LCOV - code coverage report
Current view: top level - src/test - net_tests.cpp (source / functions) Coverage Total Hit
Test: total_coverage.info Lines: 99.0 % 960 950
Test Date: 2026-04-27 06:58:15 Functions: 100.0 % 60 60
Branches: 50.3 % 4344 2185

             Branch data     Line data    Source code
       1                 :             : // Copyright (c) 2012-present The Bitcoin Core developers
       2                 :             : // Distributed under the MIT software license, see the accompanying
       3                 :             : // file COPYING or http://www.opensource.org/licenses/mit-license.php.
       4                 :             : 
       5                 :             : #include <addrman.h>
       6                 :             : #include <chainparams.h>
       7                 :             : #include <clientversion.h>
       8                 :             : #include <common/args.h>
       9                 :             : #include <compat/compat.h>
      10                 :             : #include <net.h>
      11                 :             : #include <net_processing.h>
      12                 :             : #include <netaddress.h>
      13                 :             : #include <netbase.h>
      14                 :             : #include <netmessagemaker.h>
      15                 :             : #include <node/protocol_version.h>
      16                 :             : #include <serialize.h>
      17                 :             : #include <span.h>
      18                 :             : #include <streams.h>
      19                 :             : #include <test/util/common.h>
      20                 :             : #include <test/util/net.h>
      21                 :             : #include <test/util/random.h>
      22                 :             : #include <test/util/setup_common.h>
      23                 :             : #include <test/util/validation.h>
      24                 :             : #include <util/strencodings.h>
      25                 :             : #include <util/string.h>
      26                 :             : #include <validation.h>
      27                 :             : 
      28                 :             : #include <boost/test/unit_test.hpp>
      29                 :             : 
      30                 :             : #include <algorithm>
      31                 :             : #include <cstdint>
      32                 :             : #include <ios>
      33                 :             : #include <memory>
      34                 :             : #include <optional>
      35                 :             : #include <string>
      36                 :             : 
      37                 :             : using namespace std::literals;
      38                 :             : using namespace util::hex_literals;
      39                 :             : using util::ToString;
      40                 :             : 
      41                 :             : BOOST_FIXTURE_TEST_SUITE(net_tests, RegTestingSetup)
      42                 :             : 
      43   [ +  -  +  -  :           7 : BOOST_AUTO_TEST_CASE(cnode_listen_port)
          +  -  +  -  -  
          +  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
          -  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
                      - ]
      44                 :             : {
      45                 :             :     // test default
      46                 :           1 :     uint16_t port{GetListenPort()};
      47   [ +  -  +  - ]:           2 :     BOOST_CHECK(port == Params().GetDefaultPort());
      48                 :             :     // test set port
      49                 :           1 :     uint16_t altPort = 12345;
      50   [ +  -  +  -  :           2 :     BOOST_CHECK(gArgs.SoftSetArg("-port", ToString(altPort)));
             +  -  +  - ]
      51                 :           1 :     port = GetListenPort();
      52         [ +  - ]:           2 :     BOOST_CHECK(port == altPort);
      53                 :           1 : }
      54                 :             : 
      55   [ +  -  +  -  :           7 : BOOST_AUTO_TEST_CASE(cnode_simple_test)
          +  -  +  -  -  
          +  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
          -  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
                      - ]
      56                 :             : {
      57                 :           1 :     NodeId id = 0;
      58                 :             : 
      59                 :           1 :     in_addr ipv4Addr;
      60                 :           1 :     ipv4Addr.s_addr = 0xa0b0c001;
      61                 :             : 
      62                 :           1 :     CAddress addr = CAddress(CService(ipv4Addr, 7777), NODE_NETWORK);
      63         [ +  - ]:           1 :     std::string pszDest;
      64                 :             : 
      65                 :           2 :     std::unique_ptr<CNode> pnode1 = std::make_unique<CNode>(id++,
      66                 :           1 :                                                             /*sock=*/nullptr,
      67                 :             :                                                             addr,
      68                 :           1 :                                                             /*nKeyedNetGroupIn=*/0,
      69                 :           1 :                                                             /*nLocalHostNonceIn=*/0,
      70                 :           0 :                                                             CAddress(),
      71                 :             :                                                             pszDest,
      72                 :           1 :                                                             ConnectionType::OUTBOUND_FULL_RELAY,
      73                 :           1 :                                                             /*inbound_onion=*/false,
      74   [ +  -  +  - ]:           1 :                                                             /*network_key=*/0);
      75   [ +  -  +  -  :           2 :     BOOST_CHECK(pnode1->IsFullOutboundConn() == true);
                   +  - ]
      76   [ +  -  +  -  :           2 :     BOOST_CHECK(pnode1->IsManualConn() == false);
                   +  - ]
      77   [ +  -  +  -  :           2 :     BOOST_CHECK(pnode1->IsBlockOnlyConn() == false);
                   +  - ]
      78   [ +  -  +  -  :           2 :     BOOST_CHECK(pnode1->IsFeelerConn() == false);
                   +  - ]
      79   [ +  -  +  -  :           2 :     BOOST_CHECK(pnode1->IsAddrFetchConn() == false);
                   +  - ]
      80   [ +  -  +  -  :           2 :     BOOST_CHECK(pnode1->IsInboundConn() == false);
                   +  - ]
      81   [ +  -  +  -  :           2 :     BOOST_CHECK(pnode1->m_inbound_onion == false);
                   +  - ]
      82   [ +  -  +  -  :           1 :     BOOST_CHECK_EQUAL(pnode1->ConnectedThroughNetwork(), Network::NET_IPV4);
                   +  - ]
      83                 :             : 
      84                 :           2 :     std::unique_ptr<CNode> pnode2 = std::make_unique<CNode>(id++,
      85                 :           1 :                                                             /*sock=*/nullptr,
      86                 :             :                                                             addr,
      87                 :           1 :                                                             /*nKeyedNetGroupIn=*/1,
      88                 :           1 :                                                             /*nLocalHostNonceIn=*/1,
      89                 :           0 :                                                             CAddress(),
      90                 :             :                                                             pszDest,
      91                 :           1 :                                                             ConnectionType::INBOUND,
      92                 :           1 :                                                             /*inbound_onion=*/false,
      93   [ +  -  +  - ]:           1 :                                                             /*network_key=*/1);
      94   [ +  -  +  -  :           2 :     BOOST_CHECK(pnode2->IsFullOutboundConn() == false);
                   +  - ]
      95   [ +  -  +  -  :           2 :     BOOST_CHECK(pnode2->IsManualConn() == false);
                   +  - ]
      96   [ +  -  +  -  :           2 :     BOOST_CHECK(pnode2->IsBlockOnlyConn() == false);
                   +  - ]
      97   [ +  -  +  -  :           2 :     BOOST_CHECK(pnode2->IsFeelerConn() == false);
                   +  - ]
      98   [ +  -  +  -  :           2 :     BOOST_CHECK(pnode2->IsAddrFetchConn() == false);
                   +  - ]
      99   [ +  -  +  -  :           2 :     BOOST_CHECK(pnode2->IsInboundConn() == true);
                   +  - ]
     100   [ +  -  +  -  :           2 :     BOOST_CHECK(pnode2->m_inbound_onion == false);
                   +  - ]
     101   [ +  -  +  -  :           1 :     BOOST_CHECK_EQUAL(pnode2->ConnectedThroughNetwork(), Network::NET_IPV4);
                   +  - ]
     102                 :             : 
     103                 :           2 :     std::unique_ptr<CNode> pnode3 = std::make_unique<CNode>(id++,
     104                 :           1 :                                                             /*sock=*/nullptr,
     105                 :             :                                                             addr,
     106                 :           1 :                                                             /*nKeyedNetGroupIn=*/0,
     107                 :           1 :                                                             /*nLocalHostNonceIn=*/0,
     108                 :           0 :                                                             CAddress(),
     109                 :             :                                                             pszDest,
     110                 :           1 :                                                             ConnectionType::OUTBOUND_FULL_RELAY,
     111                 :           1 :                                                             /*inbound_onion=*/false,
     112   [ +  -  +  - ]:           1 :                                                             /*network_key=*/2);
     113   [ +  -  +  -  :           2 :     BOOST_CHECK(pnode3->IsFullOutboundConn() == true);
                   +  - ]
     114   [ +  -  +  -  :           2 :     BOOST_CHECK(pnode3->IsManualConn() == false);
                   +  - ]
     115   [ +  -  +  -  :           2 :     BOOST_CHECK(pnode3->IsBlockOnlyConn() == false);
                   +  - ]
     116   [ +  -  +  -  :           2 :     BOOST_CHECK(pnode3->IsFeelerConn() == false);
                   +  - ]
     117   [ +  -  +  -  :           2 :     BOOST_CHECK(pnode3->IsAddrFetchConn() == false);
                   +  - ]
     118   [ +  -  +  -  :           2 :     BOOST_CHECK(pnode3->IsInboundConn() == false);
                   +  - ]
     119   [ +  -  +  -  :           2 :     BOOST_CHECK(pnode3->m_inbound_onion == false);
                   +  - ]
     120   [ +  -  +  -  :           1 :     BOOST_CHECK_EQUAL(pnode3->ConnectedThroughNetwork(), Network::NET_IPV4);
                   +  - ]
     121                 :             : 
     122                 :           2 :     std::unique_ptr<CNode> pnode4 = std::make_unique<CNode>(id++,
     123                 :           1 :                                                             /*sock=*/nullptr,
     124                 :             :                                                             addr,
     125                 :           1 :                                                             /*nKeyedNetGroupIn=*/1,
     126                 :           1 :                                                             /*nLocalHostNonceIn=*/1,
     127                 :           0 :                                                             CAddress(),
     128                 :             :                                                             pszDest,
     129                 :           1 :                                                             ConnectionType::INBOUND,
     130                 :           1 :                                                             /*inbound_onion=*/true,
     131   [ +  -  +  - ]:           1 :                                                             /*network_key=*/3);
     132   [ +  -  +  -  :           2 :     BOOST_CHECK(pnode4->IsFullOutboundConn() == false);
                   +  - ]
     133   [ +  -  +  -  :           2 :     BOOST_CHECK(pnode4->IsManualConn() == false);
                   +  - ]
     134   [ +  -  +  -  :           2 :     BOOST_CHECK(pnode4->IsBlockOnlyConn() == false);
                   +  - ]
     135   [ +  -  +  -  :           2 :     BOOST_CHECK(pnode4->IsFeelerConn() == false);
                   +  - ]
     136   [ +  -  +  -  :           2 :     BOOST_CHECK(pnode4->IsAddrFetchConn() == false);
                   +  - ]
     137   [ +  -  +  -  :           2 :     BOOST_CHECK(pnode4->IsInboundConn() == true);
                   +  - ]
     138   [ +  -  +  -  :           2 :     BOOST_CHECK(pnode4->m_inbound_onion == true);
                   +  - ]
     139   [ +  -  +  -  :           1 :     BOOST_CHECK_EQUAL(pnode4->ConnectedThroughNetwork(), Network::NET_ONION);
                   +  - ]
     140                 :           1 : }
     141                 :             : 
     142   [ +  -  +  -  :           7 : BOOST_AUTO_TEST_CASE(cnetaddr_basic)
          +  -  +  -  -  
          +  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
          -  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
                      - ]
     143                 :             : {
     144                 :           1 :     CNetAddr addr;
     145                 :             : 
     146                 :             :     // IPv4, INADDR_ANY
     147   [ +  -  +  -  :           2 :     addr = LookupHost("0.0.0.0", false).value();
                   +  - ]
     148   [ +  -  +  -  :           2 :     BOOST_REQUIRE(!addr.IsValid());
             +  -  +  - ]
     149   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr.IsIPv4());
                   +  - ]
     150                 :             : 
     151   [ +  -  +  -  :           2 :     BOOST_CHECK(addr.IsBindAny());
             +  -  +  - ]
     152   [ +  -  +  -  :           2 :     BOOST_CHECK(addr.IsAddrV1Compatible());
             +  -  +  - ]
     153   [ +  -  +  -  :           1 :     BOOST_CHECK_EQUAL(addr.ToStringAddr(), "0.0.0.0");
                   +  - ]
     154                 :             : 
     155                 :             :     // IPv4, INADDR_NONE
     156   [ +  -  +  -  :           2 :     addr = LookupHost("255.255.255.255", false).value();
                   +  - ]
     157   [ +  -  +  -  :           2 :     BOOST_REQUIRE(!addr.IsValid());
             +  -  +  - ]
     158   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr.IsIPv4());
                   +  - ]
     159                 :             : 
     160   [ +  -  +  -  :           2 :     BOOST_CHECK(!addr.IsBindAny());
             +  -  +  - ]
     161   [ +  -  +  -  :           2 :     BOOST_CHECK(addr.IsAddrV1Compatible());
             +  -  +  - ]
     162   [ +  -  +  -  :           1 :     BOOST_CHECK_EQUAL(addr.ToStringAddr(), "255.255.255.255");
                   +  - ]
     163                 :             : 
     164                 :             :     // IPv4, casual
     165   [ +  -  +  -  :           2 :     addr = LookupHost("12.34.56.78", false).value();
                   +  - ]
     166   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr.IsValid());
             +  -  +  - ]
     167   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr.IsIPv4());
                   +  - ]
     168                 :             : 
     169   [ +  -  +  -  :           2 :     BOOST_CHECK(!addr.IsBindAny());
             +  -  +  - ]
     170   [ +  -  +  -  :           2 :     BOOST_CHECK(addr.IsAddrV1Compatible());
             +  -  +  - ]
     171   [ +  -  +  -  :           1 :     BOOST_CHECK_EQUAL(addr.ToStringAddr(), "12.34.56.78");
                   +  - ]
     172                 :             : 
     173                 :             :     // IPv6, in6addr_any
     174   [ +  -  +  -  :           2 :     addr = LookupHost("::", false).value();
                   +  - ]
     175   [ +  -  +  -  :           2 :     BOOST_REQUIRE(!addr.IsValid());
             +  -  +  - ]
     176   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr.IsIPv6());
                   +  - ]
     177                 :             : 
     178   [ +  -  +  -  :           2 :     BOOST_CHECK(addr.IsBindAny());
             +  -  +  - ]
     179   [ +  -  +  -  :           2 :     BOOST_CHECK(addr.IsAddrV1Compatible());
             +  -  +  - ]
     180   [ +  -  +  -  :           1 :     BOOST_CHECK_EQUAL(addr.ToStringAddr(), "::");
                   +  - ]
     181                 :             : 
     182                 :             :     // IPv6, casual
     183   [ +  -  +  -  :           2 :     addr = LookupHost("1122:3344:5566:7788:9900:aabb:ccdd:eeff", false).value();
                   +  - ]
     184   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr.IsValid());
             +  -  +  - ]
     185   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr.IsIPv6());
                   +  - ]
     186                 :             : 
     187   [ +  -  +  -  :           2 :     BOOST_CHECK(!addr.IsBindAny());
             +  -  +  - ]
     188   [ +  -  +  -  :           2 :     BOOST_CHECK(addr.IsAddrV1Compatible());
             +  -  +  - ]
     189   [ +  -  +  -  :           1 :     BOOST_CHECK_EQUAL(addr.ToStringAddr(), "1122:3344:5566:7788:9900:aabb:ccdd:eeff");
                   +  - ]
     190                 :             : 
     191                 :             :     // IPv6, scoped/link-local. See https://tools.ietf.org/html/rfc4007
     192                 :             :     // We support non-negative decimal integers (uint32_t) as zone id indices.
     193                 :             :     // Normal link-local scoped address functionality is to append "%" plus the
     194                 :             :     // zone id, for example, given a link-local address of "fe80::1" and a zone
     195                 :             :     // id of "32", return the address as "fe80::1%32".
