Branch data Line data Source code
1 : : // Copyright (c) 2012-present The Bitcoin Core developers
2 : : // Distributed under the MIT software license, see the accompanying
3 : : // file COPYING or http://www.opensource.org/licenses/mit-license.php.
4 : :
5 : : #include <addrman.h>
6 : : #include <chainparams.h>
7 : : #include <clientversion.h>
8 : : #include <common/args.h>
9 : : #include <compat/compat.h>
10 : : #include <net.h>
11 : : #include <net_processing.h>
12 : : #include <netaddress.h>
13 : : #include <netbase.h>
14 : : #include <netmessagemaker.h>
15 : : #include <node/protocol_version.h>
16 : : #include <serialize.h>
17 : : #include <span.h>
18 : : #include <streams.h>
19 : : #include <test/util/common.h>
20 : : #include <test/util/net.h>
21 : : #include <test/util/random.h>
22 : : #include <test/util/setup_common.h>
23 : : #include <test/util/validation.h>
24 : : #include <util/strencodings.h>
25 : : #include <util/string.h>
26 : : #include <validation.h>
27 : :
28 : : #include <boost/test/unit_test.hpp>
29 : :
30 : : #include <algorithm>
31 : : #include <cstdint>
32 : : #include <ios>
33 : : #include <memory>
34 : : #include <optional>
35 : : #include <string>
36 : :
37 : : using namespace std::literals;
38 : : using namespace util::hex_literals;
39 : : using util::ToString;
40 : :
41 : : BOOST_FIXTURE_TEST_SUITE(net_tests, RegTestingSetup)
42 : :
43 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(cnode_listen_port)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
44 : : {
45 : : // test default
46 : 1 : uint16_t port{GetListenPort()};
47 [ + - + - ]: 2 : BOOST_CHECK(port == Params().GetDefaultPort());
48 : : // test set port
49 : 1 : uint16_t altPort = 12345;
50 [ + - + - : 2 : BOOST_CHECK(gArgs.SoftSetArg("-port", ToString(altPort)));
+ - + - ]
51 : 1 : port = GetListenPort();
52 [ + - ]: 2 : BOOST_CHECK(port == altPort);
53 : 1 : }
54 : :
55 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(cnode_simple_test)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
56 : : {
57 : 1 : NodeId id = 0;
58 : :
59 : 1 : in_addr ipv4Addr;
60 : 1 : ipv4Addr.s_addr = 0xa0b0c001;
61 : :
62 : 1 : CAddress addr = CAddress(CService(ipv4Addr, 7777), NODE_NETWORK);
63 [ + - ]: 1 : std::string pszDest;
64 : :
65 : 2 : std::unique_ptr<CNode> pnode1 = std::make_unique<CNode>(id++,
66 : 1 : /*sock=*/nullptr,
67 : : addr,
68 : 1 : /*nKeyedNetGroupIn=*/0,
69 : 1 : /*nLocalHostNonceIn=*/0,
70 : 0 : CAddress(),
71 : : pszDest,
72 : 1 : ConnectionType::OUTBOUND_FULL_RELAY,
73 : 1 : /*inbound_onion=*/false,
74 [ + - + - ]: 1 : /*network_key=*/0);
75 [ + - + - : 2 : BOOST_CHECK(pnode1->IsFullOutboundConn() == true);
+ - ]
76 [ + - + - : 2 : BOOST_CHECK(pnode1->IsManualConn() == false);
+ - ]
77 [ + - + - : 2 : BOOST_CHECK(pnode1->IsBlockOnlyConn() == false);
+ - ]
78 [ + - + - : 2 : BOOST_CHECK(pnode1->IsFeelerConn() == false);
+ - ]
79 [ + - + - : 2 : BOOST_CHECK(pnode1->IsAddrFetchConn() == false);
+ - ]
80 [ + - + - : 2 : BOOST_CHECK(pnode1->IsInboundConn() == false);
+ - ]
81 [ + - + - : 2 : BOOST_CHECK(pnode1->m_inbound_onion == false);
+ - ]
82 [ + - + - : 1 : BOOST_CHECK_EQUAL(pnode1->ConnectedThroughNetwork(), Network::NET_IPV4);
+ - ]
83 : :
84 : 2 : std::unique_ptr<CNode> pnode2 = std::make_unique<CNode>(id++,
85 : 1 : /*sock=*/nullptr,
86 : : addr,
87 : 1 : /*nKeyedNetGroupIn=*/1,
88 : 1 : /*nLocalHostNonceIn=*/1,
89 : 0 : CAddress(),
90 : : pszDest,
91 : 1 : ConnectionType::INBOUND,
92 : 1 : /*inbound_onion=*/false,
93 [ + - + - ]: 1 : /*network_key=*/1);
94 [ + - + - : 2 : BOOST_CHECK(pnode2->IsFullOutboundConn() == false);
+ - ]
95 [ + - + - : 2 : BOOST_CHECK(pnode2->IsManualConn() == false);
+ - ]
96 [ + - + - : 2 : BOOST_CHECK(pnode2->IsBlockOnlyConn() == false);
+ - ]
97 [ + - + - : 2 : BOOST_CHECK(pnode2->IsFeelerConn() == false);
+ - ]
98 [ + - + - : 2 : BOOST_CHECK(pnode2->IsAddrFetchConn() == false);
+ - ]
99 [ + - + - : 2 : BOOST_CHECK(pnode2->IsInboundConn() == true);
+ - ]
100 [ + - + - : 2 : BOOST_CHECK(pnode2->m_inbound_onion == false);
+ - ]
101 [ + - + - : 1 : BOOST_CHECK_EQUAL(pnode2->ConnectedThroughNetwork(), Network::NET_IPV4);
+ - ]
102 : :
103 : 2 : std::unique_ptr<CNode> pnode3 = std::make_unique<CNode>(id++,
104 : 1 : /*sock=*/nullptr,
105 : : addr,
106 : 1 : /*nKeyedNetGroupIn=*/0,
107 : 1 : /*nLocalHostNonceIn=*/0,
108 : 0 : CAddress(),
109 : : pszDest,
110 : 1 : ConnectionType::OUTBOUND_FULL_RELAY,
111 : 1 : /*inbound_onion=*/false,
112 [ + - + - ]: 1 : /*network_key=*/2);
113 [ + - + - : 2 : BOOST_CHECK(pnode3->IsFullOutboundConn() == true);
+ - ]
114 [ + - + - : 2 : BOOST_CHECK(pnode3->IsManualConn() == false);
+ - ]
115 [ + - + - : 2 : BOOST_CHECK(pnode3->IsBlockOnlyConn() == false);
+ - ]
116 [ + - + - : 2 : BOOST_CHECK(pnode3->IsFeelerConn() == false);
+ - ]
117 [ + - + - : 2 : BOOST_CHECK(pnode3->IsAddrFetchConn() == false);
+ - ]
118 [ + - + - : 2 : BOOST_CHECK(pnode3->IsInboundConn() == false);
+ - ]
119 [ + - + - : 2 : BOOST_CHECK(pnode3->m_inbound_onion == false);
+ - ]
120 [ + - + - : 1 : BOOST_CHECK_EQUAL(pnode3->ConnectedThroughNetwork(), Network::NET_IPV4);
+ - ]
121 : :
122 : 2 : std::unique_ptr<CNode> pnode4 = std::make_unique<CNode>(id++,
123 : 1 : /*sock=*/nullptr,
124 : : addr,
125 : 1 : /*nKeyedNetGroupIn=*/1,
126 : 1 : /*nLocalHostNonceIn=*/1,
127 : 0 : CAddress(),
128 : : pszDest,
129 : 1 : ConnectionType::INBOUND,
130 : 1 : /*inbound_onion=*/true,
131 [ + - + - ]: 1 : /*network_key=*/3);
132 [ + - + - : 2 : BOOST_CHECK(pnode4->IsFullOutboundConn() == false);
+ - ]
133 [ + - + - : 2 : BOOST_CHECK(pnode4->IsManualConn() == false);
+ - ]
134 [ + - + - : 2 : BOOST_CHECK(pnode4->IsBlockOnlyConn() == false);
+ - ]
135 [ + - + - : 2 : BOOST_CHECK(pnode4->IsFeelerConn() == false);
+ - ]
136 [ + - + - : 2 : BOOST_CHECK(pnode4->IsAddrFetchConn() == false);
+ - ]
137 [ + - + - : 2 : BOOST_CHECK(pnode4->IsInboundConn() == true);
+ - ]
138 [ + - + - : 2 : BOOST_CHECK(pnode4->m_inbound_onion == true);
+ - ]
139 [ + - + - : 1 : BOOST_CHECK_EQUAL(pnode4->ConnectedThroughNetwork(), Network::NET_ONION);
+ - ]
140 : 1 : }
141 : :
142 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(cnetaddr_basic)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
143 : : {
144 : 1 : CNetAddr addr;
145 : :
146 : : // IPv4, INADDR_ANY
147 [ + - + - : 2 : addr = LookupHost("0.0.0.0", false).value();
+ - ]
148 [ + - + - : 2 : BOOST_REQUIRE(!addr.IsValid());
+ - + - ]
149 [ + - + - : 2 : BOOST_REQUIRE(addr.IsIPv4());
+ - ]
150 : :
151 [ + - + - : 2 : BOOST_CHECK(addr.IsBindAny());
+ - + - ]
152 [ + - + - : 2 : BOOST_CHECK(addr.IsAddrV1Compatible());
+ - + - ]
153 [ + - + - : 1 : BOOST_CHECK_EQUAL(addr.ToStringAddr(), "0.0.0.0");
+ - ]
154 : :
155 : : // IPv4, INADDR_NONE
156 [ + - + - : 2 : addr = LookupHost("255.255.255.255", false).value();
+ - ]
157 [ + - + - : 2 : BOOST_REQUIRE(!addr.IsValid());
+ - + - ]
158 [ + - + - : 2 : BOOST_REQUIRE(addr.IsIPv4());
+ - ]
159 : :
160 [ + - + - : 2 : BOOST_CHECK(!addr.IsBindAny());
+ - + - ]
161 [ + - + - : 2 : BOOST_CHECK(addr.IsAddrV1Compatible());
+ - + - ]
162 [ + - + - : 1 : BOOST_CHECK_EQUAL(addr.ToStringAddr(), "255.255.255.255");
+ - ]
163 : :
164 : : // IPv4, casual
165 [ + - + - : 2 : addr = LookupHost("12.34.56.78", false).value();
+ - ]
166 [ + - + - : 2 : BOOST_REQUIRE(addr.IsValid());
+ - + - ]
167 [ + - + - : 2 : BOOST_REQUIRE(addr.IsIPv4());
+ - ]
168 : :
169 [ + - + - : 2 : BOOST_CHECK(!addr.IsBindAny());
+ - + - ]
170 [ + - + - : 2 : BOOST_CHECK(addr.IsAddrV1Compatible());
+ - + - ]
171 [ + - + - : 1 : BOOST_CHECK_EQUAL(addr.ToStringAddr(), "12.34.56.78");
+ - ]
172 : :
173 : : // IPv6, in6addr_any
174 [ + - + - : 2 : addr = LookupHost("::", false).value();
+ - ]
175 [ + - + - : 2 : BOOST_REQUIRE(!addr.IsValid());
+ - + - ]
176 [ + - + - : 2 : BOOST_REQUIRE(addr.IsIPv6());
+ - ]
177 : :
178 [ + - + - : 2 : BOOST_CHECK(addr.IsBindAny());
+ - + - ]
179 [ + - + - : 2 : BOOST_CHECK(addr.IsAddrV1Compatible());
+ - + - ]
180 [ + - + - : 1 : BOOST_CHECK_EQUAL(addr.ToStringAddr(), "::");
+ - ]
181 : :
182 : : // IPv6, casual
183 [ + - + - : 2 : addr = LookupHost("1122:3344:5566:7788:9900:aabb:ccdd:eeff", false).value();
+ - ]
184 [ + - + - : 2 : BOOST_REQUIRE(addr.IsValid());
+ - + - ]
185 [ + - + - : 2 : BOOST_REQUIRE(addr.IsIPv6());
+ - ]
186 : :
187 [ + - + - : 2 : BOOST_CHECK(!addr.IsBindAny());
+ - + - ]
188 [ + - + - : 2 : BOOST_CHECK(addr.IsAddrV1Compatible());
+ - + - ]
189 [ + - + - : 1 : BOOST_CHECK_EQUAL(addr.ToStringAddr(), "1122:3344:5566:7788:9900:aabb:ccdd:eeff");
+ - ]
190 : :
191 : : // IPv6, scoped/link-local. See https://tools.ietf.org/html/rfc4007
192 : : // We support non-negative decimal integers (uint32_t) as zone id indices.
193 : : // Normal link-local scoped address functionality is to append "%" plus the
194 : : // zone id, for example, given a link-local address of "fe80::1" and a zone
195 : : // id of "32", return the address as "fe80::1%32".
