netstack3_filter/conntrack/
tcp.rs

1// Copyright 2024 The Fuchsia Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5//! TCP state tracking.
6
7use core::time::Duration;
8
9use netstack3_base::{Control, SegmentHeader, SeqNum, UnscaledWindowSize, WindowScale, WindowSize};
10use replace_with::replace_with_and;
11
12use super::{
13    ConnectionDirection, ConnectionUpdateAction, ConnectionUpdateError, EstablishmentLifecycle,
14};
15
16/// A struct that completely encapsulates tracking a bidirectional TCP
17/// connection.
18#[derive(Debug, Clone)]
19pub(crate) struct Connection {
20    /// The current state of the TCP connection.
21    state: State,
22}
23
24impl Connection {
25    pub fn new(segment: &SegmentHeader, payload_len: usize, self_connected: bool) -> Option<Self> {
26        Some(Self {
27            // TODO(https://fxbug.dev/355699182): Properly support self-connected
28            // connections.
29            state: if self_connected {
30                Untracked {}.into()
31            } else {
32                State::new(segment, payload_len)?
33            },
34        })
35    }
36
37    pub fn expiry_duration(&self, establishment_lifecycle: EstablishmentLifecycle) -> Duration {
38        self.state.expiry_duration(establishment_lifecycle)
39    }
40
41    pub fn update(
42        &mut self,
43        segment: &SegmentHeader,
44        payload_len: usize,
45        dir: ConnectionDirection,
46    ) -> Result<ConnectionUpdateAction, ConnectionUpdateError> {
47        let valid =
48            replace_with_and(&mut self.state, |state| state.update(segment, payload_len, dir));
49
50        if !valid {
51            return Err(ConnectionUpdateError::InvalidPacket);
52        }
53
54        match self.state {
55            State::Closed(_) => Ok(ConnectionUpdateAction::RemoveEntry),
56            State::Untracked(_)
57            | State::SynSent(_)
58            | State::WaitingOnOpeningAck(_)
59            | State::Closing(_)
60            | State::Established(_) => Ok(ConnectionUpdateAction::NoAction),
61        }
62    }
63}
64
65/// States for a TCP connection as a whole.
66///
67/// These vaguely correspond to states from RFC 9293, but since they apply to
68/// the whole connection, and we're just snooping in the middle, they can't line
69/// up perfectly 1:1. See the doc comments on each state for the expected state
70/// of each of the peers assuming that all packets are received and are valid.
71#[derive(Debug, Clone, PartialEq, Eq)]
72pub(crate) enum State {
73    /// The connection has properties that break standard state tracking. This
74    /// state does a good-enough job tracking the connection.
75    ///
76    /// This is a short-circuit state that can never be left.
77    Untracked(Untracked),
78
79    /// The connection has been closed, either by the FIN handshake or valid
80    /// RST.
81    ///
82    /// This is a short-circuit state that can never be left.
83    Closed(Closed),
84
85    /// The initial SYN for this connection has been sent. State contained
86    /// within is everything that can be gleaned from the initial SYN packet
87    /// sent in the original direction.
88    ///
89    /// Expected peer states:
90    /// - Original: `SYN_SENT`
91    /// - Reply: `SYN_RECEIVED` (upon receipt)
92    SynSent(SynSent),
93
94    /// The reply peer has sent a valid SYN/ACK segment. All that remains is for
95    /// the original peer to ACK.
96    ///
97    /// Expected peer states.
98    /// - Original: ESTABLISHED
99    /// - Reply: SYN_RECEIVED
100    WaitingOnOpeningAck(WaitingOnOpeningAck),
101
102    /// The handshake has completed and data may begin flowing at any time. This
103    /// is where most connections will spend the vast majority of their time.
104    ///
105    /// Expected peer states:
106    /// - Original: ESTABLISHED
107    /// - Reply: ESTABLISHED
108    Established(Established),
109
110    /// The process of closing down a connection starting from when the first
111    /// FIN is seen and until FINs from both peers have been ACKed.
112    ///
113    /// Expected peer states are any of:
114    /// - FIN_WAIT_1
115    /// - FIN_WAIT_2
116    /// - CLOSING
117    /// - CLOSE_WAIT
118    /// - LAST_ACK
119    Closing(Closing),
120}
121
122impl State {
123    fn new(segment: &SegmentHeader, payload_len: usize) -> Option<Self> {
124        // We explicitly don't want to track any connections that we haven't
125        // seen from the beginning because:
126        //
127        // a) This shouldn't happen, since we run from boot
128        // b) Window scale is only negotiated during the initial handshake.
129        match segment.control {
130            Some(Control::SYN) => {}
131            None | Some(Control::FIN) | Some(Control::RST) => return None,
132        }
133
134        Some(
135            SynSent {
136                iss: segment.seq,
137                logical_len: segment.len(payload_len),
138                advertised_window_scale: segment.options.window_scale(),
139                // This unwrap cannot fail because WindowSize::MAX is 2^30-1,
140                // which is larger than the largest possible unscaled window
141                // size (2^16).
142                window_size: WindowSize::from_u32(u16::from(segment.wnd).into()).unwrap(),
143            }
144            .into(),
145        )
146    }
147
148    fn expiry_duration(&self, establishment_lifecycle: EstablishmentLifecycle) -> Duration {
149        const MAXIMUM_SEGMENT_LIFETIME: Duration = Duration::from_secs(120);
150
151        // These are all picked to optimize purging connections from the table
152        // as soon as is reasonable. Unlike Linux, we are choosing to be more
153        // conservative with our timeouts and setting the most aggressive one to
154        // the standard MSL of 120 seconds.
155        match self {
156            State::Untracked(_) => {
157                match establishment_lifecycle {
158                    // This is small because it's just meant to be the time for
159                    // the initial handshake.
160                    EstablishmentLifecycle::SeenOriginal | EstablishmentLifecycle::SeenReply => {
161                        MAXIMUM_SEGMENT_LIFETIME
162                    }
163                    EstablishmentLifecycle::Established => Duration::from_secs(6 * 60 * 60),
164                }
165            }
166            State::Closed(_) => Duration::ZERO,
167            State::SynSent(_) => MAXIMUM_SEGMENT_LIFETIME,
168            State::WaitingOnOpeningAck(_) => MAXIMUM_SEGMENT_LIFETIME,
169            State::Established(Established { original, reply }) => {
170                // If there is no data outstanding, make the timeout large, and
171                // otherwise small so we can purge the connection quickly if one
172                // of the endpoints disappears.
173                if original.unacked_data || reply.unacked_data {
174                    MAXIMUM_SEGMENT_LIFETIME
175                } else {
176                    Duration::from_secs(5 * 60 * 60 * 24)
177                }
178            }
179            State::Closing(_) => MAXIMUM_SEGMENT_LIFETIME,
180        }
181    }
182
183    /// Returns a new state that unconditionally replaces the previous one. The
184    /// boolean represents whether the segment was valid or not.
185    ///
186    /// In the case where the segment was invalid, the returned state will be
187    /// equivalent to the one that `update` was called on.
188    fn update(
189        self,
190        segment: &SegmentHeader,
191        payload_len: usize,
192        dir: ConnectionDirection,
193    ) -> (State, bool) {
194        match self {
195            State::Untracked(s) => s.update(segment, payload_len, dir),
196            State::Closed(s) => s.update(segment, payload_len, dir),
197            State::SynSent(s) => s.update(segment, payload_len, dir),
198            State::WaitingOnOpeningAck(s) => s.update(segment, payload_len, dir),
199            State::Established(s) => s.update(segment, payload_len, dir),
200            State::Closing(s) => s.update(segment, payload_len, dir),
201        }
202    }
203}
204
205macro_rules! state_from_state_struct {
206    ($struct:ident) => {
207        impl From<$struct> for State {
208            fn from(value: $struct) -> Self {
209                Self::$struct(value)
210            }
211        }
212    };
213}
214
215/// Contains all of the information required for a single peer in an established
216/// TCP connection.
217///
218/// Packets are valid with the following equations (taken from ["Real Stateful
219/// TCP Packet Filtering in IP Filter"][paper] and updated to allow for segments
220/// intersecting the valid ranges, rather than needing to be entirely contained
221/// within them).
222///
223/// Definitions:
224/// - s: The sequence number of the first octet of the segment
225/// - n: The (virtual) length of the segment in octets
226/// - a: The ACK number of the segment
227///
228/// I:   Data upper bound: s   <= receiver.max_wnd_seq
229/// II:  Data lower bound: s+n >= sender.max_next_seq - receiver.max_wnd
230/// III: ACK  upper bound: a   <= receiver.max_next_seq
231/// IV:  ACK  lower bound: a   >= receiver.max_next_seq - MAXACKWINDOW
232///
233/// MAXACKWINDOW is defined in the paper to be 66000, which is larger than
234/// the largest possible window (without scaling). We scale by
235/// sender.window_scale to ensure this property remains true.
236///
237/// [paper]: https://www.usenix.org/legacy/events/sec01/invitedtalks/rooij.pdf
238#[derive(Debug, Clone, PartialEq, Eq)]
239struct Peer {
240    /// How much to scale window updates from this peer.
241    window_scale: WindowScale,
242
243    /// The maximum window size ever sent by this peer.
244    ///
245    /// On every packet sent by this peer, the larger of itself and the
246    /// (scaled) window from the packet is taken.
247    max_wnd: WindowSize,
248
249    /// The maximum sequence number that is in the window for this peer.
