||
|
if (state == ESTABLISHED) {
|
||
|
TCP_REG(&tcp_active_pcbs, pcb);
|
||
|
ip_addr_copy(pcb->local_ip, *local_ip);
|
||
|
pcb->local_port = local_port;
|
||
|
ip_addr_copy(pcb->remote_ip, *remote_ip);
|
||
|
pcb->remote_port = remote_port;
|
||
|
} else if(state == LISTEN) {
|
||
|
TCP_REG(&tcp_listen_pcbs.pcbs, pcb);
|
||
|
ip_addr_copy(pcb->local_ip, *local_ip);
|
||
|
pcb->local_port = local_port;
|
||
|
} else if(state == TIME_WAIT) {
|
||
|
TCP_REG(&tcp_tw_pcbs, pcb);
|
||
|
ip_addr_copy(pcb->local_ip, *local_ip);
|
||
|
pcb->local_port = local_port;
|
||
|
ip_addr_copy(pcb->remote_ip, *remote_ip);
|
||
|
pcb->remote_port = remote_port;
|
||
|
} else {
|
||
|
fail();
|
||
|
}
|
||
|
}
|
||
|
|
||
|
void
|
||
|
test_tcp_counters_err(void* arg, err_t err)
|
||
|
{
|
||
|
struct test_tcp_counters* counters = (struct test_tcp_counters*)arg;
|
||
|
EXPECT_RET(arg != NULL);
|
||
|
counters->err_calls++;
|
||
|
counters->last_err = err;
|
||
|
}
|
||
|
|
||
|
static void
|
||
|
test_tcp_counters_check_rxdata(struct test_tcp_counters* counters, struct pbuf* p)
|
||
|
{
|
||
|
struct pbuf* q;
|
||
|
u32_t i, received;
|
||
|
if(counters->expected_data == NULL) {
|
||
|
/* no data to compare */
|
||
|
return;
|
||
|
}
|
||
|
EXPECT_RET(counters->recved_bytes + p->tot_len <= counters->expected_data_len);
|
||
|
received = counters->recved_bytes;
|
||
|
for(q = p; q != NULL; q = q->next) {
|
||
|
char *data = (char*)q->payload;
|
||
|
for(i = 0; i < q->len; i++) {
|
||
|
EXPECT_RET(data[i] == counters->expected_data[received]);
|
||
|
received++;
|
||
|
}
|
||
|
}
|
||
|
EXPECT(received == counters->recved_bytes + p->tot_len);
|
||
|
}
|
||
|
|
||
|
err_t
|
||
|
test_tcp_counters_recv(void* arg, struct tcp_pcb* pcb, struct pbuf* p, err_t err)
|
||
|
{
|
||
|
struct test_tcp_counters* counters = (struct test_tcp_counters*)arg;
|
||
|
EXPECT_RETX(arg != NULL, ERR_OK);
|
||
|
EXPECT_RETX(pcb != NULL, ERR_OK);
|
||
|
EXPECT_RETX(err == ERR_OK, ERR_OK);
|
||
|
|
||
|
if (p != NULL) {
|
||
|
if (counters->close_calls == 0) {
|
||
|
counters->recv_calls++;
|
||
|
test_tcp_counters_check_rxdata(counters, p);
|
||
|
counters->recved_bytes += p->tot_len;
|
||
|
} else {
|
||
|
counters->recv_calls_after_close++;
|
||
|
counters->recved_bytes_after_close += p->tot_len;
|
||
|
}
|
||
|
pbuf_free(p);
|
||
|
} else {
|
||
|
counters->close_calls++;
|
||
|
}
|
||
|
EXPECT(counters->recv_calls_after_close == 0 && counters->recved_bytes_after_close == 0);
|
||
|
return ERR_OK;
|
||
|
}
|
||
|
|
||
|
/** Allocate a pcb and set up the test_tcp_counters_* callbacks */
|
||
|
struct tcp_pcb*
|
||
|
test_tcp_new_counters_pcb(struct test_tcp_counters* counters)
|
||
|
{
|
||
|
struct tcp_pcb* pcb = tcp_new();
|
||
|