196 [ + - ]: 1 : const std::string link_local{"fe80::1"};
197 [ + - ]: 1 : const std::string scoped_addr{link_local + "%32"};
198 [ + - + - ]: 2 : addr = LookupHost(scoped_addr, false).value();
199 [ + - + - : 2 : BOOST_REQUIRE(addr.IsValid());
+ - + - ]
200 [ + - + - : 2 : BOOST_REQUIRE(addr.IsIPv6());
+ - ]
201 [ + - + - : 2 : BOOST_CHECK(!addr.IsBindAny());
+ - + - ]
202 [ + - + - : 1 : BOOST_CHECK_EQUAL(addr.ToStringAddr(), scoped_addr);
+ - ]
203 : :
204 : : // TORv2, no longer supported
205 [ + - + - : 2 : BOOST_CHECK(!addr.SetSpecial("6hzph5hv6337r6p2.onion"));
+ - + - ]
206 : :
207 : : // TORv3
208 : 1 : const char* torv3_addr = "pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion";
209 [ + - + - : 2 : BOOST_REQUIRE(addr.SetSpecial(torv3_addr));
+ - + - ]
210 [ + - + - : 2 : BOOST_REQUIRE(addr.IsValid());
+ - + - ]
211 [ + - + - : 2 : BOOST_REQUIRE(addr.IsTor());
+ - ]
212 : :
213 [ + - + - : 2 : BOOST_CHECK(!addr.IsI2P());
+ - ]
214 [ + - + - : 2 : BOOST_CHECK(!addr.IsBindAny());
+ - + - ]
215 [ + - + - : 2 : BOOST_CHECK(!addr.IsAddrV1Compatible());
+ - + - ]
216 [ + - + - : 1 : BOOST_CHECK_EQUAL(addr.ToStringAddr(), torv3_addr);
+ - ]
217 : :
218 : : // TORv3, broken, with wrong checksum
219 [ + - + - : 2 : BOOST_CHECK(!addr.SetSpecial("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscsad.onion"));
+ - + - ]
220 : :
221 : : // TORv3, broken, with wrong version
222 [ + - + - : 2 : BOOST_CHECK(!addr.SetSpecial("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscrye.onion"));
+ - + - ]
223 : :
224 : : // TORv3, malicious
225 [ + - + - : 3 : BOOST_CHECK(!addr.SetSpecial(std::string{
+ - + - +
- ]
226 : : "pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd\0wtf.onion", 66}));
227 : :
228 : : // TOR, bogus length
229 [ + - + - : 3 : BOOST_CHECK(!addr.SetSpecial(std::string{"mfrggzak.onion"}));
+ - + - +
- ]
230 : :
231 : : // TOR, invalid base32
232 [ + - + - : 3 : BOOST_CHECK(!addr.SetSpecial(std::string{"mf*g zak.onion"}));
+ - + - +
- ]
233 : :
234 : : // I2P
235 : 1 : const char* i2p_addr = "UDHDrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.I2P";
236 [ + - + - : 2 : BOOST_REQUIRE(addr.SetSpecial(i2p_addr));
+ - + - ]
237 [ + - + - : 2 : BOOST_REQUIRE(addr.IsValid());
+ - + - ]
238 [ + - + - : 2 : BOOST_REQUIRE(addr.IsI2P());
+ - ]
239 : :
240 [ + - + - : 2 : BOOST_CHECK(!addr.IsTor());
+ - ]
241 [ + - + - : 2 : BOOST_CHECK(!addr.IsBindAny());
+ - + - ]
242 [ + - + - : 2 : BOOST_CHECK(!addr.IsAddrV1Compatible());
+ - + - ]
243 [ + - + - : 1 : BOOST_CHECK_EQUAL(addr.ToStringAddr(), ToLower(i2p_addr));
+ - + - ]
244 : :
245 : : // I2P, correct length, but decodes to less than the expected number of bytes.
246 [ + - + - : 2 : BOOST_CHECK(!addr.SetSpecial("udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jn=.b32.i2p"));
+ - + - ]
247 : :
248 : : // I2P, extra unnecessary padding
249 [ + - + - : 2 : BOOST_CHECK(!addr.SetSpecial("udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna=.b32.i2p"));
+ - + - ]
250 : :
251 : : // I2P, malicious
252 [ + - + - : 2 : BOOST_CHECK(!addr.SetSpecial("udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v\0wtf.b32.i2p"s));
- + + - +
- + - ]
253 : :
254 : : // I2P, valid but unsupported (56 Base32 characters)
255 : : // See "Encrypted LS with Base 32 Addresses" in
256 : : // https://geti2p.net/spec/encryptedleaseset.txt
257 [ + - + - : 2 : BOOST_CHECK(
+ - + - ]
258 : : !addr.SetSpecial("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscsad.b32.i2p"));
259 : :
260 : : // I2P, invalid base32
261 [ + - + - : 3 : BOOST_CHECK(!addr.SetSpecial(std::string{"tp*szydbh4dp.b32.i2p"}));
+ - + - +
- ]
262 : :
263 : : // Internal
264 [ + - + - ]: 1 : addr.SetInternal("esffpp");
265 [ + - + - : 2 : BOOST_REQUIRE(!addr.IsValid()); // "internal" is considered invalid
+ - + - ]
266 [ + - + - : 2 : BOOST_REQUIRE(addr.IsInternal());
+ - + - ]
267 : :
268 [ + - + - : 2 : BOOST_CHECK(!addr.IsBindAny());
+ - + - ]
269 [ + - + - : 2 : BOOST_CHECK(addr.IsAddrV1Compatible());
+ - + - ]
270 [ + - + - : 1 : BOOST_CHECK_EQUAL(addr.ToStringAddr(), "esffpvrt3wpeaygy.internal");
+ - ]
271 : :
272 : : // Totally bogus
273 [ + - + - : 2 : BOOST_CHECK(!addr.SetSpecial("totally bogus"));
+ - ]
274 : 1 : }
275 : :
276 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(cnetaddr_tostring_canonical_ipv6)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
277 : : {
278 : : // Test that CNetAddr::ToString formats IPv6 addresses with zero compression as described in
279 : : // RFC 5952 ("A Recommendation for IPv6 Address Text Representation").
280 : 1 : const std::map<std::string, std::string> canonical_representations_ipv6{
281 : : {"0000:0000:0000:0000:0000:0000:0000:0000", "::"},
282 : : {"000:0000:000:00:0:00:000:0000", "::"},
283 : : {"000:000:000:000:000:000:000:000", "::"},
284 : : {"00:00:00:00:00:00:00:00", "::"},
285 : : {"0:0:0:0:0:0:0:0", "::"},
286 : : {"0:0:0:0:0:0:0:1", "::1"},
287 : : {"2001:0:0:1:0:0:0:1", "2001:0:0:1::1"},
288 : : {"2001:0db8:0:0:1:0:0:1", "2001:db8::1:0:0:1"},
289 : : {"2001:0db8:85a3:0000:0000:8a2e:0370:7334", "2001:db8:85a3::8a2e:370:7334"},
290 : : {"2001:0db8::0001", "2001:db8::1"},
291 : : {"2001:0db8::0001:0000", "2001:db8::1:0"},
292 : : {"2001:0db8::1:0:0:1", "2001:db8::1:0:0:1"},
293 : : {"2001:db8:0000:0:1::1", "2001:db8::1:0:0:1"},
294 : : {"2001:db8:0000:1:1:1:1:1", "2001:db8:0:1:1:1:1:1"},
295 : : {"2001:db8:0:0:0:0:2:1", "2001:db8::2:1"},
296 : : {"2001:db8:0:0:0::1", "2001:db8::1"},
297 : : {"2001:db8:0:0:1:0:0:1", "2001:db8::1:0:0:1"},
298 : : {"2001:db8:0:0:1::1", "2001:db8::1:0:0:1"},
299 : : {"2001:DB8:0:0:1::1", "2001:db8::1:0:0:1"},
300 : : {"2001:db8:0:0::1", "2001:db8::1"},
301 : : {"2001:db8:0:0:aaaa::1", "2001:db8::aaaa:0:0:1"},
302 : : {"2001:db8:0:1:1:1:1:1", "2001:db8:0:1:1:1:1:1"},
303 : : {"2001:db8:0::1", "2001:db8::1"},
304 : : {"2001:db8:85a3:0:0:8a2e:370:7334", "2001:db8:85a3::8a2e:370:7334"},
305 : : {"2001:db8::0:1", "2001:db8::1"},
306 : : {"2001:db8::0:1:0:0:1", "2001:db8::1:0:0:1"},
307 : : {"2001:DB8::1", "2001:db8::1"},
308 : : {"2001:db8::1", "2001:db8::1"},
309 : : {"2001:db8::1:0:0:1", "2001:db8::1:0:0:1"},
310 : : {"2001:db8::1:1:1:1:1", "2001:db8:0:1:1:1:1:1"},
311 : : {"2001:db8::aaaa:0:0:1", "2001:db8::aaaa:0:0:1"},
312 : : {"2001:db8:aaaa:bbbb:cccc:dddd:0:1", "2001:db8:aaaa:bbbb:cccc:dddd:0:1"},
313 : : {"2001:db8:aaaa:bbbb:cccc:dddd::1", "2001:db8:aaaa:bbbb:cccc:dddd:0:1"},
314 : : {"2001:db8:aaaa:bbbb:cccc:dddd:eeee:0001", "2001:db8:aaaa:bbbb:cccc:dddd:eeee:1"},
315 : : {"2001:db8:aaaa:bbbb:cccc:dddd:eeee:001", "2001:db8:aaaa:bbbb:cccc:dddd:eeee:1"},
316 : : {"2001:db8:aaaa:bbbb:cccc:dddd:eeee:01", "2001:db8:aaaa:bbbb:cccc:dddd:eeee:1"},
317 : : {"2001:db8:aaaa:bbbb:cccc:dddd:eeee:1", "2001:db8:aaaa:bbbb:cccc:dddd:eeee:1"},
318 : : {"2001:db8:aaaa:bbbb:cccc:dddd:eeee:aaaa", "2001:db8:aaaa:bbbb:cccc:dddd:eeee:aaaa"},
319 : : {"2001:db8:aaaa:bbbb:cccc:dddd:eeee:AAAA", "2001:db8:aaaa:bbbb:cccc:dddd:eeee:aaaa"},
320 : : {"2001:db8:aaaa:bbbb:cccc:dddd:eeee:AaAa", "2001:db8:aaaa:bbbb:cccc:dddd:eeee:aaaa"},
321 [ - + + + : 41 : };
- - ]
322 [ + - + + ]: 41 : for (const auto& [input_address, expected_canonical_representation_output] : canonical_representations_ipv6) {
323 [ + - + - ]: 40 : const std::optional<CNetAddr> net_addr{LookupHost(input_address, false)};
324 [ + - + - : 80 : BOOST_REQUIRE(net_addr.value().IsIPv6());
+ - + - ]
325 [ + - + - : 40 : BOOST_CHECK_EQUAL(net_addr.value().ToStringAddr(), expected_canonical_representation_output);
+ - + - ]
326 : 40 : }
327 [ + - + - : 2 : }
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- - - ]
328 : :
329 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(cnetaddr_serialize_v1)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
330 : : {
331 : 1 : CNetAddr addr;
332 : 1 : DataStream s{};
333 : 1 : const auto ser_params{CAddress::V1_NETWORK};
334 : :
335 [ + - ]: 1 : s << ser_params(addr);
336 [ + - - + : 1 : BOOST_CHECK_EQUAL(HexStr(s), "00000000000000000000000000000000");
+ - + - ]
337 [ + - ]: 1 : s.clear();
338 : :
339 [ + - + - : 2 : addr = LookupHost("1.2.3.4", false).value();
+ - ]
340 [ + - ]: 1 : s << ser_params(addr);
341 [ + - - + : 1 : BOOST_CHECK_EQUAL(HexStr(s), "00000000000000000000ffff01020304");
+ - + - ]
342 [ + - ]: 1 : s.clear();
343 : :
344 [ + - + - : 2 : addr = LookupHost("1a1b:2a2b:3a3b:4a4b:5a5b:6a6b:7a7b:8a8b", false).value();
+ - ]
345 [ + - ]: 1 : s << ser_params(addr);
346 [ + - - + : 1 : BOOST_CHECK_EQUAL(HexStr(s), "1a1b2a2b3a3b4a4b5a5b6a6b7a7b8a8b");
+ - + - ]
347 [ + - ]: 1 : s.clear();
348 : :
349 : : // TORv2, no longer supported
350 [ + - + - : 2 : BOOST_CHECK(!addr.SetSpecial("6hzph5hv6337r6p2.onion"));
+ - + - ]
351 : :
352 [ + - + - : 2 : BOOST_REQUIRE(addr.SetSpecial("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion"));
+ - + - ]
353 [ + - ]: 1 : s << ser_params(addr);
354 [ + - - + : 1 : BOOST_CHECK_EQUAL(HexStr(s), "00000000000000000000000000000000");
+ - + - ]
355 [ + - ]: 1 : s.clear();
356 : :
357 [ + - + - ]: 1 : addr.SetInternal("a");
358 [ + - ]: 1 : s << ser_params(addr);
359 [ + - - + : 1 : BOOST_CHECK_EQUAL(HexStr(s), "fd6b88c08724ca978112ca1bbdcafac2");
+ - + - ]
360 [ + - ]: 2 : s.clear();
361 : 1 : }
362 : :
363 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(cnetaddr_serialize_v2)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
364 : : {
365 : 1 : CNetAddr addr;
366 : 1 : DataStream s{};
367 : 1 : const auto ser_params{CAddress::V2_NETWORK};
368 : :
369 [ + - ]: 1 : s << ser_params(addr);
370 [ + - - + : 1 : BOOST_CHECK_EQUAL(HexStr(s), "021000000000000000000000000000000000");
+ - + - ]
371 [ + - ]: 1 : s.clear();
372 : :
373 [ + - + - : 2 : addr = LookupHost("1.2.3.4", false).value();
+ - ]
374 [ + - ]: 1 : s << ser_params(addr);
375 [ + - - + : 1 : BOOST_CHECK_EQUAL(HexStr(s), "010401020304");
+ - + - ]
376 [ + - ]: 1 : s.clear();
377 : :
378 [ + - + - : 2 : addr = LookupHost("1a1b:2a2b:3a3b:4a4b:5a5b:6a6b:7a7b:8a8b", false).value();
+ - ]
379 [ + - ]: 1 : s << ser_params(addr);
380 [ + - - + : 1 : BOOST_CHECK_EQUAL(HexStr(s), "02101a1b2a2b3a3b4a4b5a5b6a6b7a7b8a8b");
+ - + - ]
381 [ + - ]: 1 : s.clear();
382 : :
383 : : // TORv2, no longer supported
384 [ + - + - : 2 : BOOST_CHECK(!addr.SetSpecial("6hzph5hv6337r6p2.onion"));
+ - + - ]
385 : :
386 [ + - + - : 2 : BOOST_REQUIRE(addr.SetSpecial("kpgvmscirrdqpekbqjsvw5teanhatztpp2gl6eee4zkowvwfxwenqaid.onion"));
+ - + - ]
387 [ + - ]: 1 : s << ser_params(addr);
388 [ + - - + : 1 : BOOST_CHECK_EQUAL(HexStr(s), "042053cd5648488c4707914182655b7664034e09e66f7e8cbf1084e654eb56c5bd88");
+ - + - ]
389 [ + - ]: 1 : s.clear();
390 : :
391 [ + - + - : 2 : BOOST_REQUIRE(addr.SetInternal("a"));
+ - + - +
- ]
392 [ + - ]: 1 : s << ser_params(addr);
393 [ + - - + : 1 : BOOST_CHECK_EQUAL(HexStr(s), "0210fd6b88c08724ca978112ca1bbdcafac2");
+ - + - ]
394 [ + - ]: 2 : s.clear();
395 : 1 : }
396 : :
397 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(cnetaddr_unserialize_v2)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
398 : : {
399 : 1 : CNetAddr addr;
400 : 1 : DataStream s{};
401 : 1 : const auto ser_params{CAddress::V2_NETWORK};
402 : :
403 : : // Valid IPv4.
