1*10465441SEvalZero /*
2*10465441SEvalZero * Routines to compress and uncompess tcp packets (for transmission
3*10465441SEvalZero * over low speed serial lines.
4*10465441SEvalZero *
5*10465441SEvalZero * Copyright (c) 1989 Regents of the University of California.
6*10465441SEvalZero * All rights reserved.
7*10465441SEvalZero *
8*10465441SEvalZero * Redistribution and use in source and binary forms are permitted
9*10465441SEvalZero * provided that the above copyright notice and this paragraph are
10*10465441SEvalZero * duplicated in all such forms and that any documentation,
11*10465441SEvalZero * advertising materials, and other materials related to such
12*10465441SEvalZero * distribution and use acknowledge that the software was developed
13*10465441SEvalZero * by the University of California, Berkeley. The name of the
14*10465441SEvalZero * University may not be used to endorse or promote products derived
15*10465441SEvalZero * from this software without specific prior written permission.
16*10465441SEvalZero * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
17*10465441SEvalZero * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
18*10465441SEvalZero * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
19*10465441SEvalZero *
20*10465441SEvalZero * Van Jacobson ([email protected]), Dec 31, 1989:
21*10465441SEvalZero * Initial distribution.
22*10465441SEvalZero *
23*10465441SEvalZero * Modified June 1993 by Paul Mackerras, [email protected],
24*10465441SEvalZero * so that the entire packet being decompressed doesn't have
25*10465441SEvalZero * to be in contiguous memory (just the compressed header).
26*10465441SEvalZero *
27*10465441SEvalZero * Modified March 1998 by Guy Lancaster, [email protected],
28*10465441SEvalZero * for a 16 bit processor.
29*10465441SEvalZero */
30*10465441SEvalZero
31*10465441SEvalZero #include "lwip/opt.h"
32*10465441SEvalZero
33*10465441SEvalZero #if PPP_SUPPORT /* don't build if not configured for use in lwipopts.h */
34*10465441SEvalZero
35*10465441SEvalZero #include "ppp_impl.h"
36*10465441SEvalZero #include "pppdebug.h"
37*10465441SEvalZero
38*10465441SEvalZero #include "vj.h"
39*10465441SEvalZero
40*10465441SEvalZero #include <string.h>
41*10465441SEvalZero
42*10465441SEvalZero #if VJ_SUPPORT
43*10465441SEvalZero
44*10465441SEvalZero #if LINK_STATS
45*10465441SEvalZero #define INCR(counter) ++comp->stats.counter
46*10465441SEvalZero #else
47*10465441SEvalZero #define INCR(counter)
48*10465441SEvalZero #endif
49*10465441SEvalZero
50*10465441SEvalZero void
vj_compress_init(struct vjcompress * comp)51*10465441SEvalZero vj_compress_init(struct vjcompress *comp)
52*10465441SEvalZero {
53*10465441SEvalZero register u_char i;
54*10465441SEvalZero register struct cstate *tstate = comp->tstate;
55*10465441SEvalZero
56*10465441SEvalZero #if MAX_SLOTS == 0
57*10465441SEvalZero memset((char *)comp, 0, sizeof(*comp));
58*10465441SEvalZero #endif
59*10465441SEvalZero comp->maxSlotIndex = MAX_SLOTS - 1;
60*10465441SEvalZero comp->compressSlot = 0; /* Disable slot ID compression by default. */
61*10465441SEvalZero for (i = MAX_SLOTS - 1; i > 0; --i) {
62*10465441SEvalZero tstate[i].cs_id = i;
63*10465441SEvalZero tstate[i].cs_next = &tstate[i - 1];
64*10465441SEvalZero }
65*10465441SEvalZero tstate[0].cs_next = &tstate[MAX_SLOTS - 1];
66*10465441SEvalZero tstate[0].cs_id = 0;
67*10465441SEvalZero comp->last_cs = &tstate[0];
68*10465441SEvalZero comp->last_recv = 255;
69*10465441SEvalZero comp->last_xmit = 255;
70*10465441SEvalZero comp->flags = VJF_TOSS;
71*10465441SEvalZero }
72*10465441SEvalZero
73*10465441SEvalZero
74*10465441SEvalZero /* ENCODE encodes a number that is known to be non-zero. ENCODEZ
75*10465441SEvalZero * checks for zero (since zero has to be encoded in the long, 3 byte
76*10465441SEvalZero * form).