250    ///
251    /// On every packet sent by this peer, this is updated to be the larger of
252    /// itself or the current advertised window (scaled) plus the ACK number in
253    /// the packet.
254    max_wnd_seq: SeqNum,
255
256    /// The largest "next octet" ever sent by this peer. This is equivalent to
257    /// one more than the largest sequence number ever sent by this peer.
258    ///
259    /// On every packet sent by this peer, this is updated to be the larger of
260    /// itself or the sequence number plus the length of the packet.
261    max_next_seq: SeqNum,
262
263    /// Has this peer sent data that has yet to be ACKed?
264    ///
265    /// Set when max_next_seq is increased.
266    ///
267    /// Unset when a reply segment is seen that has an ACK number equal to
268    /// `max_next_seq` (larger would mean an invalid packet).
269    unacked_data: bool,
270
271    /// The state of the first FIN segment sent by this peer.
272    fin_state: FinState,
273}
274
275impl Peer {
276    /// Checks that an ACK segment is within the windows defined in the comment on [`Peer`].
277    fn ack_segment_valid(
278        sender: &Self,
279        receiver: &Self,
280        seq: SeqNum,
281        len: u32,
282        ack: SeqNum,
283    ) -> bool {
284        // All checks below are for the negation of the equation referenced in
285        // the associated comment.
286
287        // I: Segment sequence numbers upper bound.
288        if seq.after(receiver.max_wnd_seq) {
289            return false;
290        }
291
292        // II: Segment sequence numbers lower bound.
293        if (seq + len).before(sender.max_next_seq - receiver.max_wnd) {
294            return false;
295        }
296
297        // III: ACK upper bound.
298        if ack.after(receiver.max_next_seq) {
299            return false;
300        }
301
302        // IV: ACK lower bound.
303        if ack.before(receiver.max_next_seq - receiver.max_ack_window()) {
304            return false;
305        }
306
307        true
308    }
309
310    /// Returns a new `Peer` updated using the provided information from a
311    /// segment which it has sent.
312    fn update_sender(
313        self,
314        seq: SeqNum,
315        len: u32,
316        ack: SeqNum,
317        wnd: UnscaledWindowSize,
318        fin_seen: bool,
319    ) -> Self {
320        let Self { window_scale, max_wnd, max_wnd_seq, max_next_seq, unacked_data, fin_state } =
321            self;
322
323        // The minimum window size is assumed to be 1. From the paper:
324        //   On BSD systems, a window probing is always done with a packet
325        //   containing one octet of data.
326        let window_size = {
327            let window_size = wnd << window_scale;
328            // The unwrap below won't fail because 1 is less than
329            // WindowSize::MAX.
330            core::cmp::max(window_size, WindowSize::from_u32(1).unwrap())
331        };
332
333        // The largest sequence number allowed by the current window.
334        let wnd_seq = ack + window_size;
335        // The octet one past the last one in the segment.
336        let end = seq + len;
337        // The largest `end` value sent by this peer.
338        let sender_max_next_seq = if max_next_seq.before(end) { end } else { max_next_seq };
339
340        Peer {
341            window_scale,
342            max_wnd: core::cmp::max(max_wnd, window_size),
343            max_wnd_seq: if max_wnd_seq.before(wnd_seq) { wnd_seq } else { max_wnd_seq },
344            max_next_seq: sender_max_next_seq,
345            unacked_data: if sender_max_next_seq.after(max_next_seq) { true } else { unacked_data },
346            fin_state: if fin_seen { fin_state.update_fin_sent(end - 1) } else { fin_state },
347        }
348    }
349
350    /// Returns a new `Peer` updated using the provided information from a
351    /// segment which it received.
352    fn update_receiver(self, ack: SeqNum) -> Self {
353        let Self { window_scale, max_wnd, max_wnd_seq, max_next_seq, unacked_data, fin_state } =
354            self;
355
356        Peer {
357            window_scale,
358            max_wnd,
359            max_wnd_seq,
360            max_next_seq,
361            // It's not possible for ack to be > self.max_next_seq due to
362            // equation III, which is checked on every segment.
363            unacked_data: if ack == max_next_seq { false } else { unacked_data },
364            fin_state: fin_state.update_ack_received(ack),
365        }
366    }
367
368    fn max_ack_window(&self) -> u32 {
369        // The paper gives 66000 as the MAXACKWINDOW constant because it's a
370        // little larger than the largest possible TCP window. With winow
371        // scaling in effect, this constant is no longer valid, so we scale it
372        // up by that scaling factor.
373        //
374        // This shift is guaranteed to never overflow because the maximum value
375        // for self.window_scale is 14 and 66000 << 14 < u32::MAX.
376        66000u32 << (self.window_scale.get() as u32)
377    }
378}
379
380/// Tracks the state of the FIN process for a peer.
381#[derive(Debug, Clone, PartialEq, Eq)]
382enum FinState {
383    /// This peer has not sent a FIN yet.
384    NotSent,
385
386    /// This peer has sent a FIN with the provided sequence number.
387    ///
388    /// Updated to ensure it is the sequence number of the first FIN sent.
389    Sent(SeqNum),
390
391    /// The FIN sent by this peer has been ACKed.
392    Acked,
393}
394
395impl FinState {
396    /// To be called when the peer has sent a FIN segment with the sequence
397    /// number of the FIN.
398    ///
399    /// Returns an updated `FinState`.
400    fn update_fin_sent(self, seq: SeqNum) -> Self {
401        match self {
402            FinState::NotSent => FinState::Sent(seq),
403            FinState::Sent(s) => {
404                // NOTE: We want to track the first FIN in the sequence
405                // space, not the first one we saw.
406                if s.before(seq) {
407                    FinState::Sent(s)
408                } else {
409                    FinState::Sent(seq)
410                }
411            }
412            FinState::Acked => FinState::Acked,
413        }
414    }
415
416    /// To be called when the peer has received an ACK.
417    ///
418    /// Returns an updated `FinState`.
419    fn update_ack_received(self, ack: SeqNum) -> Self {
420        match self {
421            FinState::NotSent => FinState::NotSent,
422            FinState::Sent(seq) => {
423                if ack.after(seq) {
424                    FinState::Acked
425                } else {
426                    FinState::Sent(seq)
427                }
428            }
429            FinState::Acked => FinState::Acked,
430        }
431    }
432
433    /// Has this FIN been acked?
434    fn acked(&self) -> bool {
435        match self {
436            FinState::NotSent => false,
437            FinState::Sent(_) => false,
438            FinState::Acked => true,
439        }
440    }
441}
442
443/// The return value from [`do_established_update`] indicating further action.
444#[derive(Debug, PartialEq, Eq)]
445enum EstablishedUpdateResult {
446    /// The update was successful.
447    ///
448    /// `new_original` and `new_reply` are the updated versions of the original
449    /// and reply peers that were provided to the function.
450    Success { new_original: Peer, new_reply: Peer, fin_seen: bool },
451
452    /// A valid RST was seen.
453    Reset,
454
455    /// The segment was invalid.
456    ///
457    /// Includes the non-updated peers so the state can be reset.
458    Invalid { original: Peer, reply: Peer },
459}
460
461fn swap_peers(original: Peer, reply: Peer, dir: ConnectionDirection) -> (Peer, Peer) {
462    match dir {
463        ConnectionDirection::Original => (original, reply),
464        ConnectionDirection::Reply => (reply, original),
465    }
466}
467
468/// Holds and names the peers passed into [`do_established_update`] to avoid
469/// ambiguous argument order.
470struct UpdatePeers {
471    original: Peer,
472    reply: Peer,
473}
474
475/// The core functionality for handling segments once the handshake is complete.
476///
477/// Validates that segments fall within the bounds described in the comment on
478/// [`Peer`].
479fn do_established_update(
480    UpdatePeers { original, reply }: UpdatePeers,
481    segment: &SegmentHeader,
482    payload_len: usize,
483    dir: ConnectionDirection,
484) -> EstablishedUpdateResult {
485    let logical_len = segment.len(payload_len);
486    let SegmentHeader { seq, ack, wnd, control, options: _ } = segment;
487
488    let (sender, receiver) = swap_peers(original, reply, dir);
489
490    // From RFC 9293:
491    //   If the ACK control bit is set, this field contains the value of the
492    //   next sequence number the sender of the segment is expecting to receive.
493    //   Once a connection is established, this is always sent.
494    let ack = match ack {
495        Some(ack) => ack,
496        None => {
497            let (original, reply) = swap_peers(sender, receiver, dir);
498            return EstablishedUpdateResult::Invalid { original, reply };
499        }
500    };
501
502    if !Peer::ack_segment_valid(&sender, &receiver, *seq, logical_len, *ack) {
503        let (original, reply) = swap_peers(sender, receiver, dir);
504        return EstablishedUpdateResult::Invalid { original, reply };
505    }
506
507    let fin_seen = match control {
508        Some(Control::SYN) => {
509            let (original, reply) = swap_peers(sender, receiver, dir);
510            return EstablishedUpdateResult::Invalid { original, reply };
511        }
512        Some(Control::RST) => return EstablishedUpdateResult::Reset,
513        Some(Control::FIN) => true,
514        None => false,
515    };
516
517    let new_sender = sender.update_sender(*seq, logical_len, *ack, *wnd, fin_seen);
518    let new_receiver = receiver.update_receiver(*ack);
519
520    let (new_original, new_reply) = swap_peers(new_sender, new_receiver, dir);
521    EstablishedUpdateResult::Success { new_original, new_reply, fin_seen }
522}
523
524/// State for the Untracked state.