404 [ + - ]: 1 : s << "01" // network type (IPv4)
405 : : "04" // address length
406 : 1 : "01020304"_hex; // address
407 [ + - ]: 1 : s >> ser_params(addr);
408 [ + - + - : 2 : BOOST_CHECK(addr.IsValid());
+ - + - ]
409 [ + - + - : 2 : BOOST_CHECK(addr.IsIPv4());
+ - ]
410 [ + - + - : 2 : BOOST_CHECK(addr.IsAddrV1Compatible());
+ - + - ]
411 [ + - + - : 1 : BOOST_CHECK_EQUAL(addr.ToStringAddr(), "1.2.3.4");
+ - ]
412 [ + - - + : 2 : BOOST_REQUIRE(s.empty());
+ - + - ]
413 : :
414 : : // Invalid IPv4, valid length but address itself is shorter.
415 [ + - ]: 1 : s << "01" // network type (IPv4)
416 : : "04" // address length
417 : 1 : "0102"_hex; // address
418 [ + - - + : 2 : BOOST_CHECK_EXCEPTION(s >> ser_params(addr), std::ios_base::failure, HasReason("end of data"));
- - - - -
+ + - + -
+ - ]
419 [ + - - + : 2 : BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
+ - + - ]
420 [ + - ]: 1 : s.clear();
421 : :
422 : : // Invalid IPv4, with bogus length.
423 [ + - ]: 1 : s << "01" // network type (IPv4)
424 : : "05" // address length
425 : 1 : "01020304"_hex; // address
426 [ + - - + : 2 : BOOST_CHECK_EXCEPTION(s >> ser_params(addr), std::ios_base::failure,
- - - - -
+ + - + -
+ - ]
427 : : HasReason("BIP155 IPv4 address with length 5 (should be 4)"));
428 [ + - - + : 2 : BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
+ - + - ]
429 [ + - ]: 1 : s.clear();
430 : :
431 : : // Invalid IPv4, with extreme length.
432 [ + - ]: 1 : s << "01" // network type (IPv4)
433 : : "fd0102" // address length (513 as CompactSize)
434 : 1 : "01020304"_hex; // address
435 [ + - - + : 2 : BOOST_CHECK_EXCEPTION(s >> ser_params(addr), std::ios_base::failure,
- - - - -
+ + - + -
+ - ]
436 : : HasReason("Address too long: 513 > 512"));
437 [ + - - + : 2 : BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
+ - + - ]
438 [ + - ]: 1 : s.clear();
439 : :
440 : : // Valid IPv6.
441 [ + - ]: 1 : s << "02" // network type (IPv6)
442 : : "10" // address length
443 : 1 : "0102030405060708090a0b0c0d0e0f10"_hex; // address
444 [ + - ]: 1 : s >> ser_params(addr);
445 [ + - + - : 2 : BOOST_CHECK(addr.IsValid());
+ - + - ]
446 [ + - + - : 2 : BOOST_CHECK(addr.IsIPv6());
+ - ]
447 [ + - + - : 2 : BOOST_CHECK(addr.IsAddrV1Compatible());
+ - + - ]
448 [ + - + - : 1 : BOOST_CHECK_EQUAL(addr.ToStringAddr(), "102:304:506:708:90a:b0c:d0e:f10");
+ - ]
449 [ + - - + : 2 : BOOST_REQUIRE(s.empty());
+ - + - ]
450 : :
451 : : // Valid IPv6, contains embedded "internal".
452 [ + - ]: 1 : s << "02" // network type (IPv6)
453 : : "10" // address length
454 : 1 : "fd6b88c08724ca978112ca1bbdcafac2"_hex; // address: 0xfd + sha256("bitcoin")[0:5] +
455 : : // sha256(name)[0:10]
456 [ + - ]: 1 : s >> ser_params(addr);
457 [ + - + - : 2 : BOOST_CHECK(addr.IsInternal());
+ - + - ]
458 [ + - + - : 2 : BOOST_CHECK(addr.IsAddrV1Compatible());
+ - + - ]
459 [ + - + - : 1 : BOOST_CHECK_EQUAL(addr.ToStringAddr(), "zklycewkdo64v6wc.internal");
+ - ]
460 [ + - - + : 2 : BOOST_REQUIRE(s.empty());
+ - + - ]
461 : :
462 : : // Invalid IPv6, with bogus length.
463 [ + - ]: 1 : s << "02" // network type (IPv6)
464 : : "04" // address length
465 : 1 : "00"_hex; // address
466 [ + - - + : 2 : BOOST_CHECK_EXCEPTION(s >> ser_params(addr), std::ios_base::failure,
- - - - -
+ + - + -
+ - ]
467 : : HasReason("BIP155 IPv6 address with length 4 (should be 16)"));
468 [ + - - + : 2 : BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
+ - + - ]
469 [ + - ]: 1 : s.clear();
470 : :
471 : : // Invalid IPv6, contains embedded IPv4.
472 [ + - ]: 1 : s << "02" // network type (IPv6)
473 : : "10" // address length
474 : 1 : "00000000000000000000ffff01020304"_hex; // address
475 [ + - ]: 1 : s >> ser_params(addr);
476 [ + - + - : 2 : BOOST_CHECK(!addr.IsValid());
+ - + - ]
477 [ + - - + : 2 : BOOST_REQUIRE(s.empty());
+ - + - ]
478 : :
479 : : // Invalid IPv6, contains embedded TORv2.
480 [ + - ]: 1 : s << "02" // network type (IPv6)
481 : : "10" // address length
482 : 1 : "fd87d87eeb430102030405060708090a"_hex; // address
483 [ + - ]: 1 : s >> ser_params(addr);
484 [ + - + - : 2 : BOOST_CHECK(!addr.IsValid());
+ - + - ]
485 [ + - - + : 2 : BOOST_REQUIRE(s.empty());
+ - + - ]
486 : :
487 : : // TORv2, no longer supported.
488 [ + - ]: 1 : s << "03" // network type (TORv2)
489 : : "0a" // address length
490 : 1 : "f1f2f3f4f5f6f7f8f9fa"_hex; // address
491 [ + - ]: 1 : s >> ser_params(addr);
492 [ + - + - : 2 : BOOST_CHECK(!addr.IsValid());
+ - + - ]
493 [ + - - + : 2 : BOOST_REQUIRE(s.empty());
+ - + - ]
494 : :
495 : : // Valid TORv3.
496 [ + - ]: 1 : s << "04" // network type (TORv3)
497 : : "20" // address length
498 : : "79bcc625184b05194975c28b66b66b04" // address
499 : 1 : "69f7f6556fb1ac3189a79b40dda32f1f"_hex;
500 [ + - ]: 1 : s >> ser_params(addr);
501 [ + - + - : 2 : BOOST_CHECK(addr.IsValid());
+ - + - ]
502 [ + - + - : 2 : BOOST_CHECK(addr.IsTor());
+ - ]
503 [ + - + - : 2 : BOOST_CHECK(!addr.IsAddrV1Compatible());
+ - + - ]
504 [ + - + - : 1 : BOOST_CHECK_EQUAL(addr.ToStringAddr(),
+ - ]
505 : : "pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion");
506 [ + - - + : 2 : BOOST_REQUIRE(s.empty());
+ - + - ]
507 : :
508 : : // Invalid TORv3, with bogus length.
509 [ + - ]: 1 : s << "04" // network type (TORv3)
510 : : "00" // address length
511 : 1 : "00"_hex; // address
512 [ + - - + : 2 : BOOST_CHECK_EXCEPTION(s >> ser_params(addr), std::ios_base::failure,
- - - - -
+ + - + -
+ - ]
513 : : HasReason("BIP155 TORv3 address with length 0 (should be 32)"));
514 [ + - - + : 2 : BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
+ - + - ]
515 [ + - ]: 1 : s.clear();
516 : :
517 : : // Valid I2P.
518 [ + - ]: 1 : s << "05" // network type (I2P)
519 : : "20" // address length
520 : : "a2894dabaec08c0051a481a6dac88b64" // address
521 : 1 : "f98232ae42d4b6fd2fa81952dfe36a87"_hex;
522 [ + - ]: 1 : s >> ser_params(addr);
523 [ + - + - : 2 : BOOST_CHECK(addr.IsValid());
+ - + - ]
524 [ + - + - : 2 : BOOST_CHECK(addr.IsI2P());
+ - ]
525 [ + - + - : 2 : BOOST_CHECK(!addr.IsAddrV1Compatible());
+ - + - ]
526 [ + - + - : 1 : BOOST_CHECK_EQUAL(addr.ToStringAddr(),
+ - ]
527 : : "ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p");
528 [ + - - + : 2 : BOOST_REQUIRE(s.empty());
+ - + - ]
529 : :
530 : : // Invalid I2P, with bogus length.
531 [ + - ]: 1 : s << "05" // network type (I2P)
532 : : "03" // address length
533 : 1 : "00"_hex; // address
534 [ + - - + : 2 : BOOST_CHECK_EXCEPTION(s >> ser_params(addr), std::ios_base::failure,
- - - - -
+ + - + -
+ - ]
535 : : HasReason("BIP155 I2P address with length 3 (should be 32)"));
536 [ + - - + : 2 : BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
+ - + - ]
537 [ + - ]: 1 : s.clear();
538 : :
539 : : // Valid CJDNS.
540 [ + - ]: 1 : s << "06" // network type (CJDNS)
541 : : "10" // address length
542 : 1 : "fc000001000200030004000500060007"_hex; // address
543 [ + - ]: 1 : s >> ser_params(addr);
544 [ + - + - : 2 : BOOST_CHECK(addr.IsValid());
+ - + - ]
545 [ + - + - : 2 : BOOST_CHECK(addr.IsCJDNS());
+ - ]
546 [ + - + - : 2 : BOOST_CHECK(!addr.IsAddrV1Compatible());
+ - + - ]
547 [ + - + - : 1 : BOOST_CHECK_EQUAL(addr.ToStringAddr(), "fc00:1:2:3:4:5:6:7");
+ - ]
548 [ + - - + : 2 : BOOST_REQUIRE(s.empty());
+ - + - ]
549 : :
550 : : // Invalid CJDNS, wrong prefix.
551 [ + - ]: 1 : s << "06" // network type (CJDNS)
552 : : "10" // address length
553 : 1 : "aa000001000200030004000500060007"_hex; // address
554 [ + - ]: 1 : s >> ser_params(addr);
555 [ + - + - : 2 : BOOST_CHECK(addr.IsCJDNS());
+ - ]
556 [ + - + - : 2 : BOOST_CHECK(!addr.IsValid());
+ - + - ]
557 [ + - - + : 2 : BOOST_REQUIRE(s.empty());
+ - + - ]
558 : :
559 : : // Invalid CJDNS, with bogus length.
560 [ + - ]: 1 : s << "06" // network type (CJDNS)
561 : : "01" // address length
562 : 1 : "00"_hex; // address
563 [ + - - + : 2 : BOOST_CHECK_EXCEPTION(s >> ser_params(addr), std::ios_base::failure,
- - - - -
+ + - + -
+ - ]
564 : : HasReason("BIP155 CJDNS address with length 1 (should be 16)"));
565 [ + - - + : 2 : BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
+ - + - ]
566 [ + - ]: 1 : s.clear();
567 : :
568 : : // Unknown, with extreme length.
569 [ + - ]: 1 : s << "aa" // network type (unknown)
570 : : "fe00000002" // address length (CompactSize's MAX_SIZE)
571 : 1 : "01020304050607"_hex; // address
572 [ + - - + : 2 : BOOST_CHECK_EXCEPTION(s >> ser_params(addr), std::ios_base::failure,
- - - - -
+ + - + -
+ - ]
573 : : HasReason("Address too long: 33554432 > 512"));
574 [ + - - + : 2 : BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
+ - + - ]
575 [ + - ]: 1 : s.clear();
576 : :
577 : : // Unknown, with reasonable length.
578 [ + - ]: 1 : s << "aa" // network type (unknown)
579 : : "04" // address length
580 : 1 : "01020304"_hex; // address
581 [ + - ]: 1 : s >> ser_params(addr);
582 [ + - + - : 2 : BOOST_CHECK(!addr.IsValid());
+ - + - ]
583 [ + - - + : 2 : BOOST_REQUIRE(s.empty());
+ - + - ]
584 : :
585 : : // Unknown, with zero length.