77*10465441SEvalZero */
78*10465441SEvalZero #define ENCODE(n) { \
79*10465441SEvalZero if ((u_short)(n) >= 256) { \
80*10465441SEvalZero *cp++ = 0; \
81*10465441SEvalZero cp[1] = (u_char)(n); \
82*10465441SEvalZero cp[0] = (u_char)((n) >> 8); \
83*10465441SEvalZero cp += 2; \
84*10465441SEvalZero } else { \
85*10465441SEvalZero *cp++ = (u_char)(n); \
86*10465441SEvalZero } \
87*10465441SEvalZero }
88*10465441SEvalZero #define ENCODEZ(n) { \
89*10465441SEvalZero if ((u_short)(n) >= 256 || (u_short)(n) == 0) { \
90*10465441SEvalZero *cp++ = 0; \
91*10465441SEvalZero cp[1] = (u_char)(n); \
92*10465441SEvalZero cp[0] = (u_char)((n) >> 8); \
93*10465441SEvalZero cp += 2; \
94*10465441SEvalZero } else { \
95*10465441SEvalZero *cp++ = (u_char)(n); \
96*10465441SEvalZero } \
97*10465441SEvalZero }
98*10465441SEvalZero
99*10465441SEvalZero #define DECODEL(f) { \
100*10465441SEvalZero if (*cp == 0) {\
101*10465441SEvalZero u32_t tmp = ntohl(f) + ((cp[1] << 8) | cp[2]); \
102*10465441SEvalZero (f) = htonl(tmp); \
103*10465441SEvalZero cp += 3; \
104*10465441SEvalZero } else { \
105*10465441SEvalZero u32_t tmp = ntohl(f) + (u32_t)*cp++; \
106*10465441SEvalZero (f) = htonl(tmp); \
107*10465441SEvalZero } \
108*10465441SEvalZero }
109*10465441SEvalZero
110*10465441SEvalZero #define DECODES(f) { \
111*10465441SEvalZero if (*cp == 0) {\
112*10465441SEvalZero u_short tmp = ntohs(f) + (((u_short)cp[1] << 8) | cp[2]); \
113*10465441SEvalZero (f) = htons(tmp); \
114*10465441SEvalZero cp += 3; \
115*10465441SEvalZero } else { \
116*10465441SEvalZero u_short tmp = ntohs(f) + (u_short)*cp++; \
117*10465441SEvalZero (f) = htons(tmp); \
118*10465441SEvalZero } \
119*10465441SEvalZero }
120*10465441SEvalZero
121*10465441SEvalZero #define DECODEU(f) { \
122*10465441SEvalZero if (*cp == 0) {\
123*10465441SEvalZero (f) = htons(((u_short)cp[1] << 8) | cp[2]); \
124*10465441SEvalZero cp += 3; \
125*10465441SEvalZero } else { \
126*10465441SEvalZero (f) = htons((u_short)*cp++); \
127*10465441SEvalZero } \
128*10465441SEvalZero }
129*10465441SEvalZero
130*10465441SEvalZero /*
131*10465441SEvalZero * vj_compress_tcp - Attempt to do Van Jacobson header compression on a
132*10465441SEvalZero * packet. This assumes that nb and comp are not null and that the first
133*10465441SEvalZero * buffer of the chain contains a valid IP header.
134*10465441SEvalZero * Return the VJ type code indicating whether or not the packet was
135*10465441SEvalZero * compressed.
136*10465441SEvalZero */
137*10465441SEvalZero u_int
vj_compress_tcp(struct vjcompress * comp,struct pbuf * pb)138*10465441SEvalZero vj_compress_tcp(struct vjcompress *comp, struct pbuf *pb)
139*10465441SEvalZero {
140*10465441SEvalZero register struct ip_hdr *ip = (struct ip_hdr *)pb->payload;
141*10465441SEvalZero register struct cstate *cs = comp->last_cs->cs_next;
142*10465441SEvalZero register u_short hlen = IPH_HL(ip);
143*10465441SEvalZero register struct tcp_hdr *oth;
144*10465441SEvalZero register struct tcp_hdr *th;
145*10465441SEvalZero register u_short deltaS, deltaA;
146*10465441SEvalZero register u_long deltaL;
147*10465441SEvalZero register u_int changes = 0;
148*10465441SEvalZero u_char new_seq[16];
149*10465441SEvalZero register u_char *cp = new_seq;
150*10465441SEvalZero
151*10465441SEvalZero /*
152*10465441SEvalZero * Check that the packet is IP proto TCP.
153*10465441SEvalZero */
154*10465441SEvalZero if (IPH_PROTO(ip) != IP_PROTO_TCP) {
155*10465441SEvalZero return (TYPE_IP);
156*10465441SEvalZero }
157*10465441SEvalZero
158*10465441SEvalZero /*
159*10465441SEvalZero * Bail if this is an IP fragment or if the TCP packet isn't
160*10465441SEvalZero * `compressible' (i.e., ACK isn't set or some other control bit is
161*10465441SEvalZero * set).
162*10465441SEvalZero */
163*10465441SEvalZero if ((IPH_OFFSET(ip) & PP_HTONS(0x3fff)) || pb->tot_len < 40) {
164*10465441SEvalZero return (TYPE_IP);
165*10465441SEvalZero }
166*10465441SEvalZero th = (struct tcp_hdr *)&((long *)ip)[hlen];
167*10465441SEvalZero if ((TCPH_FLAGS(th) & (TCP_SYN|TCP_FIN|TCP_RST|TCP_ACK)) != TCP_ACK) {
168*10465441SEvalZero return (TYPE_IP);
169*10465441SEvalZero }
170*10465441SEvalZero /*
171*10465441SEvalZero * Packet is compressible -- we're going to send either a
172*10465441SEvalZero * COMPRESSED_TCP or UNCOMPRESSED_TCP packet. Either way we need
173*10465441SEvalZero * to locate (or create) the connection state. Special case the
174*10465441SEvalZero * most recently used connection since it's most likely to be used
175*10465441SEvalZero * again & we don't have to do any reordering if it's used.
