aboutsummaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorArisotura <thetotalworm@gmail.com>2019-03-05 15:01:23 +0100
committerArisotura <thetotalworm@gmail.com>2019-03-05 15:01:23 +0100
commit349322b94c4cceb7253ab03ab5421f93ac780511 (patch)
tree5166c9ed04570dd75ced53095ad8a59a6bb49e4f /src
parent623b0ea2e0ae274c64360897e5ae20467fe3c541 (diff)
less shitty code.
also, initiating TCP connection!
Diffstat (limited to 'src')
-rw-r--r--src/libui_sdl/LAN_Socket.cpp345
1 files changed, 211 insertions, 134 deletions
diff --git a/src/libui_sdl/LAN_Socket.cpp b/src/libui_sdl/LAN_Socket.cpp
index 40189c2..05acd2f 100644
--- a/src/libui_sdl/LAN_Socket.cpp
+++ b/src/libui_sdl/LAN_Socket.cpp
@@ -72,8 +72,11 @@ u16 IPv4ID;
typedef struct
{
u8 DestIP[4];
+ u16 SourcePort;
u16 DestPort;
+ u32 SeqNum;
+
// 0: unused
// 1: connected
u8 Status;
@@ -144,6 +147,42 @@ void FinishUDPFrame(u8* data, int len)
*(u16*)&udpheader[6] = htons(tmp);
}
+void FinishTCPFrame(u8* data, int len)
+{
+ u8* ipheader = &data[0xE];
+ u8* tcpheader = &data[0x22];
+
+ // lengths
+ *(u16*)&ipheader[2] = htons(len - 0xE);
+
+ // IP checksum
+ u32 tmp = 0;
+
+ for (int i = 0; i < 20; i += 2)
+ tmp += ntohs(*(u16*)&ipheader[i]);
+ while (tmp >> 16)
+ tmp = (tmp & 0xFFFF) + (tmp >> 16);
+ tmp ^= 0xFFFF;
+ *(u16*)&ipheader[10] = htons(tmp);
+
+ u32 tcplen = ntohs(*(u16*)&ipheader[2]) - 0x14;
+
+ // TCP checksum
+ tmp = 0;
+ tmp += ntohs(*(u16*)&ipheader[12]);
+ tmp += ntohs(*(u16*)&ipheader[14]);
+ tmp += ntohs(*(u16*)&ipheader[16]);
+ tmp += ntohs(*(u16*)&ipheader[18]);
+ tmp += ntohs(0x0600);
+ tmp += tcplen;
+ for (u8* i = tcpheader; i < &tcpheader[tcplen]; i += 2)
+ tmp += ntohs(*(u16*)i);
+ while (tmp >> 16)
+ tmp = (tmp & 0xFFFF) + (tmp >> 16);
+ tmp ^= 0xFFFF;
+ *(u16*)&tcpheader[16] = htons(tmp);
+}
+
/*bool HandleIncomingIPFrame(u8* data, int len)
{
@@ -546,171 +585,200 @@ void HandleDNSFrame(u8* data, int len)
RXNum = 1;
}
-void HandleIPFrame(u8* data, int len)
+void HandleUDPFrame(u8* data, int len)
{
- u8 protocol = data[0x17];
-
- // any kind of IPv4 frame that isn't DHCP
- // we do NAT and forward it to the network
-
- // like:
- // melonRouter -> host
- // destination MAC set to host MAC
- // source MAC set to melonRouter MAC
-
- //memcpy(&data[0], &PCapAdapterData->DHCP_MAC[0], 6);
- //memcpy(&data[6], &PCapAdapterData->MAC[0], 6);
-
- //*(u32*)&data[0x1A] = *(u32*)&PCapAdapterData->IP_v4[0];
-
u8* ipheader = &data[0xE];
- u8* protoheader = &data[0x22];
+ u8* udpheader = &data[0x22];
- // IP checksum
- u32 tmp = 0;
+ // TODO!