586 [ + - ]: 1 : s << "aa" // network type (unknown)
587 : : "00" // address length
588 : 1 : ""_hex; // address
589 [ + - ]: 1 : s >> ser_params(addr);
590 [ + - + - : 2 : BOOST_CHECK(!addr.IsValid());
+ - + - ]
591 [ + - - + : 2 : BOOST_REQUIRE(s.empty());
+ - ]
592 : 1 : }
593 : :
594 : : // prior to PR #14728, this test triggers an undefined behavior
595 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(ipv4_peer_with_ipv6_addrMe_test)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
596 : : {
597 : : // set up local addresses; all that's necessary to reproduce the bug is
598 : : // that a normal IPv4 address is among the entries, but if this address is
599 : : // !IsRoutable the undefined behavior is easier to trigger deterministically
600 : 1 : in_addr raw_addr;
601 : 1 : raw_addr.s_addr = htonl(0x7f000001);
602 : 1 : const CNetAddr mapLocalHost_entry = CNetAddr(raw_addr);
603 : 1 : {
604 [ + - ]: 1 : LOCK(g_maplocalhost_mutex);
605 : 1 : LocalServiceInfo lsi;
606 : 1 : lsi.nScore = 23;
607 : 1 : lsi.nPort = 42;
608 [ + - + - ]: 1 : mapLocalHost[mapLocalHost_entry] = lsi;
609 : 0 : }
610 : :
611 : : // create a peer with an IPv4 address
612 : 1 : in_addr ipv4AddrPeer;
613 : 1 : ipv4AddrPeer.s_addr = 0xa0b0c001;
614 [ + - ]: 2 : CAddress addr = CAddress(CService(ipv4AddrPeer, 7777), NODE_NETWORK);
615 : 2 : std::unique_ptr<CNode> pnode = std::make_unique<CNode>(/*id=*/0,
616 : 1 : /*sock=*/nullptr,
617 : : addr,
618 : 1 : /*nKeyedNetGroupIn=*/0,
619 : 1 : /*nLocalHostNonceIn=*/0,
620 : 1 : CAddress{},
621 [ + - ]: 1 : /*pszDest=*/std::string{},
622 : 1 : ConnectionType::OUTBOUND_FULL_RELAY,
623 : 1 : /*inbound_onion=*/false,
624 [ + - + - ]: 1 : /*network_key=*/0);
625 [ + - ]: 1 : pnode->fSuccessfullyConnected.store(true);
626 : :
627 : : // the peer claims to be reaching us via IPv6
628 : 1 : in6_addr ipv6AddrLocal;
629 [ + - ]: 1 : memset(ipv6AddrLocal.s6_addr, 0, 16);
630 : 1 : ipv6AddrLocal.s6_addr[0] = 0xcc;
631 [ + - ]: 2 : CAddress addrLocal = CAddress(CService(ipv6AddrLocal, 7777), NODE_NETWORK);
632 [ + - ]: 1 : pnode->SetAddrLocal(addrLocal);
633 : :
634 : : // before patch, this causes undefined behavior detectable with clang's -fsanitize=memory
635 [ + - ]: 1 : GetLocalAddrForPeer(*pnode);
636 : :
637 : : // suppress no-checks-run warning; if this test fails, it's by triggering a sanitizer
638 [ + - + - : 2 : BOOST_CHECK(1);
+ - ]
639 : :
640 : : // Cleanup, so that we don't confuse other tests.
641 : 1 : {
642 [ + - ]: 1 : LOCK(g_maplocalhost_mutex);
643 [ + - + - ]: 1 : mapLocalHost.erase(mapLocalHost_entry);
644 : 1 : }
645 : 1 : }
646 : :
647 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(get_local_addr_for_peer_port)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
648 : : {
649 : : // Test that GetLocalAddrForPeer() properly selects the address to self-advertise:
650 : : //
651 : : // 1. GetLocalAddrForPeer() calls GetLocalAddress() which returns an address that is
652 : : // not routable.
653 : : // 2. GetLocalAddrForPeer() overrides the address with whatever the peer has told us
654 : : // he sees us as.
655 : : // 2.1. For inbound connections we must override both the address and the port.
656 : : // 2.2. For outbound connections we must override only the address.
657 : :
658 : : // Pretend that we bound to this port.
659 : 1 : const uint16_t bind_port = 20001;
660 [ + - + - ]: 2 : m_node.args->ForceSetArg("-bind", strprintf("3.4.5.6:%u", bind_port));
661 : :
662 : : // Our address:port as seen from the peer, completely different from the above.
663 : 1 : in_addr peer_us_addr;
664 : 1 : peer_us_addr.s_addr = htonl(0x02030405);
665 : 1 : const CService peer_us{peer_us_addr, 20002};
666 : :
667 : : // Create a peer with a routable IPv4 address (outbound).
668 : 1 : in_addr peer_out_in_addr;
669 : 1 : peer_out_in_addr.s_addr = htonl(0x01020304);
670 : 1 : CNode peer_out{/*id=*/0,
671 : : /*sock=*/nullptr,
672 [ - + ]: 1 : /*addrIn=*/CAddress{CService{peer_out_in_addr, 8333}, NODE_NETWORK},
673 : : /*nKeyedNetGroupIn=*/0,
674 : : /*nLocalHostNonceIn=*/0,
675 [ + - ]: 2 : /*addrBindIn=*/CService{},
676 : 1 : /*addrNameIn=*/std::string{},
677 : : /*conn_type_in=*/ConnectionType::OUTBOUND_FULL_RELAY,
678 : : /*inbound_onion=*/false,
679 [ + - + - ]: 3 : /*network_key=*/0};
680 [ + - ]: 1 : peer_out.fSuccessfullyConnected = true;
681 [ + - ]: 1 : peer_out.SetAddrLocal(peer_us);
682 : :
683 : : // Without the fix peer_us:8333 is chosen instead of the proper peer_us:bind_port.
684 [ + - ]: 1 : auto chosen_local_addr = GetLocalAddrForPeer(peer_out);
685 [ + - + - : 2 : BOOST_REQUIRE(chosen_local_addr);
+ - ]
686 [ + - ]: 1 : const CService expected{peer_us_addr, bind_port};
687 [ + - + - : 2 : BOOST_CHECK(*chosen_local_addr == expected);
+ - + - ]
688 : :
689 : : // Create a peer with a routable IPv4 address (inbound).
690 : 1 : in_addr peer_in_in_addr;
691 : 1 : peer_in_in_addr.s_addr = htonl(0x05060708);
692 : 1 : CNode peer_in{/*id=*/0,
693 : : /*sock=*/nullptr,
694 [ - + ]: 1 : /*addrIn=*/CAddress{CService{peer_in_in_addr, 8333}, NODE_NETWORK},
695 : : /*nKeyedNetGroupIn=*/0,
696 : : /*nLocalHostNonceIn=*/0,
697 [ + - ]: 2 : /*addrBindIn=*/CService{},
698 : 1 : /*addrNameIn=*/std::string{},
699 : : /*conn_type_in=*/ConnectionType::INBOUND,
700 : : /*inbound_onion=*/false,
701 [ + - + - ]: 3 : /*network_key=*/1};
702 [ + - ]: 1 : peer_in.fSuccessfullyConnected = true;
703 [ + - ]: 1 : peer_in.SetAddrLocal(peer_us);
704 : :
705 : : // Without the fix peer_us:8333 is chosen instead of the proper peer_us:peer_us.GetPort().
706 [ + - ]: 2 : chosen_local_addr = GetLocalAddrForPeer(peer_in);
707 [ + - + - : 2 : BOOST_REQUIRE(chosen_local_addr);
+ - ]
708 [ + - + - : 2 : BOOST_CHECK(*chosen_local_addr == peer_us);
+ - + - ]
709 : :
710 [ + - + - : 2 : m_node.args->ForceSetArg("-bind", "");
+ - ]
711 : 1 : }
712 : :
713 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(LimitedAndReachable_Network)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
714 : : {
715 [ + - + - ]: 2 : BOOST_CHECK(g_reachable_nets.Contains(NET_IPV4));
716 [ + - + - ]: 2 : BOOST_CHECK(g_reachable_nets.Contains(NET_IPV6));
717 [ + - + - ]: 2 : BOOST_CHECK(g_reachable_nets.Contains(NET_ONION));
718 [ + - + - ]: 2 : BOOST_CHECK(g_reachable_nets.Contains(NET_I2P));
719 [ + - + - ]: 2 : BOOST_CHECK(g_reachable_nets.Contains(NET_CJDNS));
720 : :
721 : 1 : g_reachable_nets.Remove(NET_IPV4);
722 : 1 : g_reachable_nets.Remove(NET_IPV6);
723 : 1 : g_reachable_nets.Remove(NET_ONION);
724 : 1 : g_reachable_nets.Remove(NET_I2P);
725 : 1 : g_reachable_nets.Remove(NET_CJDNS);
726 : :
727 [ + - + - ]: 2 : BOOST_CHECK(!g_reachable_nets.Contains(NET_IPV4));
728 [ + - + - ]: 2 : BOOST_CHECK(!g_reachable_nets.Contains(NET_IPV6));
729 [ + - + - ]: 2 : BOOST_CHECK(!g_reachable_nets.Contains(NET_ONION));
730 [ + - + - ]: 2 : BOOST_CHECK(!g_reachable_nets.Contains(NET_I2P));
731 [ + - + - ]: 2 : BOOST_CHECK(!g_reachable_nets.Contains(NET_CJDNS));
732 : :
733 : 1 : g_reachable_nets.Add(NET_IPV4);
734 : 1 : g_reachable_nets.Add(NET_IPV6);
735 : 1 : g_reachable_nets.Add(NET_ONION);
736 : 1 : g_reachable_nets.Add(NET_I2P);
737 : 1 : g_reachable_nets.Add(NET_CJDNS);
738 : :
739 [ + - + - ]: 2 : BOOST_CHECK(g_reachable_nets.Contains(NET_IPV4));
740 [ + - + - ]: 2 : BOOST_CHECK(g_reachable_nets.Contains(NET_IPV6));
741 [ + - + - ]: 2 : BOOST_CHECK(g_reachable_nets.Contains(NET_ONION));
742 [ + - + - ]: 2 : BOOST_CHECK(g_reachable_nets.Contains(NET_I2P));
743 [ + - + - ]: 2 : BOOST_CHECK(g_reachable_nets.Contains(NET_CJDNS));
744 : 1 : }
745 : :
746 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(LimitedAndReachable_NetworkCaseUnroutableAndInternal)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
747 : : {
748 : : // Should be reachable by default.
749 [ + - + - ]: 2 : BOOST_CHECK(g_reachable_nets.Contains(NET_UNROUTABLE));
750 [ + - + - ]: 2 : BOOST_CHECK(g_reachable_nets.Contains(NET_INTERNAL));
751 : :
752 : 1 : g_reachable_nets.RemoveAll();
753 : :
754 [ + - + - ]: 2 : BOOST_CHECK(!g_reachable_nets.Contains(NET_UNROUTABLE));
755 [ + - + - ]: 2 : BOOST_CHECK(!g_reachable_nets.Contains(NET_INTERNAL));
756 : :
757 : 1 : g_reachable_nets.Add(NET_IPV4);
758 : 1 : g_reachable_nets.Add(NET_IPV6);
759 : 1 : g_reachable_nets.Add(NET_ONION);
760 : 1 : g_reachable_nets.Add(NET_I2P);
761 : 1 : g_reachable_nets.Add(NET_CJDNS);
762 : 1 : g_reachable_nets.Add(NET_UNROUTABLE);
763 : 1 : g_reachable_nets.Add(NET_INTERNAL);
764 : 1 : }
765 : :
766 : 2 : CNetAddr UtilBuildAddress(unsigned char p1, unsigned char p2, unsigned char p3, unsigned char p4)
767 : : {
768 : 2 : unsigned char ip[] = {p1, p2, p3, p4};
769 : :
770 : 2 : struct sockaddr_in sa;
771 : 2 : memset(&sa, 0, sizeof(sockaddr_in)); // initialize the memory block
772 : 2 : memcpy(&(sa.sin_addr), &ip, sizeof(ip));
773 : 2 : return CNetAddr(sa.sin_addr);
774 : : }
775 : :
776 : :
777 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(LimitedAndReachable_CNetAddr)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
778 : : {
779 : 1 : CNetAddr addr = UtilBuildAddress(0x001, 0x001, 0x001, 0x001); // 1.1.1.1
780 : :
781 [ + - ]: 1 : g_reachable_nets.Add(NET_IPV4);
782 [ + - + - : 2 : BOOST_CHECK(g_reachable_nets.Contains(addr));
+ - + - ]
783 : :
784 [ + - ]: 1 : g_reachable_nets.Remove(NET_IPV4);
785 [ + - + - : 2 : BOOST_CHECK(!g_reachable_nets.Contains(addr));
+ - + - ]
786 : :
787 [ + - ]: 1 : g_reachable_nets.Add(NET_IPV4); // have to reset this, because this is stateful.
788 : 1 : }
789 : :
790 : :
791 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(LocalAddress_BasicLifecycle)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
792 : : {
793 [ + - ]: 1 : CService addr = CService(UtilBuildAddress(0x002, 0x001, 0x001, 0x001), 1000); // 2.1.1.1:1000
794 : :
795 [ + - ]: 1 : g_reachable_nets.Add(NET_IPV4);
796 : :
797 [ + - + - : 2 : BOOST_CHECK(!IsLocal(addr));
+ - + - ]
798 [ + - + - : 2 : BOOST_CHECK(AddLocal(addr, 1000));
+ - + - ]
799 [ + - + - : 2 : BOOST_CHECK(IsLocal(addr));
+ - + - ]
800 : :
801 [ + - ]: 1 : RemoveLocal(addr);
802 [ + - + - : 2 : BOOST_CHECK(!IsLocal(addr));
+ - ]
803 : 1 : }
804 : :
805 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(initial_advertise_from_version_message)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
806 : : {
807 : 1 : LOCK(NetEventsInterface::g_msgproc_mutex);
808 [ + - ]: 1 : auto& connman{static_cast<ConnmanTestMsg&>(*m_node.connman)};
809 : :
810 : : // Tests the following scenario:
811 : : // * -bind=3.4.5.6:20001 is specified
812 : : // * we make an outbound connection to a peer
813 : : // * the peer reports he sees us as 2.3.4.5:20002 in the version message
814 : : // (20002 is a random port assigned by our OS for the outgoing TCP connection,
815 : : // we cannot accept connections to it)
816 : : // * we should self-advertise to that peer as 2.3.4.5:20001
817 : :
818 : : // Pretend that we bound to this port.