525///
526/// This state never transitions to another state.
527#[derive(Debug, Clone, PartialEq, Eq)]
528pub(crate) struct Untracked {}
529state_from_state_struct!(Untracked);
530
531impl Untracked {
532    fn update(
533        self,
534        _segment: &SegmentHeader,
535        _payload_len: usize,
536        _dir: ConnectionDirection,
537    ) -> (State, bool) {
538        (Self {}.into(), true)
539    }
540}
541
542/// State for the Closed state.
543///
544/// This state never transitions to another state.
545#[derive(Debug, Clone, PartialEq, Eq)]
546pub(crate) struct Closed {}
547state_from_state_struct!(Closed);
548
549impl Closed {
550    fn update(
551        self,
552        _segment: &SegmentHeader,
553        _payload_len: usize,
554        _dir: ConnectionDirection,
555    ) -> (State, bool) {
556        (self.into(), true)
557    }
558}
559
560/// State for the SynSent state.
561///
562/// State transitions for in-range segments by direction:
563/// - Original
564///   - SYN: Update data, stay in SynSent
565///   - SYN/ACK: Invalid
566///   - RST: Invalid
567///   - FIN: Invalid
568///   - ACK: Invalid
569/// - Reply
570///   - SYN: Untracked, until we support simultaneous open.
571///   - SYN/ACK: WaitingOnOpeningAck
572///   - RST: Delete connection
573///   - FIN: Invalid
574///   - ACK: Invalid
575#[derive(Debug, Clone, PartialEq, Eq)]
576pub(crate) struct SynSent {
577    /// The ISS (initial send sequence number) for the original TCP stack.
578    iss: SeqNum,
579
580    /// The logical length of the segment sent by the original TCP stack.
581    logical_len: u32,
582
583    /// The window scale (if set in the initial SYN) for the original TCP stack.
584    advertised_window_scale: Option<WindowScale>,
585
586    /// The window size of the original TCP stack. Will be converted into a
587    /// sequence number once we know what the reply stack's ISN is.
588    ///
589    /// RFC 1323 2.2:
590    ///   The Window field in a SYN (i.e., a <SYN> or <SYN,ACK>) segment itself
591    ///   is never scaled.
592    window_size: WindowSize,
593}
594state_from_state_struct!(SynSent);
595
596impl SynSent {
597    fn update(
598        self,
599        segment: &SegmentHeader,
600        payload_len: usize,
601        dir: ConnectionDirection,
602    ) -> (State, bool) {
603        let Self { iss, logical_len, advertised_window_scale, window_size } = self;
604
605        match dir {
606            // This is another packet in the same direction as the first one.
607            // Update existing parameters for initial SYN, but only for packets
608            // that look to be valid retransmits of the initial SYN. This
609            // behavior is copied over from gVisor.
610            ConnectionDirection::Original => {
611                if let Some(_) = segment.ack {
612                    return (self.into(), false);
613                }
614
615                match segment.control {
616                    None | Some(Control::FIN) | Some(Control::RST) => {
617                        return (self.into(), false);
618                    }
619                    Some(Control::SYN) => {}
620                };
621
622                if segment.seq != iss || segment.options.window_scale() != advertised_window_scale {
623                    return (self.into(), false);
624                }
625
626                // If it's a valid retransmit of the original SYN, update
627                // any state that changed and let it through.
628                let seg_window_size = WindowSize::from_u32(u16::from(segment.wnd).into()).unwrap();
629
630                (
631                    SynSent {
632                        iss: iss,
633                        logical_len: u32::max(segment.len(payload_len), logical_len),
634                        advertised_window_scale: advertised_window_scale,
635                        window_size: core::cmp::max(seg_window_size, window_size),
636                    }
637                    .into(),
638                    true,
639                )
640            }
641
642            ConnectionDirection::Reply => {
643                // RFC 9293 3.10.7.3:
644                //   If SND.UNA < SEG.ACK =< SND.NXT, then the ACK is
645                //   acceptable.
646                match segment.ack {
647                    None => {}
648                    Some(ack) => {
649                        if !(ack.after(iss) && ack.before(iss + logical_len + 1)) {
650                            return (self.into(), false);
651                        }
652                    }
653                };
654
655                match segment.control {
656                    None | Some(Control::FIN) => (self.into(), false),
657                    // RFC 9293 3.10.7.3:
658                    //   If the RST bit is set,
659                    //   If the ACK was acceptable, then signal to the user
660                    //   "error: connection reset", drop the segment, enter
661                    //   CLOSED state, delete TCB, and return. Otherwise (no
662                    //   ACK), drop the segment and return.
663                    //
664                    // For our purposes, we delete the connection because we
665                    // know the receiver will tear down the connection.
666                    Some(Control::RST) => match segment.ack {
667                        None => (self.into(), false),
668                        Some(_) => (Closed {}.into(), true),
669                    },
670
671                    Some(Control::SYN) => {
672                        let Some(ack) = segment.ack else {
673                            // TODO(https://fxbug.dev/355200767): Support
674                            // simultaneous open.
675                            log::warn!(
676                                "Unsupported TCP simultaneous open. Giving up on detailed tracking"
677                            );
678
679                            return (Untracked {}.into(), true);
680                        };
681
682                        let reply_window_scale = segment.options.window_scale();
683                        let reply_window_size =
684                            WindowSize::from_u32(u16::from(segment.wnd).into()).unwrap();
685
686                        // RFC 1323 2.2:
687                        //   This option is an offer, not a promise; both sides
688                        //   must send Window Scale options in their SYN
689                        //   segments to enable window scaling in either
690                        //   direction.
691                        let (original_window_scale, reply_window_scale) =
692                            match (advertised_window_scale, reply_window_scale) {
693                                (Some(original), Some(reply)) => (original, reply),
694                                _ => (WindowScale::ZERO, WindowScale::ZERO),
695                            };
696
697                        let original_max_next_seq = iss + logical_len;
698
699                        (
700                            WaitingOnOpeningAck {
701                                original: Peer {
702                                    window_scale: original_window_scale,
703                                    max_wnd: window_size,
704                                    // We're still waiting on an ACK from
705                                    // the original stack, so this is
706                                    // slightly different from the normal
707                                    // calculation. It's still valid because
708                                    // we can assume that the implicit ACK
709                                    // number is the reply ISS (no data
710                                    // ACKed).
711                                    max_wnd_seq: segment.seq + window_size,
712                                    max_next_seq: original_max_next_seq,
713                                    unacked_data: ack.before(original_max_next_seq),
714                                    fin_state: FinState::NotSent,
715                                },
716                                reply: Peer {
717                                    window_scale: reply_window_scale,
718                                    max_wnd: reply_window_size,
719                                    max_wnd_seq: ack + reply_window_size,
720                                    max_next_seq: segment.seq + segment.len(payload_len),
721                                    // The reply peer will always have
722                                    // unacked data here because the SYN we
723                                    // just saw sent needs to be acked.
724                                    unacked_data: true,
725                                    fin_state: FinState::NotSent,
726                                },
727                            }
728                            .into(),
729                            true,
730                        )
731                    }
732                }
733            }
734        }
735    }
736}
737
738/// State for the WaitingOnOpeningAck state.
739///
740/// Note this expects the ACK to come from the original direction.
741///
742/// State transitions for in-range segments by direction:
743/// - Original
744///   - SYN: Invalid
745///   - RST: Delete connection
746///   - FIN: Closing
747///   - ACK: Established
748/// - Reply
749///   - SYN: Invalid
750///   - RST: Delete connection
751///   - FIN: Closing
752///   - ACK: WaitingOnOpeningAck
753#[derive(Debug, Clone, PartialEq, Eq)]
754pub(crate) struct WaitingOnOpeningAck {
755    /// State for the "original" TCP stack (the one that we first saw a packet
756    /// for).
757    original: Peer,
758
759    /// State for the "reply" TCP stack.
760    reply: Peer,
761}
762state_from_state_struct!(WaitingOnOpeningAck);
763
764impl WaitingOnOpeningAck {
765    fn update(
766        self,
767        segment: &SegmentHeader,
768        payload_len: usize,
769        dir: ConnectionDirection,
770    ) -> (State, bool) {
771        let Self { original, reply } = self;
772
773        let (original, reply, fin_seen) = match do_established_update(
774            UpdatePeers { original, reply },
775            segment,
776            payload_len,
777            dir.clone(),
778        ) {
779            EstablishedUpdateResult::Success { new_original, new_reply, fin_seen } => {
780                (new_original, new_reply, fin_seen)
781            }
782            EstablishedUpdateResult::Invalid { original, reply } => {
783                return (Self { original, reply }.into(), false)
784            }
785            EstablishedUpdateResult::Reset => return (Closed {}.into(), true),
786        };
787
788        let new_state = if fin_seen {
789            Closing { original, reply }.into()
790        } else {
791            match dir {
792                // We move to Established because we know that if the ACK was
793                // valid (checked by do_established_update), the ACK must
794                // include the SYN, which is the first possible octet.
795                ConnectionDirection::Original => Established { original, reply }.into(),
796                ConnectionDirection::Reply => WaitingOnOpeningAck { original, reply }.into(),
797            }
798        };
799
800        (new_state, true)
801    }
802}
803
804/// State for the Established state.
