/* $Id: ipv4.cpp 44529 2013-02-04 15:54:15Z vboxsync $ */ /** @file * IPRT - IPv4 Checksum calculation and validation. */ /* * Copyright (C) 2008-2011 Oracle Corporation * * This file is part of VirtualBox Open Source Edition (OSE), as * available from http://www.virtualbox.org. This file is free software; * you can redistribute it and/or modify it under the terms of the GNU * General Public License (GPL) as published by the Free Software * Foundation, in version 2 as it comes in the "COPYING" file of the * VirtualBox OSE distribution. VirtualBox OSE is distributed in the * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind. * * The contents of this file may alternatively be used under the terms * of the Common Development and Distribution License Version 1.0 * (CDDL) only, as it comes in the "COPYING.CDDL" file of the * VirtualBox OSE distribution, in which case the provisions of the * CDDL are applicable instead of those of the GPL. * * You may elect to license modified versions of this file under the * terms and conditions of either the GPL or the CDDL or both. */ /******************************************************************************* * Header Files * *******************************************************************************/ #include #include "internal/iprt.h" #include #include /** * Calculates the checksum of the IPv4 header. * * @returns Checksum (network endian). * @param pIpHdr Pointer to the IPv4 header to checksum, network endian (big). * Assumes the caller already checked the minimum size requirement. */ RTDECL(uint16_t) RTNetIPv4HdrChecksum(PCRTNETIPV4 pIpHdr) { uint16_t const *paw = (uint16_t const *)pIpHdr; uint32_t u32Sum = paw[0] /* ip_hl */ + paw[1] /* ip_len */ + paw[2] /* ip_id */ + paw[3] /* ip_off */ + paw[4] /* ip_ttl */ /*+ paw[5] == 0 */ /* ip_sum */ + paw[6] /* ip_src */ + paw[7] /* ip_src:16 */ + paw[8] /* ip_dst */ + paw[9]; /* ip_dst:16 */ /* any options */ if (pIpHdr->ip_hl > 20 / 4) { /* this is a bit insane... (identical to the TCP header) */ switch (pIpHdr->ip_hl) { case 6: u32Sum += paw[10] + paw[11]; break; case 7: u32Sum += paw[10] + paw[11] + paw[12] + paw[13]; break; case 8: u32Sum += paw[10] + paw[11] + paw[12] + paw[13] + paw[14] + paw[15]; break; case 9: u32Sum += paw[10] + paw[11] + paw[12] + paw[13] + paw[14] + paw[15] + paw[16] + paw[17]; break; case 10: u32Sum += paw[10] + paw[11] + paw[12] + paw[13] + paw[14] + paw[15] + paw[16] + paw[17] + paw[18] + paw[19]; break; case 11: u32Sum += paw[10] + paw[11] + paw[12] + paw[13] + paw[14] + paw[15] + paw[16] + paw[17] + paw[18] + paw[19] + paw[20] + paw[21]; break; case 12: u32Sum += paw[10] + paw[11] + paw[12] + paw[13] + paw[14] + paw[15] + paw[16] + paw[17] + paw[18] + paw[19] + paw[20] + paw[21] + paw[22] + paw[23]; break; case 13: u32Sum += paw[10] + paw[11] + paw[12] + paw[13] + paw[14] + paw[15] + paw[16] + paw[17] + paw[18] + paw[19] + paw[20] + paw[21] + paw[22] + paw[23] + paw[24] + paw[25]; break; case 14: u32Sum += paw[10] + paw[11] + paw[12] + paw[13] + paw[14] + paw[15] + paw[16] + paw[17] + paw[18] + paw[19] + paw[20] + paw[21] + paw[22] + paw[23] + paw[24] + paw[25] + paw[26] + paw[27]; break; case 