if (pcb != NULL) {
|
||
|
/* set up args and callbacks */
|
||
|
tcp_arg(pcb, counters);
|
||
|
tcp_recv(pcb, test_tcp_counters_recv);
|
||
|
tcp_err(pcb, test_tcp_counters_err);
|
||
|
pcb->snd_wnd = TCP_WND;
|
||
|
pcb->snd_wnd_max = TCP_WND;
|
||
|
}
|
||
|
return pcb;
|
||
|
}
|
||
|
|
||
|
/** Calls tcp_input() after adjusting current_iphdr_dest */
|
||
|
void test_tcp_input(struct pbuf *p, struct netif *inp)
|
||
|
{
|
||
|
struct ip_hdr *iphdr = (struct ip_hdr*)p->payload;
|
||
|
/* these lines are a hack, don't use them as an example :-) */
|
||
|
ip_addr_copy_from_ip4(*ip_current_dest_addr(), iphdr->dest);
|
||
|
ip_addr_copy_from_ip4(*ip_current_src_addr(), iphdr->src);
|
||
|
ip_current_netif() = inp;
|
||
|
ip_data.current_ip4_header = iphdr;
|
||
|
|
||
|
/* since adding IPv6, p->payload must point to tcp header, not ip header */
|
||
|
pbuf_header(p, -(s16_t)sizeof(struct ip_hdr));
|
||
|
|
||
|
tcp_input(p, inp);
|
||
|
|
||
|
ip_addr_set_zero(ip_current_dest_addr());
|
||
|
ip_addr_set_zero(ip_current_src_addr());
|
||
|
ip_current_netif() = NULL;
|
||
|
ip_data.current_ip4_header = NULL;
|
||
|
}
|
||
|
|
||
|
static err_t test_tcp_netif_output(struct netif *netif, struct pbuf *p,
|
||
|
const ip4_addr_t *ipaddr)
|
||
|
{
|
||
|
struct test_tcp_txcounters *txcounters = (struct test_tcp_txcounters*)netif->state;
|
||
|
LWIP_UNUSED_ARG(ipaddr);
|
||
|
if (txcounters != NULL)
|
||
|
{
|
||
|
txcounters->num_tx_calls++;
|
||
|
txcounters->num_tx_bytes += p->tot_len;
|
||
|
if (txcounters->copy_tx_packets) {
|
||
|
struct pbuf *p_copy = pbuf_alloc(PBUF_LINK, p->tot_len, PBUF_RAM);
|
||
|
err_t err;
|
||
|
EXPECT(p_copy != NULL);
|
||
|
err = pbuf_copy(p_copy, p);
|
||
|
EXPECT(err == ERR_OK);
|
||
|
if (txcounters->tx_packets == NULL) {
|
||
|
txcounters->tx_packets = p_copy;
|
||
|
} else {
|
||
|
pbuf_cat(txcounters->tx_packets, p_copy);
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
return ERR_OK;
|
||
|
}
|
||
|
|
||
|
void test_tcp_init_netif(struct netif *netif, struct test_tcp_txcounters *txcounters,
|
||
|
ip_addr_t *ip_addr, ip_addr_t *netmask)
|
||
|
{
|
||
|
struct netif *n;
|
||
|
memset(netif, 0, sizeof(struct netif));
|
||
|
if (txcounters != NULL) {
|
||
|
memset(txcounters, 0, sizeof(struct test_tcp_txcounters));
|
||
|
netif->state = txcounters;
|
||
|
}
|
||
|
netif->output = test_tcp_netif_output;
|
||
|
netif->flags |= NETIF_FLAG_UP | NETIF_FLAG_LINK_UP;
|
||
|
ip_addr_copy_from_ip4(netif->netmask, *ip_2_ip4(netmask));
|
||
|
ip_addr_copy_from_ip4(netif->ip_addr, *ip_2_ip4(ip_addr));
|
||
|
for (n = netif_list; n != NULL; n = n->next) {
|
||
|
if (n == netif) {
|
||
|
return;
|
||
|
}
|
||
|
}
|
||
|
netif->next = NULL;
|
||
|
netif_list = netif;
|
||
|
}
|