805///
806/// State transitions for in-range segments, regardless of direction:
807/// - SYN: Invalid
808/// - RST: Delete connection
809/// - FIN: Closing
810/// - ACK: Established
811#[derive(Debug, Clone, PartialEq, Eq)]
812pub(crate) struct Established {
813    original: Peer,
814    reply: Peer,
815}
816state_from_state_struct!(Established);
817
818impl Established {
819    fn update(
820        self,
821        segment: &SegmentHeader,
822        payload_len: usize,
823        dir: ConnectionDirection,
824    ) -> (State, bool) {
825        let Self { original, reply } = self;
826
827        let (original, reply, fin_seen) = match do_established_update(
828            UpdatePeers { original, reply },
829            segment,
830            payload_len,
831            dir.clone(),
832        ) {
833            EstablishedUpdateResult::Success { new_original, new_reply, fin_seen } => {
834                (new_original, new_reply, fin_seen)
835            }
836            EstablishedUpdateResult::Invalid { original, reply } => {
837                return (Self { original, reply }.into(), false)
838            }
839            EstablishedUpdateResult::Reset => return (Closed {}.into(), true),
840        };
841
842        let new_state = if fin_seen {
843            Closing { original, reply }.into()
844        } else {
845            Established { original, reply }.into()
846        };
847
848        (new_state, true)
849    }
850}
851
852/// State for the Closing state.
853///
854/// State transitions for in-range segments regardless of direction:
855/// - SYN: Invalid
856/// - RST: Delete connection
857/// - FIN: Closing
858/// - ACK: Closing
859///
860/// The Closing state deletes the connection once FINs from both peers have been
861/// ACKed.
862#[derive(Debug, Clone, PartialEq, Eq)]
863pub(crate) struct Closing {
864    original: Peer,
865    reply: Peer,
866}
867state_from_state_struct!(Closing);
868
869impl Closing {
870    fn update(
871        self,
872        segment: &SegmentHeader,
873        payload_len: usize,
874        dir: ConnectionDirection,
875    ) -> (State, bool) {
876        let Self { original, reply } = self;
877
878        // NOTE: Segments after a FIN are somewhat invalid, but we do not
879        // attempt to handle them specially. Per RFC 9293 3.10.7.4:
880        //
881        //   Seventh, process the segment text. [After FIN,] this should not
882        //   occur since a FIN has been received from the remote side. Ignore
883        //   the segment text.
884        //
885        // Because these segments aren't completely invalid, handling them
886        // properly (and consistently with the endpoints) is difficult. It is
887        // not needed for correctness, since the connection will be torn down as
888        // soon as there's an ACK for both FINs anyway. This extra invalid data
889        // does not change that.
890        //
891        // Neither Linux nor gVisor do anything special for these segments.
892
893        let (original, reply) = match do_established_update(
894            UpdatePeers { original, reply },
895            segment,
896            payload_len,
897            dir.clone(),
898        ) {
899            EstablishedUpdateResult::Success { new_original, new_reply, fin_seen: _ } => {
900                (new_original, new_reply)
901            }
902            EstablishedUpdateResult::Invalid { original, reply } => {
903                return (Self { original, reply }.into(), false)
904            }
905            EstablishedUpdateResult::Reset => return (Closed {}.into(), true),
906        };
907
908        if original.fin_state.acked() && reply.fin_state.acked() {
909            // Removing the entry immediately is not expected to break any
910            // use-cases. The endpoints are ultimately responsible for
911            // respecting the TIME_WAIT state.
912            //
913            // The NAT entry will be removed as a consequence, but this is only
914            // a problem if a server wanted to reopen the connection with the
915            // client (but only during TIME_WAIT).
916            //
917            // TODO(https://fxbug.dev/355200767): Add TimeWait and reopening
918            // connections once simultaneous open is supported.
919            (Closed {}.into(), true)
920        } else {
921            (Closing { original, reply }.into(), true)
922        }
923    }
924}
925
926#[cfg(test)]
927mod tests {
928    use super::{
929        do_established_update, Closed, Closing, Established, EstablishedUpdateResult, FinState,
930        Peer, State, SynSent, Untracked, UpdatePeers, WaitingOnOpeningAck,
931    };
932
933    use assert_matches::assert_matches;
934    use netstack3_base::{
935        Control, HandshakeOptions, Options, SegmentHeader, SeqNum, UnscaledWindowSize, WindowScale,
936        WindowSize,
937    };
938    use test_case::test_case;
939
940    use crate::conntrack::ConnectionDirection;
941
942    const ORIGINAL_ISS: SeqNum = SeqNum::new(0);
943    const REPLY_ISS: SeqNum = SeqNum::new(8192);
944    const ORIGINAL_WND: u16 = 16;
945    const REPLY_WND: u16 = 17;
946    const ORIGINAL_WS: u8 = 3;
947    const REPLY_WS: u8 = 4;
948    const ORIGINAL_PAYLOAD_LEN: usize = 12;
949    const REPLY_PAYLOAD_LEN: usize = 13;
950
951    impl Peer {
952        pub fn arbitrary() -> Peer {
953            Peer {
954                max_next_seq: SeqNum::new(0),
955                window_scale: WindowScale::new(0).unwrap(),
956                max_wnd_seq: SeqNum::new(0),
957                unacked_data: false,
958                max_wnd: WindowSize::new(0).unwrap(),
959                fin_state: FinState::NotSent,
960            }
961        }
962    }
963
964    #[test_case(None)]
965    #[test_case(Some(Control::FIN))]
966    #[test_case(Some(Control::RST))]
967    fn syn_sent_original_non_syn_segment(control: Option<Control>) {
968        let state = SynSent {
969            iss: ORIGINAL_ISS,
970            logical_len: 3,
971            advertised_window_scale: None,
972            window_size: WindowSize::from_u32(ORIGINAL_WND as u32).unwrap(),
973        };
974
975        let segment = SegmentHeader {
976            seq: ORIGINAL_ISS,
977            ack: None,
978            wnd: UnscaledWindowSize::from(ORIGINAL_WND),
979            control,
980            options: Options::default(),
981        };
982
983        let expected_state = state.clone().into();
984        assert_eq!(
985            state.update(&segment, ORIGINAL_PAYLOAD_LEN, ConnectionDirection::Original),
986            (expected_state, false)
987        );
988    }
989
990    #[test_case(SegmentHeader {
991        // Different from existing.
992        seq: ORIGINAL_ISS + 1,
993        ack: None,
994        wnd: UnscaledWindowSize::from(ORIGINAL_WND),
995        control: Some(Control::SYN),
996        options: HandshakeOptions {
997            // Same as existing.
998            window_scale: WindowScale::new(ORIGINAL_WS),
999            ..Default::default()
1000        }.into(),
1001    }; "different ISS")]
1002    #[test_case(SegmentHeader {
1003        // Same as existing.
1004        seq: ORIGINAL_ISS,
1005        ack: None,
1006        wnd: UnscaledWindowSize::from(ORIGINAL_WND),
1007        control: Some(Control::SYN),
1008        options: HandshakeOptions {
1009            // Different from existing.
1010            window_scale: WindowScale::new(ORIGINAL_WS + 1),
1011            ..Default::default()
1012        }.into(),
1013    }; "different window scale")]
1014    #[test_case(SegmentHeader {
1015        seq: ORIGINAL_ISS,
1016        // ACK here is invalid.