176*10465441SEvalZero */
177*10465441SEvalZero INCR(vjs_packets);
178*10465441SEvalZero if (!ip_addr_cmp(&ip->src, &cs->cs_ip.src)
179*10465441SEvalZero || !ip_addr_cmp(&ip->dest, &cs->cs_ip.dest)
180*10465441SEvalZero || *(long *)th != ((long *)&cs->cs_ip)[IPH_HL(&cs->cs_ip)]) {
181*10465441SEvalZero /*
182*10465441SEvalZero * Wasn't the first -- search for it.
183*10465441SEvalZero *
184*10465441SEvalZero * States are kept in a circularly linked list with
185*10465441SEvalZero * last_cs pointing to the end of the list. The
186*10465441SEvalZero * list is kept in lru order by moving a state to the
187*10465441SEvalZero * head of the list whenever it is referenced. Since
188*10465441SEvalZero * the list is short and, empirically, the connection
189*10465441SEvalZero * we want is almost always near the front, we locate
190*10465441SEvalZero * states via linear search. If we don't find a state
191*10465441SEvalZero * for the datagram, the oldest state is (re-)used.
192*10465441SEvalZero */
193*10465441SEvalZero register struct cstate *lcs;
194*10465441SEvalZero register struct cstate *lastcs = comp->last_cs;
195*10465441SEvalZero
196*10465441SEvalZero do {
197*10465441SEvalZero lcs = cs; cs = cs->cs_next;
198*10465441SEvalZero INCR(vjs_searches);
199*10465441SEvalZero if (ip_addr_cmp(&ip->src, &cs->cs_ip.src)
200*10465441SEvalZero && ip_addr_cmp(&ip->dest, &cs->cs_ip.dest)
201*10465441SEvalZero && *(long *)th == ((long *)&cs->cs_ip)[IPH_HL(&cs->cs_ip)]) {
202*10465441SEvalZero goto found;
203*10465441SEvalZero }
204*10465441SEvalZero } while (cs != lastcs);
205*10465441SEvalZero
206*10465441SEvalZero /*
207*10465441SEvalZero * Didn't find it -- re-use oldest cstate. Send an
208*10465441SEvalZero * uncompressed packet that tells the other side what
209*10465441SEvalZero * connection number we're using for this conversation.
210*10465441SEvalZero * Note that since the state list is circular, the oldest
211*10465441SEvalZero * state points to the newest and we only need to set
212*10465441SEvalZero * last_cs to update the lru linkage.
213*10465441SEvalZero */
214*10465441SEvalZero INCR(vjs_misses);
215*10465441SEvalZero comp->last_cs = lcs;
216*10465441SEvalZero hlen += TCPH_HDRLEN(th);
217*10465441SEvalZero hlen <<= 2;
218*10465441SEvalZero /* Check that the IP/TCP headers are contained in the first buffer. */
219*10465441SEvalZero if (hlen > pb->len) {
220*10465441SEvalZero return (TYPE_IP);
221*10465441SEvalZero }
222*10465441SEvalZero goto uncompressed;
223*10465441SEvalZero
224*10465441SEvalZero found:
225*10465441SEvalZero /*
226*10465441SEvalZero * Found it -- move to the front on the connection list.
227*10465441SEvalZero */
228*10465441SEvalZero if (cs == lastcs) {
229*10465441SEvalZero comp->last_cs = lcs;
230*10465441SEvalZero } else {
231*10465441SEvalZero lcs->cs_next = cs->cs_next;
232*10465441SEvalZero cs->cs_next = lastcs->cs_next;
233*10465441SEvalZero lastcs->cs_next = cs;
234*10465441SEvalZero }
235*10465441SEvalZero }
236*10465441SEvalZero
237*10465441SEvalZero oth = (struct tcp_hdr *)&((long *)&cs->cs_ip)[hlen];
238*10465441SEvalZero deltaS = hlen;
239*10465441SEvalZero hlen += TCPH_HDRLEN(th);
240*10465441SEvalZero hlen <<= 2;
241*10465441SEvalZero /* Check that the IP/TCP headers are contained in the first buffer. */
242*10465441SEvalZero if (hlen > pb->len) {
243*10465441SEvalZero PPPDEBUG(LOG_INFO, ("vj_compress_tcp: header len %d spans buffers\n", hlen));
244*10465441SEvalZero return (TYPE_IP);
245*10465441SEvalZero }
246*10465441SEvalZero
247*10465441SEvalZero /*
248*10465441SEvalZero * Make sure that only what we expect to change changed. The first
249*10465441SEvalZero * line of the `if' checks the IP protocol version, header length &
250*10465441SEvalZero * type of service. The 2nd line checks the "Don't fragment" bit.
