xref: /nrf52832-nimble/rt-thread/components/net/lwip-1.4.1/src/netif/ppp/vj.c (revision 104654410c56c573564690304ae786df310c91fc)
1*10465441SEvalZero /*
2*10465441SEvalZero  * Routines to compress and uncompess tcp packets (for transmission
3*10465441SEvalZero  * over low speed serial lines.
4*10465441SEvalZero  *
5*10465441SEvalZero  * Copyright (c) 1989 Regents of the University of California.
6*10465441SEvalZero  * All rights reserved.
7*10465441SEvalZero  *
8*10465441SEvalZero  * Redistribution and use in source and binary forms are permitted
9*10465441SEvalZero  * provided that the above copyright notice and this paragraph are
10*10465441SEvalZero  * duplicated in all such forms and that any documentation,
11*10465441SEvalZero  * advertising materials, and other materials related to such
12*10465441SEvalZero  * distribution and use acknowledge that the software was developed
13*10465441SEvalZero  * by the University of California, Berkeley.  The name of the
14*10465441SEvalZero  * University may not be used to endorse or promote products derived
15*10465441SEvalZero  * from this software without specific prior written permission.
16*10465441SEvalZero  * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
17*10465441SEvalZero  * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
18*10465441SEvalZero  * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
19*10465441SEvalZero  *
20*10465441SEvalZero  * Van Jacobson ([email protected]), Dec 31, 1989:
21*10465441SEvalZero  *   Initial distribution.
22*10465441SEvalZero  *
23*10465441SEvalZero  * Modified June 1993 by Paul Mackerras, [email protected],
24*10465441SEvalZero  * so that the entire packet being decompressed doesn't have
25*10465441SEvalZero  * to be in contiguous memory (just the compressed header).
26*10465441SEvalZero  *
27*10465441SEvalZero  * Modified March 1998 by Guy Lancaster, [email protected],
28*10465441SEvalZero  * for a 16 bit processor.
29*10465441SEvalZero  */
30*10465441SEvalZero 
31*10465441SEvalZero #include "lwip/opt.h"
32*10465441SEvalZero 
33*10465441SEvalZero #if PPP_SUPPORT /* don't build if not configured for use in lwipopts.h */
34*10465441SEvalZero 
35*10465441SEvalZero #include "ppp_impl.h"
36*10465441SEvalZero #include "pppdebug.h"
37*10465441SEvalZero 
38*10465441SEvalZero #include "vj.h"
39*10465441SEvalZero 
40*10465441SEvalZero #include <string.h>
41*10465441SEvalZero 
42*10465441SEvalZero #if VJ_SUPPORT
43*10465441SEvalZero 
44*10465441SEvalZero #if LINK_STATS
45*10465441SEvalZero #define INCR(counter) ++comp->stats.counter
46*10465441SEvalZero #else
47*10465441SEvalZero #define INCR(counter)
48*10465441SEvalZero #endif
49*10465441SEvalZero 
50*10465441SEvalZero void
vj_compress_init(struct vjcompress * comp)51*10465441SEvalZero vj_compress_init(struct vjcompress *comp)
52*10465441SEvalZero {
53*10465441SEvalZero   register u_char i;
54*10465441SEvalZero   register struct cstate *tstate = comp->tstate;
55*10465441SEvalZero 
56*10465441SEvalZero #if MAX_SLOTS == 0
57*10465441SEvalZero   memset((char *)comp, 0, sizeof(*comp));
58*10465441SEvalZero #endif
59*10465441SEvalZero   comp->maxSlotIndex = MAX_SLOTS - 1;
60*10465441SEvalZero   comp->compressSlot = 0;    /* Disable slot ID compression by default. */
61*10465441SEvalZero   for (i = MAX_SLOTS - 1; i > 0; --i) {
62*10465441SEvalZero     tstate[i].cs_id = i;
63*10465441SEvalZero     tstate[i].cs_next = &tstate[i - 1];
64*10465441SEvalZero   }
65*10465441SEvalZero   tstate[0].cs_next = &tstate[MAX_SLOTS - 1];
66*10465441SEvalZero   tstate[0].cs_id = 0;
67*10465441SEvalZero   comp->last_cs = &tstate[0];
68*10465441SEvalZero   comp->last_recv = 255;
69*10465441SEvalZero   comp->last_xmit = 255;
70*10465441SEvalZero   comp->flags = VJF_TOSS;
71*10465441SEvalZero }
72*10465441SEvalZero 
73*10465441SEvalZero 
74*10465441SEvalZero /* ENCODE encodes a number that is known to be non-zero.  ENCODEZ
75*10465441SEvalZero  * checks for zero (since zero has to be encoded in the long, 3 byte
76*10465441SEvalZero  * form).