1017        ack: Some(SeqNum::new(10)),
1018        wnd: UnscaledWindowSize::from(ORIGINAL_WND),
1019        control: Some(Control::SYN),
1020        options: HandshakeOptions {
1021            window_scale: WindowScale::new(2),
1022            ..Default::default()
1023        }.into(),
1024    }; "ack not allowed")]
1025    fn syn_sent_original_syn_not_retransmit(segment: SegmentHeader) {
1026        let state = SynSent {
1027            iss: ORIGINAL_ISS,
1028            logical_len: ORIGINAL_PAYLOAD_LEN as u32 + 1,
1029            advertised_window_scale: WindowScale::new(ORIGINAL_WS),
1030            window_size: WindowSize::from_u32(ORIGINAL_WND as u32).unwrap(),
1031        };
1032
1033        let expected_state = state.clone().into();
1034        assert_eq!(
1035            state.update(&segment, ORIGINAL_PAYLOAD_LEN, ConnectionDirection::Original),
1036            (expected_state, false)
1037        );
1038    }
1039
1040    #[test]
1041    fn syn_sent_original_syn_retransmit() {
1042        let state = SynSent {
1043            iss: ORIGINAL_ISS,
1044            logical_len: ORIGINAL_PAYLOAD_LEN as u32 + 1,
1045            advertised_window_scale: WindowScale::new(ORIGINAL_WS),
1046            window_size: WindowSize::from_u32(ORIGINAL_WND as u32).unwrap(),
1047        };
1048
1049        let segment = SegmentHeader {
1050            seq: ORIGINAL_ISS,
1051            ack: None,
1052            wnd: UnscaledWindowSize::from(ORIGINAL_WND + 10),
1053            control: Some(Control::SYN),
1054            options: HandshakeOptions {
1055                window_scale: WindowScale::new(ORIGINAL_WS),
1056                ..Default::default()
1057            }
1058            .into(),
1059        };
1060
1061        let result = assert_matches!(
1062            state.update(
1063                &segment,
1064                ORIGINAL_PAYLOAD_LEN + 10,
1065                ConnectionDirection::Original
1066            ),
1067            (State::SynSent(s), true) => s
1068        );
1069
1070        assert_eq!(
1071            result,
1072            SynSent {
1073                iss: ORIGINAL_ISS,
1074                logical_len: ORIGINAL_PAYLOAD_LEN as u32 + 10 + 1,
1075                advertised_window_scale: WindowScale::new(ORIGINAL_WS),
1076                window_size: WindowSize::from_u32(ORIGINAL_WND as u32 + 10).unwrap(),
1077            }
1078        )
1079    }
1080
1081    #[test_case(None)]
1082    #[test_case(Some(Control::FIN))]
1083    fn syn_sent_reply_non_syn_segment(control: Option<Control>) {
1084        let state = SynSent {
1085            iss: ORIGINAL_ISS,
1086            logical_len: ORIGINAL_PAYLOAD_LEN as u32 + 1,
1087            advertised_window_scale: None,
1088            window_size: WindowSize::from_u32(ORIGINAL_WND as u32).unwrap(),
1089        };
1090
1091        let segment = SegmentHeader {
1092            seq: ORIGINAL_ISS,
1093            ack: None,
1094            wnd: UnscaledWindowSize::from(ORIGINAL_WND),
1095            control,
1096            options: Options::default(),
1097        };
1098
1099        let expected_state = state.clone().into();
1100        assert_eq!(
1101            state.update(&segment, REPLY_PAYLOAD_LEN, ConnectionDirection::Reply),
1102            (expected_state, false)
1103        );
1104    }
1105
1106    #[test_case(ORIGINAL_ISS, None; "small invalid")]
1107    #[test_case(
1108        ORIGINAL_ISS + 1, Some(Closed {}.into());
1109        "smallest valid"
1110    )]
1111    #[test_case(
1112        ORIGINAL_ISS + ORIGINAL_PAYLOAD_LEN as u32 + 1,
1113        Some(Closed {}.into());
1114        "largest valid"
1115    )]
1116    #[test_case(
1117        ORIGINAL_ISS + ORIGINAL_PAYLOAD_LEN as u32 + 2,
1118        None;
1119        "large invalid"
1120    )]
1121    fn syn_sent_reply_rst_segment(ack: SeqNum, new_state: Option<State>) {
1122        let state = SynSent {
1123            iss: ORIGINAL_ISS,
1124            logical_len: ORIGINAL_PAYLOAD_LEN as u32 + 1,
1125            advertised_window_scale: None,
1126            window_size: WindowSize::from_u32(ORIGINAL_WND as u32).unwrap(),
1127        };
1128
1129        let segment = SegmentHeader {
1130            seq: ORIGINAL_ISS,
1131            ack: Some(ack),
1132            wnd: UnscaledWindowSize::from(ORIGINAL_WND),
1133            control: Some(Control::RST),
1134            options: Options::default(),
1135        };
1136
1137        let (expected_state, valid) = match new_state {
1138            Some(state) => (state, true),
1139            None => (state.clone().into(), false),
1140        };
1141
1142        assert_eq!(
1143            state.update(&segment, /*payload_len*/ 0, ConnectionDirection::Reply),
1144            (expected_state, valid)
1145        );
1146    }
1147
1148    #[test]
1149    fn syn_sent_reply_simultaneous_open() {
1150        let state = SynSent {
1151            iss: ORIGINAL_ISS,
1152            logical_len: ORIGINAL_PAYLOAD_LEN as u32 + 1,
1153            advertised_window_scale: WindowScale::new(ORIGINAL_WS),
1154            window_size: WindowSize::from_u32(ORIGINAL_WND as u32).unwrap(),
1155        };
1156
1157        let segment = SegmentHeader {
1158            seq: ORIGINAL_ISS,
1159            ack: None,
1160            wnd: UnscaledWindowSize::from(ORIGINAL_WND + 10),
1161            control: Some(Control::SYN),
1162            options: Options::default(),
1163        };
1164
1165        assert_eq!(
1166            state.update(&segment, /*payload_len*/ 0, ConnectionDirection::Reply),
1167            (Untracked {}.into(), true)
1168        );
1169    }
1170
1171    #[test_case(ORIGINAL_ISS; "too low")]
1172    #[test_case(ORIGINAL_ISS + ORIGINAL_PAYLOAD_LEN + 2; "too high")]
1173    fn syn_sent_reply_syn_ack_not_in_range(ack: SeqNum) {
1174        let state = SynSent {
1175            iss: ORIGINAL_ISS,
1176            logical_len: ORIGINAL_PAYLOAD_LEN as u32 + 1,
1177            advertised_window_scale: None,
1178            window_size: WindowSize::from_u32(ORIGINAL_WND as u32).unwrap(),
1179        };
1180
1181        let segment = SegmentHeader {
1182            seq: REPLY_ISS,
1183            ack: Some(ack),
1184            wnd: UnscaledWindowSize::from(REPLY_WND),
1185            control: Some(Control::SYN),
1186            options: Options::default(),
1187        };
1188
1189        let expected_state = state.clone().into();
1190        assert_eq!(
1191            state.update(&segment, REPLY_PAYLOAD_LEN, ConnectionDirection::Reply),
1192            (expected_state, false)
1193        );
1194    }
1195
1196    #[test_case(None)]
1197    #[test_case(Some(WindowScale::new(REPLY_WS).unwrap()))]
1198    fn syn_sent_reply_syn_ack(reply_window_scale: Option<WindowScale>) {
1199        let state = SynSent {
1200            iss: ORIGINAL_ISS,
1201            logical_len: ORIGINAL_PAYLOAD_LEN as u32 + 1,
1202            advertised_window_scale: WindowScale::new(ORIGINAL_WS),
1203            window_size: WindowSize::from_u32(ORIGINAL_WND as u32).unwrap(),
1204        };
1205
1206        let segment = SegmentHeader {
1207            seq: REPLY_ISS,
1208            ack: Some(ORIGINAL_ISS + 1),
1209            wnd: UnscaledWindowSize::from(REPLY_WND),
1210            control: Some(Control::SYN),
1211            options: HandshakeOptions { window_scale: reply_window_scale, ..Default::default() }
1212                .into(),
1213        };
1214
1215        let new_state = assert_matches!(
1216            state.update(
1217                &segment,
1218                REPLY_PAYLOAD_LEN,
1219                ConnectionDirection::Reply
1220            ),
1221            (State::WaitingOnOpeningAck(s), true) => s
1222        );
1223
1224        let (original_window_scale, reply_window_scale) = match reply_window_scale {
1225            Some(s) => (WindowScale::new(ORIGINAL_WS).unwrap(), s),
1226            None => (WindowScale::ZERO, WindowScale::ZERO),
1227        };
1228
1229        assert_eq!(
1230            new_state,
1231            WaitingOnOpeningAck {
1232                original: Peer {
1233                    window_scale: original_window_scale,
1234                    max_wnd: WindowSize::from_u32(ORIGINAL_WND as u32).unwrap(),
1235                    max_wnd_seq: REPLY_ISS + ORIGINAL_WND as u32,
1236                    max_next_seq: ORIGINAL_ISS + ORIGINAL_PAYLOAD_LEN + 1,
1237                    unacked_data: true,
1238                    fin_state: FinState::NotSent,
1239                },
1240                reply: Peer {
1241                    window_scale: reply_window_scale,
1242                    max_wnd: WindowSize::from_u32(REPLY_WND as u32).unwrap(),
1243                    max_wnd_seq: ORIGINAL_ISS + 1 + REPLY_WND as u32,
1244                    max_next_seq: REPLY_ISS + REPLY_PAYLOAD_LEN + 1,
1245                    unacked_data: true,
1246                    fin_state: FinState::NotSent,
1247                }
1248            }
1249        );
1250    }
1251
1252    #[test_case(FinState::NotSent, SeqNum::new(9) => FinState::Sent(SeqNum::new(9)))]
1253    #[test_case(FinState::Sent(SeqNum::new(9)), SeqNum::new(8) => FinState::Sent(SeqNum::new(8)))]
1254    #[test_case(FinState::Sent(SeqNum::new(9)), SeqNum::new(9) => FinState::Sent(SeqNum::new(9)))]
1255    #[test_case(FinState::Sent(SeqNum::new(9)), SeqNum::new(10) => FinState::Sent(SeqNum::new(9)))]
1256    #[test_case(FinState::Acked, SeqNum::new(9) => FinState::Acked)]
1257    fn fin_state_update_fin_sent(fin_state: FinState, seq: SeqNum) -> FinState {
1258        fin_state.update_fin_sent(seq)
1259    }
1260
1261    #[test_case(FinState::NotSent, SeqNum::new(10) => FinState::NotSent)]
1262    #[test_case(FinState::Sent(SeqNum::new(9)), SeqNum::new(9) => FinState::Sent(SeqNum::new(9)))]
1263    #[test_case(FinState::Sent(SeqNum::new(9)), SeqNum::new(10) => FinState::Acked)]
1264    #[test_case(FinState::Acked, SeqNum::new(10) => FinState::Acked)]
1265    fn fin_state_update_ack_received(fin_state: FinState, ack: SeqNum) -> FinState {
1266        fin_state.update_ack_received(ack)
1267    }
1268
1269    const RECV_MAX_NEXT_SEQ: SeqNum = SeqNum::new(66_001);
1270    const RECV_MAX_WND_SEQ: SeqNum = SeqNum::new(1424);
1271
1272    #[test_case(SeqNum::new(424), 200, SeqNum::new(1) => true; "success low seq/ack")]
1273    #[test_case(RECV_MAX_WND_SEQ, 0, RECV_MAX_NEXT_SEQ => true; "success high seq/ack")]
1274    #[test_case(RECV_MAX_WND_SEQ + 1, 0, SeqNum::new(1) => false; "bad equation I")]
1275    #[test_case(SeqNum::new(424), 199, SeqNum::new(1) => false; "bad equation II")]
1276    #[test_case(SeqNum::new(424), 200, RECV_MAX_NEXT_SEQ + 1 => false; "bad equation III")]
1277    #[test_case(SeqNum::new(424), 200, SeqNum::new(0) => false; "bad equation IV")]
1278    fn ack_segment_valid_test(seq: SeqNum, len: u32, ack: SeqNum) -> bool {
1279        let sender = Peer { max_next_seq: SeqNum::new(1024), ..Peer::arbitrary() };
1280
1281        // MAXACKWINDOW is going to be 66000 due to window shift of 0.