251*10465441SEvalZero * The 3rd line checks the time-to-live and protocol (the protocol
252*10465441SEvalZero * check is unnecessary but costless). The 4th line checks the TCP
253*10465441SEvalZero * header length. The 5th line checks IP options, if any. The 6th
254*10465441SEvalZero * line checks TCP options, if any. If any of these things are
255*10465441SEvalZero * different between the previous & current datagram, we send the
256*10465441SEvalZero * current datagram `uncompressed'.
257*10465441SEvalZero */
258*10465441SEvalZero if (((u_short *)ip)[0] != ((u_short *)&cs->cs_ip)[0]
259*10465441SEvalZero || ((u_short *)ip)[3] != ((u_short *)&cs->cs_ip)[3]
260*10465441SEvalZero || ((u_short *)ip)[4] != ((u_short *)&cs->cs_ip)[4]
261*10465441SEvalZero || TCPH_HDRLEN(th) != TCPH_HDRLEN(oth)
262*10465441SEvalZero || (deltaS > 5 && BCMP(ip + 1, &cs->cs_ip + 1, (deltaS - 5) << 2))
263*10465441SEvalZero || (TCPH_HDRLEN(th) > 5 && BCMP(th + 1, oth + 1, (TCPH_HDRLEN(th) - 5) << 2))) {
264*10465441SEvalZero goto uncompressed;
265*10465441SEvalZero }
266*10465441SEvalZero
267*10465441SEvalZero /*
268*10465441SEvalZero * Figure out which of the changing fields changed. The
269*10465441SEvalZero * receiver expects changes in the order: urgent, window,
270*10465441SEvalZero * ack, seq (the order minimizes the number of temporaries
271*10465441SEvalZero * needed in this section of code).
272*10465441SEvalZero */
273*10465441SEvalZero if (TCPH_FLAGS(th) & TCP_URG) {
274*10465441SEvalZero deltaS = ntohs(th->urgp);
275*10465441SEvalZero ENCODEZ(deltaS);
276*10465441SEvalZero changes |= NEW_U;
277*10465441SEvalZero } else if (th->urgp != oth->urgp) {
278*10465441SEvalZero /* argh! URG not set but urp changed -- a sensible
279*10465441SEvalZero * implementation should never do this but RFC793
280*10465441SEvalZero * doesn't prohibit the change so we have to deal
281*10465441SEvalZero * with it. */
282*10465441SEvalZero goto uncompressed;
283*10465441SEvalZero }
284*10465441SEvalZero
285*10465441SEvalZero if ((deltaS = (u_short)(ntohs(th->wnd) - ntohs(oth->wnd))) != 0) {
286*10465441SEvalZero ENCODE(deltaS);
287*10465441SEvalZero changes |= NEW_W;
288*10465441SEvalZero }
289*10465441SEvalZero
290*10465441SEvalZero if ((deltaL = ntohl(th->ackno) - ntohl(oth->ackno)) != 0) {
291*10465441SEvalZero if (deltaL > 0xffff) {
292*10465441SEvalZero goto uncompressed;
293*10465441SEvalZero }
294*10465441SEvalZero deltaA = (u_short)deltaL;
295*10465441SEvalZero ENCODE(deltaA);
296*10465441SEvalZero changes |= NEW_A;
297*10465441SEvalZero }
298*10465441SEvalZero
299*10465441SEvalZero if ((deltaL = ntohl(th->seqno) - ntohl(oth->seqno)) != 0) {
300*10465441SEvalZero if (deltaL > 0xffff) {
301*10465441SEvalZero goto uncompressed;
302*10465441SEvalZero }
303*10465441SEvalZero deltaS = (u_short)deltaL;
304*10465441SEvalZero ENCODE(deltaS);
305*10465441SEvalZero changes |= NEW_S;
306*10465441SEvalZero }
307*10465441SEvalZero
308*10465441SEvalZero switch(changes) {
309*10465441SEvalZero case 0:
310*10465441SEvalZero /*
311*10465441SEvalZero * Nothing changed. If this packet contains data and the
312*10465441SEvalZero * last one didn't, this is probably a data packet following
313*10465441SEvalZero * an ack (normal on an interactive connection) and we send
314*10465441SEvalZero * it compressed. Otherwise it's probably a retransmit,
315*10465441SEvalZero * retransmitted ack or window probe. Send it uncompressed
316*10465441SEvalZero * in case the other side missed the compressed version.
317*10465441SEvalZero */
318*10465441SEvalZero if (IPH_LEN(ip) != IPH_LEN(&cs->cs_ip) &&
319*10465441SEvalZero ntohs(IPH_LEN(&cs->cs_ip)) == hlen) {
320*10465441SEvalZero break;
321*10465441SEvalZero }
322*10465441SEvalZero
323*10465441SEvalZero /* (fall through) */
324*10465441SEvalZero
325*10465441SEvalZero case SPECIAL_I:
326*10465441SEvalZero case SPECIAL_D:
327*10465441SEvalZero /*
328*10465441SEvalZero * actual changes match one of our special case encodings --
329*10465441SEvalZero * send packet uncompressed.