77*10465441SEvalZero  */
78*10465441SEvalZero #define ENCODE(n) { \
79*10465441SEvalZero   if ((u_short)(n) >= 256) { \
80*10465441SEvalZero     *cp++ = 0; \
81*10465441SEvalZero     cp[1] = (u_char)(n); \
82*10465441SEvalZero     cp[0] = (u_char)((n) >> 8); \
83*10465441SEvalZero     cp += 2; \
84*10465441SEvalZero   } else { \
85*10465441SEvalZero     *cp++ = (u_char)(n); \
86*10465441SEvalZero   } \
87*10465441SEvalZero }
88*10465441SEvalZero #define ENCODEZ(n) { \
89*10465441SEvalZero   if ((u_short)(n) >= 256 || (u_short)(n) == 0) { \
90*10465441SEvalZero     *cp++ = 0; \
91*10465441SEvalZero     cp[1] = (u_char)(n); \
92*10465441SEvalZero     cp[0] = (u_char)((n) >> 8); \
93*10465441SEvalZero     cp += 2; \
94*10465441SEvalZero   } else { \
95*10465441SEvalZero     *cp++ = (u_char)(n); \
96*10465441SEvalZero   } \
97*10465441SEvalZero }
98*10465441SEvalZero 
99*10465441SEvalZero #define DECODEL(f) { \
100*10465441SEvalZero   if (*cp == 0) {\
101*10465441SEvalZero     u32_t tmp = ntohl(f) + ((cp[1] << 8) | cp[2]); \
102*10465441SEvalZero     (f) = htonl(tmp); \
103*10465441SEvalZero     cp += 3; \
104*10465441SEvalZero   } else { \
105*10465441SEvalZero     u32_t tmp = ntohl(f) + (u32_t)*cp++; \
106*10465441SEvalZero     (f) = htonl(tmp); \
107*10465441SEvalZero   } \
108*10465441SEvalZero }
109*10465441SEvalZero 
110*10465441SEvalZero #define DECODES(f) { \
111*10465441SEvalZero   if (*cp == 0) {\
112*10465441SEvalZero     u_short tmp = ntohs(f) + (((u_short)cp[1] << 8) | cp[2]); \
113*10465441SEvalZero     (f) = htons(tmp); \
114*10465441SEvalZero     cp += 3; \
115*10465441SEvalZero   } else { \
116*10465441SEvalZero     u_short tmp = ntohs(f) + (u_short)*cp++; \
117*10465441SEvalZero     (f) = htons(tmp); \
118*10465441SEvalZero   } \
119*10465441SEvalZero }
120*10465441SEvalZero 
121*10465441SEvalZero #define DECODEU(f) { \
122*10465441SEvalZero   if (*cp == 0) {\
123*10465441SEvalZero     (f) = htons(((u_short)cp[1] << 8) | cp[2]); \
124*10465441SEvalZero     cp += 3; \
125*10465441SEvalZero   } else { \
126*10465441SEvalZero     (f) = htons((u_short)*cp++); \
127*10465441SEvalZero   } \
128*10465441SEvalZero }
129*10465441SEvalZero 
130*10465441SEvalZero /*
131*10465441SEvalZero  * vj_compress_tcp - Attempt to do Van Jacobson header compression on a
132*10465441SEvalZero  * packet.  This assumes that nb and comp are not null and that the first
133*10465441SEvalZero  * buffer of the chain contains a valid IP header.
134*10465441SEvalZero  * Return the VJ type code indicating whether or not the packet was
135*10465441SEvalZero  * compressed.
136*10465441SEvalZero  */
137*10465441SEvalZero u_int
vj_compress_tcp(struct vjcompress * comp,struct pbuf * pb)138*10465441SEvalZero vj_compress_tcp(struct vjcompress *comp, struct pbuf *pb)
139*10465441SEvalZero {
140*10465441SEvalZero   register struct ip_hdr *ip = (struct ip_hdr *)pb->payload;
141*10465441SEvalZero   register struct cstate *cs = comp->last_cs->cs_next;
142*10465441SEvalZero   register u_short hlen = IPH_HL(ip);
143*10465441SEvalZero   register struct tcp_hdr *oth;
144*10465441SEvalZero   register struct tcp_hdr *th;
145*10465441SEvalZero   register u_short deltaS, deltaA;
146*10465441SEvalZero   register u_long deltaL;
147*10465441SEvalZero   register u_int changes = 0;
148*10465441SEvalZero   u_char new_seq[16];
149*10465441SEvalZero   register u_char *cp = new_seq;
150*10465441SEvalZero 
151*10465441SEvalZero   /*
152*10465441SEvalZero    * Check that the packet is IP proto TCP.
153*10465441SEvalZero    */
154*10465441SEvalZero   if (IPH_PROTO(ip) != IP_PROTO_TCP) {
155*10465441SEvalZero     return (TYPE_IP);
156*10465441SEvalZero   }
157*10465441SEvalZero 
158*10465441SEvalZero   /*
159*10465441SEvalZero    * Bail if this is an IP fragment or if the TCP packet isn't
160*10465441SEvalZero    * `compressible' (i.e., ACK isn't set or some other control bit is
161*10465441SEvalZero    * set).
162*10465441SEvalZero    */
163*10465441SEvalZero   if ((IPH_OFFSET(ip) & PP_HTONS(0x3fff)) || pb->tot_len < 40) {
164*10465441SEvalZero     return (TYPE_IP);
165*10465441SEvalZero   }
166*10465441SEvalZero   th = (struct tcp_hdr *)&((long *)ip)[hlen];
167*10465441SEvalZero   if ((TCPH_FLAGS(th) & (TCP_SYN|TCP_FIN|TCP_RST|TCP_ACK)) != TCP_ACK) {
168*10465441SEvalZero     return (TYPE_IP);
169*10465441SEvalZero   }
170*10465441SEvalZero   /*
171*10465441SEvalZero    * Packet is compressible -- we're going to send either a
172*10465441SEvalZero    * COMPRESSED_TCP or UNCOMPRESSED_TCP packet.  Either way we need
173*10465441SEvalZero    * to locate (or create) the connection state.  Special case the
174*10465441SEvalZero    * most recently used connection since it's most likely to be used
175*10465441SEvalZero    * again & we don't have to do any reordering if it's used.