15: u32Sum += paw[10] + paw[11] + paw[12] + paw[13] + paw[14] + paw[15] + paw[16] + paw[17] + paw[18] + paw[19] + paw[20] + paw[21] + paw[22] + paw[23] + paw[24] + paw[25] + paw[26] + paw[27] + paw[28] + paw[29]; break; default: AssertFailed(); } } /* 16-bit one complement fun */ u32Sum = (u32Sum >> 16) + (u32Sum & 0xffff); /* hi + low words */ u32Sum += u32Sum >> 16; /* carry */ return (uint16_t)~u32Sum; } RT_EXPORT_SYMBOL(RTNetIPv4HdrChecksum); /** * Verifies the header version, header size, packet size, and header checksum * of the specified IPv4 header. * * @returns true if valid, false if invalid. * @param pIpHdr Pointer to the IPv4 header to validate. Network endian (big). * @param cbHdrMax The max header size, or the max size of what pIpHdr points * to if you like. Note that an IPv4 header can be up to 60 bytes. * @param cbPktMax The max IP packet size, IP header and payload. This doesn't have * to be mapped following pIpHdr. * @param fChecksum Whether to validate the checksum (GSO). */ RTDECL(bool) RTNetIPv4IsHdrValid(PCRTNETIPV4 pIpHdr, size_t cbHdrMax, size_t cbPktMax, bool fChecksum) { /* * The header fields. */ Assert(cbPktMax >= cbHdrMax); if (RT_UNLIKELY(cbHdrMax < RTNETIPV4_MIN_LEN)) return false; if (RT_UNLIKELY(pIpHdr->ip_hl * 4 < RTNETIPV4_MIN_LEN)) return false; if (RT_UNLIKELY((size_t)pIpHdr->ip_hl * 4 > cbHdrMax)) { Assert((size_t)pIpHdr->ip_hl * 4 > cbPktMax); /* You'll hit this if you mapped/copy too little of the header! */ return false; } if (RT_UNLIKELY(pIpHdr->ip_v != 4)) return false; if (RT_UNLIKELY(RT_BE2H_U16(pIpHdr->ip_len) > cbPktMax)) return false; /* * The header checksum if requested. */ if (fChecksum) { uint16_t u16Sum = RTNetIPv4HdrChecksum(pIpHdr); if (RT_UNLIKELY(pIpHdr->ip_sum != u16Sum)) return false; } return true; } RT_EXPORT_SYMBOL(RTNetIPv4IsHdrValid); /** * Calculates the checksum of a pseudo header given an IPv4 header [inlined]. * * @returns 32-bit intermediary checksum value. * @param pIpHdr The IP header (network endian (big)). */ DECLINLINE(uint32_t) rtNetIPv4PseudoChecksum(PCRTNETIPV4 pIpHdr) { uint16_t cbPayload = RT_BE2H_U16(pIpHdr->ip_len) - pIpHdr->ip_hl * 4; uint32_t u32Sum = pIpHdr->ip_src.au16[0] + pIpHdr->ip_src.au16[1] + pIpHdr->ip_dst.au16[0] + pIpHdr->ip_dst.au16[1] #ifdef RT_BIG_ENDIAN + pIpHdr->ip_p #else + ((uint32_t)pIpHdr->ip_p << 8) #endif + RT_H2BE_U16(cbPayload); return u32Sum; } /** * Calculates the checksum of a pseudo header given an IPv4 header. * * @returns 32-bit intermediary checksum value. * @param pIpHdr The IP header (network endian (big)). */ RTDECL(uint32_t) RTNetIPv4PseudoChecksum(PCRTNETIPV4 pIpHdr) { return rtNetIPv4PseudoChecksum(pIpHdr); } RT_EXPORT_SYMBOL(RTNetIPv4PseudoChecksum); /** * Calculates the checksum of a pseudo header given the individual components. * * @returns 32-bit intermediary checksum value. * @param SrcAddr The source address in host endian. * @param DstAddr The destination address in host endian. * @param bProtocol The protocol number. * @param cbPkt The packet size (host endian of course) (no IPv4 header). */ RTDECL(uint32_t) RTNetIPv4PseudoChecksumBits(RTNETADDRIPV4 SrcAddr, RTNETADDRIPV4 DstAddr, uint8_t bProtocol, uint16_t cbPkt) { uint32_t u32Sum = RT_H2BE_U16(SrcAddr.au16[0]) + RT_H2BE_U16(SrcAddr.au16[1]) + RT_H2BE_U16(DstAddr.au16[0]) + RT_H2BE_U16(DstAddr.au16[1]) #ifdef RT_BIG_ENDIAN + bProtocol #else + ((uint32_t)bProtocol << 8) #endif + RT_H2BE_U16(cbPkt); return u32Sum; } RT_EXPORT_SYMBOL(RTNetIPv4PseudoChecksumBits); /** * Adds the checksum of the UDP header to the intermediate checksum value [inlined]. * * @returns 32-bit intermediary checksum value. * @param pUdpHdr Pointer to the UDP header to checksum, network endian (big). * @param u32Sum The 32-bit intermediate checksum value. */ DECLINLINE(uint32_t) rtNetIPv4AddUDPChecksum(PCRTNETUDP pUdpHdr, uint32_t u32Sum) { u32Sum += pUdpHdr->uh_sport + pUdpHdr->uh_dport /*+ pUdpHdr->uh_sum = 0 */ + pUdpHdr->uh_ulen; return u32Sum; } /** * Adds the checksum of the UDP header to the intermediate checksum value. * * @returns 32-bit intermediary checksum value. * @param pUdpHdr Pointer to the UDP header to checksum, network endian (big). * @param u32Sum The 32-bit intermediate checksum value. */ RTDECL(uint32_t) RTNetIPv4AddUDPChecksum(PCRTNETUDP pUdpHdr, uint32_t u32Sum) { return rtNetIPv4AddUDPChecksum(pUdpHdr, u32Sum); } RT_EXPORT_SYMBOL(RTNetIPv4AddUDPChecksum); /** * Adds the checksum of the TCP header to the intermediate checksum value [inlined]. * * @returns 32-bit intermediary checksum value. * @param pTcpHdr Pointer to the TCP header to checksum, network * endian (big). Assumes the caller has already validate * it and made sure the entire header is present. * @param u32Sum The 32-bit intermediate checksum value. */ DECLINLINE(uint32_t) rtNetIPv4AddTCPChecksum(PCRTNETTCP pTcpHdr, uint32_t u32Sum) { uint16_t const *paw = (uint16_t const *)pTcpHdr; u32Sum += paw[0] /* th_sport */ + paw[1] /* th_dport */ + paw[2] /* th_seq */ + paw[3] /* th_seq:16 */ + paw[4] /* th_ack */ + paw[5] /* th_ack:16 */ + paw[6] /* th_off, th_x2, th_flags */ + paw[7] /* th_win */ /*+ paw[8] == 0 */ /* th_sum */ + paw[9]; /* th_urp */ if (pTcpHdr->th_off > RTNETTCP_MIN_LEN / 4) { /* this is a bit insane... (identical to the IPv4 header) */ switch (pTcpHdr->th_off) { case 6: u32Sum += paw[10] + paw[11]; break; case 7: u32Sum += paw[10] + paw[11] + paw[12] + paw[13]; break; case 8: u32Sum += paw[10] + paw[11] + paw[12] + paw[13] + paw[14] + paw[15]; break; case 9: u32Sum += paw[10] + paw[11] + paw[12] + paw[13] + paw[14] + paw[15] + paw[16] + paw[17]; break; case 10: u32Sum += paw[10] + paw[11] + paw[12] + paw[13] + paw[14] + paw[15] + paw[16] + paw[17] + paw[18] + paw[19]; break; case 11: u32Sum += paw[10] + paw[11] + paw[12] + paw[13] + paw[14] + paw[15] + paw[16] + paw[17] + paw[18] + paw[19] + paw[20] + paw[21]; break; case 12: u32Sum += paw[10] + paw[11] + paw[12] + paw[13] + paw[14] + paw[15] + paw[16] + paw[17] + paw[18] + paw[19] + paw[20] + paw[21] + paw[22] + paw[23]; break; case 13: u32Sum += paw[10] + paw[11] + paw[12] + paw[13] + paw[14] + paw[15] + paw[16] + paw[17] + paw[18] + paw[19] + paw[20] + paw[21] + paw[22] + paw[23] + paw[24] + paw[25]; break; case 14: u32Sum += paw[10] + paw[11] + paw[12] + paw[13] + paw[14] + paw[15] + paw[16] + paw[17] + paw[18] + paw[19] + paw[20] + paw[21] + paw[22] + paw[23] + paw[24] + paw[25] + paw[26] + paw[27]; break; case 15: u32Sum += paw[10] + paw[11] + paw[12] + paw[13] + paw[14] + paw[15] + paw[16] + paw[17] + paw[18] + paw[19] + paw[20] + paw[21] + paw[22] + paw[23] + paw[24] + paw[25] + paw[26] + paw[27] + paw[28] + paw[29]; break; default: AssertFailed(); } } return u32Sum; } /** * Adds the checksum of the TCP header to the intermediate checksum value. * * @returns 32-bit intermediary checksum value. * @param pTcpHdr Pointer to the TCP header to checksum, network * endian (big). Assumes the caller has already validate * it and made sure the entire header is present. * @param u32Sum The 32-bit intermediate checksum value. */ RTDECL(uint32_t) RTNetIPv4AddTCPChecksum(PCRTNETTCP pTcpHdr, uint32_t u32Sum) { return rtNetIPv4AddTCPChecksum(pTcpHdr, u32Sum); } RT_EXPORT_SYMBOL(RTNetIPv4AddTCPChecksum); /** * Adds the checksum of the specified data segment to the intermediate checksum value [inlined]. * * @returns 32-bit intermediary checksum value. * @param pvData Pointer to the data that should be checksummed. * @param cbData The number of bytes to checksum. * @param u32Sum The 32-bit intermediate checksum value. * @param pfOdd This is used to keep track of odd bits, initialize to false * when starting to checksum the data (aka text) after a TCP * or UDP header (data never start at an odd offset). */ DECLINLINE(uint32_t) rtNetIPv4AddDataChecksum(void const *pvData, size_t cbData, uint32_t u32Sum, bool *pfOdd) { uint16_t const *pw = (uint16_t const *)pvData; if (*pfOdd) { #ifdef RT_BIG_ENDIAN /* there was an odd byte in the previous chunk, add the lower byte. */ u32Sum += *(uint8_t *)pvData; #else /* there was an odd byte in the previous chunk, add the upper byte. */ u32Sum += (uint32_t)*(uint8_t *)pvData << 8; #endif /* skip the byte. */ cbData--; if (!cbData) return u32Sum; pvData = (uint8_t const *)pvData + 1; } /* iterate the data. */ while (cbData > 1) { u32Sum += *pw; pw++; cbData -= 2; } /* handle odd byte. */ if (cbData) { #ifdef RT_BIG_ENDIAN u32Sum += (uint32_t)*(uint8_t *)pw << 8; #else u32Sum += *(uint8_t *)pw; #endif *pfOdd = true; } else *pfOdd = false; return u32Sum; } /** * Adds the checksum of the specified data segment to the intermediate checksum value. * * @returns 32-bit intermediary checksum value. * @param pvData The data bits to checksum. * @param cbData The number of bytes to checksum. * @param u32Sum The 32-bit intermediate checksum value. * @param pfOdd This is used to keep track of odd bits, initialize to false * when starting to checksum the data (aka text) after a TCP * or UDP header (data never start at an odd offset). */ RTDECL(uint32_t) RTNetIPv4AddDataChecksum(void const *pvData, size_t cbData, uint32_t u32Sum, bool *pfOdd) { return rtNetIPv4AddDataChecksum(pvData, cbData, u32Sum, pfOdd); } RT_EXPORT_SYMBOL(RTNetIPv4AddDataChecksum); /** * Finalizes a IPv4 checksum [inlined]. * * @returns The checksum (network endian). * @param u32Sum The 32-bit intermediate checksum