     196         [ +  - ]:           1 :     const std::string link_local{"fe80::1"};
     197         [ +  - ]:           1 :     const std::string scoped_addr{link_local + "%32"};
     198   [ +  -  +  - ]:           2 :     addr = LookupHost(scoped_addr, false).value();
     199   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr.IsValid());
             +  -  +  - ]
     200   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr.IsIPv6());
                   +  - ]
     201   [ +  -  +  -  :           2 :     BOOST_CHECK(!addr.IsBindAny());
             +  -  +  - ]
     202   [ +  -  +  -  :           1 :     BOOST_CHECK_EQUAL(addr.ToStringAddr(), scoped_addr);
                   +  - ]
     203                 :             : 
     204                 :             :     // TORv2, no longer supported
     205   [ +  -  +  -  :           2 :     BOOST_CHECK(!addr.SetSpecial("6hzph5hv6337r6p2.onion"));
             +  -  +  - ]
     206                 :             : 
     207                 :             :     // TORv3
     208                 :           1 :     const char* torv3_addr = "pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion";
     209   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr.SetSpecial(torv3_addr));
             +  -  +  - ]
     210   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr.IsValid());
             +  -  +  - ]
     211   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr.IsTor());
                   +  - ]
     212                 :             : 
     213   [ +  -  +  -  :           2 :     BOOST_CHECK(!addr.IsI2P());
                   +  - ]
     214   [ +  -  +  -  :           2 :     BOOST_CHECK(!addr.IsBindAny());
             +  -  +  - ]
     215   [ +  -  +  -  :           2 :     BOOST_CHECK(!addr.IsAddrV1Compatible());
             +  -  +  - ]
     216   [ +  -  +  -  :           1 :     BOOST_CHECK_EQUAL(addr.ToStringAddr(), torv3_addr);
                   +  - ]
     217                 :             : 
     218                 :             :     // TORv3, broken, with wrong checksum
     219   [ +  -  +  -  :           2 :     BOOST_CHECK(!addr.SetSpecial("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscsad.onion"));
             +  -  +  - ]
     220                 :             : 
     221                 :             :     // TORv3, broken, with wrong version
     222   [ +  -  +  -  :           2 :     BOOST_CHECK(!addr.SetSpecial("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscrye.onion"));
             +  -  +  - ]
     223                 :             : 
     224                 :             :     // TORv3, malicious
     225   [ +  -  +  -  :           3 :     BOOST_CHECK(!addr.SetSpecial(std::string{
          +  -  +  -  +  
                      - ]
     226                 :             :         "pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd\0wtf.onion", 66}));
     227                 :             : 
     228                 :             :     // TOR, bogus length
     229   [ +  -  +  -  :           3 :     BOOST_CHECK(!addr.SetSpecial(std::string{"mfrggzak.onion"}));
          +  -  +  -  +  
                      - ]
     230                 :             : 
     231                 :             :     // TOR, invalid base32
     232   [ +  -  +  -  :           3 :     BOOST_CHECK(!addr.SetSpecial(std::string{"mf*g zak.onion"}));
          +  -  +  -  +  
                      - ]
     233                 :             : 
     234                 :             :     // I2P
     235                 :           1 :     const char* i2p_addr = "UDHDrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.I2P";
     236   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr.SetSpecial(i2p_addr));
             +  -  +  - ]
     237   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr.IsValid());
             +  -  +  - ]
     238   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr.IsI2P());
                   +  - ]
     239                 :             : 
     240   [ +  -  +  -  :           2 :     BOOST_CHECK(!addr.IsTor());
                   +  - ]
     241   [ +  -  +  -  :           2 :     BOOST_CHECK(!addr.IsBindAny());
             +  -  +  - ]
     242   [ +  -  +  -  :           2 :     BOOST_CHECK(!addr.IsAddrV1Compatible());
             +  -  +  - ]
     243   [ +  -  +  -  :           1 :     BOOST_CHECK_EQUAL(addr.ToStringAddr(), ToLower(i2p_addr));
             +  -  +  - ]
     244                 :             : 
     245                 :             :     // I2P, correct length, but decodes to less than the expected number of bytes.
     246   [ +  -  +  -  :           2 :     BOOST_CHECK(!addr.SetSpecial("udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jn=.b32.i2p"));
             +  -  +  - ]
     247                 :             : 
     248                 :             :     // I2P, extra unnecessary padding
     249   [ +  -  +  -  :           2 :     BOOST_CHECK(!addr.SetSpecial("udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna=.b32.i2p"));
             +  -  +  - ]
     250                 :             : 
     251                 :             :     // I2P, malicious
     252   [ +  -  +  -  :           2 :     BOOST_CHECK(!addr.SetSpecial("udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v\0wtf.b32.i2p"s));
          -  +  +  -  +  
                -  +  - ]
     253                 :             : 
     254                 :             :     // I2P, valid but unsupported (56 Base32 characters)
     255                 :             :     // See "Encrypted LS with Base 32 Addresses" in
     256                 :             :     // https://geti2p.net/spec/encryptedleaseset.txt
     257   [ +  -  +  -  :           2 :     BOOST_CHECK(
             +  -  +  - ]
     258                 :             :         !addr.SetSpecial("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscsad.b32.i2p"));
     259                 :             : 
     260                 :             :     // I2P, invalid base32
     261   [ +  -  +  -  :           3 :     BOOST_CHECK(!addr.SetSpecial(std::string{"tp*szydbh4dp.b32.i2p"}));
          +  -  +  -  +  
                      - ]
     262                 :             : 
     263                 :             :     // Internal
     264   [ +  -  +  - ]:           1 :     addr.SetInternal("esffpp");
     265   [ +  -  +  -  :           2 :     BOOST_REQUIRE(!addr.IsValid()); // "internal" is considered invalid
             +  -  +  - ]
     266   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr.IsInternal());
             +  -  +  - ]
     267                 :             : 
     268   [ +  -  +  -  :           2 :     BOOST_CHECK(!addr.IsBindAny());
             +  -  +  - ]
     269   [ +  -  +  -  :           2 :     BOOST_CHECK(addr.IsAddrV1Compatible());
             +  -  +  - ]
     270   [ +  -  +  -  :           1 :     BOOST_CHECK_EQUAL(addr.ToStringAddr(), "esffpvrt3wpeaygy.internal");
                   +  - ]
     271                 :             : 
     272                 :             :     // Totally bogus
     273   [ +  -  +  -  :           2 :     BOOST_CHECK(!addr.SetSpecial("totally bogus"));
                   +  - ]
     274                 :           1 : }
     275                 :             : 
     276   [ +  -  +  -  :           7 : BOOST_AUTO_TEST_CASE(cnetaddr_tostring_canonical_ipv6)
          +  -  +  -  -  
          +  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
          -  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
                      - ]
     277                 :             : {
     278                 :             :     // Test that CNetAddr::ToString formats IPv6 addresses with zero compression as described in
     279                 :             :     // RFC 5952 ("A Recommendation for IPv6 Address Text Representation").
     280                 :           1 :     const std::map<std::string, std::string> canonical_representations_ipv6{
     281                 :             :         {"0000:0000:0000:0000:0000:0000:0000:0000", "::"},
     282                 :             :         {"000:0000:000:00:0:00:000:0000", "::"},
     283                 :             :         {"000:000:000:000:000:000:000:000", "::"},
     284                 :             :         {"00:00:00:00:00:00:00:00", "::"},
     285                 :             :         {"0:0:0:0:0:0:0:0", "::"},
     286                 :             :         {"0:0:0:0:0:0:0:1", "::1"},
     287                 :             :         {"2001:0:0:1:0:0:0:1", "2001:0:0:1::1"},
     288                 :             :         {"2001:0db8:0:0:1:0:0:1", "2001:db8::1:0:0:1"},
     289                 :             :         {"2001:0db8:85a3:0000:0000:8a2e:0370:7334", "2001:db8:85a3::8a2e:370:7334"},
     290                 :             :         {"2001:0db8::0001", "2001:db8::1"},
     291                 :             :         {"2001:0db8::0001:0000", "2001:db8::1:0"},
     292                 :             :         {"2001:0db8::1:0:0:1", "2001:db8::1:0:0:1"},
     293                 :             :         {"2001:db8:0000:0:1::1", "2001:db8::1:0:0:1"},
     294                 :             :         {"2001:db8:0000:1:1:1:1:1", "2001:db8:0:1:1:1:1:1"},
     295                 :             :         {"2001:db8:0:0:0:0:2:1", "2001:db8::2:1"},
     296                 :             :         {"2001:db8:0:0:0::1", "2001:db8::1"},
     297                 :             :         {"2001:db8:0:0:1:0:0:1", "2001:db8::1:0:0:1"},
     298                 :             :         {"2001:db8:0:0:1::1", "2001:db8::1:0:0:1"},
     299                 :             :         {"2001:DB8:0:0:1::1", "2001:db8::1:0:0:1"},
     300                 :             :         {"2001:db8:0:0::1", "2001:db8::1"},
     301                 :             :         {"2001:db8:0:0:aaaa::1", "2001:db8::aaaa:0:0:1"},
     302                 :             :         {"2001:db8:0:1:1:1:1:1", "2001:db8:0:1:1:1:1:1"},
     303                 :             :         {"2001:db8:0::1", "2001:db8::1"},
     304                 :             :         {"2001:db8:85a3:0:0:8a2e:370:7334", "2001:db8:85a3::8a2e:370:7334"},
     305                 :             :         {"2001:db8::0:1", "2001:db8::1"},
     306                 :             :         {"2001:db8::0:1:0:0:1", "2001:db8::1:0:0:1"},
     307                 :             :         {"2001:DB8::1", "2001:db8::1"},
     308                 :             :         {"2001:db8::1", "2001:db8::1"},
     309                 :             :         {"2001:db8::1:0:0:1", "2001:db8::1:0:0:1"},
     310                 :             :         {"2001:db8::1:1:1:1:1", "2001:db8:0:1:1:1:1:1"},
     311                 :             :         {"2001:db8::aaaa:0:0:1", "2001:db8::aaaa:0:0:1"},
     312                 :             :         {"2001:db8:aaaa:bbbb:cccc:dddd:0:1", "2001:db8:aaaa:bbbb:cccc:dddd:0:1"},
     313                 :             :         {"2001:db8:aaaa:bbbb:cccc:dddd::1", "2001:db8:aaaa:bbbb:cccc:dddd:0:1"},
     314                 :             :         {"2001:db8:aaaa:bbbb:cccc:dddd:eeee:0001", "2001:db8:aaaa:bbbb:cccc:dddd:eeee:1"},
     315                 :             :         {"2001:db8:aaaa:bbbb:cccc:dddd:eeee:001", "2001:db8:aaaa:bbbb:cccc:dddd:eeee:1"},
     316                 :             :         {"2001:db8:aaaa:bbbb:cccc:dddd:eeee:01", "2001:db8:aaaa:bbbb:cccc:dddd:eeee:1"},
     317                 :             :         {"2001:db8:aaaa:bbbb:cccc:dddd:eeee:1", "2001:db8:aaaa:bbbb:cccc:dddd:eeee:1"},
     318                 :             :         {"2001:db8:aaaa:bbbb:cccc:dddd:eeee:aaaa", "2001:db8:aaaa:bbbb:cccc:dddd:eeee:aaaa"},
     319                 :             :         {"2001:db8:aaaa:bbbb:cccc:dddd:eeee:AAAA", "2001:db8:aaaa:bbbb:cccc:dddd:eeee:aaaa"},
     320                 :             :         {"2001:db8:aaaa:bbbb:cccc:dddd:eeee:AaAa", "2001:db8:aaaa:bbbb:cccc:dddd:eeee:aaaa"},
     321   [ -  +  +  +  :          41 :     };
                   -  - ]
     322   [ +  -  +  + ]:          41 :     for (const auto& [input_address, expected_canonical_representation_output] : canonical_representations_ipv6) {
     323   [ +  -  +  - ]:          40 :         const std::optional<CNetAddr> net_addr{LookupHost(input_address, false)};
     324   [ +  -  +  -  :          80 :         BOOST_REQUIRE(net_addr.value().IsIPv6());
             +  -  +  - ]
     325   [ +  -  +  -  :          40 :         BOOST_CHECK_EQUAL(net_addr.value().ToStringAddr(), expected_canonical_representation_output);
             +  -  +  - ]
     326                 :          40 :     }
     327   [ +  -  +  -  :           2 : }
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  +  -  +  
                -  -  - ]
     328                 :             : 
     329   [ +  -  +  -  :           7 : BOOST_AUTO_TEST_CASE(cnetaddr_serialize_v1)
          +  -  +  -  -  
          +  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
          -  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
                      - ]
     330                 :             : {
     331                 :           1 :     CNetAddr addr;
     332                 :           1 :     DataStream s{};
     333                 :           1 :     const auto ser_params{CAddress::V1_NETWORK};
     334                 :             : 
     335         [ +  - ]:           1 :     s << ser_params(addr);
     336   [ +  -  -  +  :           1 :     BOOST_CHECK_EQUAL(HexStr(s), "00000000000000000000000000000000");
             +  -  +  - ]
     337         [ +  - ]:           1 :     s.clear();
     338                 :             : 
     339   [ +  -  +  -  :           2 :     addr = LookupHost("1.2.3.4", false).value();
                   +  - ]
     340         [ +  - ]:           1 :     s << ser_params(addr);
     341   [ +  -  -  +  :           1 :     BOOST_CHECK_EQUAL(HexStr(s), "00000000000000000000ffff01020304");
             +  -  +  - ]
     342         [ +  - ]:           1 :     s.clear();
     343                 :             : 
     344   [ +  -  +  -  :           2 :     addr = LookupHost("1a1b:2a2b:3a3b:4a4b:5a5b:6a6b:7a7b:8a8b", false).value();
                   +  - ]
     345         [ +  - ]:           1 :     s << ser_params(addr);
     346   [ +  -  -  +  :           1 :     BOOST_CHECK_EQUAL(HexStr(s), "1a1b2a2b3a3b4a4b5a5b6a6b7a7b8a8b");
             +  -  +  - ]
     347         [ +  - ]:           1 :     s.clear();
     348                 :             : 
     349                 :             :     // TORv2, no longer supported
     350   [ +  -  +  -  :           2 :     BOOST_CHECK(!addr.SetSpecial("6hzph5hv6337r6p2.onion"));
             +  -  +  - ]
     351                 :             : 
     352   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr.SetSpecial("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion"));
             +  -  +  - ]
     353         [ +  - ]:           1 :     s << ser_params(addr);
     354   [ +  -  -  +  :           1 :     BOOST_CHECK_EQUAL(HexStr(s), "00000000000000000000000000000000");
             +  -  +  - ]
     355         [ +  - ]:           1 :     s.clear();
     356                 :             : 
     357   [ +  -  +  - ]:           1 :     addr.SetInternal("a");
     358         [ +  - ]:           1 :     s << ser_params(addr);
     359   [ +  -  -  +  :           1 :     BOOST_CHECK_EQUAL(HexStr(s), "fd6b88c08724ca978112ca1bbdcafac2");
             +  -  +  - ]
     360         [ +  - ]:           2 :     s.clear();
     361                 :           1 : }
     362                 :             : 
     363   [ +  -  +  -  :           7 : BOOST_AUTO_TEST_CASE(cnetaddr_serialize_v2)
          +  -  +  -  -  
          +  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
          -  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
                      - ]
     364                 :             : {
     365                 :           1 :     CNetAddr addr;
     366                 :           1 :     DataStream s{};
     367                 :           1 :     const auto ser_params{CAddress::V2_NETWORK};
     368                 :             : 
     369         [ +  - ]:           1 :     s << ser_params(addr);
     370   [ +  -  -  +  :           1 :     BOOST_CHECK_EQUAL(HexStr(s), "021000000000000000000000000000000000");
             +  -  +  - ]
     371         [ +  - ]:           1 :     s.clear();
     372                 :             : 
     373   [ +  -  +  -  :           2 :     addr = LookupHost("1.2.3.4", false).value();
                   +  - ]
     374         [ +  - ]:           1 :     s << ser_params(addr);
     375   [ +  -  -  +  :           1 :     BOOST_CHECK_EQUAL(HexStr(s), "010401020304");
             +  -  +  - ]
     376         [ +  - ]:           1 :     s.clear();
     377                 :             : 
     378   [ +  -  +  -  :           2 :     addr = LookupHost("1a1b:2a2b:3a3b:4a4b:5a5b:6a6b:7a7b:8a8b", false).value();
                   +  - ]
     379         [ +  - ]:           1 :     s << ser_params(addr);
     380   [ +  -  -  +  :           1 :     BOOST_CHECK_EQUAL(HexStr(s), "02101a1b2a2b3a3b4a4b5a5b6a6b7a7b8a8b");
             +  -  +  - ]
     381         [ +  - ]:           1 :     s.clear();
     382                 :             : 
     383                 :             :     // TORv2, no longer supported
     384   [ +  -  +  -  :           2 :     BOOST_CHECK(!addr.SetSpecial("6hzph5hv6337r6p2.onion"));
             +  -  +  - ]
     385                 :             : 
     386   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr.SetSpecial("kpgvmscirrdqpekbqjsvw5teanhatztpp2gl6eee4zkowvwfxwenqaid.onion"));
             +  -  +  - ]
     387         [ +  - ]:           1 :     s << ser_params(addr);
     388   [ +  -  -  +  :           1 :     BOOST_CHECK_EQUAL(HexStr(s), "042053cd5648488c4707914182655b7664034e09e66f7e8cbf1084e654eb56c5bd88");
             +  -  +  - ]
     389         [ +  - ]:           1 :     s.clear();
     390                 :             : 
     391   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr.SetInternal("a"));
          +  -  +  -  +  
                      - ]
     392         [ +  - ]:           1 :     s << ser_params(addr);
     393   [ +  -  -  +  :           1 :     BOOST_CHECK_EQUAL(HexStr(s), "0210fd6b88c08724ca978112ca1bbdcafac2");
             +  -  +  - ]
     394         [ +  - ]:           2 :     s.clear();
     395                 :           1 : }
     396                 :             : 
     397   [ +  -  +  -  :           7 : BOOST_AUTO_TEST_CASE(cnetaddr_unserialize_v2)
          +  -  +  -  -  
          +  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
          -  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
                      - ]
     398                 :             : {
     399                 :           1 :     CNetAddr addr;
     400                 :           1 :     DataStream s{};
     401                 :           1 :     const auto ser_params{CAddress::V2_NETWORK};
     402                 :             : 
     403                 :             :     // Valid IPv4.
