diff options
author | Arisotura <thetotalworm@gmail.com> | 2019-03-05 15:01:23 +0100 |
---|---|---|
committer | Arisotura <thetotalworm@gmail.com> | 2019-03-05 15:01:23 +0100 |
commit | 349322b94c4cceb7253ab03ab5421f93ac780511 (patch) | |
tree | 5166c9ed04570dd75ced53095ad8a59a6bb49e4f /src | |
parent | 623b0ea2e0ae274c64360897e5ae20467fe3c541 (diff) |
less shitty code.
also, initiating TCP connection!
Diffstat (limited to 'src')
-rw-r--r-- | src/libui_sdl/LAN_Socket.cpp | 345 |
1 files changed, 211 insertions, 134 deletions
diff --git a/src/libui_sdl/LAN_Socket.cpp b/src/libui_sdl/LAN_Socket.cpp index 40189c2..05acd2f 100644 --- a/src/libui_sdl/LAN_Socket.cpp +++ b/src/libui_sdl/LAN_Socket.cpp @@ -72,8 +72,11 @@ u16 IPv4ID; typedef struct { u8 DestIP[4]; + u16 SourcePort; u16 DestPort; + u32 SeqNum; + // 0: unused // 1: connected u8 Status; @@ -144,6 +147,42 @@ void FinishUDPFrame(u8* data, int len) *(u16*)&udpheader[6] = htons(tmp); } +void FinishTCPFrame(u8* data, int len) +{ + u8* ipheader = &data[0xE]; + u8* tcpheader = &data[0x22]; + + // lengths + *(u16*)&ipheader[2] = htons(len - 0xE); + + // IP checksum + u32 tmp = 0; + + for (int i = 0; i < 20; i += 2) + tmp += ntohs(*(u16*)&ipheader[i]); + while (tmp >> 16) + tmp = (tmp & 0xFFFF) + (tmp >> 16); + tmp ^= 0xFFFF; + *(u16*)&ipheader[10] = htons(tmp); + + u32 tcplen = ntohs(*(u16*)&ipheader[2]) - 0x14; + + // TCP checksum + tmp = 0; + tmp += ntohs(*(u16*)&ipheader[12]); + tmp += ntohs(*(u16*)&ipheader[14]); + tmp += ntohs(*(u16*)&ipheader[16]); + tmp += ntohs(*(u16*)&ipheader[18]); + tmp += ntohs(0x0600); + tmp += tcplen; + for (u8* i = tcpheader; i < &tcpheader[tcplen]; i += 2) + tmp += ntohs(*(u16*)i); + while (tmp >> 16) + tmp = (tmp & 0xFFFF) + (tmp >> 16); + tmp ^= 0xFFFF; + *(u16*)&tcpheader[16] = htons(tmp); +} + /*bool HandleIncomingIPFrame(u8* data, int len) { @@ -546,171 +585,200 @@ void HandleDNSFrame(u8* data, int len) RXNum = 1; } -void HandleIPFrame(u8* data, int len) +void HandleUDPFrame(u8* data, int len) { - u8 protocol = data[0x17]; - - // any kind of IPv4 frame that isn't DHCP - // we do NAT and forward it to the network - - // like: - // melonRouter -> host - // destination MAC set to host MAC - // source MAC set to melonRouter MAC - - //memcpy(&data[0], &PCapAdapterData->DHCP_MAC[0], 6); - //memcpy(&data[6], &PCapAdapterData->MAC[0], 6); - - //*(u32*)&data[0x1A] = *(u32*)&PCapAdapterData->IP_v4[0]; - u8* ipheader = &data[0xE]; - u8* protoheader = &data[0x22]; + u8* udpheader = &data[0x22]; - // IP checksum - u32 tmp = 0; + // TODO! +} - *(u16*)&ipheader[10] = 0; - for (int i = 0; i < 20; i += 2) - tmp += ntohs(*(u16*)&ipheader[i]); - while (tmp >> 16) - tmp = (tmp & 0xFFFF) + (tmp >> 16); - tmp ^= 0xFFFF; - *(u16*)&ipheader[10] = htons(tmp); +void TCP_SYNACK(TCPSocket* sock, u8* data, int