appneta/tcpreplay

View on GitHub
src/fragroute/mod_tcp_seg.c

Summary

Maintainability
Test Coverage
/*
 * mod_tcp_seg.c
 *
 * Copyright (c) 2001 Dug Song <dugsong@monkey.org>
 *
 * $Id$
 */

#include "defines.h"
#include "config.h"
#include "common.h"
#include "iputil.h"
#include "lib/queue.h"
#include "mod.h"
#include "pkt.h"
#include "randutil.h"
#include <stdio.h>
#include <stdlib.h>
#include <string.h>

#ifndef MIN
#define MIN(a, b) (((a) < (b)) ? (a) : (b))
#endif

#define FAVOR_OLD 1
#define FAVOR_NEW 2

static struct tcp_seg_data {
    rand_t *rnd;
    int size;
    int overlap;
} tcp_seg_data;

void *
tcp_seg_close(_U_ void *d)
{
    if (tcp_seg_data.rnd != NULL)
        rand_close(tcp_seg_data.rnd);
    tcp_seg_data.size = 0;
    return (NULL);
}

void *
tcp_seg_open(int argc, char *argv[])
{
    if (argc < 2) {
        warn("need segment <size> in bytes");
        return (NULL);
    }
    tcp_seg_data.rnd = rand_open();

    if ((tcp_seg_data.size = (int)strtol(argv[1], NULL, 10)) == 0) {
        warnx("invalid segment size '%s'", argv[1]);
        return (tcp_seg_close(&tcp_seg_data));
    }
    if (argc == 3) {
        if (strcmp(argv[2], "old") == 0 || strcmp(argv[2], "win32") == 0)
            tcp_seg_data.overlap = FAVOR_OLD;
        else if (strcmp(argv[2], "new") == 0 || strcmp(argv[2], "unix") == 0)
            tcp_seg_data.overlap = FAVOR_NEW;
        else
            return (tcp_seg_close(&tcp_seg_data));
    }
    return (&tcp_seg_data);
}

int
tcp_seg_apply(_U_ void *d, struct pktq *pktq)
{
    struct pkt *pkt, *new, *next;

    for (pkt = TAILQ_FIRST(pktq); pkt != TAILQ_END(pktq); pkt = next) {
        uint32_t seq;
        int hl, tl, len;
        u_char *p;
        uint16_t eth_type;
        uint8_t nxt;

        next = TAILQ_NEXT(pkt, pkt_next);

        eth_type = htons(pkt->pkt_eth->eth_type);

        if (pkt->pkt_ip == NULL)
            continue;

        if (eth_type == ETH_TYPE_IP) {
            nxt = pkt->pkt_ip->ip_p;
        } else if (eth_type == ETH_TYPE_IPV6) {
            nxt = pkt->pkt_ip6->ip6_nxt;
        } else {
            continue;
        }

        if (nxt != IP_PROTO_TCP || pkt->pkt_tcp == NULL || pkt->pkt_tcp_data == NULL ||
            (pkt->pkt_tcp->th_flags & TH_ACK) == 0 || pkt->pkt_end - pkt->pkt_tcp_data <= tcp_seg_data.size)
            continue;

        if (eth_type == ETH_TYPE_IP) {
            hl = pkt->pkt_ip->ip_hl << 2;
        } else if (eth_type == ETH_TYPE_IPV6) {
            hl = IP6_HDR_LEN;
        } else {
            continue;
        }

        tl = pkt->pkt_tcp->th_off << 2;
        seq = ntohl(pkt->pkt_tcp->th_seq);

        for (p = pkt->pkt_tcp_data; p < pkt->pkt_end; p += len) {
            u_char *p1, *p2;

            new = pkt_new(pkt->pkt_buf_size);
            memcpy(new->pkt_eth, pkt->pkt_eth, (u_char *)pkt->pkt_eth_data - (u_char *)pkt->pkt_eth);
            p1 = p, p2 = NULL;
            len = MIN(pkt->pkt_end - p, tcp_seg_data.size);

            if (tcp_seg_data.overlap != 0 && p + (len << 1) < pkt->pkt_end) {
                struct pkt tmp;
                u_char tmp_buf[pkt->pkt_buf_size];

                tmp.pkt_buf = tmp_buf;
                tmp.pkt_buf_size = pkt->pkt_buf_size;
                rand_strset(tcp_seg_data.rnd, tmp.pkt_buf, len);

                if (tcp_seg_data.overlap == FAVOR_OLD) {
                    p1 = p + len;
                    p2 = tmp.pkt_buf;
                } else if (tcp_seg_data.overlap == FAVOR_NEW) {
                    p1 = tmp.pkt_buf;
                    p2 = p + len;
                }
                len = tcp_seg_data.size;
                seq += tcp_seg_data.size;
            }
            memcpy(new->pkt_ip, pkt->pkt_ip, hl + tl);
            new->pkt_ip_data = new->pkt_eth_data + hl;
            new->pkt_tcp_data = new->pkt_ip_data + tl;
            memcpy(new->pkt_tcp_data, p1, len);
            new->pkt_end = new->pkt_tcp_data + len;

            if (eth_type == ETH_TYPE_IP) {
                new->pkt_ip->ip_id = rand_uint16(tcp_seg_data.rnd);
                new->pkt_ip->ip_len = htons(hl + tl + len);
            } else {
                new->pkt_ip6->ip6_plen = htons(tl + len);
            }

            new->pkt_tcp->th_seq = htonl(seq);
            inet_checksum(eth_type, new->pkt_ip, hl + tl + len);
            TAILQ_INSERT_BEFORE(pkt, new, pkt_next);

            if (p2 != NULL) {
                new = pkt_dup(new);
                new->pkt_ts.tv_usec = 1;
                if (eth_type == ETH_TYPE_IP) {
                    new->pkt_ip->ip_id = rand_uint16(tcp_seg_data.rnd);
                    new->pkt_ip->ip_len = htons(hl + tl + (len << 1));
                } else if (eth_type == ETH_TYPE_IPV6) {
                    new->pkt_ip6->ip6_plen = htons(tl + (len << 1));
                }
                new->pkt_tcp->th_seq = htonl(seq - len);

                memcpy(new->pkt_tcp_data, p, len);
                memcpy(new->pkt_tcp_data + len, p2, len);
                new->pkt_end = new->pkt_tcp_data + (len << 1);
                inet_checksum(eth_type, new->pkt_ip, hl + tl + (len << 1));
                TAILQ_INSERT_BEFORE(pkt, new, pkt_next);
                p += len;
            }
            seq += len;
        }
        TAILQ_REMOVE(pktq, pkt, pkt_next);
        pkt_free(pkt);
    }
    return (0);
}

struct mod mod_tcp_seg = {
        "tcp_seg",                  /* name */
        "tcp_seg <size> [old|new]", /* usage */
        tcp_seg_open,               /* open */
        tcp_seg_apply,              /* apply */
        tcp_seg_close               /* close */
};