     404         [ +  - ]:           1 :     s << "01"            // network type (IPv4)
     405                 :             :          "04"            // address length
     406                 :           1 :          "01020304"_hex; // address
     407         [ +  - ]:           1 :     s >> ser_params(addr);
     408   [ +  -  +  -  :           2 :     BOOST_CHECK(addr.IsValid());
             +  -  +  - ]
     409   [ +  -  +  -  :           2 :     BOOST_CHECK(addr.IsIPv4());
                   +  - ]
     410   [ +  -  +  -  :           2 :     BOOST_CHECK(addr.IsAddrV1Compatible());
             +  -  +  - ]
     411   [ +  -  +  -  :           1 :     BOOST_CHECK_EQUAL(addr.ToStringAddr(), "1.2.3.4");
                   +  - ]
     412   [ +  -  -  +  :           2 :     BOOST_REQUIRE(s.empty());
             +  -  +  - ]
     413                 :             : 
     414                 :             :     // Invalid IPv4, valid length but address itself is shorter.
     415         [ +  - ]:           1 :     s << "01"        // network type (IPv4)
     416                 :             :          "04"        // address length
     417                 :           1 :          "0102"_hex; // address
     418   [ +  -  -  +  :           2 :     BOOST_CHECK_EXCEPTION(s >> ser_params(addr), std::ios_base::failure, HasReason("end of data"));
          -  -  -  -  -  
          +  +  -  +  -  
                   +  - ]
     419   [ +  -  -  +  :           2 :     BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
             +  -  +  - ]
     420         [ +  - ]:           1 :     s.clear();
     421                 :             : 
     422                 :             :     // Invalid IPv4, with bogus length.
     423         [ +  - ]:           1 :     s << "01"            // network type (IPv4)
     424                 :             :          "05"            // address length
     425                 :           1 :          "01020304"_hex; // address
     426   [ +  -  -  +  :           2 :     BOOST_CHECK_EXCEPTION(s >> ser_params(addr), std::ios_base::failure,
          -  -  -  -  -  
          +  +  -  +  -  
                   +  - ]
     427                 :             :                           HasReason("BIP155 IPv4 address with length 5 (should be 4)"));
     428   [ +  -  -  +  :           2 :     BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
             +  -  +  - ]
     429         [ +  - ]:           1 :     s.clear();
     430                 :             : 
     431                 :             :     // Invalid IPv4, with extreme length.
     432         [ +  - ]:           1 :     s << "01"            // network type (IPv4)
     433                 :             :          "fd0102"        // address length (513 as CompactSize)
     434                 :           1 :          "01020304"_hex; // address
     435   [ +  -  -  +  :           2 :     BOOST_CHECK_EXCEPTION(s >> ser_params(addr), std::ios_base::failure,
          -  -  -  -  -  
          +  +  -  +  -  
                   +  - ]
     436                 :             :                           HasReason("Address too long: 513 > 512"));
     437   [ +  -  -  +  :           2 :     BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
             +  -  +  - ]
     438         [ +  - ]:           1 :     s.clear();
     439                 :             : 
     440                 :             :     // Valid IPv6.
     441         [ +  - ]:           1 :     s << "02"                                    // network type (IPv6)
     442                 :             :          "10"                                    // address length
     443                 :           1 :          "0102030405060708090a0b0c0d0e0f10"_hex; // address
     444         [ +  - ]:           1 :     s >> ser_params(addr);
     445   [ +  -  +  -  :           2 :     BOOST_CHECK(addr.IsValid());
             +  -  +  - ]
     446   [ +  -  +  -  :           2 :     BOOST_CHECK(addr.IsIPv6());
                   +  - ]
     447   [ +  -  +  -  :           2 :     BOOST_CHECK(addr.IsAddrV1Compatible());
             +  -  +  - ]
     448   [ +  -  +  -  :           1 :     BOOST_CHECK_EQUAL(addr.ToStringAddr(), "102:304:506:708:90a:b0c:d0e:f10");
                   +  - ]
     449   [ +  -  -  +  :           2 :     BOOST_REQUIRE(s.empty());
             +  -  +  - ]
     450                 :             : 
     451                 :             :     // Valid IPv6, contains embedded "internal".
     452         [ +  - ]:           1 :     s << "02"                                    // network type (IPv6)
     453                 :             :          "10"                                    // address length
     454                 :           1 :          "fd6b88c08724ca978112ca1bbdcafac2"_hex; // address: 0xfd + sha256("bitcoin")[0:5] +
     455                 :             :                                                  // sha256(name)[0:10]
     456         [ +  - ]:           1 :     s >> ser_params(addr);
     457   [ +  -  +  -  :           2 :     BOOST_CHECK(addr.IsInternal());
             +  -  +  - ]
     458   [ +  -  +  -  :           2 :     BOOST_CHECK(addr.IsAddrV1Compatible());
             +  -  +  - ]
     459   [ +  -  +  -  :           1 :     BOOST_CHECK_EQUAL(addr.ToStringAddr(), "zklycewkdo64v6wc.internal");
                   +  - ]
     460   [ +  -  -  +  :           2 :     BOOST_REQUIRE(s.empty());
             +  -  +  - ]
     461                 :             : 
     462                 :             :     // Invalid IPv6, with bogus length.
     463         [ +  - ]:           1 :     s << "02"      // network type (IPv6)
     464                 :             :          "04"      // address length
     465                 :           1 :          "00"_hex; // address
     466   [ +  -  -  +  :           2 :     BOOST_CHECK_EXCEPTION(s >> ser_params(addr), std::ios_base::failure,
          -  -  -  -  -  
          +  +  -  +  -  
                   +  - ]
     467                 :             :                           HasReason("BIP155 IPv6 address with length 4 (should be 16)"));
     468   [ +  -  -  +  :           2 :     BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
             +  -  +  - ]
     469         [ +  - ]:           1 :     s.clear();
     470                 :             : 
     471                 :             :     // Invalid IPv6, contains embedded IPv4.
     472         [ +  - ]:           1 :     s << "02"                                    // network type (IPv6)
     473                 :             :          "10"                                    // address length
     474                 :           1 :          "00000000000000000000ffff01020304"_hex; // address
     475         [ +  - ]:           1 :     s >> ser_params(addr);
     476   [ +  -  +  -  :           2 :     BOOST_CHECK(!addr.IsValid());
             +  -  +  - ]
     477   [ +  -  -  +  :           2 :     BOOST_REQUIRE(s.empty());
             +  -  +  - ]
     478                 :             : 
     479                 :             :     // Invalid IPv6, contains embedded TORv2.
     480         [ +  - ]:           1 :     s << "02"                                    // network type (IPv6)
     481                 :             :          "10"                                    // address length
     482                 :           1 :          "fd87d87eeb430102030405060708090a"_hex; // address
     483         [ +  - ]:           1 :     s >> ser_params(addr);
     484   [ +  -  +  -  :           2 :     BOOST_CHECK(!addr.IsValid());
             +  -  +  - ]
     485   [ +  -  -  +  :           2 :     BOOST_REQUIRE(s.empty());
             +  -  +  - ]
     486                 :             : 
     487                 :             :     // TORv2, no longer supported.
     488         [ +  - ]:           1 :     s << "03"                        // network type (TORv2)
     489                 :             :          "0a"                        // address length
     490                 :           1 :          "f1f2f3f4f5f6f7f8f9fa"_hex; // address
     491         [ +  - ]:           1 :     s >> ser_params(addr);
     492   [ +  -  +  -  :           2 :     BOOST_CHECK(!addr.IsValid());
             +  -  +  - ]
     493   [ +  -  -  +  :           2 :     BOOST_REQUIRE(s.empty());
             +  -  +  - ]
     494                 :             : 
     495                 :             :     // Valid TORv3.
     496         [ +  - ]:           1 :     s << "04"                               // network type (TORv3)
     497                 :             :          "20"                               // address length
     498                 :             :          "79bcc625184b05194975c28b66b66b04" // address
     499                 :           1 :          "69f7f6556fb1ac3189a79b40dda32f1f"_hex;
     500         [ +  - ]:           1 :     s >> ser_params(addr);
     501   [ +  -  +  -  :           2 :     BOOST_CHECK(addr.IsValid());
             +  -  +  - ]
     502   [ +  -  +  -  :           2 :     BOOST_CHECK(addr.IsTor());
                   +  - ]
     503   [ +  -  +  -  :           2 :     BOOST_CHECK(!addr.IsAddrV1Compatible());
             +  -  +  - ]
     504   [ +  -  +  -  :           1 :     BOOST_CHECK_EQUAL(addr.ToStringAddr(),
                   +  - ]
     505                 :             :                       "pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion");
     506   [ +  -  -  +  :           2 :     BOOST_REQUIRE(s.empty());
             +  -  +  - ]
     507                 :             : 
     508                 :             :     // Invalid TORv3, with bogus length.
     509         [ +  - ]:           1 :     s << "04"      // network type (TORv3)
     510                 :             :          "00"      // address length
     511                 :           1 :          "00"_hex; // address
     512   [ +  -  -  +  :           2 :     BOOST_CHECK_EXCEPTION(s >> ser_params(addr), std::ios_base::failure,
          -  -  -  -  -  
          +  +  -  +  -  
                   +  - ]
     513                 :             :                           HasReason("BIP155 TORv3 address with length 0 (should be 32)"));
     514   [ +  -  -  +  :           2 :     BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
             +  -  +  - ]
     515         [ +  - ]:           1 :     s.clear();
     516                 :             : 
     517                 :             :     // Valid I2P.
     518         [ +  - ]:           1 :     s << "05"                               // network type (I2P)
     519                 :             :          "20"                               // address length
     520                 :             :          "a2894dabaec08c0051a481a6dac88b64" // address
     521                 :           1 :          "f98232ae42d4b6fd2fa81952dfe36a87"_hex;
     522         [ +  - ]:           1 :     s >> ser_params(addr);
     523   [ +  -  +  -  :           2 :     BOOST_CHECK(addr.IsValid());
             +  -  +  - ]
     524   [ +  -  +  -  :           2 :     BOOST_CHECK(addr.IsI2P());
                   +  - ]
     525   [ +  -  +  -  :           2 :     BOOST_CHECK(!addr.IsAddrV1Compatible());
             +  -  +  - ]
     526   [ +  -  +  -  :           1 :     BOOST_CHECK_EQUAL(addr.ToStringAddr(),
                   +  - ]
     527                 :             :                       "ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p");
     528   [ +  -  -  +  :           2 :     BOOST_REQUIRE(s.empty());
             +  -  +  - ]
     529                 :             : 
     530                 :             :     // Invalid I2P, with bogus length.
     531         [ +  - ]:           1 :     s << "05"      // network type (I2P)
     532                 :             :          "03"      // address length
     533                 :           1 :          "00"_hex; // address
     534   [ +  -  -  +  :           2 :     BOOST_CHECK_EXCEPTION(s >> ser_params(addr), std::ios_base::failure,
          -  -  -  -  -  
          +  +  -  +  -  
                   +  - ]
     535                 :             :                           HasReason("BIP155 I2P address with length 3 (should be 32)"));
     536   [ +  -  -  +  :           2 :     BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
             +  -  +  - ]
     537         [ +  - ]:           1 :     s.clear();
     538                 :             : 
     539                 :             :     // Valid CJDNS.
     540         [ +  - ]:           1 :     s << "06"                                    // network type (CJDNS)
     541                 :             :          "10"                                    // address length
     542                 :           1 :          "fc000001000200030004000500060007"_hex; // address
     543         [ +  - ]:           1 :     s >> ser_params(addr);
     544   [ +  -  +  -  :           2 :     BOOST_CHECK(addr.IsValid());
             +  -  +  - ]
     545   [ +  -  +  -  :           2 :     BOOST_CHECK(addr.IsCJDNS());
                   +  - ]
     546   [ +  -  +  -  :           2 :     BOOST_CHECK(!addr.IsAddrV1Compatible());
             +  -  +  - ]
     547   [ +  -  +  -  :           1 :     BOOST_CHECK_EQUAL(addr.ToStringAddr(), "fc00:1:2:3:4:5:6:7");
                   +  - ]
     548   [ +  -  -  +  :           2 :     BOOST_REQUIRE(s.empty());
             +  -  +  - ]
     549                 :             : 
     550                 :             :     // Invalid CJDNS, wrong prefix.
     551         [ +  - ]:           1 :     s << "06"                                    // network type (CJDNS)
     552                 :             :          "10"                                    // address length
     553                 :           1 :          "aa000001000200030004000500060007"_hex; // address
     554         [ +  - ]:           1 :     s >> ser_params(addr);
     555   [ +  -  +  -  :           2 :     BOOST_CHECK(addr.IsCJDNS());
                   +  - ]
     556   [ +  -  +  -  :           2 :     BOOST_CHECK(!addr.IsValid());
             +  -  +  - ]
     557   [ +  -  -  +  :           2 :     BOOST_REQUIRE(s.empty());
             +  -  +  - ]
     558                 :             : 
     559                 :             :     // Invalid CJDNS, with bogus length.
     560         [ +  - ]:           1 :     s << "06"      // network type (CJDNS)
     561                 :             :          "01"      // address length
     562                 :           1 :          "00"_hex; // address
     563   [ +  -  -  +  :           2 :     BOOST_CHECK_EXCEPTION(s >> ser_params(addr), std::ios_base::failure,
          -  -  -  -  -  
          +  +  -  +  -  
                   +  - ]
     564                 :             :                           HasReason("BIP155 CJDNS address with length 1 (should be 16)"));
     565   [ +  -  -  +  :           2 :     BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
             +  -  +  - ]
     566         [ +  - ]:           1 :     s.clear();
     567                 :             : 
     568                 :             :     // Unknown, with extreme length.
     569         [ +  - ]:           1 :     s << "aa"                  // network type (unknown)
     570                 :             :          "fe00000002"          // address length (CompactSize's MAX_SIZE)
     571                 :           1 :          "01020304050607"_hex; // address
     572   [ +  -  -  +  :           2 :     BOOST_CHECK_EXCEPTION(s >> ser_params(addr), std::ios_base::failure,
          -  -  -  -  -  
          +  +  -  +  -  
                   +  - ]
     573                 :             :                           HasReason("Address too long: 33554432 > 512"));
     574   [ +  -  -  +  :           2 :     BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
             +  -  +  - ]
     575         [ +  - ]:           1 :     s.clear();
     576                 :             : 
     577                 :             :     // Unknown, with reasonable length.