330*10465441SEvalZero */
331*10465441SEvalZero goto uncompressed;
332*10465441SEvalZero
333*10465441SEvalZero case NEW_S|NEW_A:
334*10465441SEvalZero if (deltaS == deltaA && deltaS == ntohs(IPH_LEN(&cs->cs_ip)) - hlen) {
335*10465441SEvalZero /* special case for echoed terminal traffic */
336*10465441SEvalZero changes = SPECIAL_I;
337*10465441SEvalZero cp = new_seq;
338*10465441SEvalZero }
339*10465441SEvalZero break;
340*10465441SEvalZero
341*10465441SEvalZero case NEW_S:
342*10465441SEvalZero if (deltaS == ntohs(IPH_LEN(&cs->cs_ip)) - hlen) {
343*10465441SEvalZero /* special case for data xfer */
344*10465441SEvalZero changes = SPECIAL_D;
345*10465441SEvalZero cp = new_seq;
346*10465441SEvalZero }
347*10465441SEvalZero break;
348*10465441SEvalZero }
349*10465441SEvalZero
350*10465441SEvalZero deltaS = (u_short)(ntohs(IPH_ID(ip)) - ntohs(IPH_ID(&cs->cs_ip)));
351*10465441SEvalZero if (deltaS != 1) {
352*10465441SEvalZero ENCODEZ(deltaS);
353*10465441SEvalZero changes |= NEW_I;
354*10465441SEvalZero }
355*10465441SEvalZero if (TCPH_FLAGS(th) & TCP_PSH) {
356*10465441SEvalZero changes |= TCP_PUSH_BIT;
357*10465441SEvalZero }
358*10465441SEvalZero /*
359*10465441SEvalZero * Grab the cksum before we overwrite it below. Then update our
360*10465441SEvalZero * state with this packet's header.
361*10465441SEvalZero */
362*10465441SEvalZero deltaA = ntohs(th->chksum);
363*10465441SEvalZero BCOPY(ip, &cs->cs_ip, hlen);
364*10465441SEvalZero
365*10465441SEvalZero /*
366*10465441SEvalZero * We want to use the original packet as our compressed packet.
367*10465441SEvalZero * (cp - new_seq) is the number of bytes we need for compressed
368*10465441SEvalZero * sequence numbers. In addition we need one byte for the change
369*10465441SEvalZero * mask, one for the connection id and two for the tcp checksum.
370*10465441SEvalZero * So, (cp - new_seq) + 4 bytes of header are needed. hlen is how
371*10465441SEvalZero * many bytes of the original packet to toss so subtract the two to
372*10465441SEvalZero * get the new packet size.
373*10465441SEvalZero */
374*10465441SEvalZero deltaS = (u_short)(cp - new_seq);
375*10465441SEvalZero if (!comp->compressSlot || comp->last_xmit != cs->cs_id) {
376*10465441SEvalZero comp->last_xmit = cs->cs_id;
377*10465441SEvalZero hlen -= deltaS + 4;
378*10465441SEvalZero if(pbuf_header(pb, -hlen)){
379*10465441SEvalZero /* Can we cope with this failing? Just assert for now */
380*10465441SEvalZero LWIP_ASSERT("pbuf_header failed\n", 0);
381*10465441SEvalZero }
382*10465441SEvalZero cp = (u_char *)pb->payload;
383*10465441SEvalZero *cp++ = (u_char)(changes | NEW_C);
384*10465441SEvalZero *cp++ = cs->cs_id;
385*10465441SEvalZero } else {
386*10465441SEvalZero hlen -= deltaS + 3;
387*10465441SEvalZero if(pbuf_header(pb, -hlen)) {
388*10465441SEvalZero /* Can we cope with this failing? Just assert for now */
389*10465441SEvalZero LWIP_ASSERT("pbuf_header failed\n", 0);
390*10465441SEvalZero }
391*10465441SEvalZero cp = (u_char *)pb->payload;
392*10465441SEvalZero *cp++ = (u_char)changes;
393*10465441SEvalZero }
394*10465441SEvalZero *cp++ = (u_char)(deltaA >> 8);
395*10465441SEvalZero *cp++ = (u_char)deltaA;
396*10465441SEvalZero BCOPY(new_seq, cp, deltaS);
397*10465441SEvalZero INCR(vjs_compressed);
398*10465441SEvalZero return (TYPE_COMPRESSED_TCP);
399*10465441SEvalZero
400*10465441SEvalZero /*
401*10465441SEvalZero * Update connection state cs & send uncompressed packet (that is,
402*10465441SEvalZero * a regular ip/tcp packet but with the 'conversation id' we hope
403*10465441SEvalZero * to use on future compressed packets in the protocol field).
404*10465441SEvalZero */
405*10465441SEvalZero uncompressed:
406*10465441SEvalZero BCOPY(ip, &cs->cs_ip, hlen);
407*10465441SEvalZero IPH_PROTO_SET(ip, cs->cs_id);
408*10465441SEvalZero comp->last_xmit = cs->cs_id;
409*10465441SEvalZero return (TYPE_UNCOMPRESSED_TCP);
410*10465441SEvalZero }
411*10465441SEvalZero
412*10465441SEvalZero /*
413*10465441SEvalZero * Called when we may have missed a packet.