176*10465441SEvalZero    */
177*10465441SEvalZero   INCR(vjs_packets);
178*10465441SEvalZero   if (!ip_addr_cmp(&ip->src, &cs->cs_ip.src)
179*10465441SEvalZero       || !ip_addr_cmp(&ip->dest, &cs->cs_ip.dest)
180*10465441SEvalZero       || *(long *)th != ((long *)&cs->cs_ip)[IPH_HL(&cs->cs_ip)]) {
181*10465441SEvalZero     /*
182*10465441SEvalZero      * Wasn't the first -- search for it.
183*10465441SEvalZero      *
184*10465441SEvalZero      * States are kept in a circularly linked list with
185*10465441SEvalZero      * last_cs pointing to the end of the list.  The
186*10465441SEvalZero      * list is kept in lru order by moving a state to the
187*10465441SEvalZero      * head of the list whenever it is referenced.  Since
188*10465441SEvalZero      * the list is short and, empirically, the connection
189*10465441SEvalZero      * we want is almost always near the front, we locate
190*10465441SEvalZero      * states via linear search.  If we don't find a state
191*10465441SEvalZero      * for the datagram, the oldest state is (re-)used.
192*10465441SEvalZero      */
193*10465441SEvalZero     register struct cstate *lcs;
194*10465441SEvalZero     register struct cstate *lastcs = comp->last_cs;
195*10465441SEvalZero 
196*10465441SEvalZero     do {
197*10465441SEvalZero       lcs = cs; cs = cs->cs_next;
198*10465441SEvalZero       INCR(vjs_searches);
199*10465441SEvalZero       if (ip_addr_cmp(&ip->src, &cs->cs_ip.src)
200*10465441SEvalZero           && ip_addr_cmp(&ip->dest, &cs->cs_ip.dest)
201*10465441SEvalZero           && *(long *)th == ((long *)&cs->cs_ip)[IPH_HL(&cs->cs_ip)]) {
202*10465441SEvalZero         goto found;
203*10465441SEvalZero       }
204*10465441SEvalZero     } while (cs != lastcs);
205*10465441SEvalZero 
206*10465441SEvalZero     /*
207*10465441SEvalZero      * Didn't find it -- re-use oldest cstate.  Send an
208*10465441SEvalZero      * uncompressed packet that tells the other side what
209*10465441SEvalZero      * connection number we're using for this conversation.
210*10465441SEvalZero      * Note that since the state list is circular, the oldest
211*10465441SEvalZero      * state points to the newest and we only need to set
212*10465441SEvalZero      * last_cs to update the lru linkage.
213*10465441SEvalZero      */
214*10465441SEvalZero     INCR(vjs_misses);
215*10465441SEvalZero     comp->last_cs = lcs;
216*10465441SEvalZero     hlen += TCPH_HDRLEN(th);
217*10465441SEvalZero     hlen <<= 2;
218*10465441SEvalZero     /* Check that the IP/TCP headers are contained in the first buffer. */
219*10465441SEvalZero     if (hlen > pb->len) {
220*10465441SEvalZero       return (TYPE_IP);
221*10465441SEvalZero     }
222*10465441SEvalZero     goto uncompressed;
223*10465441SEvalZero 
224*10465441SEvalZero     found:
225*10465441SEvalZero     /*
226*10465441SEvalZero      * Found it -- move to the front on the connection list.
227*10465441SEvalZero      */
228*10465441SEvalZero     if (cs == lastcs) {
229*10465441SEvalZero       comp->last_cs = lcs;
230*10465441SEvalZero     } else {
231*10465441SEvalZero       lcs->cs_next = cs->cs_next;
232*10465441SEvalZero       cs->cs_next = lastcs->cs_next;
233*10465441SEvalZero       lastcs->cs_next = cs;
234*10465441SEvalZero     }
235*10465441SEvalZero   }
236*10465441SEvalZero 
237*10465441SEvalZero   oth = (struct tcp_hdr *)&((long *)&cs->cs_ip)[hlen];
238*10465441SEvalZero   deltaS = hlen;
239*10465441SEvalZero   hlen += TCPH_HDRLEN(th);
240*10465441SEvalZero   hlen <<= 2;
241*10465441SEvalZero   /* Check that the IP/TCP headers are contained in the first buffer. */
242*10465441SEvalZero   if (hlen > pb->len) {
243*10465441SEvalZero     PPPDEBUG(LOG_INFO, ("vj_compress_tcp: header len %d spans buffers\n", hlen));
244*10465441SEvalZero     return (TYPE_IP);
245*10465441SEvalZero   }
246*10465441SEvalZero 
247*10465441SEvalZero   /*
248*10465441SEvalZero    * Make sure that only what we expect to change changed. The first
249*10465441SEvalZero    * line of the `if' checks the IP protocol version, header length &
250*10465441SEvalZero    * type of service.  The 2nd line checks the "Don't fragment" bit.