len) +{ + u8 resp[128]; + u8* out = &resp[0]; - if (protocol == 0x11) - { - u32 udplen = ntohs(*(u16*)&protoheader[4]); + u8* ipheader = &data[0xE]; + u8* tcpheader = &data[0x22]; - // UDP checksum - tmp = 0; - *(u16*)&protoheader[6] = 0; - tmp += ntohs(*(u16*)&ipheader[12]); - tmp += ntohs(*(u16*)&ipheader[14]); - tmp += ntohs(*(u16*)&ipheader[16]); - tmp += ntohs(*(u16*)&ipheader[18]); - tmp += ntohs(0x1100); - tmp += udplen; - for (u8* i = protoheader; i < &protoheader[udplen]; i += 2) - tmp += ntohs(*(u16*)i); - while (tmp >> 16) - tmp = (tmp & 0xFFFF) + (tmp >> 16); - tmp ^= 0xFFFF; - if (tmp == 0) tmp = 0xFFFF; - *(u16*)&protoheader[6] = htons(tmp); - } - else if (protocol == 0x06) - { - u32 tcplen = ntohs(*(u16*)&ipheader[2]) - 0x14; + u32 seqnum = htonl(*(u32*)&tcpheader[4]); - u16 srcport = ntohs(*(u16*)&protoheader[0]); - u16 dstport = ntohs(*(u16*)&protoheader[2]); - u16 flags = ntohs(*(u16*)&protoheader[12]); + // ethernet + memcpy(out, &data[6], 6); out += 6; + memcpy(out, kServerMAC, 6); out += 6; + *(u16*)out = htons(0x0800); out += 2; - if (flags & 0x002) // SYN - { - int sockid = -1; - for (int i = 0; i < (sizeof(TCPSocketList)/sizeof(TCPSocket)); i++) - { - TCPSocket* sock = &TCPSocketList[i]; - if (sock->Status == 1 && !memcmp(&sock->DestIP, &ipheader[16], 4) && sock->DestPort == dstport) - { - printf("LANMAGIC: duplicate TCP socket\n"); - sockid = i; - break; - } - } + // IP + u8* resp_ipheader = out; + *out++ = 0x45; + *out++ = 0x00; + *(u16*)out = 0; out += 2; // total length + *(u16*)out = htons(IPv4ID); out += 2; IPv4ID++; + *out++ = 0x00; + *out++ = 0x00; + *out++ = 0x80; // TTL + *out++ = 0x06; // protocol (TCP) + *(u16*)out = 0; out += 2; // checksum + *(u32*)out = *(u32*)&ipheader[16]; out += 4; // source IP + *(u32*)out = *(u32*)&ipheader[12]; out += 4; // destination IP + + // TCP + u8* resp_tcpheader = out; + *(u16*)out = *(u16*)&tcpheader[2]; out += 2; // source port + *(u16*)out = *(u16*)&tcpheader[0]; out += 2; // destination port + *(u32*)out = htonl(sock->SeqNum); out += 4; sock->SeqNum++; // seq number + *(u32*)out = htonl(seqnum+1); out += 4; // ack seq number + *(u16*)out = htons(0x8012); out += 2; // flags (SYN+ACK) + *(u16*)out = htons(0x7000); out += 2; // window size (uuuh) + *(u16*)out = 0; out += 2; // checksum + *(u16*)out = 0; out += 2; // urgent pointer + + // TCP options + *out++ = 0x02; *out++ = 0x04; // max segment size + *(u16*)out = htons(0x05B4); out += 2; + *out++ = 0x01; + *out++ = 0x01; + *out++ = 0x04; *out++ = 0x02; // SACK permitted + *out++ = 0x01; + *out++ = 0x03; *out++ = 0x03; // window size + *out++ = 0x08; - if (sockid == -1) - { - for (int i = 0; i < (sizeof(TCPSocketList)/sizeof(TCPSocket)); i++) - { - TCPSocket* sock = &TCPSocketList[i]; - if (sock->Status == 0) - { - sockid = i; - break; - } - } - } + u32 framelen = (u32)(out - &resp[0]); + if (framelen & 1) { *out++ = 0; framelen++; } + FinishTCPFrame(resp, framelen); - if (sockid == -1) - { - printf("LANMAGIC: !! TCP SOCKET LIST FULL\n"); - return; - } + // TODO: if there is already a packet queued, this will overwrite it + // that being said, this will only happen during DHCP setup, so probably + // not a big deal - printf("LANMAGIC: opening TCP socket #%d to %d.%d.%d.%d:%d\n", - sockid, - ipheader[16], ipheader[17], ipheader[18], ipheader[19], - dstport); + PacketLen = framelen; + memcpy(PacketBuffer, resp, PacketLen); + RXNum = 1; +} - // keep track of it - // (TODO: also keep track of source port?) +void HandleTCPFrame(u8* data, int len) +{ + u8* ipheader = &data[0xE]; + u8* tcpheader = &data[0x22]; - TCPSocket* sock = &TCPSocketList[sockid]; - sock->Status = 1; - memcpy(sock->DestIP, &ipheader[16], 4); - sock->DestPort = dstport; + u32 tcplen = ntohs(*(u16*)&ipheader[2]) - 0x14; - // open backend socket - if (!sock->Backend) - { - sock->Backend = socket(AF_INET, SOCK_STREAM, 0); - } + u16 srcport = ntohs(*(u16*)&tcpheader[0]); + u16 dstport = ntohs(*(u16*)&tcpheader[2]); + u16 flags = ntohs(*(u16*)&tcpheader[12]); - struct sockaddr_in conn_addr; - memset(&conn_addr, 0, sizeof(conn_addr)); - conn_addr.sin_family = AF_INET; - conn_addr.sin_addr.S_un.S_addr = *(u32*)&ipheader[16]; - if (connect(sock->Backend, (sockaddr*)&conn_addr, sizeof(conn_addr)) == SOCKET_ERROR) + if (flags & 0x002) // SYN + { + int sockid = -1; + for (int i = 0; i < (sizeof(TCPSocketList)/sizeof(TCPSocket)); i++) + { + TCPSocket* sock = &TCPSocketList[i]; + if (sock->Status == 1 && !memcmp(&sock->DestIP, &ipheader[16], 4) && + sock->SourcePort == srcport && sock->DestPort == dstport) { - printf("connect() shat itself :(\n"); + printf("LANMAGIC: duplicate TCP socket\n"); + sockid = i; + break; } } - else + + if (sockid == -1) { - int sockid = -1; for (int i = 0; i < (sizeof(TCPSocketList)/sizeof(TCPSocket)); i++) { TCPSocket* sock = &TCPSocketList[i]; - if (sock->Status == 1 && !memcmp(&sock->DestIP, &ipheader[16], 4) && sock->DestPort == dstport) + if (sock->Status == 0) { sockid = i; break; } } + } - if (sockid == -1) - { - printf("LANMAGIC: bad TCP packet\n"); - return; - } + if (sockid == -1) + { + printf("LANMAGIC: !! TCP SOCKET LIST FULL\n"); + return; + } - if (flags & 0x001) // FIN + printf("LANMAGIC: opening TCP socket #%d to %d.%d.%d.