     578         [ +  - ]:           1 :     s << "aa"            // network type (unknown)
     579                 :             :          "04"            // address length
     580                 :           1 :          "01020304"_hex; // address
     581         [ +  - ]:           1 :     s >> ser_params(addr);
     582   [ +  -  +  -  :           2 :     BOOST_CHECK(!addr.IsValid());
             +  -  +  - ]
     583   [ +  -  -  +  :           2 :     BOOST_REQUIRE(s.empty());
             +  -  +  - ]
     584                 :             : 
     585                 :             :     // Unknown, with zero length.
     586         [ +  - ]:           1 :     s << "aa"    // network type (unknown)
     587                 :             :          "00"    // address length
     588                 :           1 :          ""_hex; // address
     589         [ +  - ]:           1 :     s >> ser_params(addr);
     590   [ +  -  +  -  :           2 :     BOOST_CHECK(!addr.IsValid());
             +  -  +  - ]
     591   [ +  -  -  +  :           2 :     BOOST_REQUIRE(s.empty());
                   +  - ]
     592                 :           1 : }
     593                 :             : 
     594                 :             : // prior to PR #14728, this test triggers an undefined behavior
     595   [ +  -  +  -  :           7 : BOOST_AUTO_TEST_CASE(ipv4_peer_with_ipv6_addrMe_test)
          +  -  +  -  -  
          +  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
          -  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
                      - ]
     596                 :             : {
     597                 :             :     // set up local addresses; all that's necessary to reproduce the bug is
     598                 :             :     // that a normal IPv4 address is among the entries, but if this address is
     599                 :             :     // !IsRoutable the undefined behavior is easier to trigger deterministically
     600                 :           1 :     in_addr raw_addr;
     601                 :           1 :     raw_addr.s_addr = htonl(0x7f000001);
     602                 :           1 :     const CNetAddr mapLocalHost_entry = CNetAddr(raw_addr);
     603                 :           1 :     {
     604         [ +  - ]:           1 :         LOCK(g_maplocalhost_mutex);
     605                 :           1 :         LocalServiceInfo lsi;
     606                 :           1 :         lsi.nScore = 23;
     607                 :           1 :         lsi.nPort = 42;
     608   [ +  -  +  - ]:           1 :         mapLocalHost[mapLocalHost_entry] = lsi;
     609                 :           0 :     }
     610                 :             : 
     611                 :             :     // create a peer with an IPv4 address
     612                 :           1 :     in_addr ipv4AddrPeer;
     613                 :           1 :     ipv4AddrPeer.s_addr = 0xa0b0c001;
     614         [ +  - ]:           2 :     CAddress addr = CAddress(CService(ipv4AddrPeer, 7777), NODE_NETWORK);
     615                 :           2 :     std::unique_ptr<CNode> pnode = std::make_unique<CNode>(/*id=*/0,
     616                 :           1 :                                                            /*sock=*/nullptr,
     617                 :             :                                                            addr,
     618                 :           1 :                                                            /*nKeyedNetGroupIn=*/0,
     619                 :           1 :                                                            /*nLocalHostNonceIn=*/0,
     620                 :           1 :                                                            CAddress{},
     621         [ +  - ]:           1 :                                                            /*pszDest=*/std::string{},
     622                 :           1 :                                                            ConnectionType::OUTBOUND_FULL_RELAY,
     623                 :           1 :                                                            /*inbound_onion=*/false,
     624   [ +  -  +  - ]:           1 :                                                            /*network_key=*/0);
     625         [ +  - ]:           1 :     pnode->fSuccessfullyConnected.store(true);
     626                 :             : 
     627                 :             :     // the peer claims to be reaching us via IPv6
     628                 :           1 :     in6_addr ipv6AddrLocal;
     629         [ +  - ]:           1 :     memset(ipv6AddrLocal.s6_addr, 0, 16);
     630                 :           1 :     ipv6AddrLocal.s6_addr[0] = 0xcc;
     631         [ +  - ]:           2 :     CAddress addrLocal = CAddress(CService(ipv6AddrLocal, 7777), NODE_NETWORK);
     632         [ +  - ]:           1 :     pnode->SetAddrLocal(addrLocal);
     633                 :             : 
     634                 :             :     // before patch, this causes undefined behavior detectable with clang's -fsanitize=memory
     635         [ +  - ]:           1 :     GetLocalAddrForPeer(*pnode);
     636                 :             : 
     637                 :             :     // suppress no-checks-run warning; if this test fails, it's by triggering a sanitizer
     638   [ +  -  +  -  :           2 :     BOOST_CHECK(1);
                   +  - ]
     639                 :             : 
     640                 :             :     // Cleanup, so that we don't confuse other tests.
     641                 :           1 :     {
     642         [ +  - ]:           1 :         LOCK(g_maplocalhost_mutex);
     643   [ +  -  +  - ]:           1 :         mapLocalHost.erase(mapLocalHost_entry);
     644                 :           1 :     }
     645                 :           1 : }
     646                 :             : 
     647   [ +  -  +  -  :           7 : BOOST_AUTO_TEST_CASE(get_local_addr_for_peer_port)
          +  -  +  -  -  
          +  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
          -  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
                      - ]
     648                 :             : {
     649                 :             :     // Test that GetLocalAddrForPeer() properly selects the address to self-advertise:
     650                 :             :     //
     651                 :             :     // 1. GetLocalAddrForPeer() calls GetLocalAddress() which returns an address that is
     652                 :             :     //    not routable.
     653                 :             :     // 2. GetLocalAddrForPeer() overrides the address with whatever the peer has told us
     654                 :             :     //    he sees us as.
     655                 :             :     // 2.1. For inbound connections we must override both the address and the port.
     656                 :             :     // 2.2. For outbound connections we must override only the address.
     657                 :             : 
     658                 :             :     // Pretend that we bound to this port.
     659                 :           1 :     const uint16_t bind_port = 20001;
     660   [ +  -  +  - ]:           2 :     m_node.args->ForceSetArg("-bind", strprintf("3.4.5.6:%u", bind_port));
     661                 :             : 
     662                 :             :     // Our address:port as seen from the peer, completely different from the above.
     663                 :           1 :     in_addr peer_us_addr;
     664                 :           1 :     peer_us_addr.s_addr = htonl(0x02030405);
     665                 :           1 :     const CService peer_us{peer_us_addr, 20002};
     666                 :             : 
     667                 :             :     // Create a peer with a routable IPv4 address (outbound).
     668                 :           1 :     in_addr peer_out_in_addr;
     669                 :           1 :     peer_out_in_addr.s_addr = htonl(0x01020304);
     670                 :           1 :     CNode peer_out{/*id=*/0,
     671                 :             :                    /*sock=*/nullptr,
     672         [ -  + ]:           1 :                    /*addrIn=*/CAddress{CService{peer_out_in_addr, 8333}, NODE_NETWORK},
     673                 :             :                    /*nKeyedNetGroupIn=*/0,
     674                 :             :                    /*nLocalHostNonceIn=*/0,
     675         [ +  - ]:           2 :                    /*addrBindIn=*/CService{},
     676                 :           1 :                    /*addrNameIn=*/std::string{},
     677                 :             :                    /*conn_type_in=*/ConnectionType::OUTBOUND_FULL_RELAY,
     678                 :             :                    /*inbound_onion=*/false,
     679   [ +  -  +  - ]:           3 :                    /*network_key=*/0};
     680         [ +  - ]:           1 :     peer_out.fSuccessfullyConnected = true;
     681         [ +  - ]:           1 :     peer_out.SetAddrLocal(peer_us);
     682                 :             : 
     683                 :             :     // Without the fix peer_us:8333 is chosen instead of the proper peer_us:bind_port.
     684         [ +  - ]:           1 :     auto chosen_local_addr = GetLocalAddrForPeer(peer_out);
     685   [ +  -  +  -  :           2 :     BOOST_REQUIRE(chosen_local_addr);
                   +  - ]
     686         [ +  - ]:           1 :     const CService expected{peer_us_addr, bind_port};
     687   [ +  -  +  -  :           2 :     BOOST_CHECK(*chosen_local_addr == expected);
             +  -  +  - ]
     688                 :             : 
     689                 :             :     // Create a peer with a routable IPv4 address (inbound).
     690                 :           1 :     in_addr peer_in_in_addr;
     691                 :           1 :     peer_in_in_addr.s_addr = htonl(0x05060708);
     692                 :           1 :     CNode peer_in{/*id=*/0,
     693                 :             :                   /*sock=*/nullptr,
     694         [ -  + ]:           1 :                   /*addrIn=*/CAddress{CService{peer_in_in_addr, 8333}, NODE_NETWORK},
     695                 :             :                   /*nKeyedNetGroupIn=*/0,
     696                 :             :                   /*nLocalHostNonceIn=*/0,
     697         [ +  - ]:           2 :                   /*addrBindIn=*/CService{},
     698                 :           1 :                   /*addrNameIn=*/std::string{},
     699                 :             :                   /*conn_type_in=*/ConnectionType::INBOUND,
     700                 :             :                   /*inbound_onion=*/false,
     701   [ +  -  +  - ]:           3 :                   /*network_key=*/1};
     702         [ +  - ]:           1 :     peer_in.fSuccessfullyConnected = true;
     703         [ +  - ]:           1 :     peer_in.SetAddrLocal(peer_us);
     704                 :             : 
     705                 :             :     // Without the fix peer_us:8333 is chosen instead of the proper peer_us:peer_us.GetPort().
     706         [ +  - ]:           2 :     chosen_local_addr = GetLocalAddrForPeer(peer_in);
     707   [ +  -  +  -  :           2 :     BOOST_REQUIRE(chosen_local_addr);
                   +  - ]
     708   [ +  -  +  -  :           2 :     BOOST_CHECK(*chosen_local_addr == peer_us);
             +  -  +  - ]
     709                 :             : 
     710   [ +  -  +  -  :           2 :     m_node.args->ForceSetArg("-bind", "");
                   +  - ]
     711                 :           1 : }
     712                 :             : 
     713   [ +  -  +  -  :           7 : BOOST_AUTO_TEST_CASE(LimitedAndReachable_Network)
          +  -  +  -  -  
          +  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
          -  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
                      - ]
     714                 :             : {
     715   [ +  -  +  - ]:           2 :     BOOST_CHECK(g_reachable_nets.Contains(NET_IPV4));
     716   [ +  -  +  - ]:           2 :     BOOST_CHECK(g_reachable_nets.Contains(NET_IPV6));
     717   [ +  -  +  - ]:           2 :     BOOST_CHECK(g_reachable_nets.Contains(NET_ONION));
     718   [ +  -  +  - ]:           2 :     BOOST_CHECK(g_reachable_nets.Contains(NET_I2P));
     719   [ +  -  +  - ]:           2 :     BOOST_CHECK(g_reachable_nets.Contains(NET_CJDNS));
     720                 :             : 
     721                 :           1 :     g_reachable_nets.Remove(NET_IPV4);
     722                 :           1 :     g_reachable_nets.Remove(NET_IPV6);
     723                 :           1 :     g_reachable_nets.Remove(NET_ONION);
     724                 :           1 :     g_reachable_nets.Remove(NET_I2P);
     725                 :           1 :     g_reachable_nets.Remove(NET_CJDNS);
     726                 :             : 
     727   [ +  -  +  - ]:           2 :     BOOST_CHECK(!g_reachable_nets.Contains(NET_IPV4));
     728   [ +  -  +  - ]:           2 :     BOOST_CHECK(!g_reachable_nets.Contains(NET_IPV6));
     729   [ +  -  +  - ]:           2 :     BOOST_CHECK(!g_reachable_nets.Contains(NET_ONION));
     730   [ +  -  +  - ]:           2 :     BOOST_CHECK(!g_reachable_nets.Contains(NET_I2P));
     731   [ +  -  +  - ]:           2 :     BOOST_CHECK(!g_reachable_nets.Contains(NET_CJDNS));
     732                 :             : 
     733                 :           1 :     g_reachable_nets.Add(NET_IPV4);
     734                 :           1 :     g_reachable_nets.Add(NET_IPV6);
     735                 :           1 :     g_reachable_nets.Add(NET_ONION);
     736                 :           1 :     g_reachable_nets.Add(NET_I2P);
     737                 :           1 :     g_reachable_nets.Add(NET_CJDNS);
     738                 :             : 
     739   [ +  -  +  - ]:           2 :     BOOST_CHECK(g_reachable_nets.Contains(NET_IPV4));
     740   [ +  -  +  - ]:           2 :     BOOST_CHECK(g_reachable_nets.Contains(NET_IPV6));
     741   [ +  -  +  - ]:           2 :     BOOST_CHECK(g_reachable_nets.Contains(NET_ONION));
     742   [ +  -  +  - ]:           2 :     BOOST_CHECK(g_reachable_nets.Contains(NET_I2P));
     743   [ +  -  +  - ]:           2 :     BOOST_CHECK(g_reachable_nets.Contains(NET_CJDNS));
     744                 :           1 : }
     745                 :             : 
     746   [ +  -  +  -  :           7 : BOOST_AUTO_TEST_CASE(LimitedAndReachable_NetworkCaseUnroutableAndInternal)
          +  -  +  -  -  
          +  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
          -  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
                      - ]
     747                 :             : {
     748                 :             :     // Should be reachable by default.
     749   [ +  -  +  - ]:           2 :     BOOST_CHECK(g_reachable_nets.Contains(NET_UNROUTABLE));
     750   [ +  -  +  - ]:           2 :     BOOST_CHECK(g_reachable_nets.Contains(NET_INTERNAL));
     751                 :             : 
     752                 :           1 :     g_reachable_nets.RemoveAll();
     753                 :             : 
     754   [ +  -  +  - ]:           2 :     BOOST_CHECK(!g_reachable_nets.Contains(NET_UNROUTABLE));
     755   [ +  -  +  - ]:           2 :     BOOST_CHECK(!g_reachable_nets.Contains(NET_INTERNAL));
     756                 :             : 
     757                 :           1 :     g_reachable_nets.Add(NET_IPV4);
     758                 :           1 :     g_reachable_nets.Add(NET_IPV6);
     759                 :           1 :     g_reachable_nets.Add(NET_ONION);
     760                 :           1 :     g_reachable_nets.Add(NET_I2P);
     761                 :           1 :     g_reachable_nets.Add(NET_CJDNS);
     762                 :           1 :     g_reachable_nets.Add(NET_UNROUTABLE);
     763                 :           1 :     g_reachable_nets.Add(NET_INTERNAL);
     764                 :           1 : }
     765                 :             : 
     766                 :           2 : CNetAddr UtilBuildAddress(unsigned char p1, unsigned char p2, unsigned char p3, unsigned char p4)
     767                 :             : {
     768                 :           2 :     unsigned char ip[] = {p1, p2, p3, p4};
     769                 :             : 
     770                 :           2 :     struct sockaddr_in sa;
     771                 :           2 :     memset(&sa, 0, sizeof(sockaddr_in)); // initialize the memory block
     772                 :           2 :     memcpy(&(sa.sin_addr), &ip, sizeof(ip));
     773                 :           2 :     return CNetAddr(sa.sin_addr);
     774                 :             : }
     775                 :             : 
     776                 :             : 
     777   [ +  -  +  -  :           7 : BOOST_AUTO_TEST_CASE(LimitedAndReachable_CNetAddr)
          +  -  +  -  -  
          +  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
          -  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
                      - ]
     778                 :             : {
     779                 :           1 :     CNetAddr addr = UtilBuildAddress(0x001, 0x001, 0x001, 0x001); // 1.1.1.1
     780                 :             : 
     781         [ +  - ]:           1 :     g_reachable_nets.Add(NET_IPV4);
     782   [ +  -  +  -  :           2 :     BOOST_CHECK(g_reachable_nets.Contains(addr));
             +  -  +  - ]
     783                 :             : 
     784         [ +  - ]:           1 :     g_reachable_nets.Remove(NET_IPV4);
     785   [ +  -  +  -  :           2 :     BOOST_CHECK(!g_reachable_nets.Contains(addr));
             +  -  +  - ]
     786                 :             : 
     787         [ +  - ]:           1 :     g_reachable_nets.Add(NET_IPV4); // have to reset this, because this is stateful.