251*10465441SEvalZero    * The 3rd line checks the time-to-live and protocol (the protocol
252*10465441SEvalZero    * check is unnecessary but costless).  The 4th line checks the TCP
253*10465441SEvalZero    * header length.  The 5th line checks IP options, if any.  The 6th
254*10465441SEvalZero    * line checks TCP options, if any.  If any of these things are
255*10465441SEvalZero    * different between the previous & current datagram, we send the
256*10465441SEvalZero    * current datagram `uncompressed'.
257*10465441SEvalZero    */
258*10465441SEvalZero   if (((u_short *)ip)[0] != ((u_short *)&cs->cs_ip)[0]
259*10465441SEvalZero       || ((u_short *)ip)[3] != ((u_short *)&cs->cs_ip)[3]
260*10465441SEvalZero       || ((u_short *)ip)[4] != ((u_short *)&cs->cs_ip)[4]
261*10465441SEvalZero       || TCPH_HDRLEN(th) != TCPH_HDRLEN(oth)
262*10465441SEvalZero       || (deltaS > 5 && BCMP(ip + 1, &cs->cs_ip + 1, (deltaS - 5) << 2))
263*10465441SEvalZero       || (TCPH_HDRLEN(th) > 5 && BCMP(th + 1, oth + 1, (TCPH_HDRLEN(th) - 5) << 2))) {
264*10465441SEvalZero     goto uncompressed;
265*10465441SEvalZero   }
266*10465441SEvalZero 
267*10465441SEvalZero   /*
268*10465441SEvalZero    * Figure out which of the changing fields changed.  The
269*10465441SEvalZero    * receiver expects changes in the order: urgent, window,
270*10465441SEvalZero    * ack, seq (the order minimizes the number of temporaries
271*10465441SEvalZero    * needed in this section of code).
272*10465441SEvalZero    */
273*10465441SEvalZero   if (TCPH_FLAGS(th) & TCP_URG) {
274*10465441SEvalZero     deltaS = ntohs(th->urgp);
275*10465441SEvalZero     ENCODEZ(deltaS);
276*10465441SEvalZero     changes |= NEW_U;
277*10465441SEvalZero   } else if (th->urgp != oth->urgp) {
278*10465441SEvalZero     /* argh! URG not set but urp changed -- a sensible
279*10465441SEvalZero      * implementation should never do this but RFC793
280*10465441SEvalZero      * doesn't prohibit the change so we have to deal
281*10465441SEvalZero      * with it. */
282*10465441SEvalZero     goto uncompressed;
283*10465441SEvalZero   }
284*10465441SEvalZero 
285*10465441SEvalZero   if ((deltaS = (u_short)(ntohs(th->wnd) - ntohs(oth->wnd))) != 0) {
286*10465441SEvalZero     ENCODE(deltaS);
287*10465441SEvalZero     changes |= NEW_W;
288*10465441SEvalZero   }
289*10465441SEvalZero 
290*10465441SEvalZero   if ((deltaL = ntohl(th->ackno) - ntohl(oth->ackno)) != 0) {
291*10465441SEvalZero     if (deltaL > 0xffff) {
292*10465441SEvalZero       goto uncompressed;
293*10465441SEvalZero     }
294*10465441SEvalZero     deltaA = (u_short)deltaL;
295*10465441SEvalZero     ENCODE(deltaA);
296*10465441SEvalZero     changes |= NEW_A;
297*10465441SEvalZero   }
298*10465441SEvalZero 
299*10465441SEvalZero   if ((deltaL = ntohl(th->seqno) - ntohl(oth->seqno)) != 0) {
300*10465441SEvalZero     if (deltaL > 0xffff) {
301*10465441SEvalZero       goto uncompressed;
302*10465441SEvalZero     }
303*10465441SEvalZero     deltaS = (u_short)deltaL;
304*10465441SEvalZero     ENCODE(deltaS);
305*10465441SEvalZero     changes |= NEW_S;
306*10465441SEvalZero   }
307*10465441SEvalZero 
308*10465441SEvalZero   switch(changes) {
309*10465441SEvalZero   case 0:
310*10465441SEvalZero     /*
311*10465441SEvalZero      * Nothing changed. If this packet contains data and the
312*10465441SEvalZero      * last one didn't, this is probably a data packet following
313*10465441SEvalZero      * an ack (normal on an interactive connection) and we send
314*10465441SEvalZero      * it compressed.  Otherwise it's probably a retransmit,
315*10465441SEvalZero      * retransmitted ack or window probe.  Send it uncompressed
316*10465441SEvalZero      * in case the other side missed the compressed version.
317*10465441SEvalZero      */
318*10465441SEvalZero     if (IPH_LEN(ip) != IPH_LEN(&cs->cs_ip) &&
319*10465441SEvalZero       ntohs(IPH_LEN(&cs->cs_ip)) == hlen) {
320*10465441SEvalZero       break;
321*10465441SEvalZero     }
322*10465441SEvalZero 
323*10465441SEvalZero   /* (fall through) */
324*10465441SEvalZero 
325*10465441SEvalZero   case SPECIAL_I:
326*10465441SEvalZero   case SPECIAL_D:
327*10465441SEvalZero     /*
328*10465441SEvalZero      * actual changes match one of our special case encodings --
329*10465441SEvalZero      * send packet uncompressed.