value. */ DECLINLINE(uint16_t) rtNetIPv4FinalizeChecksum(uint32_t u32Sum) { /* 16-bit one complement fun */ u32Sum = (u32Sum >> 16) + (u32Sum & 0xffff); /* hi + low words */ u32Sum += u32Sum >> 16; /* carry */ return (uint16_t)~u32Sum; } /** * Finalizes a IPv4 checksum. * * @returns The checksum (network endian). * @param u32Sum The 32-bit intermediate checksum value. */ RTDECL(uint16_t) RTNetIPv4FinalizeChecksum(uint32_t u32Sum) { return rtNetIPv4FinalizeChecksum(u32Sum); } RT_EXPORT_SYMBOL(RTNetIPv4FinalizeChecksum); /** * Calculates the checksum for the UDP header given the UDP header w/ payload * and the checksum of the pseudo header. * * @returns The checksum (network endian). * @param u32Sum The checksum of the pseudo header. See * RTNetIPv4PseudoChecksum and RTNetIPv6PseudoChecksum. * @param pUdpHdr Pointer to the UDP header and the payload, in * network endian (big). We use the uh_ulen field to * figure out how much to checksum. */ RTDECL(uint16_t) RTNetUDPChecksum(uint32_t u32Sum, PCRTNETUDP pUdpHdr) { bool fOdd; u32Sum = rtNetIPv4AddUDPChecksum(pUdpHdr, u32Sum); fOdd = false; u32Sum = rtNetIPv4AddDataChecksum(pUdpHdr + 1, RT_BE2H_U16(pUdpHdr->uh_ulen) - sizeof(*pUdpHdr), u32Sum, &fOdd); return rtNetIPv4FinalizeChecksum(u32Sum); } RT_EXPORT_SYMBOL(RTNetUDPChecksum); /** * Calculates the checksum for the UDP header given the IP header, * UDP header and payload. * * @returns The checksum (network endian). * @param pIpHdr Pointer to the IPv4 header, in network endian (big). * @param pUdpHdr Pointer to the UDP header, in network endian (big). * @param pvData Pointer to the UDP payload. The size is taken from the * UDP header and the caller is supposed to have validated * this before calling. */ RTDECL(uint16_t) RTNetIPv4UDPChecksum(PCRTNETIPV4 pIpHdr, PCRTNETUDP pUdpHdr, void const *pvData) { bool fOdd; uint32_t u32Sum = rtNetIPv4PseudoChecksum(pIpHdr); u32Sum = rtNetIPv4AddUDPChecksum(pUdpHdr, u32Sum); fOdd = false; u32Sum = rtNetIPv4AddDataChecksum(pvData, RT_BE2H_U16(pUdpHdr->uh_ulen) - sizeof(*pUdpHdr), u32Sum, &fOdd); return rtNetIPv4FinalizeChecksum(u32Sum); } RT_EXPORT_SYMBOL(RTNetIPv4UDPChecksum); /** * Simple verification of an UDP packet size. * * @returns true if valid, false if invalid. * @param pIpHdr Pointer to the IPv4 header, in network endian (big). * This is assumed to be valid and the minimum size being mapped. * @param pUdpHdr Pointer to the UDP header, in network endian (big). * @param cbPktMax The max UDP packet size, UDP header and payload (data). */ DECLINLINE(bool) rtNetIPv4IsUDPSizeValid(PCRTNETIPV4 pIpHdr, PCRTNETUDP pUdpHdr, size_t cbPktMax) { /* * Size validation. */ size_t cb; if (RT_UNLIKELY(cbPktMax < RTNETUDP_MIN_LEN)) return false; cb = RT_BE2H_U16(pUdpHdr->uh_ulen); if (RT_UNLIKELY(cb > cbPktMax)) return false; if (RT_UNLIKELY(cb > (size_t)(RT_BE2H_U16(pIpHdr->ip_len) - pIpHdr->ip_hl * 4))) return false; return true; } /** * Simple verification of an UDP packet size. * * @returns true if valid, false if invalid. * @param pIpHdr Pointer to the IPv4 header, in network endian (big). * This is assumed to be valid and the minimum size being mapped. * @param