     788                 :           1 : }
     789                 :             : 
     790                 :             : 
     791   [ +  -  +  -  :           7 : BOOST_AUTO_TEST_CASE(LocalAddress_BasicLifecycle)
          +  -  +  -  -  
          +  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
          -  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
                      - ]
     792                 :             : {
     793         [ +  - ]:           1 :     CService addr = CService(UtilBuildAddress(0x002, 0x001, 0x001, 0x001), 1000); // 2.1.1.1:1000
     794                 :             : 
     795         [ +  - ]:           1 :     g_reachable_nets.Add(NET_IPV4);
     796                 :             : 
     797   [ +  -  +  -  :           2 :     BOOST_CHECK(!IsLocal(addr));
             +  -  +  - ]
     798   [ +  -  +  -  :           2 :     BOOST_CHECK(AddLocal(addr, 1000));
             +  -  +  - ]
     799   [ +  -  +  -  :           2 :     BOOST_CHECK(IsLocal(addr));
             +  -  +  - ]
     800                 :             : 
     801         [ +  - ]:           1 :     RemoveLocal(addr);
     802   [ +  -  +  -  :           2 :     BOOST_CHECK(!IsLocal(addr));
                   +  - ]
     803                 :           1 : }
     804                 :             : 
     805   [ +  -  +  -  :           7 : BOOST_AUTO_TEST_CASE(initial_advertise_from_version_message)
          +  -  +  -  -  
          +  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
          -  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
                      - ]
     806                 :             : {
     807                 :           1 :     LOCK(NetEventsInterface::g_msgproc_mutex);
     808         [ +  - ]:           1 :     auto& connman{static_cast<ConnmanTestMsg&>(*m_node.connman)};
     809                 :             : 
     810                 :             :     // Tests the following scenario:
     811                 :             :     // * -bind=3.4.5.6:20001 is specified
     812                 :             :     // * we make an outbound connection to a peer
     813                 :             :     // * the peer reports he sees us as 2.3.4.5:20002 in the version message
     814                 :             :     //   (20002 is a random port assigned by our OS for the outgoing TCP connection,
     815                 :             :     //   we cannot accept connections to it)
     816                 :             :     // * we should self-advertise to that peer as 2.3.4.5:20001
     817                 :             : 
     818                 :             :     // Pretend that we bound to this port.
     819                 :           1 :     const uint16_t bind_port = 20001;
     820   [ +  -  +  -  :           2 :     m_node.args->ForceSetArg("-bind", strprintf("3.4.5.6:%u", bind_port));
                   +  - ]
     821         [ +  - ]:           1 :     m_node.connman->SetCaptureMessages(true);
     822                 :             : 
     823                 :             :     // Our address:port as seen from the peer - 2.3.4.5:20002 (different from the above).
     824                 :           1 :     in_addr peer_us_addr;
     825                 :           1 :     peer_us_addr.s_addr = htonl(0x02030405);
     826         [ +  - ]:           1 :     const CService peer_us{peer_us_addr, 20002};
     827                 :             : 
     828                 :             :     // Create a peer with a routable IPv4 address.
     829                 :           1 :     in_addr peer_in_addr;
     830                 :           1 :     peer_in_addr.s_addr = htonl(0x01020304);
     831                 :           1 :     CNode peer{/*id=*/0,
     832                 :             :                /*sock=*/nullptr,
     833         [ -  + ]:           1 :                /*addrIn=*/CAddress{CService{peer_in_addr, 8333}, NODE_NETWORK},
     834                 :             :                /*nKeyedNetGroupIn=*/0,
     835                 :             :                /*nLocalHostNonceIn=*/0,
     836         [ +  - ]:           2 :                /*addrBindIn=*/CService{},
     837                 :           1 :                /*addrNameIn=*/std::string{},
     838                 :             :                /*conn_type_in=*/ConnectionType::OUTBOUND_FULL_RELAY,
     839                 :             :                /*inbound_onion=*/false,
     840   [ +  -  +  - ]:           3 :                /*network_key=*/2};
     841                 :             : 
     842                 :           1 :     const uint64_t services{NODE_NETWORK | NODE_WITNESS};
     843                 :           1 :     const int64_t time{0};
     844                 :             : 
     845                 :             :     // Force ChainstateManager::IsInitialBlockDownload() to return false.
     846                 :             :     // Otherwise PushAddress() isn't called by PeerManager::ProcessMessage().
     847         [ +  - ]:           1 :     auto& chainman = static_cast<TestChainstateManager&>(*m_node.chainman);
     848         [ +  - ]:           1 :     chainman.JumpOutOfIbd();
     849                 :             : 
     850         [ +  - ]:           1 :     m_node.peerman->InitializeNode(peer, NODE_NETWORK);
     851                 :             : 
     852         [ +  - ]:           1 :     m_node.peerman->SendMessages(peer);
     853         [ +  - ]:           1 :     connman.FlushSendBuffer(peer); // Drop sent version message
     854                 :             : 
     855         [ +  - ]:           1 :     auto msg_version_receive =
     856   [ +  -  +  - ]:           1 :         NetMsg::Make(NetMsgType::VERSION, PROTOCOL_VERSION, services, time, services, CAddress::V1_NETWORK(peer_us));
     857   [ +  -  -  + ]:           1 :     Assert(connman.ReceiveMsgFrom(peer, std::move(msg_version_receive)));
     858         [ +  - ]:           1 :     peer.fPauseSend = false;
     859         [ +  - ]:           1 :     bool more_work{connman.ProcessMessagesOnce(peer)};
     860         [ -  + ]:           1 :     Assert(!more_work);
     861                 :             : 
     862         [ +  - ]:           1 :     m_node.peerman->SendMessages(peer);
     863         [ +  - ]:           1 :     connman.FlushSendBuffer(peer); // Drop sent verack message
     864                 :             : 
     865   [ +  -  +  -  :           2 :     Assert(connman.ReceiveMsgFrom(peer, NetMsg::Make(NetMsgType::VERACK)));
             +  -  -  + ]
     866         [ +  - ]:           1 :     peer.fPauseSend = false;
     867                 :             :     // Will set peer.fSuccessfullyConnected to true (necessary in SendMessages()).
     868         [ +  - ]:           1 :     more_work = connman.ProcessMessagesOnce(peer);
     869         [ -  + ]:           1 :     Assert(!more_work);
     870                 :             : 
     871                 :             :     // Ensure that peer_us_addr:bind_port is sent to the peer.
     872         [ +  - ]:           1 :     const CService expected{peer_us_addr, bind_port};
     873                 :           1 :     bool sent{false};
     874                 :             : 
     875         [ +  - ]:           1 :     const auto CaptureMessageOrig = CaptureMessage;
     876                 :           5 :     CaptureMessage = [&sent, &expected](const CAddress& addr,
     877                 :             :                                         const std::string& msg_type,
     878                 :             :                                         std::span<const unsigned char> data,
     879                 :             :                                         bool is_incoming) -> void {
     880   [ +  -  +  + ]:           4 :         if (!is_incoming && msg_type == "addr") {
     881                 :           1 :             std::vector<CAddress> addresses;
     882                 :             : 
     883         [ +  - ]:           1 :             SpanReader{data} >> CAddress::V1_NETWORK(addresses);
     884                 :             : 
     885         [ +  - ]:           1 :             for (const auto& addr : addresses) {
     886   [ +  -  +  - ]:           1 :                 if (addr == expected) {
     887                 :           1 :                     sent = true;
     888                 :           1 :                     return;
     889                 :             :                 }
     890                 :             :             }
     891                 :           1 :         }
     892                 :           1 :     };
     893                 :             : 
     894         [ +  - ]:           1 :     m_node.peerman->SendMessages(peer);
     895                 :             : 
     896   [ +  -  +  -  :           2 :     BOOST_CHECK(sent);
                   +  - ]
     897                 :             : 
     898         [ +  - ]:           1 :     CaptureMessage = CaptureMessageOrig;
     899         [ +  - ]:           1 :     chainman.ResetIbd();
     900         [ +  - ]:           1 :     m_node.connman->SetCaptureMessages(false);
     901   [ +  -  +  -  :           2 :     m_node.args->ForceSetArg("-bind", "");
                   +  - ]
     902         [ +  - ]:           3 : }
     903                 :             : 
     904                 :             : 
     905   [ +  -  +  -  :           7 : BOOST_AUTO_TEST_CASE(advertise_local_address)
          +  -  +  -  -  
          +  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
          -  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
                      - ]
     906                 :             : {
     907                 :           8 :     auto CreatePeer = [](const CAddress& addr) {
     908                 :          14 :         return std::make_unique<CNode>(/*id=*/0,
     909                 :           7 :                                        /*sock=*/nullptr,
     910                 :             :                                        addr,
     911                 :           7 :                                        /*nKeyedNetGroupIn=*/0,
     912                 :           7 :                                        /*nLocalHostNonceIn=*/0,
     913                 :           7 :                                        CAddress{},
     914         [ +  - ]:           7 :                                        /*pszDest=*/std::string{},
     915                 :           7 :                                        ConnectionType::OUTBOUND_FULL_RELAY,
     916                 :           7 :                                        /*inbound_onion=*/false,
     917   [ +  -  +  - ]:          14 :                                        /*network_key=*/0);
     918                 :             :     };
     919                 :           1 :     g_reachable_nets.Add(NET_CJDNS);
     920                 :             : 
     921   [ +  -  +  - ]:           2 :     CAddress addr_ipv4{Lookup("1.2.3.4", 8333, false).value(), NODE_NONE};
     922   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr_ipv4.IsValid());
             +  -  +  - ]
     923   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr_ipv4.IsIPv4());
                   +  - ]
     924                 :             : 
     925   [ +  -  +  -  :           2 :     CAddress addr_ipv6{Lookup("1122:3344:5566:7788:9900:aabb:ccdd:eeff", 8333, false).value(), NODE_NONE};
                   +  - ]
     926   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr_ipv6.IsValid());
             +  -  +  - ]
     927   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr_ipv6.IsIPv6());
                   +  - ]
     928                 :             : 
     929   [ +  -  +  -  :           2 :     CAddress addr_ipv6_tunnel{Lookup("2002:3344:5566:7788:9900:aabb:ccdd:eeff", 8333, false).value(), NODE_NONE};
                   +  - ]
     930   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr_ipv6_tunnel.IsValid());
             +  -  +  - ]
     931   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr_ipv6_tunnel.IsIPv6());
                   +  - ]
     932   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr_ipv6_tunnel.IsRFC3964());
             +  -  +  - ]
     933                 :             : 
     934   [ +  -  +  -  :           2 :     CAddress addr_teredo{Lookup("2001:0000:5566:7788:9900:aabb:ccdd:eeff", 8333, false).value(), NODE_NONE};
                   +  - ]
     935   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr_teredo.IsValid());
             +  -  +  - ]
     936   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr_teredo.IsIPv6());
                   +  - ]
     937   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr_teredo.IsRFC4380());
             +  -  +  - ]
     938                 :             : 
     939         [ +  - ]:           1 :     CAddress addr_onion;
     940   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr_onion.SetSpecial("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion"));
             +  -  +  - ]
     941   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr_onion.IsValid());
             +  -  +  - ]
     942   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr_onion.IsTor());
                   +  - ]
     943                 :             : 
     944         [ +  - ]:           1 :     CAddress addr_i2p;
     945   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr_i2p.SetSpecial("udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p"));
             +  -  +  - ]
     946   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr_i2p.IsValid());
             +  -  +  - ]
     947   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr_i2p.IsI2P());
                   +  - ]
     948                 :             : 
     949   [ +  -  +  -  :           3 :     CService service_cjdns{Lookup("fc00:3344:5566:7788:9900:aabb:ccdd:eeff", 8333, false).value(), NODE_NONE};
             +  -  +  - ]
     950         [ +  - ]:           2 :     CAddress addr_cjdns{MaybeFlipIPv6toCJDNS(service_cjdns), NODE_NONE};
     951   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr_cjdns.IsValid());
             +  -  +  - ]
     952   [ +  -  +  -  :           2 :     BOOST_REQUIRE(addr_cjdns.IsCJDNS());
                   +  - ]
     953                 :             : 
     954         [ +  - ]:           1 :     const auto peer_ipv4{CreatePeer(addr_ipv4)};
     955         [ +  - ]:           1 :     const auto peer_ipv6{CreatePeer(addr_ipv6)};
     956         [ +  - ]:           1 :     const auto peer_ipv6_tunnel{CreatePeer(addr_ipv6_tunnel)};
     957         [ +  - ]:           1 :     const auto peer_teredo{CreatePeer(addr_teredo)};
     958         [ +  - ]:           1 :     const auto peer_onion{CreatePeer(addr_onion)};
     959         [ +  - ]:           1 :     const auto peer_i2p{CreatePeer(addr_i2p)};
     960         [ +  - ]:           1 :     const auto peer_cjdns{CreatePeer(addr_cjdns)};
     961                 :             : 
     962                 :             :     // one local clearnet address - advertise to all but privacy peers
     963         [ +  - ]:           1 :     AddLocal(addr_ipv4);
     964   [ +  -  +  -  :           2 :     BOOST_CHECK(GetLocalAddress(*peer_ipv4) == addr_ipv4);
          +  -  +  -  +  
                      - ]
     965   [ +  -  +  -  :           2 :     BOOST_CHECK(GetLocalAddress(*peer_ipv6) == addr_ipv4);
          +  -  +  -  +  
                      - ]
     966   [ +  -  +  -  :           2 :     BOOST_CHECK(GetLocalAddress(*peer_ipv6_tunnel) == addr_ipv4);
          +  -  +  -  +  
                      - ]
     967   [ +  -  +  -  :           2 :     BOOST_CHECK(GetLocalAddress(*peer_teredo) == addr_ipv4);
          +  -  +  -  +  
                      - ]
     968   [ +  -  +  -  :           2 :     BOOST_CHECK(GetLocalAddress(*peer_cjdns) == addr_ipv4);
          +  -  +  -  +  
                      - ]
     969   [ +  -  +  -  :           2 :     BOOST_CHECK(!GetLocalAddress(*peer_onion).IsValid());
          +  -  +  -  +  
                      - ]
     970   [ +  -  +  -  :           2 :     BOOST_CHECK(!GetLocalAddress(*peer_i2p).IsValid());
          +  -  +  -  +  
                      - ]
     971         [ +  - ]:           1 :     RemoveLocal(addr_ipv4);
     972                 :             : 
     973                 :             :     // local privacy addresses - don't advertise to clearnet peers
     974         [ +  - ]:           1 :     AddLocal(addr_onion);
     975         [ +  - ]:           1 :     AddLocal(addr_i2p);
     976   [ +  -  +  -  :           2 :     BOOST_CHECK(!GetLocalAddress(*peer_ipv4).IsValid());
          +  -  +  -  +  
                      - ]
     977   [ +  -  +  -  :           2 :     BOOST_CHECK(!GetLocalAddress(*peer_ipv6).IsValid());
          +  -  +  -  +  
                      - ]
     978   [ +  -  +  -  :           2 :     BOOST_CHECK(!GetLocalAddress(*peer_ipv6_tunnel).IsValid());
          +  -  +  -  +  
                      - ]
     979   [ +  -  +  -  :           2 :     BOOST_CHECK(!GetLocalAddress(*peer_teredo).IsValid());
          +  -  +  -  +  
                      - ]
     980   [ +  -  +  -  :           2 :     BOOST_CHECK(!GetLocalAddress(*peer_cjdns).IsValid());
          +  -  +  -  +  
                      - ]
     981   [ +  -  +  -  :           2 :     BOOST_CHECK(GetLocalAddress(*peer_onion) == addr_onion);
          +  -  +  -  +  
                      - ]
     982   [ +  -  +  -  :           2 :     BOOST_CHECK(GetLocalAddress(*peer_i2p) == addr_i2p);
          +  -  +  -  +  
                      - ]
     983         [ +  - ]:           1 :     RemoveLocal(addr_onion);
     984         [ +  - ]:           1 :     RemoveLocal(addr_i2p);
     985                 :             : 
     986                 :             :     // local addresses from all networks
     987         [ +  - ]:           1 :     AddLocal(addr_ipv4);
     988         [ +  - ]:           1 :     AddLocal(addr_ipv6);
     989         [ +  - ]:           1 :     AddLocal(addr_ipv6_tunnel);
     990         [ +  - ]:           1 :     AddLocal(addr_teredo);
     991         [ +  - ]:           1 :     AddLocal(addr_onion);
     992         [ +  - ]:           1 :     AddLocal(addr_i2p);
     993         [ +  - ]:           1 :     AddLocal(addr_cjdns);
     994   [ +  -  +  -  :           2 :     BOOST_CHECK(GetLocalAddress(*peer_ipv4) == addr_ipv4);
          +  -  +  -  +  
                      - ]
     995   [ +  -  +  -  :           2 :     BOOST_CHECK(GetLocalAddress(*peer_ipv6) == addr_ipv6);
          +  -  +  -  +  
                      - ]
     996   [ +  -  +  -  :           2 :     BOOST_CHECK(GetLocalAddress(*peer_ipv6_tunnel) == addr_ipv6);
          +  -  +  -  +  
                      - ]
     997   [ +  -  +  -  :           2 :     BOOST_CHECK(GetLocalAddress(*peer_teredo) == addr_ipv4);
          +  -  +  -  +  
                      - ]
     998   [ +  -  +  -  :           2 :     BOOST_CHECK(GetLocalAddress(*peer_onion) == addr_onion);
          +  -  +  -  +  
                      - ]
     999   [ +  -  +  -  :           2 :     BOOST_CHECK(GetLocalAddress(*peer_i2p) == addr_i2p);
          +  -  +  -  +  
                      - ]
    1000   [ +  -  +  -  :           2 :     BOOST_CHECK(GetLocalAddress(*peer_cjdns) == addr_cjdns);
          +  -  +  -  +  
                      - ]
    1001         [ +  - ]:           1 :     RemoveLocal(addr_ipv4);
    1002         [ +  - ]:           1 :     RemoveLocal(addr_ipv6);
    1003         [ +  - ]:           1 :     RemoveLocal(addr_ipv6_tunnel);
    1004         [ +  - ]:           1 :     RemoveLocal(addr_teredo);
    1005         [ +  - ]:           1 :     RemoveLocal(addr_onion);
    1006         [ +  - ]:           1 :     RemoveLocal(addr_i2p);
    1007         [ +  - ]:           1 :     RemoveLocal(addr_cjdns);
    1008                 :           1 : }
    1009                 :             : 
    1010                 :             : namespace {
    1011                 :             : 
    1012                 :          75 : CKey GenerateRandomTestKey(FastRandomContext& rng) noexcept
    1013                 :             : {
    1014                 :          75 :     CKey key;
    1015                 :          75 :     uint256 key_data = rng.rand256();
    1016                 :          75 :     key.Set(key_data.begin(), key_data.end(), true);
    1017                 :          75 :     return key;
    1018                 :             : }
    1019                 :             : 
    1020                 :             : /** A class for scenario-based tests of V2Transport
    1021                 :             :  *
    1022                 :             :  * Each V2TransportTester encapsulates a V2Transport (the one being tested), and can be told to
    1023                 :             :  * interact with it. To do so, it also encapsulates a BIP324Cipher to act as the other side. A
    1024                 :             :  * second V2Transport is not used, as doing so would not permit scenarios that involve sending
    1025                 :             :  * invalid data, or ones using BIP324 features that are not implemented on the sending
    1026                 :             :  * side (like decoy packets).