330*10465441SEvalZero      */
331*10465441SEvalZero     goto uncompressed;
332*10465441SEvalZero 
333*10465441SEvalZero   case NEW_S|NEW_A:
334*10465441SEvalZero     if (deltaS == deltaA && deltaS == ntohs(IPH_LEN(&cs->cs_ip)) - hlen) {
335*10465441SEvalZero       /* special case for echoed terminal traffic */
336*10465441SEvalZero       changes = SPECIAL_I;
337*10465441SEvalZero       cp = new_seq;
338*10465441SEvalZero     }
339*10465441SEvalZero     break;
340*10465441SEvalZero 
341*10465441SEvalZero   case NEW_S:
342*10465441SEvalZero     if (deltaS == ntohs(IPH_LEN(&cs->cs_ip)) - hlen) {
343*10465441SEvalZero       /* special case for data xfer */
344*10465441SEvalZero       changes = SPECIAL_D;
345*10465441SEvalZero       cp = new_seq;
346*10465441SEvalZero     }
347*10465441SEvalZero     break;
348*10465441SEvalZero   }
349*10465441SEvalZero 
350*10465441SEvalZero   deltaS = (u_short)(ntohs(IPH_ID(ip)) - ntohs(IPH_ID(&cs->cs_ip)));
351*10465441SEvalZero   if (deltaS != 1) {
352*10465441SEvalZero     ENCODEZ(deltaS);
353*10465441SEvalZero     changes |= NEW_I;
354*10465441SEvalZero   }
355*10465441SEvalZero   if (TCPH_FLAGS(th) & TCP_PSH) {
356*10465441SEvalZero     changes |= TCP_PUSH_BIT;
357*10465441SEvalZero   }
358*10465441SEvalZero   /*
359*10465441SEvalZero    * Grab the cksum before we overwrite it below.  Then update our
360*10465441SEvalZero    * state with this packet's header.
361*10465441SEvalZero    */
362*10465441SEvalZero   deltaA = ntohs(th->chksum);
363*10465441SEvalZero   BCOPY(ip, &cs->cs_ip, hlen);
364*10465441SEvalZero 
365*10465441SEvalZero   /*
366*10465441SEvalZero    * We want to use the original packet as our compressed packet.
367*10465441SEvalZero    * (cp - new_seq) is the number of bytes we need for compressed
368*10465441SEvalZero    * sequence numbers.  In addition we need one byte for the change
369*10465441SEvalZero    * mask, one for the connection id and two for the tcp checksum.
370*10465441SEvalZero    * So, (cp - new_seq) + 4 bytes of header are needed.  hlen is how
371*10465441SEvalZero    * many bytes of the original packet to toss so subtract the two to
372*10465441SEvalZero    * get the new packet size.
373*10465441SEvalZero    */
374*10465441SEvalZero   deltaS = (u_short)(cp - new_seq);
375*10465441SEvalZero   if (!comp->compressSlot || comp->last_xmit != cs->cs_id) {
376*10465441SEvalZero     comp->last_xmit = cs->cs_id;
377*10465441SEvalZero     hlen -= deltaS + 4;
378*10465441SEvalZero     if(pbuf_header(pb, -hlen)){
379*10465441SEvalZero       /* Can we cope with this failing?  Just assert for now */
380*10465441SEvalZero       LWIP_ASSERT("pbuf_header failed\n", 0);
381*10465441SEvalZero     }
382*10465441SEvalZero     cp = (u_char *)pb->payload;
383*10465441SEvalZero     *cp++ = (u_char)(changes | NEW_C);
384*10465441SEvalZero     *cp++ = cs->cs_id;
385*10465441SEvalZero   } else {
386*10465441SEvalZero     hlen -= deltaS + 3;
387*10465441SEvalZero     if(pbuf_header(pb, -hlen)) {
388*10465441SEvalZero       /* Can we cope with this failing?  Just assert for now */
389*10465441SEvalZero       LWIP_ASSERT("pbuf_header failed\n", 0);
390*10465441SEvalZero     }
391*10465441SEvalZero     cp = (u_char *)pb->payload;
392*10465441SEvalZero     *cp++ = (u_char)changes;
393*10465441SEvalZero   }
394*10465441SEvalZero   *cp++ = (u_char)(deltaA >> 8);
395*10465441SEvalZero   *cp++ = (u_char)deltaA;
396*10465441SEvalZero   BCOPY(new_seq, cp, deltaS);
397*10465441SEvalZero   INCR(vjs_compressed);
398*10465441SEvalZero   return (TYPE_COMPRESSED_TCP);
399*10465441SEvalZero 
400*10465441SEvalZero   /*
401*10465441SEvalZero    * Update connection state cs & send uncompressed packet (that is,
402*10465441SEvalZero    * a regular ip/tcp packet but with the 'conversation id' we hope
403*10465441SEvalZero    * to use on future compressed packets in the protocol field).
404*10465441SEvalZero    */
405*10465441SEvalZero uncompressed:
406*10465441SEvalZero   BCOPY(ip, &cs->cs_ip, hlen);
407*10465441SEvalZero   IPH_PROTO_SET(ip, cs->cs_id);
408*10465441SEvalZero   comp->last_xmit = cs->cs_id;
409*10465441SEvalZero   return (TYPE_UNCOMPRESSED_TCP);
410*10465441SEvalZero }
411*10465441SEvalZero 
412*10465441SEvalZero /*
413*10465441SEvalZero  * Called when we may have missed a packet.