819 : 1 : const uint16_t bind_port = 20001;
820 [ + - + - : 2 : m_node.args->ForceSetArg("-bind", strprintf("3.4.5.6:%u", bind_port));
+ - ]
821 [ + - ]: 1 : m_node.connman->SetCaptureMessages(true);
822 : :
823 : : // Our address:port as seen from the peer - 2.3.4.5:20002 (different from the above).
824 : 1 : in_addr peer_us_addr;
825 : 1 : peer_us_addr.s_addr = htonl(0x02030405);
826 [ + - ]: 1 : const CService peer_us{peer_us_addr, 20002};
827 : :
828 : : // Create a peer with a routable IPv4 address.
829 : 1 : in_addr peer_in_addr;
830 : 1 : peer_in_addr.s_addr = htonl(0x01020304);
831 : 1 : CNode peer{/*id=*/0,
832 : : /*sock=*/nullptr,
833 [ - + ]: 1 : /*addrIn=*/CAddress{CService{peer_in_addr, 8333}, NODE_NETWORK},
834 : : /*nKeyedNetGroupIn=*/0,
835 : : /*nLocalHostNonceIn=*/0,
836 [ + - ]: 2 : /*addrBindIn=*/CService{},
837 : 1 : /*addrNameIn=*/std::string{},
838 : : /*conn_type_in=*/ConnectionType::OUTBOUND_FULL_RELAY,
839 : : /*inbound_onion=*/false,
840 [ + - + - ]: 3 : /*network_key=*/2};
841 : :
842 : 1 : const uint64_t services{NODE_NETWORK | NODE_WITNESS};
843 : 1 : const int64_t time{0};
844 : :
845 : : // Force ChainstateManager::IsInitialBlockDownload() to return false.
846 : : // Otherwise PushAddress() isn't called by PeerManager::ProcessMessage().
847 [ + - ]: 1 : auto& chainman = static_cast<TestChainstateManager&>(*m_node.chainman);
848 [ + - ]: 1 : chainman.JumpOutOfIbd();
849 : :
850 [ + - ]: 1 : m_node.peerman->InitializeNode(peer, NODE_NETWORK);
851 : :
852 [ + - ]: 1 : m_node.peerman->SendMessages(peer);
853 [ + - ]: 1 : connman.FlushSendBuffer(peer); // Drop sent version message
854 : :
855 [ + - ]: 1 : auto msg_version_receive =
856 [ + - + - ]: 1 : NetMsg::Make(NetMsgType::VERSION, PROTOCOL_VERSION, services, time, services, CAddress::V1_NETWORK(peer_us));
857 [ + - - + ]: 1 : Assert(connman.ReceiveMsgFrom(peer, std::move(msg_version_receive)));
858 [ + - ]: 1 : peer.fPauseSend = false;
859 [ + - ]: 1 : bool more_work{connman.ProcessMessagesOnce(peer)};
860 [ - + ]: 1 : Assert(!more_work);
861 : :
862 [ + - ]: 1 : m_node.peerman->SendMessages(peer);
863 [ + - ]: 1 : connman.FlushSendBuffer(peer); // Drop sent verack message
864 : :
865 [ + - + - : 2 : Assert(connman.ReceiveMsgFrom(peer, NetMsg::Make(NetMsgType::VERACK)));
+ - - + ]
866 [ + - ]: 1 : peer.fPauseSend = false;
867 : : // Will set peer.fSuccessfullyConnected to true (necessary in SendMessages()).
868 [ + - ]: 1 : more_work = connman.ProcessMessagesOnce(peer);
869 [ - + ]: 1 : Assert(!more_work);
870 : :
871 : : // Ensure that peer_us_addr:bind_port is sent to the peer.
872 [ + - ]: 1 : const CService expected{peer_us_addr, bind_port};
873 : 1 : bool sent{false};
874 : :
875 [ + - ]: 1 : const auto CaptureMessageOrig = CaptureMessage;
876 : 5 : CaptureMessage = [&sent, &expected](const CAddress& addr,
877 : : const std::string& msg_type,
878 : : std::span<const unsigned char> data,
879 : : bool is_incoming) -> void {
880 [ + - + + ]: 4 : if (!is_incoming && msg_type == "addr") {
881 : 1 : std::vector<CAddress> addresses;
882 : :
883 [ + - ]: 1 : SpanReader{data} >> CAddress::V1_NETWORK(addresses);
884 : :
885 [ + - ]: 1 : for (const auto& addr : addresses) {
886 [ + - + - ]: 1 : if (addr == expected) {
887 : 1 : sent = true;
888 : 1 : return;
889 : : }
890 : : }
891 : 1 : }
892 : 1 : };
893 : :
894 [ + - ]: 1 : m_node.peerman->SendMessages(peer);
895 : :
896 [ + - + - : 2 : BOOST_CHECK(sent);
+ - ]
897 : :
898 [ + - ]: 1 : CaptureMessage = CaptureMessageOrig;
899 [ + - ]: 1 : chainman.ResetIbd();
900 [ + - ]: 1 : m_node.connman->SetCaptureMessages(false);
901 [ + - + - : 2 : m_node.args->ForceSetArg("-bind", "");
+ - ]
902 [ + - ]: 3 : }
903 : :
904 : :
905 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(advertise_local_address)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
906 : : {
907 : 8 : auto CreatePeer = [](const CAddress& addr) {
908 : 14 : return std::make_unique<CNode>(/*id=*/0,
909 : 7 : /*sock=*/nullptr,
910 : : addr,
911 : 7 : /*nKeyedNetGroupIn=*/0,
912 : 7 : /*nLocalHostNonceIn=*/0,
913 : 7 : CAddress{},
914 [ + - ]: 7 : /*pszDest=*/std::string{},
915 : 7 : ConnectionType::OUTBOUND_FULL_RELAY,
916 : 7 : /*inbound_onion=*/false,
917 [ + - + - ]: 14 : /*network_key=*/0);
918 : : };
919 : 1 : g_reachable_nets.Add(NET_CJDNS);
920 : :
921 [ + - + - ]: 2 : CAddress addr_ipv4{Lookup("1.2.3.4", 8333, false).value(), NODE_NONE};
922 [ + - + - : 2 : BOOST_REQUIRE(addr_ipv4.IsValid());
+ - + - ]
923 [ + - + - : 2 : BOOST_REQUIRE(addr_ipv4.IsIPv4());
+ - ]
924 : :
925 [ + - + - : 2 : CAddress addr_ipv6{Lookup("1122:3344:5566:7788:9900:aabb:ccdd:eeff", 8333, false).value(), NODE_NONE};
+ - ]
926 [ + - + - : 2 : BOOST_REQUIRE(addr_ipv6.IsValid());
+ - + - ]
927 [ + - + - : 2 : BOOST_REQUIRE(addr_ipv6.IsIPv6());
+ - ]
928 : :
929 [ + - + - : 2 : CAddress addr_ipv6_tunnel{Lookup("2002:3344:5566:7788:9900:aabb:ccdd:eeff", 8333, false).value(), NODE_NONE};
+ - ]
930 [ + - + - : 2 : BOOST_REQUIRE(addr_ipv6_tunnel.IsValid());
+ - + - ]
931 [ + - + - : 2 : BOOST_REQUIRE(addr_ipv6_tunnel.IsIPv6());
+ - ]
932 [ + - + - : 2 : BOOST_REQUIRE(addr_ipv6_tunnel.IsRFC3964());
+ - + - ]
933 : :
934 [ + - + - : 2 : CAddress addr_teredo{Lookup("2001:0000:5566:7788:9900:aabb:ccdd:eeff", 8333, false).value(), NODE_NONE};
+ - ]
935 [ + - + - : 2 : BOOST_REQUIRE(addr_teredo.IsValid());
+ - + - ]
936 [ + - + - : 2 : BOOST_REQUIRE(addr_teredo.IsIPv6());
+ - ]
937 [ + - + - : 2 : BOOST_REQUIRE(addr_teredo.IsRFC4380());
+ - + - ]
938 : :
939 [ + - ]: 1 : CAddress addr_onion;
940 [ + - + - : 2 : BOOST_REQUIRE(addr_onion.SetSpecial("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion"));
+ - + - ]
941 [ + - + - : 2 : BOOST_REQUIRE(addr_onion.IsValid());
+ - + - ]
942 [ + - + - : 2 : BOOST_REQUIRE(addr_onion.IsTor());
+ - ]
943 : :
944 [ + - ]: 1 : CAddress addr_i2p;
945 [ + - + - : 2 : BOOST_REQUIRE(addr_i2p.SetSpecial("udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p"));
+ - + - ]
946 [ + - + - : 2 : BOOST_REQUIRE(addr_i2p.IsValid());
+ - + - ]
947 [ + - + - : 2 : BOOST_REQUIRE(addr_i2p.IsI2P());
+ - ]
948 : :
949 [ + - + - : 3 : CService service_cjdns{Lookup("fc00:3344:5566:7788:9900:aabb:ccdd:eeff", 8333, false).value(), NODE_NONE};
+ - + - ]
950 [ + - ]: 2 : CAddress addr_cjdns{MaybeFlipIPv6toCJDNS(service_cjdns), NODE_NONE};
951 [ + - + - : 2 : BOOST_REQUIRE(addr_cjdns.IsValid());
+ - + - ]
952 [ + - + - : 2 : BOOST_REQUIRE(addr_cjdns.IsCJDNS());
+ - ]
953 : :
954 [ + - ]: 1 : const auto peer_ipv4{CreatePeer(addr_ipv4)};
955 [ + - ]: 1 : const auto peer_ipv6{CreatePeer(addr_ipv6)};
956 [ + - ]: 1 : const auto peer_ipv6_tunnel{CreatePeer(addr_ipv6_tunnel)};
957 [ + - ]: 1 : const auto peer_teredo{CreatePeer(addr_teredo)};
958 [ + - ]: 1 : const auto peer_onion{CreatePeer(addr_onion)};
959 [ + - ]: 1 : const auto peer_i2p{CreatePeer(addr_i2p)};
960 [ + - ]: 1 : const auto peer_cjdns{CreatePeer(addr_cjdns)};
961 : :
962 : : // one local clearnet address - advertise to all but privacy peers
963 [ + - ]: 1 : AddLocal(addr_ipv4);
964 [ + - + - : 2 : BOOST_CHECK(GetLocalAddress(*peer_ipv4) == addr_ipv4);
+ - + - +
- ]
965 [ + - + - : 2 : BOOST_CHECK(GetLocalAddress(*peer_ipv6) == addr_ipv4);
+ - + - +
- ]
966 [ + - + - : 2 : BOOST_CHECK(GetLocalAddress(*peer_ipv6_tunnel) == addr_ipv4);
+ - + - +
- ]
967 [ + - + - : 2 : BOOST_CHECK(GetLocalAddress(*peer_teredo) == addr_ipv4);
+ - + - +
- ]
968 [ + - + - : 2 : BOOST_CHECK(GetLocalAddress(*peer_cjdns) == addr_ipv4);
+ - + - +
- ]
969 [ + - + - : 2 : BOOST_CHECK(!GetLocalAddress(*peer_onion).IsValid());
+ - + - +
- ]
970 [ + - + - : 2 : BOOST_CHECK(!GetLocalAddress(*peer_i2p).IsValid());
+ - + - +
- ]
971 [ + - ]: 1 : RemoveLocal(addr_ipv4);
972 : :
973 : : // local privacy addresses - don't advertise to clearnet peers
974 [ + - ]: 1 : AddLocal(addr_onion);
975 [ + - ]: 1 : AddLocal(addr_i2p);
976 [ + - + - : 2 : BOOST_CHECK(!GetLocalAddress(*peer_ipv4).IsValid());
+ - + - +
- ]
977 [ + - + - : 2 : BOOST_CHECK(!GetLocalAddress(*peer_ipv6).IsValid());
+ - + - +
- ]
978 [ + - + - : 2 : BOOST_CHECK(!GetLocalAddress(*peer_ipv6_tunnel).IsValid());
+ - + - +
- ]
979 [ + - + - : 2 : BOOST_CHECK(!GetLocalAddress(*peer_teredo).IsValid());
+ - + - +
- ]
980 [ + - + - : 2 : BOOST_CHECK(!GetLocalAddress(*peer_cjdns).IsValid());
+ - + - +
- ]
981 [ + - + - : 2 : BOOST_CHECK(GetLocalAddress(*peer_onion) == addr_onion);
+ - + - +
- ]
982 [ + - + - : 2 : BOOST_CHECK(GetLocalAddress(*peer_i2p) == addr_i2p);
+ - + - +
- ]
983 [ + - ]: 1 : RemoveLocal(addr_onion);
984 [ + - ]: 1 : RemoveLocal(addr_i2p);
985 : :
986 : : // local addresses from all networks
987 [ + - ]: 1 : AddLocal(addr_ipv4);
988 [ + - ]: 1 : AddLocal(addr_ipv6);
989 [ + - ]: 1 : AddLocal(addr_ipv6_tunnel);
990 [ + - ]: 1 : AddLocal(addr_teredo);
991 [ + - ]: 1 : AddLocal(addr_onion);
992 [ + - ]: 1 : AddLocal(addr_i2p);
993 [ + - ]: 1 : AddLocal(addr_cjdns);
994 [ + - + - : 2 : BOOST_CHECK(GetLocalAddress(*peer_ipv4) == addr_ipv4);
+ - + - +
- ]
995 [ + - + - : 2 : BOOST_CHECK(GetLocalAddress(*peer_ipv6) == addr_ipv6);
+ - + - +
- ]
996 [ + - + - : 2 : BOOST_CHECK(GetLocalAddress(*peer_ipv6_tunnel) == addr_ipv6);
+ - + - +
- ]
997 [ + - + - : 2 : BOOST_CHECK(GetLocalAddress(*peer_teredo) == addr_ipv4);
+ - + - +
- ]
998 [ + - + - : 2 : BOOST_CHECK(GetLocalAddress(*peer_onion) == addr_onion);
+ - + - +
- ]
999 [ + - + - : 2 : BOOST_CHECK(GetLocalAddress(*peer_i2p) == addr_i2p);
+ - + - +
- ]
1000 [ + - + - : 2 : BOOST_CHECK(GetLocalAddress(*peer_cjdns) == addr_cjdns);
+ - + - +
- ]
1001 [ + - ]: 1 : RemoveLocal(addr_ipv4);
1002 [ + - ]: 1 : RemoveLocal(addr_ipv6);
1003 [ + - ]: 1 : RemoveLocal(addr_ipv6_tunnel);
1004 [ + - ]: 1 : RemoveLocal(addr_teredo);
1005 [ + - ]: 1 : RemoveLocal(addr_onion);
1006 [ + - ]: 1 : RemoveLocal(addr_i2p);
1007 [ + - ]: 1 : RemoveLocal(addr_cjdns);
1008 : 1 : }
1009 : :
1010 : : namespace {
1011 : :
1012 : 75 : CKey GenerateRandomTestKey(FastRandomContext& rng) noexcept
1013 : : {
1014 : 75 : CKey key;
1015 : 75 : uint256 key_data = rng.rand256();
1016 : 75 : key.Set(key_data.begin(), key_data.end(), true);
1017 : 75 : return key;
1018 : : }
1019 : :
1020 : : /** A class for scenario-based tests of V2Transport
1021 : : *
1022 : : * Each V2TransportTester encapsulates a V2Transport (the one being tested), and can be told to
1023 : : * interact with it. To do so, it also encapsulates a BIP324Cipher to act as the other side. A
1024 : : * second V2Transport is not used, as doing so would not permit scenarios that involve sending
1025 : : * invalid data, or ones using BIP324 features that are not implemented on the sending
1026 : : * side (like decoy packets).