    1027                 :             :  */
    1028                 :             : class V2TransportTester
    1029                 :             : {
    1030                 :             :     FastRandomContext& m_rng;
    1031                 :             :     V2Transport m_transport; //!< V2Transport being tested
    1032                 :             :     BIP324Cipher m_cipher; //!< Cipher to help with the other side
    1033                 :             :     bool m_test_initiator; //!< Whether m_transport is the initiator (true) or responder (false)
    1034                 :             : 
    1035                 :             :     std::vector<uint8_t> m_sent_garbage; //!< The garbage we've sent to m_transport.
    1036                 :             :     std::vector<uint8_t> m_recv_garbage; //!< The garbage we've received from m_transport.
    1037                 :             :     std::vector<uint8_t> m_to_send; //!< Bytes we have queued up to send to m_transport.
    1038                 :             :     std::vector<uint8_t> m_received; //!< Bytes we have received from m_transport.
    1039                 :             :     std::deque<CSerializedNetMsg> m_msg_to_send; //!< Messages to be sent *by* m_transport to us.
    1040                 :             :     bool m_sent_aad{false};
    1041                 :             : 
    1042                 :             : public:
    1043                 :             :     /** Construct a tester object. test_initiator: whether the tested transport is initiator. */
    1044                 :          75 :     explicit V2TransportTester(FastRandomContext& rng, bool test_initiator)
    1045                 :          75 :         : m_rng{rng},
    1046                 :          75 :           m_transport{0, test_initiator},
    1047                 :          75 :           m_cipher{GenerateRandomTestKey(m_rng), MakeByteSpan(m_rng.rand256())},
    1048         [ +  - ]:          75 :           m_test_initiator(test_initiator) {}
    1049                 :             : 
    1050                 :             :     /** Data type returned by Interact:
    1051                 :             :      *
    1052                 :             :      * - std::nullopt: transport error occurred
    1053                 :             :      * - otherwise: a vector of
    1054                 :             :      *   - std::nullopt: invalid message received
    1055                 :             :      *   - otherwise: a CNetMessage retrieved
    1056                 :             :      */
    1057                 :             :     using InteractResult = std::optional<std::vector<std::optional<CNetMessage>>>;
    1058                 :             : 
    1059                 :             :     /** Send/receive scheduled/available bytes and messages.
    1060                 :             :      *
    1061                 :             :      * This is the only function that interacts with the transport being tested; everything else is
    1062                 :             :      * scheduling things done by Interact(), or processing things learned by it.
    1063                 :             :      */
    1064                 :         239 :     InteractResult Interact()
    1065                 :             :     {
    1066                 :         239 :         std::vector<std::optional<CNetMessage>> ret;
    1067                 :        2925 :         while (true) {
    1068                 :        2925 :             bool progress{false};
    1069                 :             :             // Send bytes from m_to_send to the transport.
    1070         [ +  + ]:        2925 :             if (!m_to_send.empty()) {
    1071         [ -  + ]:        2219 :                 std::span<const uint8_t> to_send = std::span{m_to_send}.first(1 + m_rng.randrange(m_to_send.size()));
    1072                 :        2219 :                 size_t old_len = to_send.size();
    1073         [ +  + ]:        2219 :                 if (!m_transport.ReceivedBytes(to_send)) {
    1074                 :          23 :                     return std::nullopt; // transport error occurred
    1075                 :             :                 }
    1076         [ +  + ]:        2196 :                 if (old_len != to_send.size()) {
    1077                 :        2110 :                     progress = true;
    1078                 :        2110 :                     m_to_send.erase(m_to_send.begin(), m_to_send.begin() + (old_len - to_send.size()));
    1079                 :             :                 }
    1080                 :             :             }
    1081                 :             :             // Retrieve messages received by the transport.
    1082   [ +  +  +  +  :        2902 :             if (m_transport.ReceivedMessageComplete() && (!progress || m_rng.randbool())) {
                   +  + ]
    1083                 :         252 :                 bool reject{false};
    1084                 :         252 :                 auto msg = m_transport.GetReceivedMessage({}, reject);
    1085         [ +  + ]:         252 :                 if (reject) {
    1086         [ +  - ]:          61 :                     ret.emplace_back(std::nullopt);
    1087                 :             :                 } else {
    1088         [ +  - ]:         191 :                     ret.emplace_back(std::move(msg));
    1089                 :             :                 }
    1090                 :         252 :                 progress = true;
    1091                 :         252 :             }
    1092                 :             :             // Enqueue a message to be sent by the transport to us.
    1093   [ +  +  +  -  :        2902 :             if (!m_msg_to_send.empty() && (!progress || m_rng.randbool())) {
                   +  + ]
    1094         [ +  - ]:          51 :                 if (m_transport.SetMessageToSend(m_msg_to_send.front())) {
    1095                 :          51 :                     m_msg_to_send.pop_front();
    1096                 :          51 :                     progress = true;
    1097                 :             :                 }
    1098                 :             :             }
    1099                 :             :             // Receive bytes from the transport.
    1100         [ +  + ]:        2902 :             const auto& [recv_bytes, _more, _msg_type] = m_transport.GetBytesToSend(!m_msg_to_send.empty());
    1101   [ +  +  +  +  :        2902 :             if (!recv_bytes.empty() && (!progress || m_rng.randbool())) {
                   +  + ]
    1102                 :         906 :                 size_t to_receive = 1 + m_rng.randrange(recv_bytes.size());
    1103         [ +  - ]:         906 :                 m_received.insert(m_received.end(), recv_bytes.begin(), recv_bytes.begin() + to_receive);
    1104                 :         906 :                 progress = true;
    1105                 :         906 :                 m_transport.MarkBytesSent(to_receive);
    1106                 :             :             }
    1107         [ +  + ]:        2902 :             if (!progress) break;
    1108                 :             :         }
    1109                 :         216 :         return ret;
    1110                 :         239 :     }
    1111                 :             : 
    1112                 :             :     /** Expose the cipher. */
    1113                 :             :     BIP324Cipher& GetCipher() { return m_cipher; }
    1114                 :             : 
    1115                 :             :     /** Schedule bytes to be sent to the transport. */
    1116                 :       54612 :     void Send(std::span<const uint8_t> data)
    1117                 :             :     {
    1118                 :       54612 :         m_to_send.insert(m_to_send.end(), data.begin(), data.end());
    1119                 :       54612 :     }
    1120                 :             : 
    1121                 :             :     /** Send V1 version message header to the transport. */
    1122                 :           2 :     void SendV1Version(const MessageStartChars& magic)
    1123                 :             :     {
    1124                 :           2 :         CMessageHeader hdr(magic, "version", 126 + m_rng.randrange(11));
    1125                 :           2 :         DataStream ser{};
    1126         [ +  - ]:           2 :         ser << hdr;
    1127   [ -  +  +  - ]:           2 :         m_to_send.insert(m_to_send.end(), UCharCast(ser.data()), UCharCast(ser.data() + ser.size()));
    1128                 :           2 :     }
    1129                 :             : 
    1130                 :             :     /** Schedule bytes to be sent to the transport. */
    1131                 :       54539 :     void Send(std::span<const std::byte> data) { Send(MakeUCharSpan(data)); }
    1132                 :             : 
    1133                 :             :     /** Schedule our ellswift key to be sent to the transport. */
    1134                 :          73 :     void SendKey() { Send(m_cipher.GetOurPubKey()); }
    1135                 :             : 
    1136                 :             :     /** Schedule specified garbage to be sent to the transport. */
    1137                 :          73 :     void SendGarbage(std::span<const uint8_t> garbage)
    1138                 :             :     {
    1139                 :             :         // Remember the specified garbage (so we can use it as AAD).
    1140                 :          73 :         m_sent_garbage.assign(garbage.begin(), garbage.end());
    1141                 :             :         // Schedule it for sending.
    1142         [ -  + ]:          73 :         Send(m_sent_garbage);
    1143                 :          73 :     }
    1144                 :             : 
    1145                 :             :     /** Schedule garbage (of specified length) to be sent to the transport. */
    1146                 :          72 :     void SendGarbage(size_t garbage_len)
    1147                 :             :     {
    1148                 :             :         // Generate random garbage and send it.
    1149   [ -  +  +  - ]:          72 :         SendGarbage(m_rng.randbytes<uint8_t>(garbage_len));
    1150                 :          72 :     }
    1151                 :             : 
    1152                 :             :     /** Schedule garbage (with valid random length) to be sent to the transport. */
    1153                 :          20 :     void SendGarbage()
    1154                 :             :     {
    1155                 :          20 :          SendGarbage(m_rng.randrange(V2Transport::MAX_GARBAGE_LEN + 1));
    1156                 :          20 :     }
    1157                 :             : 
    1158                 :             :     /** Schedule a message to be sent to us by the transport. */
    1159                 :          51 :     void AddMessage(std::string m_type, std::vector<uint8_t> payload)
    1160                 :             :     {
    1161                 :          51 :         CSerializedNetMsg msg;
    1162                 :          51 :         msg.m_type = std::move(m_type);
    1163                 :          51 :         msg.data = std::move(payload);
    1164         [ +  - ]:          51 :         m_msg_to_send.push_back(std::move(msg));
    1165                 :          51 :     }
    1166                 :             : 
    1167                 :             :     /** Expect ellswift key to have been received from transport and process it.
    1168                 :             :      *
    1169                 :             :      * Many other V2TransportTester functions cannot be called until after ReceiveKey() has been
    1170                 :             :      * called, as no encryption keys are set up before that point.
    1171                 :             :      */
    1172                 :          73 :     void ReceiveKey()
    1173                 :             :     {
    1174                 :             :         // When processing a key, enough bytes need to have been received already.
    1175   [ -  +  +  - ]:         146 :         BOOST_REQUIRE(m_received.size() >= EllSwiftPubKey::size());
    1176                 :             :         // Initialize the cipher using it (acting as the opposite side of the tested transport).
    1177                 :          73 :         m_cipher.Initialize(MakeByteSpan(m_received).first(EllSwiftPubKey::size()), !m_test_initiator);
    1178                 :             :         // Strip the processed bytes off the front of the receive buffer.
    1179                 :          73 :         m_received.erase(m_received.begin(), m_received.begin() + EllSwiftPubKey::size());
    1180                 :          73 :     }
    1181                 :             : 
    1182                 :             :     /** Schedule an encrypted packet with specified content/aad/ignore to be sent to transport
    1183                 :             :      *  (only after ReceiveKey). */
    1184                 :       54393 :     void SendPacket(std::span<const uint8_t> content, std::span<const uint8_t> aad = {}, bool ignore = false)
    1185                 :             :     {
    1186                 :             :         // Use cipher to construct ciphertext.
    1187                 :       54393 :         std::vector<std::byte> ciphertext;
    1188         [ +  - ]:       54393 :         ciphertext.resize(content.size() + BIP324Cipher::EXPANSION);
    1189         [ -  + ]:       54393 :         m_cipher.Encrypt(
    1190                 :             :             /*contents=*/MakeByteSpan(content),
    1191                 :             :             /*aad=*/MakeByteSpan(aad),
    1192                 :             :             /*ignore=*/ignore,
    1193                 :       54393 :             /*output=*/ciphertext);
    1194                 :             :         // Schedule it for sending.
    1195   [ -  +  +  - ]:       54393 :         Send(ciphertext);
    1196                 :       54393 :     }
    1197                 :             : 
    1198                 :             :     /** Schedule garbage terminator to be sent to the transport (only after ReceiveKey). */
    1199                 :          73 :     void SendGarbageTerm()
    1200                 :             :     {
    1201                 :             :         // Schedule the garbage terminator to be sent.
    1202                 :          73 :         Send(m_cipher.GetSendGarbageTerminator());
    1203                 :          73 :     }
    1204                 :             : 
    1205                 :             :     /** Schedule version packet to be sent to the transport (only after ReceiveKey). */
    1206                 :         289 :     void SendVersion(std::span<const uint8_t> version_data = {}, bool vers_ignore = false)
    1207                 :             :     {
    1208                 :         289 :         std::span<const std::uint8_t> aad;
    1209                 :             :         // Set AAD to garbage only for first packet.
    1210   [ +  +  -  + ]:         289 :         if (!m_sent_aad) aad = m_sent_garbage;
    1211                 :         289 :         SendPacket(/*content=*/version_data, /*aad=*/aad, /*ignore=*/vers_ignore);
    1212                 :         289 :         m_sent_aad = true;
    1213                 :         289 :     }
    1214                 :             : 
    1215                 :             :     /** Expect a packet to have been received from transport, process it, and return its contents
    1216                 :             :      *  (only after ReceiveKey). Decoys are skipped. Optional associated authenticated data (AAD) is
    1217                 :             :      *  expected in the first received packet, no matter if that is a decoy or not. */
    1218                 :         122 :     std::vector<uint8_t> ReceivePacket(std::span<const std::byte> aad = {})
    1219                 :             :     {
    1220                 :         122 :         std::vector<uint8_t> contents;
    1221                 :             :         // Loop as long as there are ignored packets that are to be skipped.