pUdpHdr Pointer to the UDP header, in network endian (big). * @param cbPktMax The max UDP packet size, UDP header and payload (data). */ RTDECL(bool) RTNetIPv4IsUDPSizeValid(PCRTNETIPV4 pIpHdr, PCRTNETUDP pUdpHdr, size_t cbPktMax) { return rtNetIPv4IsUDPSizeValid(pIpHdr, pUdpHdr, cbPktMax); } RT_EXPORT_SYMBOL(RTNetIPv4IsUDPSizeValid); /** * Simple verification of an UDP packet (size + checksum). * * @returns true if valid, false if invalid. * @param pIpHdr Pointer to the IPv4 header, in network endian (big). * This is assumed to be valid and the minimum size being mapped. * @param pUdpHdr Pointer to the UDP header, in network endian (big). * @param pvData Pointer to the data, assuming it's one single segment * and that cbPktMax - sizeof(RTNETUDP) is mapped here. * @param cbPktMax The max UDP packet size, UDP header and payload (data). * @param fChecksum Whether to validate the checksum (GSO). */ RTDECL(bool) RTNetIPv4IsUDPValid(PCRTNETIPV4 pIpHdr, PCRTNETUDP pUdpHdr, void const *pvData, size_t cbPktMax, bool fChecksum) { if (RT_UNLIKELY(!rtNetIPv4IsUDPSizeValid(pIpHdr, pUdpHdr, cbPktMax))) return false; if (fChecksum && pUdpHdr->uh_sum) { uint16_t u16Sum = RTNetIPv4UDPChecksum(pIpHdr, pUdpHdr, pvData); if (RT_UNLIKELY(pUdpHdr->uh_sum != u16Sum)) return false; } return true; } RT_EXPORT_SYMBOL(RTNetIPv4IsUDPValid); /** * Calculates the checksum for the TCP header given the IP header, * TCP header and payload. * * @returns The checksum (network endian). * @param pIpHdr Pointer to the IPv4 header, in network endian (big). * @param pTcpHdr Pointer to the TCP header, in network endian (big). * @param pvData Pointer to the TCP payload. The size is derived from * the two headers and the caller is supposed to have * validated this before calling. If NULL, we assume * the data follows immediately after the TCP header. */ RTDECL(uint16_t) RTNetIPv4TCPChecksum(PCRTNETIPV4 pIpHdr, PCRTNETTCP pTcpHdr, void const *pvData) { bool fOdd; size_t cbData; uint32_t u32Sum = rtNetIPv4PseudoChecksum(pIpHdr); u32Sum = rtNetIPv4AddTCPChecksum(pTcpHdr, u32Sum); fOdd = false; cbData = RT_BE2H_U16(pIpHdr->ip_len) - pIpHdr->ip_hl * 4 - pTcpHdr->th_off * 4; u32Sum = rtNetIPv4AddDataChecksum(pvData ? pvData : (uint8_t const *)pTcpHdr + pTcpHdr->th_off * 4, cbData, u32Sum, &fOdd); return rtNetIPv4FinalizeChecksum(u32Sum); } RT_EXPORT_SYMBOL(RTNetIPv4TCPChecksum); /** * Calculates the checksum for the TCP header given the TCP header, payload and * the checksum of the pseudo header. * * This is not specific to IPv4. * * @returns The checksum (network endian). * @param u32Sum The checksum of the pseudo header. See * RTNetIPv4PseudoChecksum and RTNetIPv6PseudoChecksum. * @param pTcpHdr Pointer to the TCP header, in network endian (big). * @param pvData Pointer to the TCP payload. * @param cbData The size of the TCP payload. */ RTDECL(uint16_t) RTNetTCPChecksum(uint32_t u32Sum, PCRTNETTCP pTcpHdr, void const *pvData, size_t cbData) { bool fOdd; u32Sum = rtNetIPv4AddTCPChecksum(pTcpHdr, u32Sum); fOdd = false; u32Sum = rtNetIPv4AddDataChecksum(pvData, cbData, u32Sum, &fOdd); return