1027 : : */
1028 : : class V2TransportTester
1029 : : {
1030 : : FastRandomContext& m_rng;
1031 : : V2Transport m_transport; //!< V2Transport being tested
1032 : : BIP324Cipher m_cipher; //!< Cipher to help with the other side
1033 : : bool m_test_initiator; //!< Whether m_transport is the initiator (true) or responder (false)
1034 : :
1035 : : std::vector<uint8_t> m_sent_garbage; //!< The garbage we've sent to m_transport.
1036 : : std::vector<uint8_t> m_recv_garbage; //!< The garbage we've received from m_transport.
1037 : : std::vector<uint8_t> m_to_send; //!< Bytes we have queued up to send to m_transport.
1038 : : std::vector<uint8_t> m_received; //!< Bytes we have received from m_transport.
1039 : : std::deque<CSerializedNetMsg> m_msg_to_send; //!< Messages to be sent *by* m_transport to us.
1040 : : bool m_sent_aad{false};
1041 : :
1042 : : public:
1043 : : /** Construct a tester object. test_initiator: whether the tested transport is initiator. */
1044 : 75 : explicit V2TransportTester(FastRandomContext& rng, bool test_initiator)
1045 : 75 : : m_rng{rng},
1046 : 75 : m_transport{0, test_initiator},
1047 : 75 : m_cipher{GenerateRandomTestKey(m_rng), MakeByteSpan(m_rng.rand256())},
1048 [ + - ]: 75 : m_test_initiator(test_initiator) {}
1049 : :
1050 : : /** Data type returned by Interact:
1051 : : *
1052 : : * - std::nullopt: transport error occurred
1053 : : * - otherwise: a vector of
1054 : : * - std::nullopt: invalid message received
1055 : : * - otherwise: a CNetMessage retrieved
1056 : : */
1057 : : using InteractResult = std::optional<std::vector<std::optional<CNetMessage>>>;
1058 : :
1059 : : /** Send/receive scheduled/available bytes and messages.
1060 : : *
1061 : : * This is the only function that interacts with the transport being tested; everything else is
1062 : : * scheduling things done by Interact(), or processing things learned by it.
1063 : : */
1064 : 239 : InteractResult Interact()
1065 : : {
1066 : 239 : std::vector<std::optional<CNetMessage>> ret;
1067 : 2925 : while (true) {
1068 : 2925 : bool progress{false};
1069 : : // Send bytes from m_to_send to the transport.
1070 [ + + ]: 2925 : if (!m_to_send.empty()) {
1071 [ - + ]: 2219 : std::span<const uint8_t> to_send = std::span{m_to_send}.first(1 + m_rng.randrange(m_to_send.size()));
1072 : 2219 : size_t old_len = to_send.size();
1073 [ + + ]: 2219 : if (!m_transport.ReceivedBytes(to_send)) {
1074 : 23 : return std::nullopt; // transport error occurred
1075 : : }
1076 [ + + ]: 2196 : if (old_len != to_send.size()) {
1077 : 2110 : progress = true;
1078 : 2110 : m_to_send.erase(m_to_send.begin(), m_to_send.begin() + (old_len - to_send.size()));
1079 : : }
1080 : : }
1081 : : // Retrieve messages received by the transport.
1082 [ + + + + : 2902 : if (m_transport.ReceivedMessageComplete() && (!progress || m_rng.randbool())) {
+ + ]
1083 : 252 : bool reject{false};
1084 : 252 : auto msg = m_transport.GetReceivedMessage({}, reject);
1085 [ + + ]: 252 : if (reject) {
1086 [ + - ]: 61 : ret.emplace_back(std::nullopt);
1087 : : } else {
1088 [ + - ]: 191 : ret.emplace_back(std::move(msg));
1089 : : }
1090 : 252 : progress = true;
1091 : 252 : }
1092 : : // Enqueue a message to be sent by the transport to us.
1093 [ + + + - : 2902 : if (!m_msg_to_send.empty() && (!progress || m_rng.randbool())) {
+ + ]
1094 [ + - ]: 51 : if (m_transport.SetMessageToSend(m_msg_to_send.front())) {
1095 : 51 : m_msg_to_send.pop_front();
1096 : 51 : progress = true;
1097 : : }
1098 : : }
1099 : : // Receive bytes from the transport.
1100 [ + + ]: 2902 : const auto& [recv_bytes, _more, _msg_type] = m_transport.GetBytesToSend(!m_msg_to_send.empty());
1101 [ + + + + : 2902 : if (!recv_bytes.empty() && (!progress || m_rng.randbool())) {
+ + ]
1102 : 906 : size_t to_receive = 1 + m_rng.randrange(recv_bytes.size());
1103 [ + - ]: 906 : m_received.insert(m_received.end(), recv_bytes.begin(), recv_bytes.begin() + to_receive);
1104 : 906 : progress = true;
1105 : 906 : m_transport.MarkBytesSent(to_receive);
1106 : : }
1107 [ + + ]: 2902 : if (!progress) break;
1108 : : }
1109 : 216 : return ret;
1110 : 239 : }
1111 : :
1112 : : /** Expose the cipher. */
1113 : : BIP324Cipher& GetCipher() { return m_cipher; }
1114 : :
1115 : : /** Schedule bytes to be sent to the transport. */
1116 : 54612 : void Send(std::span<const uint8_t> data)
1117 : : {
1118 : 54612 : m_to_send.insert(m_to_send.end(), data.begin(), data.end());
1119 : 54612 : }
1120 : :
1121 : : /** Send V1 version message header to the transport. */
1122 : 2 : void SendV1Version(const MessageStartChars& magic)
1123 : : {
1124 : 2 : CMessageHeader hdr(magic, "version", 126 + m_rng.randrange(11));
1125 : 2 : DataStream ser{};
1126 [ + - ]: 2 : ser << hdr;
1127 [ - + + - ]: 2 : m_to_send.insert(m_to_send.end(), UCharCast(ser.data()), UCharCast(ser.data() + ser.size()));
1128 : 2 : }
1129 : :
1130 : : /** Schedule bytes to be sent to the transport. */
1131 : 54539 : void Send(std::span<const std::byte> data) { Send(MakeUCharSpan(data)); }
1132 : :
1133 : : /** Schedule our ellswift key to be sent to the transport. */
1134 : 73 : void SendKey() { Send(m_cipher.GetOurPubKey()); }
1135 : :
1136 : : /** Schedule specified garbage to be sent to the transport. */
1137 : 73 : void SendGarbage(std::span<const uint8_t> garbage)
1138 : : {
1139 : : // Remember the specified garbage (so we can use it as AAD).
1140 : 73 : m_sent_garbage.assign(garbage.begin(), garbage.end());
1141 : : // Schedule it for sending.
1142 [ - + ]: 73 : Send(m_sent_garbage);
1143 : 73 : }
1144 : :
1145 : : /** Schedule garbage (of specified length) to be sent to the transport. */
1146 : 72 : void SendGarbage(size_t garbage_len)
1147 : : {
1148 : : // Generate random garbage and send it.
1149 [ - + + - ]: 72 : SendGarbage(m_rng.randbytes<uint8_t>(garbage_len));
1150 : 72 : }
1151 : :
1152 : : /** Schedule garbage (with valid random length) to be sent to the transport. */
1153 : 20 : void SendGarbage()
1154 : : {
1155 : 20 : SendGarbage(m_rng.randrange(V2Transport::MAX_GARBAGE_LEN + 1));
1156 : 20 : }
1157 : :
1158 : : /** Schedule a message to be sent to us by the transport. */
1159 : 51 : void AddMessage(std::string m_type, std::vector<uint8_t> payload)
1160 : : {
1161 : 51 : CSerializedNetMsg msg;
1162 : 51 : msg.m_type = std::move(m_type);
1163 : 51 : msg.data = std::move(payload);
1164 [ + - ]: 51 : m_msg_to_send.push_back(std::move(msg));
1165 : 51 : }
1166 : :
1167 : : /** Expect ellswift key to have been received from transport and process it.
1168 : : *
1169 : : * Many other V2TransportTester functions cannot be called until after ReceiveKey() has been
1170 : : * called, as no encryption keys are set up before that point.
1171 : : */
1172 : 73 : void ReceiveKey()
1173 : : {
1174 : : // When processing a key, enough bytes need to have been received already.
1175 [ - + + - ]: 146 : BOOST_REQUIRE(m_received.size() >= EllSwiftPubKey::size());
1176 : : // Initialize the cipher using it (acting as the opposite side of the tested transport).
1177 : 73 : m_cipher.Initialize(MakeByteSpan(m_received).first(EllSwiftPubKey::size()), !m_test_initiator);
1178 : : // Strip the processed bytes off the front of the receive buffer.
1179 : 73 : m_received.erase(m_received.begin(), m_received.begin() + EllSwiftPubKey::size());
1180 : 73 : }
1181 : :
1182 : : /** Schedule an encrypted packet with specified content/aad/ignore to be sent to transport
1183 : : * (only after ReceiveKey). */
1184 : 54393 : void SendPacket(std::span<const uint8_t> content, std::span<const uint8_t> aad = {}, bool ignore = false)
1185 : : {
1186 : : // Use cipher to construct ciphertext.
1187 : 54393 : std::vector<std::byte> ciphertext;
1188 [ + - ]: 54393 : ciphertext.resize(content.size() + BIP324Cipher::EXPANSION);
1189 [ - + ]: 54393 : m_cipher.Encrypt(
1190 : : /*contents=*/MakeByteSpan(content),
1191 : : /*aad=*/MakeByteSpan(aad),
1192 : : /*ignore=*/ignore,
1193 : 54393 : /*output=*/ciphertext);
1194 : : // Schedule it for sending.
1195 [ - + + - ]: 54393 : Send(ciphertext);
1196 : 54393 : }
1197 : :
1198 : : /** Schedule garbage terminator to be sent to the transport (only after ReceiveKey). */
1199 : 73 : void SendGarbageTerm()
1200 : : {
1201 : : // Schedule the garbage terminator to be sent.
1202 : 73 : Send(m_cipher.GetSendGarbageTerminator());
1203 : 73 : }
1204 : :
1205 : : /** Schedule version packet to be sent to the transport (only after ReceiveKey). */
1206 : 289 : void SendVersion(std::span<const uint8_t> version_data = {}, bool vers_ignore = false)
1207 : : {
1208 : 289 : std::span<const std::uint8_t> aad;
1209 : : // Set AAD to garbage only for first packet.
1210 [ + + - + ]: 289 : if (!m_sent_aad) aad = m_sent_garbage;
1211 : 289 : SendPacket(/*content=*/version_data, /*aad=*/aad, /*ignore=*/vers_ignore);
1212 : 289 : m_sent_aad = true;
1213 : 289 : }
1214 : :
1215 : : /** Expect a packet to have been received from transport, process it, and return its contents
1216 : : * (only after ReceiveKey). Decoys are skipped. Optional associated authenticated data (AAD) is
1217 : : * expected in the first received packet, no matter if that is a decoy or not. */
1218 : 122 : std::vector<uint8_t> ReceivePacket(std::span<const std::byte> aad = {})
1219 : : {
1220 : 122 : std::vector<uint8_t> contents;
1221 : : // Loop as long as there are ignored packets that are to be skipped.
1222 : 122 : while (true) {
1223 : : // When processing a packet, at least enough bytes for its length descriptor must be received.
1224 [ + - - + : 244 : BOOST_REQUIRE(m_received.size() >= BIP324Cipher::LENGTH_LEN);
+ - - + ]
1225 : : // Decrypt the content length.