    1222                 :         122 :         while (true) {
    1223                 :             :             // When processing a packet, at least enough bytes for its length descriptor must be received.
    1224   [ +  -  -  +  :         244 :             BOOST_REQUIRE(m_received.size() >= BIP324Cipher::LENGTH_LEN);
             +  -  -  + ]
    1225                 :             :             // Decrypt the content length.
    1226         [ -  + ]:         122 :             size_t size = m_cipher.DecryptLength(MakeByteSpan(std::span{m_received}.first(BIP324Cipher::LENGTH_LEN)));
    1227                 :             :             // Check that the full packet is in the receive buffer.
    1228   [ +  -  -  +  :         244 :             BOOST_REQUIRE(m_received.size() >= size + BIP324Cipher::EXPANSION);
             +  -  +  - ]
    1229                 :             :             // Decrypt the packet contents.
    1230         [ +  - ]:         122 :             contents.resize(size);
    1231                 :         122 :             bool ignore{false};
    1232                 :         122 :             bool ret = m_cipher.Decrypt(
    1233                 :             :                 /*input=*/MakeByteSpan(
    1234         [ -  + ]:         122 :                     std::span{m_received}.first(size + BIP324Cipher::EXPANSION).subspan(BIP324Cipher::LENGTH_LEN)),
    1235                 :             :                 /*aad=*/aad,
    1236                 :             :                 /*ignore=*/ignore,
    1237                 :             :                 /*contents=*/MakeWritableByteSpan(contents));
    1238   [ +  -  +  - ]:         244 :             BOOST_CHECK(ret);
    1239                 :             :             // Don't expect AAD in further packets.
    1240                 :         122 :             aad = {};
    1241                 :             :             // Strip the processed packet's bytes off the front of the receive buffer.
    1242                 :         122 :             m_received.erase(m_received.begin(), m_received.begin() + size + BIP324Cipher::EXPANSION);
    1243                 :             :             // Stop if the ignore bit is not set on this packet.
    1244         [ -  + ]:         122 :             if (!ignore) break;
    1245                 :             :         }
    1246                 :         122 :         return contents;
    1247                 :           0 :     }
    1248                 :             : 
    1249                 :             :     /** Expect garbage and garbage terminator to have been received, and process them (only after
    1250                 :             :      *  ReceiveKey). */
    1251                 :          71 :     void ReceiveGarbage()
    1252                 :             :     {
    1253                 :             :         // Figure out the garbage length.
    1254                 :          71 :         size_t garblen;
    1255         [ +  - ]:      147744 :         for (garblen = 0; garblen <= V2Transport::MAX_GARBAGE_LEN; ++garblen) {
    1256   [ -  +  +  -  :      295488 :             BOOST_REQUIRE(m_received.size() >= garblen + BIP324Cipher::GARBAGE_TERMINATOR_LEN);
                   -  + ]
    1257   [ -  +  +  + ]:      147744 :             auto term_span = MakeByteSpan(std::span{m_received}.subspan(garblen, BIP324Cipher::GARBAGE_TERMINATOR_LEN));
    1258         [ +  + ]:      147744 :             if (std::ranges::equal(term_span, m_cipher.GetReceiveGarbageTerminator())) break;
    1259                 :             :         }
    1260                 :             :         // Copy the garbage to a buffer.
    1261                 :          71 :         m_recv_garbage.assign(m_received.begin(), m_received.begin() + garblen);
    1262                 :             :         // Strip garbage + garbage terminator off the front of the receive buffer.
    1263                 :          71 :         m_received.erase(m_received.begin(), m_received.begin() + garblen + BIP324Cipher::GARBAGE_TERMINATOR_LEN);
    1264                 :          71 :     }
    1265                 :             : 
    1266                 :             :     /** Expect version packet to have been received, and process it (only after ReceiveKey). */
    1267                 :          71 :     void ReceiveVersion()
    1268                 :             :     {
    1269                 :          71 :         auto contents = ReceivePacket(/*aad=*/MakeByteSpan(m_recv_garbage));
    1270                 :             :         // Version packets from real BIP324 peers are expected to be empty, despite the fact that
    1271                 :             :         // this class supports *sending* non-empty version packets (to test that BIP324 peers
    1272                 :             :         // correctly ignore version packet contents).
    1273   [ +  -  +  - ]:         142 :         BOOST_CHECK(contents.empty());
    1274                 :          71 :     }
    1275                 :             : 
    1276                 :             :     /** Expect application packet to have been received, with specified short id and payload.
    1277                 :             :      *  (only after ReceiveKey). */
    1278                 :           1 :     void ReceiveMessage(uint8_t short_id, std::span<const uint8_t> payload)
    1279                 :             :     {
    1280                 :           1 :         auto ret = ReceivePacket();
    1281   [ +  -  -  +  :           2 :         BOOST_CHECK(ret.size() == payload.size() + 1);
             +  -  +  - ]
    1282   [ +  -  +  -  :           2 :         BOOST_CHECK(ret[0] == short_id);
                   +  - ]
    1283   [ +  -  -  +  :           2 :         BOOST_CHECK(std::ranges::equal(std::span{ret}.subspan(1), payload));
                   +  - ]
    1284                 :           1 :     }
    1285                 :             : 
    1286                 :             :     /** Expect application packet to have been received, with specified 12-char message type and
    1287                 :             :      *  payload (only after ReceiveKey). */
    1288                 :          50 :     void ReceiveMessage(const std::string& m_type, std::span<const uint8_t> payload)
    1289                 :             :     {
    1290                 :          50 :         auto ret = ReceivePacket();
    1291   [ +  -  -  +  :         100 :         BOOST_REQUIRE(ret.size() == payload.size() + 1 + CMessageHeader::MESSAGE_TYPE_SIZE);
             +  -  +  - ]
    1292   [ +  -  +  - ]:         100 :         BOOST_CHECK(ret[0] == 0);
    1293         [ +  + ]:         650 :         for (unsigned i = 0; i < 12; ++i) {
    1294   [ -  +  +  + ]:         600 :             if (i < m_type.size()) {
    1295   [ +  -  +  - ]:         600 :                 BOOST_CHECK(ret[1 + i] == m_type[i]);
    1296                 :             :             } else {
    1297   [ +  -  +  - ]:         900 :                 BOOST_CHECK(ret[1 + i] == 0);
    1298                 :             :             }
    1299                 :             :         }
    1300   [ +  -  -  +  :         100 :         BOOST_CHECK(std::ranges::equal(std::span{ret}.subspan(1 + CMessageHeader::MESSAGE_TYPE_SIZE), payload));
                   +  - ]
    1301                 :          50 :     }
    1302                 :             : 
    1303                 :             :     /** Schedule an encrypted packet with specified message type and payload to be sent to
    1304                 :             :      *  transport (only after ReceiveKey). */
    1305                 :         120 :     void SendMessage(std::string mtype, std::span<const uint8_t> payload)
    1306                 :             :     {
    1307                 :             :         // Construct contents consisting of 0x00 + 12-byte message type + payload.
    1308                 :         120 :         std::vector<uint8_t> contents(1 + CMessageHeader::MESSAGE_TYPE_SIZE + payload.size());
    1309         [ -  + ]:         120 :         std::copy(mtype.begin(), mtype.end(), contents.begin() + 1);
    1310                 :         120 :         std::copy(payload.begin(), payload.end(), contents.begin() + 1 + CMessageHeader::MESSAGE_TYPE_SIZE);
    1311                 :             :         // Send a packet with that as contents.
    1312   [ -  +  +  - ]:         120 :         SendPacket(contents);
    1313                 :         120 :     }
    1314                 :             : 
    1315                 :             :     /** Schedule an encrypted packet with specified short message id and payload to be sent to
    1316                 :             :      *  transport (only after ReceiveKey). */
    1317                 :         152 :     void SendMessage(uint8_t short_id, std::span<const uint8_t> payload)
    1318                 :             :     {
    1319                 :             :         // Construct contents consisting of short_id + payload.
    1320                 :         152 :         std::vector<uint8_t> contents(1 + payload.size());
    1321                 :         152 :         contents[0] = short_id;
    1322                 :         152 :         std::copy(payload.begin(), payload.end(), contents.begin() + 1);
    1323                 :             :         // Send a packet with that as contents.
    1324   [ -  +  +  - ]:         152 :         SendPacket(contents);
    1325                 :         152 :     }
    1326                 :             : 
    1327                 :             :     /** Test whether the transport's session ID matches the session ID we expect. */
    1328                 :          71 :     void CompareSessionIDs() const
    1329                 :             :     {
    1330                 :          71 :         auto info = m_transport.GetInfo();
    1331         [ +  - ]:         142 :         BOOST_CHECK(info.session_id);
    1332         [ +  - ]:         142 :         BOOST_CHECK(uint256(MakeUCharSpan(m_cipher.GetSessionID())) == *info.session_id);
    1333                 :          71 :     }
    1334                 :             : 
    1335                 :             :     /** Introduce a bit error in the data scheduled to be sent. */
    1336                 :          10 :     void Damage()
    1337                 :             :     {
    1338         [ -  + ]:          10 :         m_to_send[m_rng.randrange(m_to_send.size())] ^= (uint8_t{1} << m_rng.randrange(8));
    1339                 :          10 :     }
    1340                 :             : };
    1341                 :             : 
    1342                 :             : } // namespace
    1343                 :             : 
    1344   [ +  -  +  -  :           7 : BOOST_AUTO_TEST_CASE(v2transport_test)
          +  -  +  -  -  
          +  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
          -  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
                      - ]
    1345                 :             : {
    1346                 :             :     // A mostly normal scenario, testing a transport in initiator mode.
    1347         [ +  + ]:          11 :     for (int i = 0; i < 10; ++i) {
    1348                 :          10 :         V2TransportTester tester(m_rng, true);
    1349         [ +  - ]:          10 :         auto ret = tester.Interact();
    1350   [ +  -  +  -  :          20 :         BOOST_REQUIRE(ret && ret->empty());
          -  +  +  -  +  
                      - ]
    1351         [ +  - ]:          10 :         tester.SendKey();
    1352         [ +  - ]:          10 :         tester.SendGarbage();
    1353         [ +  - ]:          10 :         tester.ReceiveKey();
    1354         [ +  - ]:          10 :         tester.SendGarbageTerm();
    1355         [ +  - ]:          10 :         tester.SendVersion();
    1356         [ +  - ]:          20 :         ret = tester.Interact();
    1357   [ +  -  +  -  :          20 :         BOOST_REQUIRE(ret && ret->empty());
          -  +  +  -  +  
                      - ]
    1358         [ +  - ]:          10 :         tester.ReceiveGarbage();
    1359         [ +  - ]:          10 :         tester.ReceiveVersion();
    1360         [ +  - ]:          10 :         tester.CompareSessionIDs();
    1361                 :          10 :         auto msg_data_1 = m_rng.randbytes<uint8_t>(m_rng.randrange(100000));
    1362                 :          10 :         auto msg_data_2 = m_rng.randbytes<uint8_t>(m_rng.randrange(1000));
    1363   [ -  +  +  - ]:          10 :         tester.SendMessage(uint8_t(4), msg_data_1); // cmpctblock short id
    1364         [ +  - ]:          10 :         tester.SendMessage(0, {}); // Invalidly encoded message
    1365   [ -  +  +  -  :          10 :         tester.SendMessage("tx", msg_data_2); // 12-character encoded message type
                   +  - ]
    1366         [ +  - ]:          20 :         ret = tester.Interact();
    1367   [ +  -  +  -  :          20 :         BOOST_REQUIRE(ret && ret->size() == 3);
          -  +  -  +  +  
                -  +  - ]
    1368   [ +  -  +  -  :          20 :         BOOST_CHECK((*ret)[0] && (*ret)[0]->m_type == "cmpctblock" && std::ranges::equal((*ret)[0]->m_recv, MakeByteSpan(msg_data_1)));
          +  -  -  +  +  
                -  +  - ]
    1369   [ +  -  +  -  :          20 :         BOOST_CHECK(!(*ret)[1]);
                   +  - ]
    1370   [ +  -  +  -  :          20 :         BOOST_CHECK((*ret)[2] && (*ret)[2]->m_type == "tx" && std::ranges::equal((*ret)[2]->m_recv, MakeByteSpan(msg_data_2)));
          +  -  -  +  +  
                -  -  + ]
    1371                 :             : 
    1372                 :             :         // Then send a message with a bit error, expecting failure. It's possible this failure does
    1373                 :             :         // not occur immediately (when the length descriptor was modified), but it should come
    1374                 :             :         // eventually, and no messages can be delivered anymore.
    1375   [ -  +  +  -  :          10 :         tester.SendMessage("bad", msg_data_1);
                   +  - ]
    1376                 :          10 :         tester.Damage();
    1377                 :          10 :         while (true) {
    1378         [ +  - ]:          20 :             ret = tester.Interact();
    1379         [ -  + ]:          10 :             if (!ret) break; // failure
    1380   [ #  #  #  #  :           0 :             BOOST_CHECK(ret->size() == 0); // no message can be delivered
                   #  # ]
    1381                 :             :             // Send another message.
    1382                 :           0 :             auto msg_data_3 = m_rng.randbytes<uint8_t>(m_rng.randrange(10000));
    1383   [ #  #  #  # ]:           0 :             tester.SendMessage(uint8_t(12), msg_data_3); // getheaders short id
    1384                 :           0 :         }
    1385                 :          10 :     }
    1386                 :             : 
    1387                 :             :     // Normal scenario, with a transport in responder node.
    1388         [ +  + ]:          11 :     for (int i = 0; i < 10; ++i) {
    1389                 :          10 :         V2TransportTester tester(m_rng, false);
    1390         [ +  - ]:          10 :         tester.SendKey();
    1391         [ +  - ]:          10 :         tester.SendGarbage();
    1392         [ +  - ]:          10 :         auto ret = tester.Interact();
    1393   [ +  -  +  -  :          20 :         BOOST_REQUIRE(ret && ret->empty());
          -  +  +  -  +  
                      - ]
    1394         [ +  - ]:          10 :         tester.ReceiveKey();
    1395         [ +  - ]:          10 :         tester.SendGarbageTerm();
    1396         [ +  - ]:          10 :         tester.SendVersion();
    1397         [ +  - ]:          20 :         ret = tester.Interact();
    1398   [ +  -  +  -  :          20 :         BOOST_REQUIRE(ret && ret->empty());
          -  +  +  -  +  
                      - ]
    1399         [ +  - ]:          10 :         tester.ReceiveGarbage();
    1400         [ +  - ]:          10 :         tester.ReceiveVersion();
    1401         [ +  - ]:          10 :         tester.CompareSessionIDs();
    1402                 :          10 :         auto msg_data_1 = m_rng.randbytes<uint8_t>(m_rng.randrange(100000));
    1403                 :          10 :         auto msg_data_2 = m_rng.randbytes<uint8_t>(m_rng.randrange(1000));
    1404   [ -  +  +  - ]:          10 :         tester.SendMessage(uint8_t(14), msg_data_1); // inv short id
    1405   [ -  +  +  - ]:          10 :         tester.SendMessage(uint8_t(19), msg_data_2); // pong short id
    1406         [ +  - ]:          20 :         ret = tester.Interact();
    1407   [ +  -  +  -  :          20 :         BOOST_REQUIRE(ret && ret->size() == 2);
          -  +  -  +  +  
                -  +  - ]
    1408   [ +  -  +  -  :          20 :         BOOST_CHECK((*ret)[0] && (*ret)[0]->m_type == "inv" && std::ranges::equal((*ret)[0]->m_recv, MakeByteSpan(msg_data_1)));
          +  -  -  +  +  
                -  +  - ]
    1409   [ +  -  +  -  :          20 :         BOOST_CHECK((*ret)[1] && (*ret)[1]->m_type == "pong" && std::ranges::equal((*ret)[1]->m_recv, MakeByteSpan(msg_data_2)));
          +  -  -  +  +  
                      - ]
    1410                 :             : 
    1411                 :             :         // Then send a too-large message.
    1412                 :          10 :         auto msg_data_3 = m_rng.randbytes<uint8_t>(4005000);
    1413   [ -  +  +  - ]:          10 :         tester.SendMessage(uint8_t(11), msg_data_3); // getdata short id
    1414         [ +  - ]:          20 :         ret = tester.Interact();
    1415   [ +  -  +  - ]:          20 :         BOOST_CHECK(!ret);
    1416                 :          10 :     }
    1417                 :             : 
    1418                 :             :     // Various valid but unusual scenarios.