%d:%d, srcport %d\n", + sockid, + ipheader[16], ipheader[17], ipheader[18], ipheader[19], + dstport, srcport); + + // keep track of it + TCPSocket* sock = &TCPSocketList[sockid]; + sock->Status = 1; + memcpy(sock->DestIP, &ipheader[16], 4); + sock->DestPort = dstport; + sock->SourcePort = srcport; + sock->SeqNum = 0x13370000; + + // open backend socket + if (!sock->Backend) + { + sock->Backend = socket(AF_INET, SOCK_STREAM, 0); + } + + struct sockaddr_in conn_addr; + memset(&conn_addr, 0, sizeof(conn_addr)); + conn_addr.sin_family = AF_INET; + conn_addr.sin_addr.S_un.S_addr = *(u32*)&ipheader[16]; + conn_addr.sin_port = htons(dstport); + if (connect(sock->Backend, (sockaddr*)&conn_addr, sizeof(conn_addr)) == SOCKET_ERROR) + { + printf("connect() shat itself :(\n"); + } + else + { + // acknowledge it + TCP_SYNACK(sock, data, len); + } + } + else + { + int sockid = -1; + for (int i = 0; i < (sizeof(TCPSocketList)/sizeof(TCPSocket)); i++) + { + TCPSocket* sock = &TCPSocketList[i]; + if (sock->Status == 1 && !memcmp(&sock->DestIP, &ipheader[16], 4) && + sock->SourcePort == srcport && sock->DestPort == dstport) { - // TODO: cleverer termination? - // also timeout etc - TCPSocketList[sockid].Status = 0; + sockid = i; + break; } } - // TCP checksum - tmp = 0; - *(u16*)&protoheader[16] = 0; - tmp += ntohs(*(u16*)&ipheader[12]); - tmp += ntohs(*(u16*)&ipheader[14]); - tmp += ntohs(*(u16*)&ipheader[16]); - tmp += ntohs(*(u16*)&ipheader[18]); - tmp += ntohs(0x0600); - tmp += tcplen; - for (u8* i = protoheader; i < &protoheader[tcplen]; i += 2) - tmp += ntohs(*(u16*)i); - while (tmp >> 16) - tmp = (tmp & 0xFFFF) + (tmp >> 16); - tmp ^= 0xFFFF; - if (tmp == 0) tmp = 0xFFFF; - *(u16*)&protoheader[16] = htons(tmp); + if (sockid == -1) + { + printf("LANMAGIC: bad TCP packet\n"); + return; + } + + if (flags & 0x001) // FIN + { + // TODO: cleverer termination? + // also timeout etc + TCPSocketList[sockid].Status = 0; + } } + + // TCP checksum + /*tmp = 0; + *(u16*)&tcpheader[16] = 0; + tmp += ntohs(*(u16*)&ipheader[12]); + tmp += ntohs(*(u16*)&ipheader[14]); + tmp += ntohs(*(u16*)&ipheader[16]); + tmp += ntohs(*(u16*)&ipheader[18]); + tmp += ntohs(0x0600); + tmp += tcplen; + for (u8* i = tcpheader; i < &tcpheader[tcplen]; i += 2) + tmp += ntohs(*(u16*)i); + while (tmp >> 16) + tmp = (tmp & 0xFFFF) + (tmp >> 16); + tmp ^= 0xFFFF; + if (tmp == 0) tmp = 0xFFFF; + *(u16*)&tcpheader[16] = htons(tmp);*/ } void HandleARPFrame(u8* data, int len) @@ -792,16 +860,25 @@ void HandlePacket(u8* data, int len) printf("LANMAGIC: DNS packet\n"); return HandleDNSFrame(data, len); } - } - printf("LANMAGIC: IP packet\n"); - return HandleIPFrame(data, len); + printf("LANMAGIC: UDP packet\n"); + return HandleUDPFrame(data, len); + } + else if (protocol == 0x06) // TCP + { + printf("LANMAGIC: TCP packet\n"); + return HandleTCPFrame(data, len); + } + else + printf("LANMAGIC: unsupported IP protocol %02X\n", protocol); } else if (ethertype == 0x0806) // ARP { printf("LANMAGIC: ARP packet\n"); return HandleARPFrame(data, len); } + else + printf("LANMAGIC: unsupported ethernet type %04X\n", ethertype); } int SendPacket(u8* data, int len) |