1282        let receiver = Peer {
1283            window_scale: WindowScale::new(0).unwrap(),
1284            max_wnd: WindowSize::new(400).unwrap(),
1285            max_next_seq: RECV_MAX_NEXT_SEQ,
1286            max_wnd_seq: RECV_MAX_WND_SEQ,
1287            ..Peer::arbitrary()
1288        };
1289
1290        Peer::ack_segment_valid(&sender, &receiver, seq, len, ack)
1291    }
1292
1293    struct PeerUpdateSenderArgs {
1294        seq: SeqNum,
1295        len: u32,
1296        ack: SeqNum,
1297        wnd: UnscaledWindowSize,
1298        fin_seen: bool,
1299    }
1300
1301    #[test_case(
1302        Peer {
1303            window_scale: WindowScale::new(3).unwrap(),
1304            max_wnd: WindowSize::new(16).unwrap(),
1305            max_wnd_seq: SeqNum::new(127),
1306            max_next_seq: SeqNum::new(1024),
1307            unacked_data: false,
1308            fin_state: FinState::NotSent,
1309        },
1310        PeerUpdateSenderArgs {
1311            seq: SeqNum::new(1025),
1312            len: 10,
1313            ack: SeqNum::new(100),
1314            wnd: UnscaledWindowSize::from_u32(4),
1315            fin_seen: false
1316        } => Peer {
1317            window_scale: WindowScale::new(3).unwrap(),
1318            max_wnd: WindowSize::new(32).unwrap(),
1319            max_wnd_seq: SeqNum::new(132),
1320            max_next_seq: SeqNum::new(1035),
1321            unacked_data: true,
1322            fin_state: FinState::NotSent,
1323        }; "packet larger"
1324    )]
1325    #[test_case(
1326        Peer {
1327            window_scale: WindowScale::new(3).unwrap(),
1328            max_wnd: WindowSize::new(16).unwrap(),
1329            max_wnd_seq: SeqNum::new(127),
1330            max_next_seq: SeqNum::new(1024),
1331            unacked_data: false,
1332            fin_state: FinState::NotSent,
1333        },
1334        PeerUpdateSenderArgs {
1335            seq: SeqNum::new(1000),
1336            len: 10,
1337            ack: SeqNum::new(0),
1338            wnd: UnscaledWindowSize::from_u32(0),
1339            fin_seen: false
1340        } => Peer {
1341            window_scale: WindowScale::new(3).unwrap(),
1342            max_wnd: WindowSize::new(16).unwrap(),
1343            max_wnd_seq: SeqNum::new(127),
1344            max_next_seq: SeqNum::new(1024),
1345            unacked_data: false,
1346            fin_state: FinState::NotSent,
1347        }; "packet smaller"
1348    )]
1349    #[test_case(
1350        Peer {
1351            window_scale: WindowScale::new(3).unwrap(),
1352            max_wnd: WindowSize::new(16).unwrap(),
1353            max_wnd_seq: SeqNum::new(127),
1354            max_next_seq: SeqNum::new(1024),
1355            unacked_data: false,
1356            fin_state: FinState::NotSent,
1357        },
1358        PeerUpdateSenderArgs {
1359            seq: SeqNum::new(1000),
1360            len: 10,
1361            ack: SeqNum::new(0),
1362            wnd: UnscaledWindowSize::from_u32(0),
1363            fin_seen: true
1364        } => Peer {
1365            window_scale: WindowScale::new(3).unwrap(),
1366            max_wnd: WindowSize::new(16).unwrap(),
1367            max_wnd_seq: SeqNum::new(127),
1368            max_next_seq: SeqNum::new(1024),
1369            unacked_data: false,
1370            fin_state: FinState::Sent(SeqNum::new(1000 + 9)),
1371        }; "fin sent"
1372    )]
1373    fn peer_update_sender_test(peer: Peer, args: PeerUpdateSenderArgs) -> Peer {
1374        peer.update_sender(args.seq, args.len, args.ack, args.wnd, args.fin_seen)
1375    }
1376
1377    #[test_case(
1378        Peer { max_next_seq: SeqNum::new(1024), ..Peer::arbitrary() },
1379        SeqNum::new(1024) => Peer { max_next_seq: SeqNum::new(1024), ..Peer::arbitrary() };
1380        "unset unacked data"
1381    )]
1382    #[test_case(
1383        Peer { max_next_seq: SeqNum::new(1024), ..Peer::arbitrary() },
1384        SeqNum::new(1023) => Peer { max_next_seq: SeqNum::new(1024), ..Peer::arbitrary() };
1385        "don't unset unacked data"
1386    )]
1387    #[test_case(
1388        Peer { fin_state: FinState::Sent(SeqNum::new(9)), ..Peer::arbitrary() },
1389        SeqNum::new(10) => Peer { fin_state: FinState::Acked, ..Peer::arbitrary() };
1390        "update fin state"
1391    )]
1392    fn peer_update_receiver_test(peer: Peer, ack: SeqNum) -> Peer {
1393        peer.update_receiver(ack)
1394    }
1395
1396    // This is mostly to ensure that we don't accidentally overflow a u32, since
1397    // it's such a basic calculation.
1398    #[test]
1399    fn peer_max_ack_window() {
1400        let max_peer = Peer { window_scale: WindowScale::MAX, ..Peer::arbitrary() };
1401        let min_peer = Peer { window_scale: WindowScale::new(0).unwrap(), ..Peer::arbitrary() };
1402
1403        assert_eq!(max_peer.max_ack_window(), 1_081_344_000u32);
1404        assert_eq!(min_peer.max_ack_window(), 66_000u32);
1405    }
1406
1407    enum EstablishedUpdateTestResult {
1408        Success { new_original: Peer, new_reply: Peer, fin_seen: bool },
1409        Invalid,
1410        Reset,
1411    }
1412
1413    struct EstablishedUpdateTestArgs {
1414        segment: SegmentHeader,
1415        payload_len: usize,
1416        dir: ConnectionDirection,
1417        expected: EstablishedUpdateTestResult,
1418    }
1419
1420    #[test_case(
1421        EstablishedUpdateTestArgs {
1422            segment: SegmentHeader {
1423                seq: SeqNum::new(1400),
1424                ack: Some(SeqNum::new(66_001)),
1425                wnd: UnscaledWindowSize::from(10),
1426                control: None,
1427                options: Options::default(),
1428            },
1429            payload_len: 24,
1430            dir: ConnectionDirection::Original,
1431            expected: EstablishedUpdateTestResult::Success {
1432                new_original: Peer {
1433                    window_scale: WindowScale::new(2).unwrap(),
1434                    // Changed.
1435                    max_wnd: WindowSize::new(40).unwrap(),
1436                    max_wnd_seq: SeqNum::new(70_000),
1437                    // Changed.
1438                    max_next_seq: SeqNum::new(1424),
1439                    // Changed.
1440                    unacked_data: true,
1441                    fin_state: FinState::NotSent,
1442                },
1443                new_reply: Peer {
1444                    window_scale: WindowScale::new(0).unwrap(),
1445                    max_wnd: WindowSize::new(400).unwrap(),
1446                    max_wnd_seq: SeqNum::new(1424),
1447                    max_next_seq: SeqNum::new(66_001),
1448                    // Changed.
1449                    unacked_data: false,
1450                    fin_state: FinState::NotSent,
1451                },
1452                fin_seen: false,
1453            }
1454        }; "success original"
1455    )]
1456    #[test_case(
1457        EstablishedUpdateTestArgs {
1458            segment: SegmentHeader {
1459                seq: SeqNum::new(66_100),
1460                ack: Some(SeqNum::new(1024)),
1461                wnd: UnscaledWindowSize::from(10),
1462                control: Some(Control::FIN),
1463                options: Options::default(),
1464            },
1465            payload_len: 0,
1466            dir: ConnectionDirection::Reply,
1467            expected: EstablishedUpdateTestResult::Success {
1468              // No changes in new_original.
1469              new_original: Peer {
1470                  window_scale: WindowScale::new(2).unwrap(),
1471                  max_wnd: WindowSize::new(0).unwrap(),
1472                  max_wnd_seq: SeqNum::new(70_000),
1473                  max_next_seq: SeqNum::new(1024),
1474                  unacked_data: false,
1475                  fin_state: FinState::NotSent,
1476              },
1477              new_reply: Peer {
1478                  window_scale: WindowScale::new(0).unwrap(),
1479                  max_wnd: WindowSize::new(400).unwrap(),
1480                  max_wnd_seq: SeqNum::new(1424),
1481                  max_next_seq: SeqNum::new(66_101),
1482                  unacked_data: true,
1483                  fin_state: FinState::Sent(SeqNum::new(66_100)),
1484              },
1485              fin_seen: true,
1486            }
1487        }; "success reply"
1488    )]
1489    #[test_case(
1490        EstablishedUpdateTestArgs {
1491            segment: SegmentHeader {
1492                seq: SeqNum::new(1400),
1493                ack: Some(SeqNum::new(66_001)),
1494                wnd: UnscaledWindowSize::from(10),
1495                control: Some(Control::RST),
1496                options: Options::default(),
1497            },
1498            payload_len: 24,
1499            dir: ConnectionDirection::Original,
1500            expected: EstablishedUpdateTestResult::Reset,
1501        }; "RST"
1502    )]
1503    #[test_case(
1504        EstablishedUpdateTestArgs {
1505            segment: SegmentHeader {
1506                seq: SeqNum::new(1400),
1507                ack: None,
1508                wnd: UnscaledWindowSize::from(10),
1509                control: None,
1510                options: Options::default(),
1511            },
1512            // These don't matter for the test
1513            payload_len: 24,
1514            dir: ConnectionDirection::Original,
1515            expected: EstablishedUpdateTestResult::Invalid,
1516        }; "missing ack"
1517    )]
1518    #[test_case(
1519        EstablishedUpdateTestArgs {
1520            segment: SegmentHeader {
1521                // Too low. Doesn't meet equation II.