1226 [ - + ]: 122 : size_t size = m_cipher.DecryptLength(MakeByteSpan(std::span{m_received}.first(BIP324Cipher::LENGTH_LEN)));
1227 : : // Check that the full packet is in the receive buffer.
1228 [ + - - + : 244 : BOOST_REQUIRE(m_received.size() >= size + BIP324Cipher::EXPANSION);
+ - + - ]
1229 : : // Decrypt the packet contents.
1230 [ + - ]: 122 : contents.resize(size);
1231 : 122 : bool ignore{false};
1232 : 122 : bool ret = m_cipher.Decrypt(
1233 : : /*input=*/MakeByteSpan(
1234 [ - + ]: 122 : std::span{m_received}.first(size + BIP324Cipher::EXPANSION).subspan(BIP324Cipher::LENGTH_LEN)),
1235 : : /*aad=*/aad,
1236 : : /*ignore=*/ignore,
1237 : : /*contents=*/MakeWritableByteSpan(contents));
1238 [ + - + - ]: 244 : BOOST_CHECK(ret);
1239 : : // Don't expect AAD in further packets.
1240 : 122 : aad = {};
1241 : : // Strip the processed packet's bytes off the front of the receive buffer.
1242 : 122 : m_received.erase(m_received.begin(), m_received.begin() + size + BIP324Cipher::EXPANSION);
1243 : : // Stop if the ignore bit is not set on this packet.
1244 [ - + ]: 122 : if (!ignore) break;
1245 : : }
1246 : 122 : return contents;
1247 : 0 : }
1248 : :
1249 : : /** Expect garbage and garbage terminator to have been received, and process them (only after
1250 : : * ReceiveKey). */
1251 : 71 : void ReceiveGarbage()
1252 : : {
1253 : : // Figure out the garbage length.
1254 : 71 : size_t garblen;
1255 [ + - ]: 147744 : for (garblen = 0; garblen <= V2Transport::MAX_GARBAGE_LEN; ++garblen) {
1256 [ - + + - : 295488 : BOOST_REQUIRE(m_received.size() >= garblen + BIP324Cipher::GARBAGE_TERMINATOR_LEN);
- + ]
1257 [ - + + + ]: 147744 : auto term_span = MakeByteSpan(std::span{m_received}.subspan(garblen, BIP324Cipher::GARBAGE_TERMINATOR_LEN));
1258 [ + + ]: 147744 : if (std::ranges::equal(term_span, m_cipher.GetReceiveGarbageTerminator())) break;
1259 : : }
1260 : : // Copy the garbage to a buffer.
1261 : 71 : m_recv_garbage.assign(m_received.begin(), m_received.begin() + garblen);
1262 : : // Strip garbage + garbage terminator off the front of the receive buffer.
1263 : 71 : m_received.erase(m_received.begin(), m_received.begin() + garblen + BIP324Cipher::GARBAGE_TERMINATOR_LEN);
1264 : 71 : }
1265 : :
1266 : : /** Expect version packet to have been received, and process it (only after ReceiveKey). */
1267 : 71 : void ReceiveVersion()
1268 : : {
1269 : 71 : auto contents = ReceivePacket(/*aad=*/MakeByteSpan(m_recv_garbage));
1270 : : // Version packets from real BIP324 peers are expected to be empty, despite the fact that
1271 : : // this class supports *sending* non-empty version packets (to test that BIP324 peers
1272 : : // correctly ignore version packet contents).
1273 [ + - + - ]: 142 : BOOST_CHECK(contents.empty());
1274 : 71 : }
1275 : :
1276 : : /** Expect application packet to have been received, with specified short id and payload.
1277 : : * (only after ReceiveKey). */
1278 : 1 : void ReceiveMessage(uint8_t short_id, std::span<const uint8_t> payload)
1279 : : {
1280 : 1 : auto ret = ReceivePacket();
1281 [ + - - + : 2 : BOOST_CHECK(ret.size() == payload.size() + 1);
+ - + - ]
1282 [ + - + - : 2 : BOOST_CHECK(ret[0] == short_id);
+ - ]
1283 [ + - - + : 2 : BOOST_CHECK(std::ranges::equal(std::span{ret}.subspan(1), payload));
+ - ]
1284 : 1 : }
1285 : :
1286 : : /** Expect application packet to have been received, with specified 12-char message type and
1287 : : * payload (only after ReceiveKey). */
1288 : 50 : void ReceiveMessage(const std::string& m_type, std::span<const uint8_t> payload)
1289 : : {
1290 : 50 : auto ret = ReceivePacket();
1291 [ + - - + : 100 : BOOST_REQUIRE(ret.size() == payload.size() + 1 + CMessageHeader::MESSAGE_TYPE_SIZE);
+ - + - ]
1292 [ + - + - ]: 100 : BOOST_CHECK(ret[0] == 0);
1293 [ + + ]: 650 : for (unsigned i = 0; i < 12; ++i) {
1294 [ - + + + ]: 600 : if (i < m_type.size()) {
1295 [ + - + - ]: 600 : BOOST_CHECK(ret[1 + i] == m_type[i]);
1296 : : } else {
1297 [ + - + - ]: 900 : BOOST_CHECK(ret[1 + i] == 0);
1298 : : }
1299 : : }
1300 [ + - - + : 100 : BOOST_CHECK(std::ranges::equal(std::span{ret}.subspan(1 + CMessageHeader::MESSAGE_TYPE_SIZE), payload));
+ - ]
1301 : 50 : }
1302 : :
1303 : : /** Schedule an encrypted packet with specified message type and payload to be sent to
1304 : : * transport (only after ReceiveKey). */
1305 : 120 : void SendMessage(std::string mtype, std::span<const uint8_t> payload)
1306 : : {
1307 : : // Construct contents consisting of 0x00 + 12-byte message type + payload.
1308 : 120 : std::vector<uint8_t> contents(1 + CMessageHeader::MESSAGE_TYPE_SIZE + payload.size());
1309 [ - + ]: 120 : std::copy(mtype.begin(), mtype.end(), contents.begin() + 1);
1310 : 120 : std::copy(payload.begin(), payload.end(), contents.begin() + 1 + CMessageHeader::MESSAGE_TYPE_SIZE);
1311 : : // Send a packet with that as contents.
1312 [ - + + - ]: 120 : SendPacket(contents);
1313 : 120 : }
1314 : :
1315 : : /** Schedule an encrypted packet with specified short message id and payload to be sent to
1316 : : * transport (only after ReceiveKey). */
1317 : 152 : void SendMessage(uint8_t short_id, std::span<const uint8_t> payload)
1318 : : {
1319 : : // Construct contents consisting of short_id + payload.
1320 : 152 : std::vector<uint8_t> contents(1 + payload.size());
1321 : 152 : contents[0] = short_id;
1322 : 152 : std::copy(payload.begin(), payload.end(), contents.begin() + 1);
1323 : : // Send a packet with that as contents.
1324 [ - + + - ]: 152 : SendPacket(contents);
1325 : 152 : }
1326 : :
1327 : : /** Test whether the transport's session ID matches the session ID we expect. */
1328 : 71 : void CompareSessionIDs() const
1329 : : {
1330 : 71 : auto info = m_transport.GetInfo();
1331 [ + - ]: 142 : BOOST_CHECK(info.session_id);
1332 [ + - ]: 142 : BOOST_CHECK(uint256(MakeUCharSpan(m_cipher.GetSessionID())) == *info.session_id);
1333 : 71 : }
1334 : :
1335 : : /** Introduce a bit error in the data scheduled to be sent. */
1336 : 10 : void Damage()
1337 : : {
1338 [ - + ]: 10 : m_to_send[m_rng.randrange(m_to_send.size())] ^= (uint8_t{1} << m_rng.randrange(8));
1339 : 10 : }
1340 : : };
1341 : :
1342 : : } // namespace
1343 : :
1344 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(v2transport_test)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
1345 : : {
1346 : : // A mostly normal scenario, testing a transport in initiator mode.
1347 [ + + ]: 11 : for (int i = 0; i < 10; ++i) {
1348 : 10 : V2TransportTester tester(m_rng, true);
1349 [ + - ]: 10 : auto ret = tester.Interact();
1350 [ + - + - : 20 : BOOST_REQUIRE(ret && ret->empty());
- + + - +
- ]
1351 [ + - ]: 10 : tester.SendKey();
1352 [ + - ]: 10 : tester.SendGarbage();
1353 [ + - ]: 10 : tester.ReceiveKey();
1354 [ + - ]: 10 : tester.SendGarbageTerm();
1355 [ + - ]: 10 : tester.SendVersion();
1356 [ + - ]: 20 : ret = tester.Interact();
1357 [ + - + - : 20 : BOOST_REQUIRE(ret && ret->empty());
- + + - +
- ]
1358 [ + - ]: 10 : tester.ReceiveGarbage();
1359 [ + - ]: 10 : tester.ReceiveVersion();
1360 [ + - ]: 10 : tester.CompareSessionIDs();
1361 : 10 : auto msg_data_1 = m_rng.randbytes<uint8_t>(m_rng.randrange(100000));
1362 : 10 : auto msg_data_2 = m_rng.randbytes<uint8_t>(m_rng.randrange(1000));
1363 [ - + + - ]: 10 : tester.SendMessage(uint8_t(4), msg_data_1); // cmpctblock short id
1364 [ + - ]: 10 : tester.SendMessage(0, {}); // Invalidly encoded message
1365 [ - + + - : 10 : tester.SendMessage("tx", msg_data_2); // 12-character encoded message type
+ - ]
1366 [ + - ]: 20 : ret = tester.Interact();
1367 [ + - + - : 20 : BOOST_REQUIRE(ret && ret->size() == 3);
- + - + +
- + - ]
1368 [ + - + - : 20 : BOOST_CHECK((*ret)[0] && (*ret)[0]->m_type == "cmpctblock" && std::ranges::equal((*ret)[0]->m_recv, MakeByteSpan(msg_data_1)));
+ - - + +
- + - ]
1369 [ + - + - : 20 : BOOST_CHECK(!(*ret)[1]);
+ - ]
1370 [ + - + - : 20 : BOOST_CHECK((*ret)[2] && (*ret)[2]->m_type == "tx" && std::ranges::equal((*ret)[2]->m_recv, MakeByteSpan(msg_data_2)));
+ - - + +
- - + ]
1371 : :
1372 : : // Then send a message with a bit error, expecting failure. It's possible this failure does
1373 : : // not occur immediately (when the length descriptor was modified), but it should come
1374 : : // eventually, and no messages can be delivered anymore.
1375 [ - + + - : 10 : tester.SendMessage("bad", msg_data_1);
+ - ]
1376 : 10 : tester.Damage();
1377 : 10 : while (true) {
1378 [ + - ]: 20 : ret = tester.Interact();
1379 [ - + ]: 10 : if (!ret) break; // failure
1380 [ # # # # : 0 : BOOST_CHECK(ret->size() == 0); // no message can be delivered
# # ]
1381 : : // Send another message.
1382 : 0 : auto msg_data_3 = m_rng.randbytes<uint8_t>(m_rng.randrange(10000));
1383 [ # # # # ]: 0 : tester.SendMessage(uint8_t(12), msg_data_3); // getheaders short id
1384 : 0 : }
1385 : 10 : }
1386 : :
1387 : : // Normal scenario, with a transport in responder node.
1388 [ + + ]: 11 : for (int i = 0; i < 10; ++i) {
1389 : 10 : V2TransportTester tester(m_rng, false);
1390 [ + - ]: 10 : tester.SendKey();
1391 [ + - ]: 10 : tester.SendGarbage();
1392 [ + - ]: 10 : auto ret = tester.Interact();
1393 [ + - + - : 20 : BOOST_REQUIRE(ret && ret->empty());
- + + - +
- ]
1394 [ + - ]: 10 : tester.ReceiveKey();
1395 [ + - ]: 10 : tester.SendGarbageTerm();
1396 [ + - ]: 10 : tester.SendVersion();
1397 [ + - ]: 20 : ret = tester.Interact();
1398 [ + - + - : 20 : BOOST_REQUIRE(ret && ret->empty());
- + + - +
- ]
1399 [ + - ]: 10 : tester.ReceiveGarbage();
1400 [ + - ]: 10 : tester.ReceiveVersion();
1401 [ + - ]: 10 : tester.CompareSessionIDs();
1402 : 10 : auto msg_data_1 = m_rng.randbytes<uint8_t>(m_rng.randrange(100000));
1403 : 10 : auto msg_data_2 = m_rng.randbytes<uint8_t>(m_rng.randrange(1000));
1404 [ - + + - ]: 10 : tester.SendMessage(uint8_t(14), msg_data_1); // inv short id
1405 [ - + + - ]: 10 : tester.SendMessage(uint8_t(19), msg_data_2); // pong short id
1406 [ + - ]: 20 : ret = tester.Interact();
1407 [ + - + - : 20 : BOOST_REQUIRE(ret && ret->size() == 2);
- + - + +
- + - ]
1408 [ + - + - : 20 : BOOST_CHECK((*ret)[0] && (*ret)[0]->m_type == "inv" && std::ranges::equal((*ret)[0]->m_recv, MakeByteSpan(msg_data_1)));
+ - - + +
- + - ]
1409 [ + - + - : 20 : BOOST_CHECK((*ret)[1] && (*ret)[1]->m_type == "pong" && std::ranges::equal((*ret)[1]->m_recv, MakeByteSpan(msg_data_2)));
+ - - + +
- ]
1410 : :
1411 : : // Then send a too-large message.
1412 : 10 : auto msg_data_3 = m_rng.randbytes<uint8_t>(4005000);
1413 [ - + + - ]: 10 : tester.SendMessage(uint8_t(11), msg_data_3); // getdata short id
1414 [ + - ]: 20 : ret = tester.Interact();
1415 [ + - + - ]: 20 : BOOST_CHECK(!ret);
1416 : 10 : }
1417 : :
1418 : : // Various valid but unusual scenarios.