+}
- *(u16*)&ipheader[10] = 0;
- for (int i = 0; i < 20; i += 2)
- tmp += ntohs(*(u16*)&ipheader[i]);
- while (tmp >> 16)
- tmp = (tmp & 0xFFFF) + (tmp >> 16);
- tmp ^= 0xFFFF;
- *(u16*)&ipheader[10] = htons(tmp);
+void TCP_SYNACK(TCPSocket* sock, u8* data, int len)
+{
+ u8 resp[128];
+ u8* out = &resp[0];
- if (protocol == 0x11)
- {
- u32 udplen = ntohs(*(u16*)&protoheader[4]);
+ u8* ipheader = &data[0xE];
+ u8* tcpheader = &data[0x22];
- // UDP checksum
- tmp = 0;
- *(u16*)&protoheader[6] = 0;
- tmp += ntohs(*(u16*)&ipheader[12]);
- tmp += ntohs(*(u16*)&ipheader[14]);
- tmp += ntohs(*(u16*)&ipheader[16]);
- tmp += ntohs(*(u16*)&ipheader[18]);
- tmp += ntohs(0x1100);
- tmp += udplen;
- for (u8* i = protoheader; i < &protoheader[udplen]; i += 2)
- tmp += ntohs(*(u16*)i);
- while (tmp >> 16)
- tmp = (tmp & 0xFFFF) + (tmp >> 16);
- tmp ^= 0xFFFF;
- if (tmp == 0) tmp = 0xFFFF;
- *(u16*)&protoheader[6] = htons(tmp);
- }
- else if (protocol == 0x06)
- {
- u32 tcplen = ntohs(*(u16*)&ipheader[2]) - 0x14;
+ u32 seqnum = htonl(*(u32*)&tcpheader[4]);
- u16 srcport = ntohs(*(u16*)&protoheader[0]);
- u16 dstport = ntohs(*(u16*)&protoheader[2]);
- u16 flags = ntohs(*(u16*)&protoheader[12]);
+ // ethernet
+ memcpy(out, &data[6], 6); out += 6;
+ memcpy(out, kServerMAC, 6); out += 6;
+ *(u16*)out = htons(0x0800); out += 2;
- if (flags & 0x002) // SYN
- {
- int sockid = -1;
- for (int i = 0; i < (sizeof(TCPSocketList)/sizeof(TCPSocket)); i++)
- {
- TCPSocket* sock = &TCPSocketList[i];
- if (sock->Status == 1 && !memcmp(&sock->DestIP, &ipheader[16], 4) && sock->DestPort == dstport)
- {
- printf("LANMAGIC: duplicate TCP socket\n");
- sockid = i;
- break;
- }
- }
+ // IP
+ u8* resp_ipheader = out;
+ *out++ = 0x45;
+ *out++ = 0x00;
+ *(u16*)out = 0; out += 2; // total length
+ *(u16*)out = htons(IPv4ID); out += 2; IPv4ID++;
+ *out++ = 0x00;
+ *out++ = 0x00;
+ *out++ = 0x80; // TTL
+ *out++ = 0x06; // protocol (TCP)
+ *(u16*)out = 0; out += 2; // checksum
+ *(u32*)out = *(u32*)&ipheader[16]; out += 4; // source IP
+ *(u32*)out = *(u32*)&ipheader[12]; out += 4; // destination IP
+
+ // TCP
+ u8* resp_tcpheader = out;
+ *(u16*)out = *(u16*)&tcpheader[2]; out += 2; // source port
+ *(u16*)out = *(u16*)&tcpheader[0]; out += 2; // destination port
+ *(u32*)out = htonl(sock->SeqNum); out += 4; sock->SeqNum++; // seq number
+ *(u32*)out = htonl(seqnum+1); out += 4; // ack seq number
+ *(u16*)out = htons(0x8012); out += 2; // flags (SYN+ACK)
+ *(u16*)out = htons(0x7000); out += 2; // window size (uuuh)
+ *(u16*)out = 0; out += 2; // checksum
+ *(u16*)out = 0; out += 2; // urgent pointer
+
+ // TCP options
+ *out++ = 0x02; *out++ = 0x04; // max segment size
+ *(u16*)out = htons(0x05B4); out += 2;
+ *out++ = 0x01;
+ *out++ = 0x01;
+ *out++ = 0x04; *out++ = 0x02; // SACK permitted
+ *out++ = 0x01;
+ *out++ = 0x03; *out++ = 0x03; // window size
+ *out++ = 0x08;
- if (sockid == -1)
- {
- for (int i = 0; i < (sizeof(TCPSocketList)/sizeof(TCPSocket)); i++)
- {
- TCPSocket* sock = &TCPSocketList[i];
- if (sock->Status == 0)
- {
- sockid = i;
- break;
- }
- }
- }
+ u32 framelen = (u32)(out - &resp[0]);
+ if (framelen & 1) { *out++ = 0; framelen++; }
+ FinishTCPFrame(resp, framelen);
- if (sockid == -1)
- {
- printf("LANMAGIC: !! TCP SOCKET LIST FULL\n");
- return;
- }
+ // TODO: if there is already a packet queued, this will overwrite it
+ // that being said, this will only happen during DHCP setup, so probably
+ // not a big deal
- printf("LANMAGIC: opening TCP socket #%d to %d.%d.%d.%d:%d\n",
- sockid,
- ipheader[16], ipheader[17], ipheader[18], ipheader[19],
- dstport);
+ PacketLen = framelen;
+ memcpy(PacketBuffer, resp, PacketLen);
+ RXNum = 1;
+}
- // keep track of it
- // (TODO: also keep track of source port?)