414*10465441SEvalZero */
415*10465441SEvalZero void
vj_uncompress_err(struct vjcompress * comp)416*10465441SEvalZero vj_uncompress_err(struct vjcompress *comp)
417*10465441SEvalZero {
418*10465441SEvalZero comp->flags |= VJF_TOSS;
419*10465441SEvalZero INCR(vjs_errorin);
420*10465441SEvalZero }
421*10465441SEvalZero
422*10465441SEvalZero /*
423*10465441SEvalZero * "Uncompress" a packet of type TYPE_UNCOMPRESSED_TCP.
424*10465441SEvalZero * Return 0 on success, -1 on failure.
425*10465441SEvalZero */
426*10465441SEvalZero int
vj_uncompress_uncomp(struct pbuf * nb,struct vjcompress * comp)427*10465441SEvalZero vj_uncompress_uncomp(struct pbuf *nb, struct vjcompress *comp)
428*10465441SEvalZero {
429*10465441SEvalZero register u_int hlen;
430*10465441SEvalZero register struct cstate *cs;
431*10465441SEvalZero register struct ip_hdr *ip;
432*10465441SEvalZero
433*10465441SEvalZero ip = (struct ip_hdr *)nb->payload;
434*10465441SEvalZero hlen = IPH_HL(ip) << 2;
435*10465441SEvalZero if (IPH_PROTO(ip) >= MAX_SLOTS
436*10465441SEvalZero || hlen + sizeof(struct tcp_hdr) > nb->len
437*10465441SEvalZero || (hlen += TCPH_HDRLEN(((struct tcp_hdr *)&((char *)ip)[hlen])) << 2)
438*10465441SEvalZero > nb->len
439*10465441SEvalZero || hlen > MAX_HDR) {
440*10465441SEvalZero PPPDEBUG(LOG_INFO, ("vj_uncompress_uncomp: bad cid=%d, hlen=%d buflen=%d\n",
441*10465441SEvalZero IPH_PROTO(ip), hlen, nb->len));
442*10465441SEvalZero comp->flags |= VJF_TOSS;
443*10465441SEvalZero INCR(vjs_errorin);
444*10465441SEvalZero return -1;
445*10465441SEvalZero }
446*10465441SEvalZero cs = &comp->rstate[comp->last_recv = IPH_PROTO(ip)];
447*10465441SEvalZero comp->flags &=~ VJF_TOSS;
448*10465441SEvalZero IPH_PROTO_SET(ip, IP_PROTO_TCP);
449*10465441SEvalZero BCOPY(ip, &cs->cs_ip, hlen);
450*10465441SEvalZero cs->cs_hlen = (u_short)hlen;
451*10465441SEvalZero INCR(vjs_uncompressedin);
452*10465441SEvalZero return 0;
453*10465441SEvalZero }
454*10465441SEvalZero
455*10465441SEvalZero /*
456*10465441SEvalZero * Uncompress a packet of type TYPE_COMPRESSED_TCP.
457*10465441SEvalZero * The packet is composed of a buffer chain and the first buffer
458*10465441SEvalZero * must contain an accurate chain length.
459*10465441SEvalZero * The first buffer must include the entire compressed TCP/IP header.
460*10465441SEvalZero * This procedure replaces the compressed header with the uncompressed
461*10465441SEvalZero * header and returns the length of the VJ header.
462*10465441SEvalZero */
463*10465441SEvalZero int
vj_uncompress_tcp(struct pbuf ** nb,struct vjcompress * comp)464*10465441SEvalZero vj_uncompress_tcp(struct pbuf **nb, struct vjcompress *comp)
465*10465441SEvalZero {
466*10465441SEvalZero u_char *cp;
467*10465441SEvalZero struct tcp_hdr *th;
468*10465441SEvalZero struct cstate *cs;
469*10465441SEvalZero u_short *bp;
470*10465441SEvalZero struct pbuf *n0 = *nb;
471*10465441SEvalZero u32_t tmp;
472*10465441SEvalZero u_int vjlen, hlen, changes;
473*10465441SEvalZero
474*10465441SEvalZero INCR(vjs_compressedin);
475*10465441SEvalZero cp = (u_char *)n0->payload;
476*10465441SEvalZero changes = *cp++;
477*10465441SEvalZero if (changes & NEW_C) {
478*10465441SEvalZero /*
479*10465441SEvalZero * Make sure the state index is in range, then grab the state.
480*10465441SEvalZero * If we have a good state index, clear the 'discard' flag.
481*10465441SEvalZero */
482*10465441SEvalZero if (*cp >= MAX_SLOTS) {
483*10465441SEvalZero PPPDEBUG(LOG_INFO, ("vj_uncompress_tcp: bad cid=%d\n", *cp));
484*10465441SEvalZero goto bad;
485*10465441SEvalZero }
486*10465441SEvalZero
487*10465441SEvalZero comp->flags &=~ VJF_TOSS;
488*10465441SEvalZero comp->last_recv = *cp++;
489*10465441SEvalZero } else {
490*10465441SEvalZero /*
491*10465441SEvalZero * this packet has an implicit state index. If we've
492*10465441SEvalZero * had a line error since the last time we got an
493*10465441SEvalZero * explicit state index, we have to toss the packet.