1522                seq: SeqNum::new(0),
1523                ack: None,
1524                wnd: UnscaledWindowSize::from(10),
1525                control: None,
1526                options: Options::default(),
1527            },
1528            // These don't matter for the test
1529            payload_len: 24,
1530            dir: ConnectionDirection::Original,
1531            expected: EstablishedUpdateTestResult::Invalid,
1532        }; "invalid equation bounds"
1533    )]
1534    #[test_case(
1535        EstablishedUpdateTestArgs {
1536            segment: SegmentHeader {
1537                seq: SeqNum::new(1400),
1538                ack: Some(SeqNum::new(66_001)),
1539                wnd: UnscaledWindowSize::from(10),
1540                control: Some(Control::SYN),
1541                options: Options::default(),
1542            },
1543            payload_len: 24,
1544            dir: ConnectionDirection::Original,
1545            expected: EstablishedUpdateTestResult::Invalid,
1546        }; "SYN not allowed"
1547    )]
1548    fn do_established_update_test(args: EstablishedUpdateTestArgs) {
1549        let original = Peer {
1550            window_scale: WindowScale::new(2).unwrap(),
1551            max_wnd: WindowSize::new(0).unwrap(),
1552            max_wnd_seq: SeqNum::new(70_000),
1553            max_next_seq: SeqNum::new(1024),
1554            unacked_data: false,
1555            fin_state: FinState::NotSent,
1556        };
1557
1558        let reply = Peer {
1559            window_scale: WindowScale::new(0).unwrap(),
1560            max_wnd: WindowSize::new(400).unwrap(),
1561            max_wnd_seq: SeqNum::new(1424),
1562            max_next_seq: SeqNum::new(66_001),
1563            unacked_data: true,
1564            fin_state: FinState::NotSent,
1565        };
1566
1567        let expected_result = match args.expected {
1568            EstablishedUpdateTestResult::Success { new_original, new_reply, fin_seen } => {
1569                EstablishedUpdateResult::Success { new_original, new_reply, fin_seen }
1570            }
1571            EstablishedUpdateTestResult::Invalid => EstablishedUpdateResult::Invalid {
1572                original: original.clone(),
1573                reply: reply.clone(),
1574            },
1575            EstablishedUpdateTestResult::Reset => EstablishedUpdateResult::Reset,
1576        };
1577
1578        assert_eq!(
1579            do_established_update(
1580                UpdatePeers { original: original, reply: reply },
1581                &args.segment,
1582                args.payload_len,
1583                args.dir,
1584            ),
1585            expected_result
1586        );
1587    }
1588
1589    struct StateUpdateTestArgs {
1590        segment: SegmentHeader,
1591        payload_len: usize,
1592        dir: ConnectionDirection,
1593        expected: Option<State>,
1594    }
1595
1596    #[test_case(
1597        StateUpdateTestArgs {
1598            segment: SegmentHeader {
1599                seq: SeqNum::new(1400),
1600                ack: Some(SeqNum::new(66_001)),
1601                wnd: UnscaledWindowSize::from(10),
1602                control: None,
1603                options: Options::default(),
1604            },
1605            payload_len: 24,
1606            dir: ConnectionDirection::Original,
1607            expected: Some(Established {
1608                original: Peer {
1609                    window_scale: WindowScale::new(2).unwrap(),
1610                    max_wnd: WindowSize::new(40).unwrap(),
1611                    max_wnd_seq: SeqNum::new(70_000),
1612                    max_next_seq: SeqNum::new(1424),
1613                    unacked_data: true,
1614                    fin_state: FinState::NotSent,
1615                },
1616                reply: Peer {
1617                    window_scale: WindowScale::new(0).unwrap(),
1618                    max_wnd: WindowSize::new(400).unwrap(),
1619                    max_wnd_seq: SeqNum::new(1424),
1620                    max_next_seq: SeqNum::new(66_001),
1621                    unacked_data: false,
1622                    fin_state: FinState::NotSent,
1623                },
1624            }.into()),
1625        }; "established"
1626    )]
1627    #[test_case(
1628        StateUpdateTestArgs {
1629            segment: SegmentHeader {
1630                seq: SeqNum::new(66_100),
1631                ack: Some(SeqNum::new(1024)),
1632                wnd: UnscaledWindowSize::from(10),
1633                control: Some(Control::FIN),
1634                options: Options::default(),
1635            },
1636            payload_len: 0,
1637            dir: ConnectionDirection::Reply,
1638            expected: Some(Closing {
1639                original: Peer {
1640                    window_scale: WindowScale::new(2).unwrap(),
1641                    max_wnd: WindowSize::new(0).unwrap(),
1642                    max_wnd_seq: SeqNum::new(70_000),
1643                    max_next_seq: SeqNum::new(1024),
1644                    unacked_data: false,
1645                    fin_state: FinState::NotSent,
1646                },
1647                reply: Peer {
1648                    window_scale: WindowScale::new(0).unwrap(),
1649                    max_wnd: WindowSize::new(400).unwrap(),
1650                    max_wnd_seq: SeqNum::new(1424),
1651                    max_next_seq: SeqNum::new(66_101),
1652                    unacked_data: true,
1653                    fin_state: FinState::Sent(SeqNum::new(66_100)),
1654                },
1655            }.into()),
1656        }; "closing"
1657    )]
1658    #[test_case(
1659        StateUpdateTestArgs {
1660            segment: SegmentHeader {
1661                seq: SeqNum::new(66_100),
1662                ack: Some(SeqNum::new(1024)),
1663                wnd: UnscaledWindowSize::from(10),
1664                control: None,
1665                options: Options::default(),
1666            },
1667            payload_len: 0,
1668            dir: ConnectionDirection::Reply,
1669            expected: Some(WaitingOnOpeningAck {
1670                original: Peer {
1671                    window_scale: WindowScale::new(2).unwrap(),
1672                    max_wnd: WindowSize::new(0).unwrap(),
1673                    max_wnd_seq: SeqNum::new(70_000),
1674                    max_next_seq: SeqNum::new(1024),
1675                    unacked_data: false,
1676                    fin_state: FinState::NotSent,
1677                },
1678                reply: Peer {
1679                    window_scale: WindowScale::new(0).unwrap(),
1680                    max_wnd: WindowSize::new(400).unwrap(),
1681                    max_wnd_seq: SeqNum::new(1424),
1682                    max_next_seq: SeqNum::new(66_100),
1683                    unacked_data: true,
1684                    fin_state: FinState::NotSent,
1685                },
1686            }.into())
1687        }; "update in place"
1688    )]
1689    #[test_case(
1690        StateUpdateTestArgs {
1691            segment: SegmentHeader {
1692                // Fails equation I.
1693                seq: SeqNum::new(100_000),
1694                ack: Some(SeqNum::new(1024)),
1695                wnd: UnscaledWindowSize::from(10),
1696                control: None,
1697                options: Options::default(),
1698            },
1699            payload_len: 0,
1700            dir: ConnectionDirection::Reply,
1701            expected: None
1702        }; "invalid"
1703    )]
1704    #[test_case(
1705        StateUpdateTestArgs {
1706            segment: SegmentHeader {
1707                seq: SeqNum::new(1400),
1708                ack: Some(SeqNum::new(66_001)),
1709                wnd: UnscaledWindowSize::from(10),
1710                control: Some(Control::RST),
1711                options: Options::default(),
1712            },
1713            payload_len: 24,
1714            dir: ConnectionDirection::Original,
1715            expected: Some(Closed {}.into()),
1716        }; "rst"
1717    )]
1718    fn waiting_on_opening_ack_test(args: StateUpdateTestArgs) {
1719        let state = WaitingOnOpeningAck {
1720            original: Peer {
1721                window_scale: WindowScale::new(2).unwrap(),
1722                max_wnd: WindowSize::new(0).unwrap(),
1723                max_wnd_seq: SeqNum::new(70_000),
1724                max_next_seq: SeqNum::new(1024),
1725                unacked_data: false,
1726                fin_state: FinState::NotSent,
1727            },
1728            reply: Peer {
1729                window_scale: WindowScale::new(0).unwrap(),
1730                max_wnd: WindowSize::new(400).unwrap(),
1731                max_wnd_seq: SeqNum::new(1424),
1732                max_next_seq: SeqNum::new(66_001),
1733                unacked_data: true,
1734                fin_state: FinState::NotSent,
1735            },
1736        };
1737
1738        let (new_state, valid) = match args.expected {
1739            Some(new_state) => (new_state, true),
1740            None => (state.clone().into(), false),
1741        };
1742
1743        assert_eq!(state.update(&args.segment, args.payload_len, args.dir), (new_state, valid));
1744    }
1745
1746    #[test_case(
1747        StateUpdateTestArgs {
1748            segment: SegmentHeader {
1749                seq: SeqNum::new(1400),
1750                ack: Some(SeqNum::new(66_001)),
1751                wnd: UnscaledWindowSize::from(10),
1752                control: None,
1753                options: Options::default(),
1754            },
1755            payload_len: 24,
1756            dir: ConnectionDirection::Original,
1757            expected: Some(Established {
1758                original: Peer {
1759                    window_scale: WindowScale::new(2).unwrap(),
1760                    max_wnd: WindowSize::new(40).unwrap(),
1761                    max_wnd_seq: SeqNum::new(70_000),
1762                    max_next_seq: SeqNum::new(1424),
1763                    // This is becoming true because `segment.seq > original.max_next_seq`.