414*10465441SEvalZero  */
415*10465441SEvalZero void
vj_uncompress_err(struct vjcompress * comp)416*10465441SEvalZero vj_uncompress_err(struct vjcompress *comp)
417*10465441SEvalZero {
418*10465441SEvalZero   comp->flags |= VJF_TOSS;
419*10465441SEvalZero   INCR(vjs_errorin);
420*10465441SEvalZero }
421*10465441SEvalZero 
422*10465441SEvalZero /*
423*10465441SEvalZero  * "Uncompress" a packet of type TYPE_UNCOMPRESSED_TCP.
424*10465441SEvalZero  * Return 0 on success, -1 on failure.
425*10465441SEvalZero  */
426*10465441SEvalZero int
vj_uncompress_uncomp(struct pbuf * nb,struct vjcompress * comp)427*10465441SEvalZero vj_uncompress_uncomp(struct pbuf *nb, struct vjcompress *comp)
428*10465441SEvalZero {
429*10465441SEvalZero   register u_int hlen;
430*10465441SEvalZero   register struct cstate *cs;
431*10465441SEvalZero   register struct ip_hdr *ip;
432*10465441SEvalZero 
433*10465441SEvalZero   ip = (struct ip_hdr *)nb->payload;
434*10465441SEvalZero   hlen = IPH_HL(ip) << 2;
435*10465441SEvalZero   if (IPH_PROTO(ip) >= MAX_SLOTS
436*10465441SEvalZero       || hlen + sizeof(struct tcp_hdr) > nb->len
437*10465441SEvalZero       || (hlen += TCPH_HDRLEN(((struct tcp_hdr *)&((char *)ip)[hlen])) << 2)
438*10465441SEvalZero           > nb->len
439*10465441SEvalZero       || hlen > MAX_HDR) {
440*10465441SEvalZero     PPPDEBUG(LOG_INFO, ("vj_uncompress_uncomp: bad cid=%d, hlen=%d buflen=%d\n",
441*10465441SEvalZero       IPH_PROTO(ip), hlen, nb->len));
442*10465441SEvalZero     comp->flags |= VJF_TOSS;
443*10465441SEvalZero     INCR(vjs_errorin);
444*10465441SEvalZero     return -1;
445*10465441SEvalZero   }
446*10465441SEvalZero   cs = &comp->rstate[comp->last_recv = IPH_PROTO(ip)];
447*10465441SEvalZero   comp->flags &=~ VJF_TOSS;
448*10465441SEvalZero   IPH_PROTO_SET(ip, IP_PROTO_TCP);
449*10465441SEvalZero   BCOPY(ip, &cs->cs_ip, hlen);
450*10465441SEvalZero   cs->cs_hlen = (u_short)hlen;
451*10465441SEvalZero   INCR(vjs_uncompressedin);
452*10465441SEvalZero   return 0;
453*10465441SEvalZero }
454*10465441SEvalZero 
455*10465441SEvalZero /*
456*10465441SEvalZero  * Uncompress a packet of type TYPE_COMPRESSED_TCP.
457*10465441SEvalZero  * The packet is composed of a buffer chain and the first buffer
458*10465441SEvalZero  * must contain an accurate chain length.
459*10465441SEvalZero  * The first buffer must include the entire compressed TCP/IP header.
460*10465441SEvalZero  * This procedure replaces the compressed header with the uncompressed
461*10465441SEvalZero  * header and returns the length of the VJ header.
462*10465441SEvalZero  */
463*10465441SEvalZero int
vj_uncompress_tcp(struct pbuf ** nb,struct vjcompress * comp)464*10465441SEvalZero vj_uncompress_tcp(struct pbuf **nb, struct vjcompress *comp)
465*10465441SEvalZero {
466*10465441SEvalZero   u_char *cp;
467*10465441SEvalZero   struct tcp_hdr *th;
468*10465441SEvalZero   struct cstate *cs;
469*10465441SEvalZero   u_short *bp;
470*10465441SEvalZero   struct pbuf *n0 = *nb;
471*10465441SEvalZero   u32_t tmp;
472*10465441SEvalZero   u_int vjlen, hlen, changes;
473*10465441SEvalZero 
474*10465441SEvalZero   INCR(vjs_compressedin);
475*10465441SEvalZero   cp = (u_char *)n0->payload;
476*10465441SEvalZero   changes = *cp++;
477*10465441SEvalZero   if (changes & NEW_C) {
478*10465441SEvalZero     /*
479*10465441SEvalZero      * Make sure the state index is in range, then grab the state.
480*10465441SEvalZero      * If we have a good state index, clear the 'discard' flag.
481*10465441SEvalZero      */
482*10465441SEvalZero     if (*cp >= MAX_SLOTS) {
483*10465441SEvalZero       PPPDEBUG(LOG_INFO, ("vj_uncompress_tcp: bad cid=%d\n", *cp));
484*10465441SEvalZero       goto bad;
485*10465441SEvalZero     }
486*10465441SEvalZero 
487*10465441SEvalZero     comp->flags &=~ VJF_TOSS;
488*10465441SEvalZero     comp->last_recv = *cp++;
489*10465441SEvalZero   } else {
490*10465441SEvalZero     /*
491*10465441SEvalZero      * this packet has an implicit state index.  If we've
492*10465441SEvalZero      * had a line error since the last time we got an
493*10465441SEvalZero      * explicit state index, we have to toss the packet.