    1419         [ +  + ]:          51 :     for (int i = 0; i < 50; ++i) {
    1420                 :             :         /** Whether an initiator or responder is being tested. */
    1421                 :          50 :         bool initiator = m_rng.randbool();
    1422                 :             :         /** Use either 0 bytes or the maximum possible (4095 bytes) garbage length. */
    1423         [ +  + ]:          50 :         size_t garb_len = m_rng.randbool() ? 0 : V2Transport::MAX_GARBAGE_LEN;
    1424                 :             :         /** How many decoy packets to send before the version packet. */
    1425                 :          50 :         unsigned num_ignore_version = m_rng.randrange(10);
    1426                 :             :         /** What data to send in the version packet (ignored by BIP324 peers, but reserved for future extensions). */
    1427         [ +  + ]:          50 :         auto ver_data = m_rng.randbytes<uint8_t>(m_rng.randbool() ? 0 : m_rng.randrange(1000));
    1428                 :             :         /** Whether to immediately send key and garbage out (required for responders, optional otherwise). */
    1429   [ +  +  +  + ]:          50 :         bool send_immediately = !initiator || m_rng.randbool();
    1430                 :             :         /** How many decoy packets to send before the first and second real message. */
    1431                 :          50 :         unsigned num_decoys_1 = m_rng.randrange(1000), num_decoys_2 = m_rng.randrange(1000);
    1432         [ +  - ]:          50 :         V2TransportTester tester(m_rng, initiator);
    1433         [ +  + ]:          50 :         if (send_immediately) {
    1434         [ +  - ]:          39 :             tester.SendKey();
    1435         [ +  - ]:          39 :             tester.SendGarbage(garb_len);
    1436                 :             :         }
    1437         [ +  - ]:          50 :         auto ret = tester.Interact();
    1438   [ +  -  +  -  :         100 :         BOOST_REQUIRE(ret && ret->empty());
          -  +  +  -  +  
                      + ]
    1439         [ +  + ]:          50 :         if (!send_immediately) {
    1440         [ +  - ]:          11 :             tester.SendKey();
    1441         [ +  - ]:          11 :             tester.SendGarbage(garb_len);
    1442                 :             :         }
    1443         [ +  - ]:          50 :         tester.ReceiveKey();
    1444         [ +  - ]:          50 :         tester.SendGarbageTerm();
    1445         [ +  + ]:         268 :         for (unsigned v = 0; v < num_ignore_version; ++v) {
    1446         [ +  + ]:         218 :             size_t ver_ign_data_len = m_rng.randbool() ? 0 : m_rng.randrange(1000);
    1447                 :         218 :             auto ver_ign_data = m_rng.randbytes<uint8_t>(ver_ign_data_len);
    1448   [ -  +  +  - ]:         218 :             tester.SendVersion(ver_ign_data, true);
    1449                 :         218 :         }
    1450   [ -  +  +  - ]:          50 :         tester.SendVersion(ver_data, false);
    1451         [ +  - ]:         100 :         ret = tester.Interact();
    1452   [ +  -  +  -  :         100 :         BOOST_REQUIRE(ret && ret->empty());
          -  +  +  -  +  
                      - ]
    1453         [ +  - ]:          50 :         tester.ReceiveGarbage();
    1454         [ +  - ]:          50 :         tester.ReceiveVersion();
    1455         [ +  - ]:          50 :         tester.CompareSessionIDs();
    1456         [ +  + ]:       26114 :         for (unsigned d = 0; d < num_decoys_1; ++d) {
    1457                 :       26064 :             auto decoy_data = m_rng.randbytes<uint8_t>(m_rng.randrange(1000));
    1458   [ -  +  +  - ]:       26064 :             tester.SendPacket(/*content=*/decoy_data, /*aad=*/{}, /*ignore=*/true);
    1459                 :       26064 :         }
    1460                 :          50 :         auto msg_data_1 = m_rng.randbytes<uint8_t>(m_rng.randrange(4000000));
    1461   [ -  +  +  - ]:          50 :         tester.SendMessage(uint8_t(28), msg_data_1);
    1462         [ +  + ]:       27818 :         for (unsigned d = 0; d < num_decoys_2; ++d) {
    1463                 :       27768 :             auto decoy_data = m_rng.randbytes<uint8_t>(m_rng.randrange(1000));
    1464   [ -  +  +  - ]:       27768 :             tester.SendPacket(/*content=*/decoy_data, /*aad=*/{}, /*ignore=*/true);
    1465                 :       27768 :         }
    1466                 :          50 :         auto msg_data_2 = m_rng.randbytes<uint8_t>(m_rng.randrange(1000));
    1467   [ -  +  +  - ]:          50 :         tester.SendMessage(uint8_t(13), msg_data_2); // headers short id
    1468                 :             :         // Send invalidly-encoded message
    1469   [ +  -  +  - ]:          50 :         tester.SendMessage(std::string("blocktxn\x00\x00\x00a", CMessageHeader::MESSAGE_TYPE_SIZE), {});
    1470   [ +  -  +  - ]:          50 :         tester.SendMessage("foobar", {}); // test receiving unknown message type
    1471   [ +  -  +  - ]:         100 :         tester.AddMessage("barfoo", {}); // test sending unknown message type
    1472         [ +  - ]:         100 :         ret = tester.Interact();
    1473   [ +  -  +  -  :         100 :         BOOST_REQUIRE(ret && ret->size() == 4);
          -  +  -  +  +  
                -  +  - ]
    1474   [ +  -  +  -  :         100 :         BOOST_CHECK((*ret)[0] && (*ret)[0]->m_type == "addrv2" && std::ranges::equal((*ret)[0]->m_recv, MakeByteSpan(msg_data_1)));
          +  -  -  +  +  
                -  +  - ]
    1475   [ +  -  +  -  :         100 :         BOOST_CHECK((*ret)[1] && (*ret)[1]->m_type == "headers" && std::ranges::equal((*ret)[1]->m_recv, MakeByteSpan(msg_data_2)));
          +  -  -  +  +  
                -  +  - ]
    1476   [ +  -  +  -  :         100 :         BOOST_CHECK(!(*ret)[2]);
                   +  - ]
    1477   [ +  -  +  -  :         100 :         BOOST_CHECK((*ret)[3] && (*ret)[3]->m_type == "foobar" && (*ret)[3]->m_recv.empty());
          +  -  -  +  -  
             +  +  -  +  
                      - ]
    1478   [ +  -  +  - ]:         100 :         tester.ReceiveMessage("barfoo", {});
    1479                 :          50 :     }
    1480                 :             : 
    1481                 :             :     // Too long garbage (initiator).
    1482                 :           1 :     {
    1483                 :           1 :         V2TransportTester tester(m_rng, true);
    1484         [ +  - ]:           1 :         auto ret = tester.Interact();
    1485   [ +  -  +  -  :           2 :         BOOST_REQUIRE(ret && ret->empty());
          -  +  +  -  +  
                      - ]
    1486         [ +  - ]:           1 :         tester.SendKey();
    1487         [ +  - ]:           1 :         tester.SendGarbage(V2Transport::MAX_GARBAGE_LEN + 1);
    1488         [ +  - ]:           1 :         tester.ReceiveKey();
    1489         [ +  - ]:           1 :         tester.SendGarbageTerm();
    1490         [ +  - ]:           2 :         ret = tester.Interact();
    1491   [ +  -  +  - ]:           2 :         BOOST_CHECK(!ret);
    1492                 :           1 :     }
    1493                 :             : 
    1494                 :             :     // Too long garbage (responder).
    1495                 :           1 :     {
    1496                 :           1 :         V2TransportTester tester(m_rng, false);
    1497         [ +  - ]:           1 :         tester.SendKey();
    1498         [ +  - ]:           1 :         tester.SendGarbage(V2Transport::MAX_GARBAGE_LEN + 1);
    1499         [ +  - ]:           1 :         auto ret = tester.Interact();
    1500   [ +  -  +  -  :           2 :         BOOST_REQUIRE(ret && ret->empty());
          -  +  +  -  +  
                      - ]
    1501         [ +  - ]:           1 :         tester.ReceiveKey();
    1502         [ +  - ]:           1 :         tester.SendGarbageTerm();
    1503         [ +  - ]:           2 :         ret = tester.Interact();
    1504   [ +  -  +  - ]:           2 :         BOOST_CHECK(!ret);
    1505                 :           1 :     }
    1506                 :             : 
    1507                 :             :     // Send garbage that includes the first 15 garbage terminator bytes somewhere.
    1508                 :           1 :     {
    1509                 :           1 :         V2TransportTester tester(m_rng, true);
    1510         [ +  - ]:           1 :         auto ret = tester.Interact();
    1511   [ +  -  +  -  :           2 :         BOOST_REQUIRE(ret && ret->empty());
          -  +  +  -  +  
                      - ]
    1512         [ +  - ]:           1 :         tester.SendKey();
    1513         [ +  - ]:           1 :         tester.ReceiveKey();
    1514                 :             :         /** The number of random garbage bytes before the included first 15 bytes of terminator. */
    1515                 :           1 :         size_t len_before = m_rng.randrange(V2Transport::MAX_GARBAGE_LEN - 16 + 1);
    1516                 :             :         /** The number of random garbage bytes after it. */
    1517                 :           1 :         size_t len_after = m_rng.randrange(V2Transport::MAX_GARBAGE_LEN - 16 - len_before + 1);
    1518                 :             :         // Construct len_before + 16 + len_after random bytes.
    1519                 :           1 :         auto garbage = m_rng.randbytes<uint8_t>(len_before + 16 + len_after);
    1520                 :             :         // Replace the designed 16 bytes in the middle with the to-be-sent garbage terminator.
    1521                 :           1 :         auto garb_term = MakeUCharSpan(tester.GetCipher().GetSendGarbageTerminator());
    1522                 :           1 :         std::copy(garb_term.begin(), garb_term.begin() + 16, garbage.begin() + len_before);
    1523                 :             :         // Introduce a bit error in the last byte of that copied garbage terminator, making only
    1524                 :             :         // the first 15 of them match.
    1525         [ -  + ]:           1 :         garbage[len_before + 15] ^= (uint8_t(1) << m_rng.randrange(8));
    1526   [ -  +  +  - ]:           1 :         tester.SendGarbage(garbage);
    1527         [ +  - ]:           1 :         tester.SendGarbageTerm();
    1528         [ +  - ]:           1 :         tester.SendVersion();
    1529         [ +  - ]:           2 :         ret = tester.Interact();
    1530   [ +  -  +  -  :           2 :         BOOST_REQUIRE(ret && ret->empty());
          -  +  +  -  +  
                      - ]
    1531         [ +  - ]:           1 :         tester.ReceiveGarbage();
    1532         [ +  - ]:           1 :         tester.ReceiveVersion();
    1533         [ +  - ]:           1 :         tester.CompareSessionIDs();
    1534                 :           1 :         auto msg_data_1 = m_rng.randbytes<uint8_t>(4000000); // test that receiving 4M payload works
    1535                 :           1 :         auto msg_data_2 = m_rng.randbytes<uint8_t>(4000000); // test that sending 4M payload works
    1536         [ +  - ]:           1 :         tester.SendMessage(uint8_t(m_rng.randrange(223) + 33), {}); // unknown short id
    1537   [ -  +  +  - ]:           1 :         tester.SendMessage(uint8_t(2), msg_data_1); // "block" short id
    1538   [ +  -  +  -  :           2 :         tester.AddMessage("blocktxn", msg_data_2); // schedule blocktxn to be sent to us
                   +  - ]
    1539         [ +  - ]:           2 :         ret = tester.Interact();
    1540   [ +  -  +  -  :           2 :         BOOST_REQUIRE(ret && ret->size() == 2);
          -  +  -  +  +  
                -  +  - ]
    1541   [ +  -  +  -  :           2 :         BOOST_CHECK(!(*ret)[0]);
                   +  - ]
    1542   [ +  -  +  -  :           2 :         BOOST_CHECK((*ret)[1] && (*ret)[1]->m_type == "block" && std::ranges::equal((*ret)[1]->m_recv, MakeByteSpan(msg_data_1)));
          +  -  -  +  +  
                -  -  + ]
    1543   [ -  +  +  - ]:           1 :         tester.ReceiveMessage(uint8_t(3), msg_data_2); // "blocktxn" short id
    1544                 :           1 :     }
    1545                 :             : 
    1546                 :             :     // Send correct network's V1 header
    1547                 :           1 :     {
    1548                 :           1 :         V2TransportTester tester(m_rng, false);
    1549   [ +  -  +  - ]:           1 :         tester.SendV1Version(Params().MessageStart());
    1550         [ +  - ]:           1 :         auto ret = tester.Interact();
    1551   [ +  -  +  - ]:           2 :         BOOST_CHECK(ret);
    1552                 :           1 :     }
    1553                 :             : 
    1554                 :             :     // Send wrong network's V1 header
    1555                 :           1 :     {
    1556                 :           1 :         V2TransportTester tester(m_rng, false);
    1557   [ +  -  +  - ]:           1 :         tester.SendV1Version(CChainParams::Main()->MessageStart());
    1558         [ +  - ]:           1 :         auto ret = tester.Interact();
    1559   [ +  -  +  - ]:           2 :         BOOST_CHECK(!ret);
    1560                 :           1 :     }
    1561                 :           1 : }
    1562                 :             : 
    1563   [ +  -  +  -  :           7 : BOOST_AUTO_TEST_CASE(private_broadcast_version_does_not_update_addrman_services)
          +  -  +  -  -  
          +  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
          -  +  -  +  -  
          +  -  +  -  +  
          -  +  -  -  +  
          +  -  +  -  +  
          -  +  -  +  -  
          +  -  -  +  +  
                      - ]
    1564                 :             : {
    1565                 :           1 :     LOCK(NetEventsInterface::g_msgproc_mutex);
    1566                 :             : 
    1567   [ +  -  +  -  :           2 :     const CNetAddr source{LookupHost("2.3.4.5", /*fAllowLookup=*/false).value()};
                   +  - ]
    1568   [ +  -  +  -  :           2 :     const CAddress addr{Lookup("1.2.3.4", 8333, /*fAllowLookup=*/false).value(), NODE_NONE};
                   +  - ]
    1569   [ +  -  +  -  :           3 :     BOOST_REQUIRE(m_node.addrman->Add({addr}, source));
          +  -  +  -  +  
                +  -  - ]
    1570                 :           1 :     CNode node{/*id=*/0,
    1571                 :             :                /*sock=*/nullptr,
    1572                 :             :                /*addrIn=*/addr,
    1573                 :             :                /*nKeyedNetGroupIn=*/0,
    1574                 :             :                /*nLocalHostNonceIn=*/0,
    1575         [ -  + ]:           1 :                /*addrBindIn=*/CService{},
    1576         [ +  - ]:           2 :                /*addrNameIn=*/"",
    1577                 :             :                /*conn_type_in=*/ConnectionType::PRIVATE_BROADCAST,
    1578                 :             :                /*inbound_onion=*/false,
    1579   [ +  -  +  - ]:           3 :                /*network_key=*/0};
    1580                 :             : 
    1581         [ +  - ]:           1 :     auto& connman = static_cast<ConnmanTestMsg&>(*m_node.connman);
    1582         [ +  - ]:           1 :     connman.Handshake(node,
    1583                 :             :                       /*successfully_connected=*/false,
    1584                 :             :                       /*remote_services=*/NODE_NETWORK,
    1585                 :             :                       /*local_services=*/NODE_NONE,
    1586                 :             :                       /*version=*/PROTOCOL_VERSION,
    1587                 :             :                       /*relay_txs=*/true);
    1588                 :             : 
    1589   [ +  -  +  -  :           1 :     BOOST_CHECK_EQUAL(m_node.addrman->Select().first.nServices, NODE_NONE);
                   +  - ]
    1590         [ +  - ]:           1 :     m_node.peerman->FinalizeNode(node);
    1591         [ +  - ]:           3 : }
    1592                 :             : 
    1593                 :             : BOOST_AUTO_TEST_SUITE_END()
        

Generated by: LCOV version 2.0-1