1764                    unacked_data: true,
1765                    fin_state: FinState::NotSent,
1766                },
1767                reply: Peer {
1768                    window_scale: WindowScale::new(0).unwrap(),
1769                    max_wnd: WindowSize::new(400).unwrap(),
1770                    max_wnd_seq: SeqNum::new(1424),
1771                    max_next_seq: SeqNum::new(66_001),
1772                    // This is becoming true because `segment.ack == reply.max_next_seq`.
1773                    unacked_data: false,
1774                    fin_state: FinState::NotSent,
1775                },
1776            }.into()),
1777        }; "update original"
1778    )]
1779    #[test_case(
1780        StateUpdateTestArgs {
1781            segment: SegmentHeader {
1782                seq: SeqNum::new(66_100),
1783                ack: Some(SeqNum::new(1024)),
1784                wnd: UnscaledWindowSize::from(10),
1785                control: Some(Control::FIN),
1786                options: Options::default(),
1787            },
1788            payload_len: 0,
1789            dir: ConnectionDirection::Reply,
1790            expected: Some(Closing {
1791                original: Peer {
1792                    window_scale: WindowScale::new(2).unwrap(),
1793                    max_wnd: WindowSize::new(0).unwrap(),
1794                    max_wnd_seq: SeqNum::new(70_000),
1795                    max_next_seq: SeqNum::new(1024),
1796                    unacked_data: false,
1797                    fin_state: FinState::NotSent,
1798                },
1799                reply: Peer {
1800                    window_scale: WindowScale::new(0).unwrap(),
1801                    max_wnd: WindowSize::new(400).unwrap(),
1802                    max_wnd_seq: SeqNum::new(1424),
1803                    max_next_seq: SeqNum::new(66_101),
1804                    unacked_data: true,
1805                    fin_state: FinState::Sent(SeqNum::new(66_100)),
1806                },
1807            }.into()),
1808        }; "closing"
1809    )]
1810    #[test_case(
1811        StateUpdateTestArgs {
1812            segment: SegmentHeader {
1813                seq: SeqNum::new(1400),
1814                // Fails equation III.
1815                ack: Some(SeqNum::new(100_000)),
1816                wnd: UnscaledWindowSize::from(10),
1817                control: None,
1818                options: Options::default(),
1819            },
1820            payload_len: 24,
1821            dir: ConnectionDirection::Original,
1822            expected: None,
1823        }; "invalid"
1824    )]
1825    #[test_case(
1826        StateUpdateTestArgs {
1827            segment: SegmentHeader {
1828                seq: SeqNum::new(1400),
1829                ack: Some(SeqNum::new(66_001)),
1830                wnd: UnscaledWindowSize::from(10),
1831                control: Some(Control::RST),
1832                options: Options::default(),
1833            },
1834            payload_len: 24,
1835            dir: ConnectionDirection::Original,
1836            expected: Some(Closed {}.into()),
1837        }; "rst"
1838    )]
1839    fn established_test(args: StateUpdateTestArgs) {
1840        let state = Established {
1841            original: Peer {
1842                window_scale: WindowScale::new(2).unwrap(),
1843                max_wnd: WindowSize::new(0).unwrap(),
1844                max_wnd_seq: SeqNum::new(70_000),
1845                max_next_seq: SeqNum::new(1024),
1846                unacked_data: false,
1847                fin_state: FinState::NotSent,
1848            },
1849            reply: Peer {
1850                window_scale: WindowScale::new(0).unwrap(),
1851                max_wnd: WindowSize::new(400).unwrap(),
1852                max_wnd_seq: SeqNum::new(1424),
1853                max_next_seq: SeqNum::new(66_001),
1854                unacked_data: true,
1855                fin_state: FinState::NotSent,
1856            },
1857        };
1858
1859        let (new_state, valid) = match args.expected {
1860            Some(new_state) => (new_state, true),
1861            None => (state.clone().into(), false),
1862        };
1863
1864        assert_eq!(state.update(&args.segment, args.payload_len, args.dir), (new_state, valid));
1865    }
1866
1867    #[test_case(
1868        StateUpdateTestArgs {
1869            segment: SegmentHeader {
1870                seq: SeqNum::new(1400),
1871                ack: Some(SeqNum::new(66_001)),
1872                wnd: UnscaledWindowSize::from(10),
1873                control: None,
1874                options: Options::default(),
1875            },
1876            payload_len: 24,
1877            dir: ConnectionDirection::Original,
1878            expected: Some(Closing {
1879                original: Peer {
1880                    window_scale: WindowScale::new(2).unwrap(),
1881                    max_wnd: WindowSize::new(40).unwrap(),
1882                    max_wnd_seq: SeqNum::new(70_000),
1883                    max_next_seq: SeqNum::new(1424),
1884                    unacked_data: true,
1885                    fin_state: FinState::NotSent,
1886                },
1887                reply: Peer {
1888                    window_scale: WindowScale::new(0).unwrap(),
1889                    max_wnd: WindowSize::new(400).unwrap(),
1890                    max_wnd_seq: SeqNum::new(1424),
1891                    max_next_seq: SeqNum::new(66_001),
1892                    unacked_data: false,
1893                    fin_state: FinState::Acked,
1894                },
1895            }.into()),
1896        }; "update original"
1897    )]
1898    #[test_case(
1899        StateUpdateTestArgs {
1900            segment: SegmentHeader {
1901                seq: SeqNum::new(1400),
1902                // Fails equation III.
1903                ack: Some(SeqNum::new(100_000)),
1904                wnd: UnscaledWindowSize::from(10),
1905                control: None,
1906                options: Options::default(),
1907            },
1908            payload_len: 24,
1909            dir: ConnectionDirection::Original,
1910            expected: None,
1911        }; "invalid"
1912    )]
1913    #[test_case(
1914        StateUpdateTestArgs {
1915            segment: SegmentHeader {
1916                seq: SeqNum::new(1400),
1917                ack: Some(SeqNum::new(66_001)),
1918                wnd: UnscaledWindowSize::from(10),
1919                control: Some(Control::RST),
1920                options: Options::default(),
1921            },
1922            payload_len: 0,
1923            dir: ConnectionDirection::Original,
1924            expected: Some (Closed {}.into())
1925        }; "rst"
1926    )]
1927    fn closing_test(args: StateUpdateTestArgs) {
1928        let state = Closing {
1929            original: Peer {
1930                window_scale: WindowScale::new(2).unwrap(),
1931                max_wnd: WindowSize::new(0).unwrap(),
1932                max_wnd_seq: SeqNum::new(70_000),
1933                max_next_seq: SeqNum::new(1024),
1934                unacked_data: true,
1935                fin_state: FinState::NotSent,
1936            },
1937            reply: Peer {
1938                window_scale: WindowScale::new(0).unwrap(),
1939                max_wnd: WindowSize::new(400).unwrap(),
1940                max_wnd_seq: SeqNum::new(1424),
1941                max_next_seq: SeqNum::new(66_001),
1942                unacked_data: false,
1943                fin_state: FinState::Acked,
1944            },
1945        };
1946
1947        let (new_state, valid) = match args.expected {
1948            Some(new_state) => (new_state, true),
1949            None => (state.clone().into(), false),
1950        };
1951
1952        assert_eq!(state.update(&args.segment, args.payload_len, args.dir), (new_state, valid));
1953    }
1954
1955    #[test]
1956    fn closing_complete_test() {
1957        let state = Closing {
1958            original: Peer {
1959                window_scale: WindowScale::new(2).unwrap(),
1960                max_wnd: WindowSize::new(0).unwrap(),
1961                max_wnd_seq: SeqNum::new(70_000),
1962                max_next_seq: SeqNum::new(1024),
1963                unacked_data: true,
1964                fin_state: FinState::Sent(SeqNum::new(1023)),
1965            },
1966            reply: Peer {
1967                window_scale: WindowScale::new(0).unwrap(),
1968                max_wnd: WindowSize::new(400).unwrap(),
1969                max_wnd_seq: SeqNum::new(1424),
1970                max_next_seq: SeqNum::new(66_001),
1971                unacked_data: false,
1972                fin_state: FinState::Acked,
1973            },
1974        };
1975
1976        let segment = SegmentHeader {
1977            seq: SeqNum::new(66_100),
1978            ack: Some(SeqNum::new(1024)),
1979            wnd: UnscaledWindowSize::from(10),
1980            control: None,
1981            options: Options::default(),
1982        };
1983
1984        assert_matches!(
1985            state.update(&segment, /* payload_len */ 0, ConnectionDirection::Reply),
1986            (State::Closed(_), true)
1987        );
1988    }
1989}