rtNetIPv4FinalizeChecksum(u32Sum); } RT_EXPORT_SYMBOL(RTNetTCPChecksum); /** * Verification of a TCP header. * * @returns true if valid, false if invalid. * @param pIpHdr Pointer to the IPv4 header, in network endian (big). * This is assumed to be valid and the minimum size being mapped. * @param pTcpHdr Pointer to the TCP header, in network endian (big). * @param cbHdrMax The max TCP header size (what pTcpHdr points to). * @param cbPktMax The max TCP packet size, TCP header and payload (data). */ DECLINLINE(bool) rtNetIPv4IsTCPSizeValid(PCRTNETIPV4 pIpHdr, PCRTNETTCP pTcpHdr, size_t cbHdrMax, size_t cbPktMax) { size_t cbTcpHdr; size_t cbTcp; Assert(cbPktMax >= cbHdrMax); /* * Size validations. */ if (RT_UNLIKELY(cbPktMax < RTNETTCP_MIN_LEN)) return false; cbTcpHdr = pTcpHdr->th_off * 4; if (RT_UNLIKELY(cbTcpHdr > cbHdrMax)) return false; cbTcp = RT_BE2H_U16(pIpHdr->ip_len) - pIpHdr->ip_hl * 4; if (RT_UNLIKELY(cbTcp > cbPktMax)) return false; return true; } /** * Simple verification of an TCP packet size. * * @returns true if valid, false if invalid. * @param pIpHdr Pointer to the IPv4 header, in network endian (big). * This is assumed to be valid and the minimum size being mapped. * @param pTcpHdr Pointer to the TCP header, in network endian (big). * @param cbHdrMax The max TCP header size (what pTcpHdr points to). * @param cbPktMax The max TCP packet size, TCP header and payload (data). */ RTDECL(bool) RTNetIPv4IsTCPSizeValid(PCRTNETIPV4 pIpHdr, PCRTNETTCP pTcpHdr, size_t cbHdrMax, size_t cbPktMax) { return rtNetIPv4IsTCPSizeValid(pIpHdr, pTcpHdr, cbHdrMax, cbPktMax); } RT_EXPORT_SYMBOL(RTNetIPv4IsTCPSizeValid); /** * Simple verification of an TCP packet (size + checksum). * * @returns true if valid, false if invalid. * @param pIpHdr Pointer to the IPv4 header, in network endian (big). * This is assumed to be valid and the minimum size being mapped. * @param pTcpHdr Pointer to the TCP header, in network endian (big). * @param cbHdrMax The max TCP header size (what pTcpHdr points to). * @param pvData Pointer to the data, assuming it's one single segment * and that cbPktMax - sizeof(RTNETTCP) is mapped here. * If NULL then we assume the data follows immediately after * the TCP header. * @param cbPktMax The max TCP packet size, TCP header and payload (data). * @param fChecksum Whether to validate the checksum (GSO). */ RTDECL(bool) RTNetIPv4IsTCPValid(PCRTNETIPV4 pIpHdr, PCRTNETTCP pTcpHdr, size_t cbHdrMax, void const *pvData, size_t cbPktMax, bool fChecksum) { if (RT_UNLIKELY(!rtNetIPv4IsTCPSizeValid(pIpHdr, pTcpHdr, cbHdrMax, cbPktMax))) return false; if (fChecksum) { uint16_t u16Sum = RTNetIPv4TCPChecksum(pIpHdr, pTcpHdr, pvData); if (RT_UNLIKELY(pTcpHdr->th_sum != u16Sum)) return false; } return true; } RT_EXPORT_SYMBOL(RTNetIPv4IsTCPValid); /** * Minimal validation of a DHCP packet. * * This will fail on BOOTP packets (if sufficient data is supplied). * It will not verify the source and destination ports, that's the * caller's responsibility. * * This function will ASSUME that the hardware type is ethernet * and use that for htype/hlen validation. * * @returns true if valid, false if invalid. * @param pUdpHdr