ZealOS/src/Home/Net/Protocols/ICMP.ZC

157 lines
3.5 KiB
HolyC
Raw Normal View History

#define ICMP_TYPE_ECHO_REPLY 0
#define ICMP_TYPE_ECHO_REQUEST 8
#define ICMP_CODE_ECHO 0 // RFC 792: "Echo or Echo Reply Message". 0 is the only code explicitly defined for Echo.
class CICMPHeader
{
U8 type;
U8 code;
U16 checksum;
U16 identifier;
U16 sequence_number;
};
2021-12-29 03:52:09 +00:00
/* global variable containing last reply ICMP header received,
Ping() checks this to make ping report.
*/
CICMPHeader icmp_reply;
U0 ICMPInit()
{
MemSet(&icmp_reply, 0, sizeof(CICMPHeader));
}
NetQueueInit;
2021-12-28 18:48:04 +00:00
U16 ICMPChecksum(U8 *buf, I64 size)
{
U64 i, sum = 0;
for (i = 0; i < size; i += 2)
{
sum += *buf(U16 *);
buf += 2;
}
if (size - i > 0)
sum += *buf;
while (sum >> 16 != 0)
sum = sum & 0xFFFF + sum >> 16;
return ~sum(U16);
}
U0 ICMPReplySend(U32 destination_ip_address,
2020-07-28 08:36:21 +01:00
U16 identifier,
U16 sequence_number,
U16 request_checksum,
U8 *payload,
I64 length)
{
U8 *icmp_frame;
I64 de_index;
CICMPHeader *header;
de_index = IPV4PacketAllocate(&icmp_frame,
2020-07-28 08:36:21 +01:00
IP_PROTOCOL_ICMP,
IPV4AddressGet,
2020-07-28 08:36:21 +01:00
destination_ip_address,
sizeof(CICMPHeader) + length);
if (de_index < 0)
{
NetErr("ICMP SEND REPLY: Failed to allocate IPV4 packet.");
return;
}
header = icmp_frame;
header->type = ICMP_TYPE_ECHO_REPLY;
header->code = 0; // why is 0 okay?
header->checksum = EndianU16(EndianU16(request_checksum) + 0x0800);
header->identifier = identifier;
header->sequence_number = sequence_number;
// TODO: header checksum is awful. Shrine says hack alert.
MemCopy(icmp_frame + sizeof(CICMPHeader), payload, length);
IPV4PacketFinish(de_index);
}
2021-12-28 18:48:04 +00:00
U0 ICMPRequestSend(U32 destination_ip_address,
U16 identifier,
U16 sequence_number,
U8 *payload,
I64 length)
{
U8 *icmp_frame;
I64 de_index;
CICMPHeader *header;
de_index = IPV4PacketAllocate(&icmp_frame,
IP_PROTOCOL_ICMP,
IPV4AddressGet,
destination_ip_address,
sizeof(CICMPHeader) + length);
if (de_index < 0)
{
NetErr("ICMP SEND REQUEST: Failed to allocate IPV4 packet.");
return;
}
header = icmp_frame;
header->type = ICMP_TYPE_ECHO_REQUEST;
header->code = 0; // why is 0 okay?
header->checksum = 0;
header->identifier = identifier;
header->sequence_number = sequence_number;
MemCopy(icmp_frame + sizeof(CICMPHeader), payload, length);
header->checksum = ICMPChecksum(header, sizeof(CICMPHeader) + length);
IPV4PacketFinish(de_index);
}
I64 ICMPHandler(CIPV4Packet *packet)
{
CICMPHeader *header;
if (packet->length < sizeof(CICMPHeader))
{
NetErr("ICMP HANDLER: Caught wrong IPV4 length.");
return -1;
}
header = packet->data;
if (header->type == ICMP_TYPE_ECHO_REQUEST && header->code == ICMP_CODE_ECHO)
{
ARPCachePut(packet->source_ip_address, packet->ethernet_frame->source_address);
ICMPReplySend(packet->source_ip_address,
2020-07-28 08:36:21 +01:00
header->identifier,
header->sequence_number,
header->checksum,
packet->data + sizeof(CICMPHeader), // Data payload at IPV4Packet data location after the ICMP header
packet->length - sizeof(CICMPHeader));// Payload length is size of packet after dropping header.
}
2021-12-29 03:52:09 +00:00
else if (header->type == ICMP_TYPE_ECHO_REPLY && header->code == ICMP_CODE_ECHO)
{ // save the reply to the global ICMP reply header
MemCopy(&icmp_reply, header, sizeof(CICMPHeader));
}
else
NetWarn("ICMP HANDLER: Unhandled ICMP packet. type, code: 0x%X, 0x%X", header->type, header->code);
NetLog("ICMP HANDLER: Exiting.");
return 0;
2021-12-29 03:52:09 +00:00
}
ICMPInit;