494*10465441SEvalZero */
495*10465441SEvalZero if (comp->flags & VJF_TOSS) {
496*10465441SEvalZero PPPDEBUG(LOG_INFO, ("vj_uncompress_tcp: tossing\n"));
497*10465441SEvalZero INCR(vjs_tossed);
498*10465441SEvalZero return (-1);
499*10465441SEvalZero }
500*10465441SEvalZero }
501*10465441SEvalZero cs = &comp->rstate[comp->last_recv];
502*10465441SEvalZero hlen = IPH_HL(&cs->cs_ip) << 2;
503*10465441SEvalZero th = (struct tcp_hdr *)&((u_char *)&cs->cs_ip)[hlen];
504*10465441SEvalZero th->chksum = htons((*cp << 8) | cp[1]);
505*10465441SEvalZero cp += 2;
506*10465441SEvalZero if (changes & TCP_PUSH_BIT) {
507*10465441SEvalZero TCPH_SET_FLAG(th, TCP_PSH);
508*10465441SEvalZero } else {
509*10465441SEvalZero TCPH_UNSET_FLAG(th, TCP_PSH);
510*10465441SEvalZero }
511*10465441SEvalZero
512*10465441SEvalZero switch (changes & SPECIALS_MASK) {
513*10465441SEvalZero case SPECIAL_I:
514*10465441SEvalZero {
515*10465441SEvalZero register u32_t i = ntohs(IPH_LEN(&cs->cs_ip)) - cs->cs_hlen;
516*10465441SEvalZero /* some compilers can't nest inline assembler.. */
517*10465441SEvalZero tmp = ntohl(th->ackno) + i;
518*10465441SEvalZero th->ackno = htonl(tmp);
519*10465441SEvalZero tmp = ntohl(th->seqno) + i;
520*10465441SEvalZero th->seqno = htonl(tmp);
521*10465441SEvalZero }
522*10465441SEvalZero break;
523*10465441SEvalZero
524*10465441SEvalZero case SPECIAL_D:
525*10465441SEvalZero /* some compilers can't nest inline assembler.. */
526*10465441SEvalZero tmp = ntohl(th->seqno) + ntohs(IPH_LEN(&cs->cs_ip)) - cs->cs_hlen;
527*10465441SEvalZero th->seqno = htonl(tmp);
528*10465441SEvalZero break;
529*10465441SEvalZero
530*10465441SEvalZero default:
531*10465441SEvalZero if (changes & NEW_U) {
532*10465441SEvalZero TCPH_SET_FLAG(th, TCP_URG);
533*10465441SEvalZero DECODEU(th->urgp);
534*10465441SEvalZero } else {
535*10465441SEvalZero TCPH_UNSET_FLAG(th, TCP_URG);
536*10465441SEvalZero }
537*10465441SEvalZero if (changes & NEW_W) {
538*10465441SEvalZero DECODES(th->wnd);
539*10465441SEvalZero }
540*10465441SEvalZero if (changes & NEW_A) {
541*10465441SEvalZero DECODEL(th->ackno);
542*10465441SEvalZero }
543*10465441SEvalZero if (changes & NEW_S) {
544*10465441SEvalZero DECODEL(th->seqno);
545*10465441SEvalZero }
546*10465441SEvalZero break;
547*10465441SEvalZero }
548*10465441SEvalZero if (changes & NEW_I) {
549*10465441SEvalZero DECODES(cs->cs_ip._id);
550*10465441SEvalZero } else {
551*10465441SEvalZero IPH_ID_SET(&cs->cs_ip, ntohs(IPH_ID(&cs->cs_ip)) + 1);
552*10465441SEvalZero IPH_ID_SET(&cs->cs_ip, htons(IPH_ID(&cs->cs_ip)));
553*10465441SEvalZero }
554*10465441SEvalZero
555*10465441SEvalZero /*
556*10465441SEvalZero * At this point, cp points to the first byte of data in the
557*10465441SEvalZero * packet. Fill in the IP total length and update the IP
558*10465441SEvalZero * header checksum.