494*10465441SEvalZero      */
495*10465441SEvalZero     if (comp->flags & VJF_TOSS) {
496*10465441SEvalZero       PPPDEBUG(LOG_INFO, ("vj_uncompress_tcp: tossing\n"));
497*10465441SEvalZero       INCR(vjs_tossed);
498*10465441SEvalZero       return (-1);
499*10465441SEvalZero     }
500*10465441SEvalZero   }
501*10465441SEvalZero   cs = &comp->rstate[comp->last_recv];
502*10465441SEvalZero   hlen = IPH_HL(&cs->cs_ip) << 2;
503*10465441SEvalZero   th = (struct tcp_hdr *)&((u_char *)&cs->cs_ip)[hlen];
504*10465441SEvalZero   th->chksum = htons((*cp << 8) | cp[1]);
505*10465441SEvalZero   cp += 2;
506*10465441SEvalZero   if (changes & TCP_PUSH_BIT) {
507*10465441SEvalZero     TCPH_SET_FLAG(th, TCP_PSH);
508*10465441SEvalZero   } else {
509*10465441SEvalZero     TCPH_UNSET_FLAG(th, TCP_PSH);
510*10465441SEvalZero   }
511*10465441SEvalZero 
512*10465441SEvalZero   switch (changes & SPECIALS_MASK) {
513*10465441SEvalZero   case SPECIAL_I:
514*10465441SEvalZero     {
515*10465441SEvalZero       register u32_t i = ntohs(IPH_LEN(&cs->cs_ip)) - cs->cs_hlen;
516*10465441SEvalZero       /* some compilers can't nest inline assembler.. */
517*10465441SEvalZero       tmp = ntohl(th->ackno) + i;
518*10465441SEvalZero       th->ackno = htonl(tmp);
519*10465441SEvalZero       tmp = ntohl(th->seqno) + i;
520*10465441SEvalZero       th->seqno = htonl(tmp);
521*10465441SEvalZero     }
522*10465441SEvalZero     break;
523*10465441SEvalZero 
524*10465441SEvalZero   case SPECIAL_D:
525*10465441SEvalZero     /* some compilers can't nest inline assembler.. */
526*10465441SEvalZero     tmp = ntohl(th->seqno) + ntohs(IPH_LEN(&cs->cs_ip)) - cs->cs_hlen;
527*10465441SEvalZero     th->seqno = htonl(tmp);
528*10465441SEvalZero     break;
529*10465441SEvalZero 
530*10465441SEvalZero   default:
531*10465441SEvalZero     if (changes & NEW_U) {
532*10465441SEvalZero       TCPH_SET_FLAG(th, TCP_URG);
533*10465441SEvalZero       DECODEU(th->urgp);
534*10465441SEvalZero     } else {
535*10465441SEvalZero       TCPH_UNSET_FLAG(th, TCP_URG);
536*10465441SEvalZero     }
537*10465441SEvalZero     if (changes & NEW_W) {
538*10465441SEvalZero       DECODES(th->wnd);
539*10465441SEvalZero     }
540*10465441SEvalZero     if (changes & NEW_A) {
541*10465441SEvalZero       DECODEL(th->ackno);
542*10465441SEvalZero     }
543*10465441SEvalZero     if (changes & NEW_S) {
544*10465441SEvalZero       DECODEL(th->seqno);
545*10465441SEvalZero     }
546*10465441SEvalZero     break;
547*10465441SEvalZero   }
548*10465441SEvalZero   if (changes & NEW_I) {
549*10465441SEvalZero     DECODES(cs->cs_ip._id);
550*10465441SEvalZero   } else {
551*10465441SEvalZero     IPH_ID_SET(&cs->cs_ip, ntohs(IPH_ID(&cs->cs_ip)) + 1);
552*10465441SEvalZero     IPH_ID_SET(&cs->cs_ip, htons(IPH_ID(&cs->cs_ip)));
553*10465441SEvalZero   }
554*10465441SEvalZero 
555*10465441SEvalZero   /*
556*10465441SEvalZero    * At this point, cp points to the first byte of data in the
557*10465441SEvalZero    * packet.  Fill in the IP total length and update the IP
558*10465441SEvalZero    * header checksum.
