| /* |
| * Copyright (c) 2022, The OpenThread Authors. |
| * All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions are met: |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in the |
| * documentation and/or other materials provided with the distribution. |
| * 3. Neither the name of the copyright holder nor the |
| * names of its contributors may be used to endorse or promote products |
| * derived from this software without specific prior written permission. |
| * |
| * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" |
| * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE |
| * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR |
| * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF |
| * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS |
| * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN |
| * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
| * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE |
| * POSSIBILITY OF SUCH DAMAGE. |
| */ |
| |
| #include "common/encoding.hpp" |
| #include "net/ip4_types.hpp" |
| |
| #include "test_util.hpp" |
| |
| namespace ot { |
| namespace Ip4 { |
| |
| void VerifyEcnDscp(const Header &aHeader, uint8_t aDscp, Ecn aEcn) |
| { |
| uint8_t expectedDscpEcn = static_cast<uint8_t>((aDscp << 2) + aEcn); |
| |
| printf("%02x {dscp:%d, ecn:%d}\n", aHeader.GetDscpEcn(), aHeader.GetDscp(), aHeader.GetEcn()); |
| |
| VerifyOrQuit(aHeader.GetDscp() == aDscp); |
| VerifyOrQuit(aHeader.GetEcn() == aEcn); |
| VerifyOrQuit(aHeader.GetDscpEcn() == expectedDscpEcn); |
| } |
| |
| void TestIp4Header(void) |
| { |
| static constexpr uint16_t kTotalLength = 84; |
| static constexpr uint8_t kTtl = 64; |
| |
| const uint8_t kDscps[] = {0x0, 0x1, 0x3, 0xf, 0x30, 0x2f, 0x3f}; |
| const Ecn kEcns[] = {Ecn::kEcnNotCapable, Ecn::kEcnCapable0, Ecn::kEcnCapable1, Ecn::kEcnMarked}; |
| const uint8_t kExampleIp4Header[] = "\x45\x00\x00\x54\x23\xed\x00\x00\x40\x01\x41\xd1\x0a\x00\x00\xeb" |
| "\x0a\x00\x00\x01"; |
| |
| Header header; |
| Address source; |
| Address destination; |
| const uint8_t *headerBytes = reinterpret_cast<const uint8_t *>(&header); |
| |
| SuccessOrQuit(source.FromString("10.0.0.235"), "Address::FromString() failed"); |
| SuccessOrQuit(destination.FromString("10.0.0.1"), "Address::FromString() failed"); |
| |
| header.InitVersionIhl(); |
| |
| header.Clear(); |
| header.InitVersionIhl(); |
| VerifyOrQuit(header.IsValid()); |
| VerifyOrQuit(header.GetTotalLength() == 0); |
| VerifyOrQuit(header.GetProtocol() == 0); |
| VerifyOrQuit(header.GetTtl() == 0); |
| VerifyOrQuit(header.GetSource().mFields.m32 == 0); |
| VerifyOrQuit(header.GetDestination().mFields.m32 == 0); |
| VerifyOrQuit(header.GetFragmentOffset() == 0); |
| |
| header.SetTotalLength(kTotalLength); |
| header.SetProtocol(Ip4::kProtoIcmp); |
| header.SetTtl(kTtl); |
| header.SetSource(source); |
| header.SetDestination(destination); |
| |
| VerifyOrQuit(header.IsValid()); |
| VerifyOrQuit(header.GetProtocol() == kProtoIcmp); |
| VerifyOrQuit(header.GetTtl() == kTtl); |
| VerifyOrQuit(header.GetSource() == source); |
| VerifyOrQuit(header.GetDestination() == destination); |
| |
| // Verify the offsets to different fields. |
| |
| VerifyOrQuit(BigEndian::ReadUint16(headerBytes + Header::kTotalLengthOffset) == kTotalLength, |
| "kTotalLength is incorrect"); |
| VerifyOrQuit(headerBytes[Header::kProtocolOffset] == kProtoIcmp, "kProtocol is incorrect"); |
| VerifyOrQuit(headerBytes[Header::kTtlOffset] == kTtl, "kTtl is incorrect"); |
| VerifyOrQuit(memcmp(&headerBytes[Header::kSourceAddressOffset], &source, sizeof(source)) == 0, |
| "Source address is incorrect"); |
| VerifyOrQuit(memcmp(&headerBytes[Header::kDestinationAddressOffset], &destination, sizeof(destination)) == 0, |
| "Destination address is incorrect"); |
| |
| for (uint8_t dscp : kDscps) |
| { |
| for (Ecn ecn : kEcns) |
| { |
| printf("Expecting {dscp:%-2d, ecn:%d} => ", dscp, ecn); |
| header.SetEcn(ecn); |
| header.SetDscp(dscp); |
| VerifyEcnDscp(header, dscp, ecn); |
| } |
| } |
| |
| memcpy(&header, kExampleIp4Header, sizeof(header)); |
| VerifyOrQuit(header.IsValid()); |
| VerifyOrQuit(memcmp(&headerBytes[Header::kSourceAddressOffset], &source, sizeof(source)) == 0, |
| "Source address is incorrect"); |
| VerifyOrQuit(memcmp(&headerBytes[Header::kDestinationAddressOffset], &destination, sizeof(destination)) == 0, |
| "Destination address is incorrect"); |
| VerifyOrQuit(BigEndian::ReadUint16(headerBytes + Header::kTotalLengthOffset) == kTotalLength, |
| "kTotalLength is incorrect"); |
| VerifyOrQuit(headerBytes[Header::kProtocolOffset] == kProtoIcmp, "kProtocol is incorrect"); |
| VerifyOrQuit(headerBytes[Header::kTtlOffset] == kTtl, "kTtl is incorrect"); |
| } |
| |
| } // namespace Ip4 |
| } // namespace ot |
| |
| int main(void) |
| { |
| ot::Ip4::TestIp4Header(); |
| printf("All tests passed\n"); |
| return 0; |
| } |