+void HandleTCPFrame(u8* data, int len)
+{
+ u8* ipheader = &data[0xE];
+ u8* tcpheader = &data[0x22];
- TCPSocket* sock = &TCPSocketList[sockid];
- sock->Status = 1;
- memcpy(sock->DestIP, &ipheader[16], 4);
- sock->DestPort = dstport;
+ u32 tcplen = ntohs(*(u16*)&ipheader[2]) - 0x14;
- // open backend socket
- if (!sock->Backend)
- {
- sock->Backend = socket(AF_INET, SOCK_STREAM, 0);
- }
+ u16 srcport = ntohs(*(u16*)&tcpheader[0]);
+ u16 dstport = ntohs(*(u16*)&tcpheader[2]);
+ u16 flags = ntohs(*(u16*)&tcpheader[12]);
- struct sockaddr_in conn_addr;
- memset(&conn_addr, 0, sizeof(conn_addr));
- conn_addr.sin_family = AF_INET;
- conn_addr.sin_addr.S_un.S_addr = *(u32*)&ipheader[16];
- if (connect(sock->Backend, (sockaddr*)&conn_addr, sizeof(conn_addr)) == SOCKET_ERROR)
+ if (flags & 0x002) // SYN
+ {
+ int sockid = -1;
+ for (int i = 0; i < (sizeof(TCPSocketList)/sizeof(TCPSocket)); i++)
+ {
+ TCPSocket* sock = &TCPSocketList[i];
+ if (sock->Status == 1 && !memcmp(&sock->DestIP, &ipheader[16], 4) &&
+ sock->SourcePort == srcport && sock->DestPort == dstport)
{
- printf("connect() shat itself :(\n");
+ printf("LANMAGIC: duplicate TCP socket\n");
+ sockid = i;
+ break;
}
}
- else
+
+ if (sockid == -1)
{
- int sockid = -1;
for (int i = 0; i < (sizeof(TCPSocketList)/sizeof(TCPSocket)); i++)
{
TCPSocket* sock = &TCPSocketList[i];
- if (sock->Status == 1 && !memcmp(&sock->DestIP, &ipheader[16], 4) && sock->DestPort == dstport)
+ if (sock->Status == 0)
{
sockid = i;
break;
}
}
+ }
- if (sockid == -1)
- {
- printf("LANMAGIC: bad TCP packet\n");
- return;
- }
+ if (sockid == -1)
+ {
+ printf("LANMAGIC: !! TCP SOCKET LIST FULL\n");
+ return;
+ }
- if (flags & 0x001) // FIN
+ printf("LANMAGIC: opening TCP socket #%d to %d.%d.%d.%d:%d, srcport %d\n",
+ sockid,
+ ipheader[16], ipheader[17], ipheader[18], ipheader[19],
+ dstport, srcport);
+
+ // keep track of it
+ TCPSocket* sock = &TCPSocketList[sockid];
+ sock->Status = 1;
+ memcpy(sock->DestIP, &ipheader[16], 4);
+ sock->DestPort = dstport;
+ sock->SourcePort = srcport;
+ sock->SeqNum = 0x13370000;
+
+ // open backend socket
+ if (!sock->Backend)
+ {
+ sock->Backend = socket(AF_INET, SOCK_STREAM, 0);
+ }
+
+ struct sockaddr_in conn_addr;
+ memset(&conn_addr, 0, sizeof(conn_addr));
+ conn_addr.sin_family = AF_INET;
+ conn_addr.sin_addr.S_un.S_addr = *(u32*)&ipheader[16];
+ conn_addr.sin_port = htons(dstport);
+ if (connect(sock->Backend, (sockaddr*)&conn_addr, sizeof(conn_addr)) == SOCKET_ERROR)
+ {
+ printf("connect() shat itself :(\n");
+ }
+ else
+ {
+ // acknowledge it
+ TCP_SYNACK(sock, data, len);
+ }
+ }
+ else
+ {
+ int sockid = -1;
+ for (int i = 0; i < (sizeof(TCPSocketList)/sizeof(TCPSocket)); i++)
+ {
+ TCPSocket* sock = &TCPSocketList[i];
+ if (sock->Status == 1 && !memcmp(&sock->DestIP, &ipheader[16], 4) &&
+ sock->SourcePort == srcport && sock->DestPort == dstport)
{
- // TODO: cleverer termination?
