1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192 |
- /* $Id$ */
- /*
- * Copyright (c) 2001-2010 Aaron Turner <aturner at synfin dot net>
- * Copyright (c) 2013-2017 Fred Klassen <tcpreplay at appneta dot com> - AppNeta
- * Copyright (c) 2017 Mario D. Santana <tcpreplay at elorangutan dot com> - El Orangutan
- *
- * The Tcpreplay Suite of tools is free software: you can redistribute it
- * and/or modify it under the terms of the GNU General Public License as
- * published by the Free Software Foundation, either version 3 of the
- * License, or with the authors permission any later version.
- *
- * The Tcpreplay Suite is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with the Tcpreplay Suite. If not, see <http://www.gnu.org/licenses/>.
- */
- /*
- * This file contains routines to manipulate port maps, in which
- * one port number is mapped to another.
- */
- #include "rewrite_sequence.h"
- #include "config.h"
- #include "incremental_checksum.h"
- #include "tcpedit.h"
- #include <stdlib.h>
- /**
- * rewrites the TCP sequence and ack numbers
- * returns 1 for changes made or 0 for none
- */
- static int
- rewrite_seqs(tcpedit_t *tcpedit, tcp_hdr_t *tcp_hdr)
- {
- volatile uint32_t newnum;
- newnum = ntohl(tcp_hdr->th_seq) + tcpedit->tcp_sequence_adjust;
- csum_replace4(&tcp_hdr->th_sum, tcp_hdr->th_seq, htonl(newnum));
- tcp_hdr->th_seq = htonl(newnum);
- /* first packet of 3-way handshake must have an ACK of zero - #450 */
- if (!((tcp_hdr->th_flags & TH_SYN) && !(tcp_hdr->th_flags & TH_ACK))) {
- newnum = ntohl(tcp_hdr->th_ack) + tcpedit->tcp_sequence_adjust;
- csum_replace4(&tcp_hdr->th_sum, tcp_hdr->th_ack, htonl(newnum));
- tcp_hdr->th_ack = htonl(newnum);
- }
- return 0;
- }
- int
- rewrite_ipv4_tcp_sequence(tcpedit_t *tcpedit, ipv4_hdr_t **ip_hdr, int l3len)
- {
- assert(tcpedit);
- assert(*ip_hdr && ip_hdr);
- if (*ip_hdr && (*ip_hdr)->ip_p == IPPROTO_TCP) {
- tcp_hdr_t *tcp_hdr = (tcp_hdr_t *)get_layer4_v4(*ip_hdr, (u_char *)ip_hdr + l3len);
- if (!tcp_hdr) {
- tcpedit_setwarn(tcpedit, "caplen to small to set TCP sequence for IP packet: l3 len=%d", l3len);
- return TCPEDIT_WARN;
- }
- return rewrite_seqs(tcpedit, tcp_hdr);
- }
- return 0;
- }
- int
- rewrite_ipv6_tcp_sequence(tcpedit_t *tcpedit, ipv6_hdr_t **ip6_hdr, int l3len)
- {
- assert(tcpedit);
- assert(*ip6_hdr && ip6_hdr);
- if (*ip6_hdr && (*ip6_hdr)->ip_nh == IPPROTO_TCP) {
- tcp_hdr_t *tcp_hdr = (tcp_hdr_t *)get_layer4_v6(*ip6_hdr, (u_char *)ip6_hdr + l3len);
- if (!tcp_hdr) {
- tcpedit_setwarn(tcpedit, "caplen to small to set TCP sequence for IP packet: l3 len=%d", l3len);
- return TCPEDIT_WARN;
- }
- return rewrite_seqs(tcpedit, tcp_hdr);
- }
- return 0;
- }
|