header.go 4.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149
  1. // Copyright 2012 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. package ipv4
  5. import (
  6. "errors"
  7. "fmt"
  8. "net"
  9. "runtime"
  10. "syscall"
  11. "unsafe"
  12. )
  13. var (
  14. errMissingAddress = errors.New("missing address")
  15. errMissingHeader = errors.New("missing header")
  16. errHeaderTooShort = errors.New("header too short")
  17. errBufferTooShort = errors.New("buffer too short")
  18. errInvalidConnType = errors.New("invalid conn type")
  19. )
  20. // References:
  21. //
  22. // RFC 791 Internet Protocol
  23. // http://tools.ietf.org/html/rfc791
  24. // RFC 1112 Host Extensions for IP Multicasting
  25. // http://tools.ietf.org/html/rfc1112
  26. // RFC 1122 Requirements for Internet Hosts
  27. // http://tools.ietf.org/html/rfc1122
  28. const (
  29. Version = 4 // protocol version
  30. HeaderLen = 20 // header length without extension headers
  31. maxHeaderLen = 60 // sensible default, revisit if later RFCs define new usage of version and header length fields
  32. )
  33. type headerField int
  34. const (
  35. posTOS headerField = 1 // type-of-service
  36. posTotalLen = 2 // packet total length
  37. posID = 4 // identification
  38. posFragOff = 6 // fragment offset
  39. posTTL = 8 // time-to-live
  40. posProtocol = 9 // next protocol
  41. posChecksum = 10 // checksum
  42. posSrc = 12 // source address
  43. posDst = 16 // destination address
  44. )
  45. // A Header represents an IPv4 header.
  46. type Header struct {
  47. Version int // protocol version
  48. Len int // header length
  49. TOS int // type-of-service
  50. TotalLen int // packet total length
  51. ID int // identification
  52. FragOff int // fragment offset
  53. TTL int // time-to-live
  54. Protocol int // next protocol
  55. Checksum int // checksum
  56. Src net.IP // source address
  57. Dst net.IP // destination address
  58. Options []byte // options, extension headers
  59. }
  60. func (h *Header) String() string {
  61. if h == nil {
  62. return "<nil>"
  63. }
  64. return fmt.Sprintf("ver: %v, hdrlen: %v, tos: %#x, totallen: %v, id: %#x, fragoff: %#x, ttl: %v, proto: %v, cksum: %#x, src: %v, dst: %v", h.Version, h.Len, h.TOS, h.TotalLen, h.ID, h.FragOff, h.TTL, h.Protocol, h.Checksum, h.Src, h.Dst)
  65. }
  66. // Please refer to the online manual; IP(4) on Darwin, FreeBSD and
  67. // OpenBSD. IP(7) on Linux.
  68. const supportsNewIPInput = runtime.GOOS == "linux" || runtime.GOOS == "openbsd"
  69. // Marshal returns the binary encoding of the IPv4 header h.
  70. func (h *Header) Marshal() ([]byte, error) {
  71. if h == nil {
  72. return nil, syscall.EINVAL
  73. }
  74. if h.Len < HeaderLen {
  75. return nil, errHeaderTooShort
  76. }
  77. hdrlen := HeaderLen + len(h.Options)
  78. b := make([]byte, hdrlen)
  79. b[0] = byte(Version<<4 | (hdrlen >> 2 & 0x0f))
  80. b[posTOS] = byte(h.TOS)
  81. if supportsNewIPInput {
  82. b[posTotalLen], b[posTotalLen+1] = byte(h.TotalLen>>8), byte(h.TotalLen)
  83. b[posFragOff], b[posFragOff+1] = byte(h.FragOff>>8), byte(h.FragOff)
  84. } else {
  85. *(*uint16)(unsafe.Pointer(&b[posTotalLen : posTotalLen+1][0])) = uint16(h.TotalLen)
  86. *(*uint16)(unsafe.Pointer(&b[posFragOff : posFragOff+1][0])) = uint16(h.FragOff)
  87. }
  88. b[posID], b[posID+1] = byte(h.ID>>8), byte(h.ID)
  89. b[posTTL] = byte(h.TTL)
  90. b[posProtocol] = byte(h.Protocol)
  91. b[posChecksum], b[posChecksum+1] = byte(h.Checksum>>8), byte(h.Checksum)
  92. if ip := h.Src.To4(); ip != nil {
  93. copy(b[posSrc:posSrc+net.IPv4len], ip[:net.IPv4len])
  94. }
  95. if ip := h.Dst.To4(); ip != nil {
  96. copy(b[posDst:posDst+net.IPv4len], ip[:net.IPv4len])
  97. } else {
  98. return nil, errMissingAddress
  99. }
  100. if len(h.Options) > 0 {
  101. copy(b[HeaderLen:], h.Options)
  102. }
  103. return b, nil
  104. }
  105. // ParseHeader parses b as an IPv4 header.
  106. func ParseHeader(b []byte) (*Header, error) {
  107. if len(b) < HeaderLen {
  108. return nil, errHeaderTooShort
  109. }
  110. hdrlen := int(b[0]&0x0f) << 2
  111. if hdrlen > len(b) {
  112. return nil, errBufferTooShort
  113. }
  114. h := &Header{}
  115. h.Version = int(b[0] >> 4)
  116. h.Len = hdrlen
  117. h.TOS = int(b[posTOS])
  118. if supportsNewIPInput {
  119. h.TotalLen = int(b[posTotalLen])<<8 | int(b[posTotalLen+1])
  120. h.FragOff = int(b[posFragOff])<<8 | int(b[posFragOff+1])
  121. } else {
  122. h.TotalLen = int(*(*uint16)(unsafe.Pointer(&b[posTotalLen : posTotalLen+1][0])))
  123. h.TotalLen += hdrlen
  124. h.FragOff = int(*(*uint16)(unsafe.Pointer(&b[posFragOff : posFragOff+1][0])))
  125. }
  126. h.ID = int(b[posID])<<8 | int(b[posID+1])
  127. h.TTL = int(b[posTTL])
  128. h.Protocol = int(b[posProtocol])
  129. h.Checksum = int(b[posChecksum])<<8 | int(b[posChecksum+1])
  130. h.Src = net.IPv4(b[posSrc], b[posSrc+1], b[posSrc+2], b[posSrc+3])
  131. h.Dst = net.IPv4(b[posDst], b[posDst+1], b[posDst+2], b[posDst+3])
  132. if hdrlen-HeaderLen > 0 {
  133. h.Options = make([]byte, hdrlen-HeaderLen)
  134. copy(h.Options, b[HeaderLen:])
  135. }
  136. return h, nil
  137. }