- // also timeout etc
- TCPSocketList[sockid].Status = 0;
+ sockid = i;
+ break;
}
}
- // TCP checksum
- tmp = 0;
- *(u16*)&protoheader[16] = 0;
- tmp += ntohs(*(u16*)&ipheader[12]);
- tmp += ntohs(*(u16*)&ipheader[14]);
- tmp += ntohs(*(u16*)&ipheader[16]);
- tmp += ntohs(*(u16*)&ipheader[18]);
- tmp += ntohs(0x0600);
- tmp += tcplen;
- for (u8* i = protoheader; i < &protoheader[tcplen]; i += 2)
- tmp += ntohs(*(u16*)i);
- while (tmp >> 16)
- tmp = (tmp & 0xFFFF) + (tmp >> 16);
- tmp ^= 0xFFFF;
- if (tmp == 0) tmp = 0xFFFF;
- *(u16*)&protoheader[16] = htons(tmp);
+ if (sockid == -1)
+ {
+ printf("LANMAGIC: bad TCP packet\n");
+ return;
+ }
+
+ if (flags & 0x001) // FIN
+ {
+ // TODO: cleverer termination?
+ // also timeout etc
+ TCPSocketList[sockid].Status = 0;
+ }
}
+
+ // TCP checksum
+ /*tmp = 0;
+ *(u16*)&tcpheader[16] = 0;
+ tmp += ntohs(*(u16*)&ipheader[12]);
+ tmp += ntohs(*(u16*)&ipheader[14]);
+ tmp += ntohs(*(u16*)&ipheader[16]);
+ tmp += ntohs(*(u16*)&ipheader[18]);
+ tmp += ntohs(0x0600);
+ tmp += tcplen;
+ for (u8* i = tcpheader; i < &tcpheader[tcplen]; i += 2)
+ tmp += ntohs(*(u16*)i);
+ while (tmp >> 16)
+ tmp = (tmp & 0xFFFF) + (tmp >> 16);
+ tmp ^= 0xFFFF;
+ if (tmp == 0) tmp = 0xFFFF;
+ *(u16*)&tcpheader[16] = htons(tmp);*/
}
void HandleARPFrame(u8* data, int len)
@@ -792,16 +860,25 @@ void HandlePacket(u8* data, int len)
printf("LANMAGIC: DNS packet\n");
return HandleDNSFrame(data, len);
}
- }
- printf("LANMAGIC: IP packet\n");
- return HandleIPFrame(data, len);
+ printf("LANMAGIC: UDP packet\n");
+ return HandleUDPFrame(data, len);
+ }
+ else if (protocol == 0x06) // TCP
+ {
+ printf("LANMAGIC: TCP packet\n");
+ return HandleTCPFrame(data, len);
+ }
+ else
+ printf("LANMAGIC: unsupported IP protocol %02X\n", protocol);
}
else if (ethertype == 0x0806) // ARP
{
printf("LANMAGIC: ARP packet\n");
return HandleARPFrame(data, len);
}
+ else
+ printf("LANMAGIC: unsupported ethernet type %04X\n", ethertype);
}
int SendPacket(u8* data, int len)