Pointer to the UDP header, in network endian (big). * This is assumed to be valid and fully mapped. * @param pDhcp Pointer to the DHCP packet. * This might not be the entire thing, see cbDhcp. * @param cbDhcp The number of valid bytes that pDhcp points to. * @param pMsgType Where to store the message type (if found). * This will be set to 0 if not found and on failure. */ RTDECL(bool) RTNetIPv4IsDHCPValid(PCRTNETUDP pUdpHdr, PCRTNETBOOTP pDhcp, size_t cbDhcp, uint8_t *pMsgType) { ssize_t cbLeft; uint8_t MsgType; PCRTNETDHCPOPT pOpt; NOREF(pUdpHdr); /** @todo rainy-day: Why isn't the UDP header used? */ AssertPtrNull(pMsgType); if (pMsgType) *pMsgType = 0; /* * Validate all the header fields we're able to... */ if (cbDhcp < RT_OFFSETOF(RTNETBOOTP, bp_op) + sizeof(pDhcp->bp_op)) return true; if (RT_UNLIKELY( pDhcp->bp_op != RTNETBOOTP_OP_REQUEST && pDhcp->bp_op != RTNETBOOTP_OP_REPLY)) return false; if (cbDhcp < RT_OFFSETOF(RTNETBOOTP, bp_htype) + sizeof(pDhcp->bp_htype)) return true; if (RT_UNLIKELY(pDhcp->bp_htype != RTNET_ARP_ETHER)) return false; if (cbDhcp < RT_OFFSETOF(RTNETBOOTP, bp_hlen) + sizeof(pDhcp->bp_hlen)) return true; if (RT_UNLIKELY(pDhcp->bp_hlen != sizeof(RTMAC))) return false; if (cbDhcp < RT_OFFSETOF(RTNETBOOTP, bp_flags) + sizeof(pDhcp->bp_flags)) return true; if (RT_UNLIKELY(RT_BE2H_U16(pDhcp->bp_flags) & ~(RTNET_DHCP_FLAGS_NO_BROADCAST))) return false; /* * Check the DHCP cookie and make sure it isn't followed by an END option * (because that seems to be indicating that it's BOOTP and not DHCP). */ cbLeft = (ssize_t)cbDhcp - RT_OFFSETOF(RTNETBOOTP, bp_vend.Dhcp.dhcp_cookie) + sizeof(pDhcp->bp_vend.Dhcp.dhcp_cookie); if (cbLeft < 0) return true; if (RT_UNLIKELY(RT_BE2H_U32(pDhcp->bp_vend.Dhcp.dhcp_cookie) != RTNET_DHCP_COOKIE)) return false; if (cbLeft < 1) return true; pOpt = (PCRTNETDHCPOPT)&pDhcp->bp_vend.Dhcp.dhcp_opts[0]; if (pOpt->dhcp_opt == RTNET_DHCP_OPT_END) return false; /* * Scan the options until we find the message type or run out of message. * * We're not strict about termination (END) for many reasons, however, * we don't accept END without MSG_TYPE. */ MsgType = 0; while (cbLeft > 0) { if (pOpt->dhcp_opt == RTNET_DHCP_OPT_END) { /* Fail if no MSG_TYPE. */ if (!MsgType) return false; break; } if (pOpt->dhcp_opt == RTNET_DHCP_OPT_PAD) { pOpt = (PCRTNETDHCPOPT)((uint8_t const *)pOpt + 1); cbLeft--; } else { switch (pOpt->dhcp_opt) { case RTNET_DHCP_OPT_MSG_TYPE: { if (cbLeft < 3) return true; MsgType = *(const uint8_t *)(pOpt + 1); switch (MsgType) { case RTNET_DHCP_MT_DISCOVER: case RTNET_DHCP_MT_OFFER: case RTNET_DHCP_MT_REQUEST: case RTNET_DHCP_MT_DECLINE: case RTNET_DHCP_MT_ACK: case RTNET_DHCP_MT_NAC: case RTNET_DHCP_MT_RELEASE: case RTNET_DHCP_MT_INFORM: break; default: /* we don't know this message type, fail. */ return false; } /* Found a known message type, consider the job done. */ if (pMsgType) *pMsgType = MsgType; return true; } } /* Skip the option. */ cbLeft -= pOpt->dhcp_len + sizeof(*pOpt); pOpt = (PCRTNETDHCPOPT)((uint8_t const *)pOpt + pOpt->dhcp_len + sizeof(*pOpt)); } } return true; } RT_EXPORT_SYMBOL(RTNetIPv4IsDHCPValid);