559*10465441SEvalZero */
560*10465441SEvalZero vjlen = (u_short)(cp - (u_char*)n0->payload);
561*10465441SEvalZero if (n0->len < vjlen) {
562*10465441SEvalZero /*
563*10465441SEvalZero * We must have dropped some characters (crc should detect
564*10465441SEvalZero * this but the old slip framing won't)
565*10465441SEvalZero */
566*10465441SEvalZero PPPDEBUG(LOG_INFO, ("vj_uncompress_tcp: head buffer %d too short %d\n",
567*10465441SEvalZero n0->len, vjlen));
568*10465441SEvalZero goto bad;
569*10465441SEvalZero }
570*10465441SEvalZero
571*10465441SEvalZero #if BYTE_ORDER == LITTLE_ENDIAN
572*10465441SEvalZero tmp = n0->tot_len - vjlen + cs->cs_hlen;
573*10465441SEvalZero IPH_LEN_SET(&cs->cs_ip, htons((u_short)tmp));
574*10465441SEvalZero #else
575*10465441SEvalZero IPH_LEN_SET(&cs->cs_ip, htons(n0->tot_len - vjlen + cs->cs_hlen));
576*10465441SEvalZero #endif
577*10465441SEvalZero
578*10465441SEvalZero /* recompute the ip header checksum */
579*10465441SEvalZero bp = (u_short *) &cs->cs_ip;
580*10465441SEvalZero IPH_CHKSUM_SET(&cs->cs_ip, 0);
581*10465441SEvalZero for (tmp = 0; hlen > 0; hlen -= 2) {
582*10465441SEvalZero tmp += *bp++;
583*10465441SEvalZero }
584*10465441SEvalZero tmp = (tmp & 0xffff) + (tmp >> 16);
585*10465441SEvalZero tmp = (tmp & 0xffff) + (tmp >> 16);
586*10465441SEvalZero IPH_CHKSUM_SET(&cs->cs_ip, (u_short)(~tmp));
587*10465441SEvalZero
588*10465441SEvalZero /* Remove the compressed header and prepend the uncompressed header. */
589*10465441SEvalZero if(pbuf_header(n0, -((s16_t)(vjlen)))) {
590*10465441SEvalZero /* Can we cope with this failing? Just assert for now */
591*10465441SEvalZero LWIP_ASSERT("pbuf_header failed\n", 0);
592*10465441SEvalZero goto bad;
593*10465441SEvalZero }
594*10465441SEvalZero
595*10465441SEvalZero if(LWIP_MEM_ALIGN(n0->payload) != n0->payload) {
596*10465441SEvalZero struct pbuf *np, *q;
597*10465441SEvalZero u8_t *bufptr;
598*10465441SEvalZero
599*10465441SEvalZero np = pbuf_alloc(PBUF_RAW, n0->len + cs->cs_hlen, PBUF_POOL);
600*10465441SEvalZero if(!np) {
601*10465441SEvalZero PPPDEBUG(LOG_WARNING, ("vj_uncompress_tcp: realign failed\n"));
602*10465441SEvalZero goto bad;
603*10465441SEvalZero }
604*10465441SEvalZero
605*10465441SEvalZero if(pbuf_header(np, -cs->cs_hlen)) {
606*10465441SEvalZero /* Can we cope with this failing? Just assert for now */
607*10465441SEvalZero LWIP_ASSERT("pbuf_header failed\n", 0);
608*10465441SEvalZero goto bad;
609*10465441SEvalZero }
610*10465441SEvalZero
611*10465441SEvalZero bufptr = n0->payload;
612*10465441SEvalZero for(q = np; q != NULL; q = q->next) {
613*10465441SEvalZero MEMCPY(q->payload, bufptr, q->len);
614*10465441SEvalZero bufptr += q->len;
615*10465441SEvalZero }
616*10465441SEvalZero
617*10465441SEvalZero if(n0->next) {
618*10465441SEvalZero pbuf_chain(np, n0->next);
619*10465441SEvalZero pbuf_dechain(n0);
620*10465441SEvalZero }
621*10465441SEvalZero pbuf_free(n0);
622*10465441SEvalZero n0 = np;
623*10465441SEvalZero }
624*10465441SEvalZero
625*10465441SEvalZero if(pbuf_header(n0, cs->cs_hlen)) {
626*10465441SEvalZero struct pbuf *np;
627*10465441SEvalZero
628*10465441SEvalZero LWIP_ASSERT("vj_uncompress_tcp: cs->cs_hlen <= PBUF_POOL_BUFSIZE", cs->cs_hlen <= PBUF_POOL_BUFSIZE);
629*10465441SEvalZero np = pbuf_alloc(PBUF_RAW, cs->cs_hlen, PBUF_POOL);
630*10465441SEvalZero if(!np) {
631*10465441SEvalZero PPPDEBUG(LOG_WARNING, ("vj_uncompress_tcp: prepend failed\n"));
632*10465441SEvalZero goto bad;
633*10465441SEvalZero }
634*10465441SEvalZero pbuf_cat(np, n0);
635*10465441SEvalZero n0 = np;
636*10465441SEvalZero }
637*10465441SEvalZero LWIP_ASSERT("n0->len >= cs->cs_hlen", n0->len >= cs->cs_hlen);
638*10465441SEvalZero MEMCPY(n0->payload, &cs->cs_ip, cs->cs_hlen);
639*10465441SEvalZero
640*10465441SEvalZero *nb = n0;
641*10465441SEvalZero
642*10465441SEvalZero return vjlen;
643*10465441SEvalZero
644*10465441SEvalZero bad:
645*10465441SEvalZero comp->flags |= VJF_TOSS;
646*10465441SEvalZero INCR(vjs_errorin);
647*10465441SEvalZero return (-1);
648*10465441SEvalZero }
649*10465441SEvalZero
650*10465441SEvalZero #endif /* VJ_SUPPORT */
651*10465441SEvalZero
652*10465441SEvalZero #endif /* PPP_SUPPORT */
653