559*10465441SEvalZero    */
560*10465441SEvalZero   vjlen = (u_short)(cp - (u_char*)n0->payload);
561*10465441SEvalZero   if (n0->len < vjlen) {
562*10465441SEvalZero     /*
563*10465441SEvalZero      * We must have dropped some characters (crc should detect
564*10465441SEvalZero      * this but the old slip framing won't)
565*10465441SEvalZero      */
566*10465441SEvalZero     PPPDEBUG(LOG_INFO, ("vj_uncompress_tcp: head buffer %d too short %d\n",
567*10465441SEvalZero           n0->len, vjlen));
568*10465441SEvalZero     goto bad;
569*10465441SEvalZero   }
570*10465441SEvalZero 
571*10465441SEvalZero #if BYTE_ORDER == LITTLE_ENDIAN
572*10465441SEvalZero   tmp = n0->tot_len - vjlen + cs->cs_hlen;
573*10465441SEvalZero   IPH_LEN_SET(&cs->cs_ip, htons((u_short)tmp));
574*10465441SEvalZero #else
575*10465441SEvalZero   IPH_LEN_SET(&cs->cs_ip, htons(n0->tot_len - vjlen + cs->cs_hlen));
576*10465441SEvalZero #endif
577*10465441SEvalZero 
578*10465441SEvalZero   /* recompute the ip header checksum */
579*10465441SEvalZero   bp = (u_short *) &cs->cs_ip;
580*10465441SEvalZero   IPH_CHKSUM_SET(&cs->cs_ip, 0);
581*10465441SEvalZero   for (tmp = 0; hlen > 0; hlen -= 2) {
582*10465441SEvalZero     tmp += *bp++;
583*10465441SEvalZero   }
584*10465441SEvalZero   tmp = (tmp & 0xffff) + (tmp >> 16);
585*10465441SEvalZero   tmp = (tmp & 0xffff) + (tmp >> 16);
586*10465441SEvalZero   IPH_CHKSUM_SET(&cs->cs_ip,  (u_short)(~tmp));
587*10465441SEvalZero 
588*10465441SEvalZero   /* Remove the compressed header and prepend the uncompressed header. */
589*10465441SEvalZero   if(pbuf_header(n0, -((s16_t)(vjlen)))) {
590*10465441SEvalZero     /* Can we cope with this failing?  Just assert for now */
591*10465441SEvalZero     LWIP_ASSERT("pbuf_header failed\n", 0);
592*10465441SEvalZero     goto bad;
593*10465441SEvalZero   }
594*10465441SEvalZero 
595*10465441SEvalZero   if(LWIP_MEM_ALIGN(n0->payload) != n0->payload) {
596*10465441SEvalZero     struct pbuf *np, *q;
597*10465441SEvalZero     u8_t *bufptr;
598*10465441SEvalZero 
599*10465441SEvalZero     np = pbuf_alloc(PBUF_RAW, n0->len + cs->cs_hlen, PBUF_POOL);
600*10465441SEvalZero     if(!np) {
601*10465441SEvalZero       PPPDEBUG(LOG_WARNING, ("vj_uncompress_tcp: realign failed\n"));
602*10465441SEvalZero       goto bad;
603*10465441SEvalZero     }
604*10465441SEvalZero 
605*10465441SEvalZero     if(pbuf_header(np, -cs->cs_hlen)) {
606*10465441SEvalZero       /* Can we cope with this failing?  Just assert for now */
607*10465441SEvalZero       LWIP_ASSERT("pbuf_header failed\n", 0);
608*10465441SEvalZero       goto bad;
609*10465441SEvalZero     }
610*10465441SEvalZero 
611*10465441SEvalZero     bufptr = n0->payload;
612*10465441SEvalZero     for(q = np; q != NULL; q = q->next) {
613*10465441SEvalZero       MEMCPY(q->payload, bufptr, q->len);
614*10465441SEvalZero       bufptr += q->len;
615*10465441SEvalZero     }
616*10465441SEvalZero 
617*10465441SEvalZero     if(n0->next) {
618*10465441SEvalZero       pbuf_chain(np, n0->next);
619*10465441SEvalZero       pbuf_dechain(n0);
620*10465441SEvalZero     }
621*10465441SEvalZero     pbuf_free(n0);
622*10465441SEvalZero     n0 = np;
623*10465441SEvalZero   }
624*10465441SEvalZero 
625*10465441SEvalZero   if(pbuf_header(n0, cs->cs_hlen)) {
626*10465441SEvalZero     struct pbuf *np;
627*10465441SEvalZero 
628*10465441SEvalZero     LWIP_ASSERT("vj_uncompress_tcp: cs->cs_hlen <= PBUF_POOL_BUFSIZE", cs->cs_hlen <= PBUF_POOL_BUFSIZE);
629*10465441SEvalZero     np = pbuf_alloc(PBUF_RAW, cs->cs_hlen, PBUF_POOL);
630*10465441SEvalZero     if(!np) {
631*10465441SEvalZero       PPPDEBUG(LOG_WARNING, ("vj_uncompress_tcp: prepend failed\n"));
632*10465441SEvalZero       goto bad;
633*10465441SEvalZero     }
634*10465441SEvalZero     pbuf_cat(np, n0);
635*10465441SEvalZero     n0 = np;
636*10465441SEvalZero   }
637*10465441SEvalZero   LWIP_ASSERT("n0->len >= cs->cs_hlen", n0->len >= cs->cs_hlen);
638*10465441SEvalZero   MEMCPY(n0->payload, &cs->cs_ip, cs->cs_hlen);
639*10465441SEvalZero 
640*10465441SEvalZero   *nb = n0;
641*10465441SEvalZero 
642*10465441SEvalZero   return vjlen;
643*10465441SEvalZero 
644*10465441SEvalZero bad:
645*10465441SEvalZero   comp->flags |= VJF_TOSS;
646*10465441SEvalZero   INCR(vjs_errorin);
647*10465441SEvalZero   return (-1);
648*10465441SEvalZero }
649*10465441SEvalZero 
650*10465441SEvalZero #endif /* VJ_SUPPORT */
651*10465441SEvalZero 
652*10465441SEvalZero #endif /* PPP_SUPPORT */
653