1419 [ + + ]: 51 : for (int i = 0; i < 50; ++i) {
1420 : : /** Whether an initiator or responder is being tested. */
1421 : 50 : bool initiator = m_rng.randbool();
1422 : : /** Use either 0 bytes or the maximum possible (4095 bytes) garbage length. */
1423 [ + + ]: 50 : size_t garb_len = m_rng.randbool() ? 0 : V2Transport::MAX_GARBAGE_LEN;
1424 : : /** How many decoy packets to send before the version packet. */
1425 : 50 : unsigned num_ignore_version = m_rng.randrange(10);
1426 : : /** What data to send in the version packet (ignored by BIP324 peers, but reserved for future extensions). */
1427 [ + + ]: 50 : auto ver_data = m_rng.randbytes<uint8_t>(m_rng.randbool() ? 0 : m_rng.randrange(1000));
1428 : : /** Whether to immediately send key and garbage out (required for responders, optional otherwise). */
1429 [ + + + + ]: 50 : bool send_immediately = !initiator || m_rng.randbool();
1430 : : /** How many decoy packets to send before the first and second real message. */
1431 : 50 : unsigned num_decoys_1 = m_rng.randrange(1000), num_decoys_2 = m_rng.randrange(1000);
1432 [ + - ]: 50 : V2TransportTester tester(m_rng, initiator);
1433 [ + + ]: 50 : if (send_immediately) {
1434 [ + - ]: 39 : tester.SendKey();
1435 [ + - ]: 39 : tester.SendGarbage(garb_len);
1436 : : }
1437 [ + - ]: 50 : auto ret = tester.Interact();
1438 [ + - + - : 100 : BOOST_REQUIRE(ret && ret->empty());
- + + - +
+ ]
1439 [ + + ]: 50 : if (!send_immediately) {
1440 [ + - ]: 11 : tester.SendKey();
1441 [ + - ]: 11 : tester.SendGarbage(garb_len);
1442 : : }
1443 [ + - ]: 50 : tester.ReceiveKey();
1444 [ + - ]: 50 : tester.SendGarbageTerm();
1445 [ + + ]: 268 : for (unsigned v = 0; v < num_ignore_version; ++v) {
1446 [ + + ]: 218 : size_t ver_ign_data_len = m_rng.randbool() ? 0 : m_rng.randrange(1000);
1447 : 218 : auto ver_ign_data = m_rng.randbytes<uint8_t>(ver_ign_data_len);
1448 [ - + + - ]: 218 : tester.SendVersion(ver_ign_data, true);
1449 : 218 : }
1450 [ - + + - ]: 50 : tester.SendVersion(ver_data, false);
1451 [ + - ]: 100 : ret = tester.Interact();
1452 [ + - + - : 100 : BOOST_REQUIRE(ret && ret->empty());
- + + - +
- ]
1453 [ + - ]: 50 : tester.ReceiveGarbage();
1454 [ + - ]: 50 : tester.ReceiveVersion();
1455 [ + - ]: 50 : tester.CompareSessionIDs();
1456 [ + + ]: 26114 : for (unsigned d = 0; d < num_decoys_1; ++d) {
1457 : 26064 : auto decoy_data = m_rng.randbytes<uint8_t>(m_rng.randrange(1000));
1458 [ - + + - ]: 26064 : tester.SendPacket(/*content=*/decoy_data, /*aad=*/{}, /*ignore=*/true);
1459 : 26064 : }
1460 : 50 : auto msg_data_1 = m_rng.randbytes<uint8_t>(m_rng.randrange(4000000));
1461 [ - + + - ]: 50 : tester.SendMessage(uint8_t(28), msg_data_1);
1462 [ + + ]: 27818 : for (unsigned d = 0; d < num_decoys_2; ++d) {
1463 : 27768 : auto decoy_data = m_rng.randbytes<uint8_t>(m_rng.randrange(1000));
1464 [ - + + - ]: 27768 : tester.SendPacket(/*content=*/decoy_data, /*aad=*/{}, /*ignore=*/true);
1465 : 27768 : }
1466 : 50 : auto msg_data_2 = m_rng.randbytes<uint8_t>(m_rng.randrange(1000));
1467 [ - + + - ]: 50 : tester.SendMessage(uint8_t(13), msg_data_2); // headers short id
1468 : : // Send invalidly-encoded message
1469 [ + - + - ]: 50 : tester.SendMessage(std::string("blocktxn\x00\x00\x00a", CMessageHeader::MESSAGE_TYPE_SIZE), {});
1470 [ + - + - ]: 50 : tester.SendMessage("foobar", {}); // test receiving unknown message type
1471 [ + - + - ]: 100 : tester.AddMessage("barfoo", {}); // test sending unknown message type
1472 [ + - ]: 100 : ret = tester.Interact();
1473 [ + - + - : 100 : BOOST_REQUIRE(ret && ret->size() == 4);
- + - + +
- + - ]
1474 [ + - + - : 100 : BOOST_CHECK((*ret)[0] && (*ret)[0]->m_type == "addrv2" && std::ranges::equal((*ret)[0]->m_recv, MakeByteSpan(msg_data_1)));
+ - - + +
- + - ]
1475 [ + - + - : 100 : BOOST_CHECK((*ret)[1] && (*ret)[1]->m_type == "headers" && std::ranges::equal((*ret)[1]->m_recv, MakeByteSpan(msg_data_2)));
+ - - + +
- + - ]
1476 [ + - + - : 100 : BOOST_CHECK(!(*ret)[2]);
+ - ]
1477 [ + - + - : 100 : BOOST_CHECK((*ret)[3] && (*ret)[3]->m_type == "foobar" && (*ret)[3]->m_recv.empty());
+ - - + -
+ + - +
- ]
1478 [ + - + - ]: 100 : tester.ReceiveMessage("barfoo", {});
1479 : 50 : }
1480 : :
1481 : : // Too long garbage (initiator).
1482 : 1 : {
1483 : 1 : V2TransportTester tester(m_rng, true);
1484 [ + - ]: 1 : auto ret = tester.Interact();
1485 [ + - + - : 2 : BOOST_REQUIRE(ret && ret->empty());
- + + - +
- ]
1486 [ + - ]: 1 : tester.SendKey();
1487 [ + - ]: 1 : tester.SendGarbage(V2Transport::MAX_GARBAGE_LEN + 1);
1488 [ + - ]: 1 : tester.ReceiveKey();
1489 [ + - ]: 1 : tester.SendGarbageTerm();
1490 [ + - ]: 2 : ret = tester.Interact();
1491 [ + - + - ]: 2 : BOOST_CHECK(!ret);
1492 : 1 : }
1493 : :
1494 : : // Too long garbage (responder).
1495 : 1 : {
1496 : 1 : V2TransportTester tester(m_rng, false);
1497 [ + - ]: 1 : tester.SendKey();
1498 [ + - ]: 1 : tester.SendGarbage(V2Transport::MAX_GARBAGE_LEN + 1);
1499 [ + - ]: 1 : auto ret = tester.Interact();
1500 [ + - + - : 2 : BOOST_REQUIRE(ret && ret->empty());
- + + - +
- ]
1501 [ + - ]: 1 : tester.ReceiveKey();
1502 [ + - ]: 1 : tester.SendGarbageTerm();
1503 [ + - ]: 2 : ret = tester.Interact();
1504 [ + - + - ]: 2 : BOOST_CHECK(!ret);
1505 : 1 : }
1506 : :
1507 : : // Send garbage that includes the first 15 garbage terminator bytes somewhere.
1508 : 1 : {
1509 : 1 : V2TransportTester tester(m_rng, true);
1510 [ + - ]: 1 : auto ret = tester.Interact();
1511 [ + - + - : 2 : BOOST_REQUIRE(ret && ret->empty());
- + + - +
- ]
1512 [ + - ]: 1 : tester.SendKey();
1513 [ + - ]: 1 : tester.ReceiveKey();
1514 : : /** The number of random garbage bytes before the included first 15 bytes of terminator. */
1515 : 1 : size_t len_before = m_rng.randrange(V2Transport::MAX_GARBAGE_LEN - 16 + 1);
1516 : : /** The number of random garbage bytes after it. */
1517 : 1 : size_t len_after = m_rng.randrange(V2Transport::MAX_GARBAGE_LEN - 16 - len_before + 1);
1518 : : // Construct len_before + 16 + len_after random bytes.
1519 : 1 : auto garbage = m_rng.randbytes<uint8_t>(len_before + 16 + len_after);
1520 : : // Replace the designed 16 bytes in the middle with the to-be-sent garbage terminator.
1521 : 1 : auto garb_term = MakeUCharSpan(tester.GetCipher().GetSendGarbageTerminator());
1522 : 1 : std::copy(garb_term.begin(), garb_term.begin() + 16, garbage.begin() + len_before);
1523 : : // Introduce a bit error in the last byte of that copied garbage terminator, making only
1524 : : // the first 15 of them match.
1525 [ - + ]: 1 : garbage[len_before + 15] ^= (uint8_t(1) << m_rng.randrange(8));
1526 [ - + + - ]: 1 : tester.SendGarbage(garbage);
1527 [ + - ]: 1 : tester.SendGarbageTerm();
1528 [ + - ]: 1 : tester.SendVersion();
1529 [ + - ]: 2 : ret = tester.Interact();
1530 [ + - + - : 2 : BOOST_REQUIRE(ret && ret->empty());
- + + - +
- ]
1531 [ + - ]: 1 : tester.ReceiveGarbage();
1532 [ + - ]: 1 : tester.ReceiveVersion();
1533 [ + - ]: 1 : tester.CompareSessionIDs();
1534 : 1 : auto msg_data_1 = m_rng.randbytes<uint8_t>(4000000); // test that receiving 4M payload works
1535 : 1 : auto msg_data_2 = m_rng.randbytes<uint8_t>(4000000); // test that sending 4M payload works
1536 [ + - ]: 1 : tester.SendMessage(uint8_t(m_rng.randrange(223) + 33), {}); // unknown short id
1537 [ - + + - ]: 1 : tester.SendMessage(uint8_t(2), msg_data_1); // "block" short id
1538 [ + - + - : 2 : tester.AddMessage("blocktxn", msg_data_2); // schedule blocktxn to be sent to us
+ - ]
1539 [ + - ]: 2 : ret = tester.Interact();
1540 [ + - + - : 2 : BOOST_REQUIRE(ret && ret->size() == 2);
- + - + +
- + - ]
1541 [ + - + - : 2 : BOOST_CHECK(!(*ret)[0]);
+ - ]
1542 [ + - + - : 2 : BOOST_CHECK((*ret)[1] && (*ret)[1]->m_type == "block" && std::ranges::equal((*ret)[1]->m_recv, MakeByteSpan(msg_data_1)));
+ - - + +
- - + ]
1543 [ - + + - ]: 1 : tester.ReceiveMessage(uint8_t(3), msg_data_2); // "blocktxn" short id
1544 : 1 : }
1545 : :
1546 : : // Send correct network's V1 header
1547 : 1 : {
1548 : 1 : V2TransportTester tester(m_rng, false);
1549 [ + - + - ]: 1 : tester.SendV1Version(Params().MessageStart());
1550 [ + - ]: 1 : auto ret = tester.Interact();
1551 [ + - + - ]: 2 : BOOST_CHECK(ret);
1552 : 1 : }
1553 : :
1554 : : // Send wrong network's V1 header
1555 : 1 : {
1556 : 1 : V2TransportTester tester(m_rng, false);
1557 [ + - + - ]: 1 : tester.SendV1Version(CChainParams::Main()->MessageStart());
1558 [ + - ]: 1 : auto ret = tester.Interact();
1559 [ + - + - ]: 2 : BOOST_CHECK(!ret);
1560 : 1 : }
1561 : 1 : }
1562 : :
1563 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(private_broadcast_version_does_not_update_addrman_services)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
1564 : : {
1565 : 1 : LOCK(NetEventsInterface::g_msgproc_mutex);
1566 : :
1567 [ + - + - : 2 : const CNetAddr source{LookupHost("2.3.4.5", /*fAllowLookup=*/false).value()};
+ - ]
1568 [ + - + - : 2 : const CAddress addr{Lookup("1.2.3.4", 8333, /*fAllowLookup=*/false).value(), NODE_NONE};
+ - ]
1569 [ + - + - : 3 : BOOST_REQUIRE(m_node.addrman->Add({addr}, source));
+ - + - +
+ - - ]
1570 : 1 : CNode node{/*id=*/0,
1571 : : /*sock=*/nullptr,
1572 : : /*addrIn=*/addr,
1573 : : /*nKeyedNetGroupIn=*/0,
1574 : : /*nLocalHostNonceIn=*/0,
1575 [ - + ]: 1 : /*addrBindIn=*/CService{},
1576 [ + - ]: 2 : /*addrNameIn=*/"",
1577 : : /*conn_type_in=*/ConnectionType::PRIVATE_BROADCAST,
1578 : : /*inbound_onion=*/false,
1579 [ + - + - ]: 3 : /*network_key=*/0};
1580 : :
1581 [ + - ]: 1 : auto& connman = static_cast<ConnmanTestMsg&>(*m_node.connman);
1582 [ + - ]: 1 : connman.Handshake(node,
1583 : : /*successfully_connected=*/false,
1584 : : /*remote_services=*/NODE_NETWORK,
1585 : : /*local_services=*/NODE_NONE,
1586 : : /*version=*/PROTOCOL_VERSION,
1587 : : /*relay_txs=*/true);
1588 : :
1589 [ + - + - : 1 : BOOST_CHECK_EQUAL(m_node.addrman->Select().first.nServices, NODE_NONE);
+ - ]
1590 [ + - ]: 1 : m_node.peerman->FinalizeNode(node);
1591 [ + - ]: 3 : }
1592 : :
1593 : : BOOST_AUTO_TEST_SUITE_END()
|