123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923 |
- /* Copyright (c) 2016-2018, The Tor Project, Inc. */
- /* See LICENSE for licensing information */
- /**
- * \file test_hs_service.c
- * \brief Test hidden service functionality.
- */
- #define HS_SERVICE_PRIVATE
- #define HS_INTROPOINT_PRIVATE
- #define RENDSERVICE_PRIVATE
- #define CIRCUITLIST_PRIVATE
- #include "test/test.h"
- #include "test/log_test_helpers.h"
- #include "lib/crypt_ops/crypto_rand.h"
- #include "or/or.h"
- #include "or/circuitlist.h"
- #include "or/circuituse.h"
- #include "ht.h"
- #include "or/relay.h"
- #include "or/rendservice.h"
- #include "or/hs_cell.h"
- #include "or/hs_circuitmap.h"
- #include "or/hs_common.h"
- #include "or/hs_intropoint.h"
- #include "or/hs_service.h"
- #include "or/or_circuit_st.h"
- /* Trunnel. */
- #include "trunnel/hs/cell_establish_intro.h"
- #include "trunnel/hs/cell_introduce1.h"
- #include "trunnel/hs/cell_common.h"
- static size_t
- new_establish_intro_cell(const char *circ_nonce,
- trn_cell_establish_intro_t **cell_out)
- {
- ssize_t cell_len = 0;
- uint8_t buf[RELAY_PAYLOAD_SIZE] = {0};
- trn_cell_establish_intro_t *cell = NULL;
- hs_service_intro_point_t *ip = NULL;
- /* Auth key pair is generated in the constructor so we are all set for
- * using this IP object. */
- ip = service_intro_point_new(NULL, 0);
- tt_assert(ip);
- cell_len = hs_cell_build_establish_intro(circ_nonce, ip, buf);
- tt_i64_op(cell_len, OP_GT, 0);
- cell_len = trn_cell_establish_intro_parse(&cell, buf, sizeof(buf));
- tt_i64_op(cell_len, OP_GT, 0);
- tt_assert(cell);
- *cell_out = cell;
- done:
- service_intro_point_free(ip);
- return cell_len;
- }
- static ssize_t
- new_establish_intro_encoded_cell(const char *circ_nonce, uint8_t *cell_out)
- {
- ssize_t cell_len = 0;
- hs_service_intro_point_t *ip = NULL;
- /* Auth key pair is generated in the constructor so we are all set for
- * using this IP object. */
- ip = service_intro_point_new(NULL, 0);
- tt_assert(ip);
- cell_len = hs_cell_build_establish_intro(circ_nonce, ip, cell_out);
- tt_i64_op(cell_len, OP_GT, 0);
- done:
- service_intro_point_free(ip);
- return cell_len;
- }
- /* Mock function to avoid networking in unittests */
- static int
- mock_send_intro_established_cell(or_circuit_t *circ)
- {
- (void) circ;
- return 0;
- }
- static int
- mock_relay_send_command_from_edge(streamid_t stream_id, circuit_t *circ,
- uint8_t relay_command, const char *payload,
- size_t payload_len,
- crypt_path_t *cpath_layer,
- const char *filename, int lineno)
- {
- (void) stream_id;
- (void) circ;
- (void) relay_command;
- (void) payload;
- (void) payload_len;
- (void) cpath_layer;
- (void) filename;
- (void) lineno;
- return 0;
- }
- static or_circuit_t *
- helper_create_intro_circuit(void)
- {
- or_circuit_t *circ = or_circuit_new(0, NULL);
- tt_assert(circ);
- circuit_change_purpose(TO_CIRCUIT(circ), CIRCUIT_PURPOSE_OR);
- done:
- return circ;
- }
- static trn_cell_introduce1_t *
- helper_create_introduce1_cell(void)
- {
- trn_cell_introduce1_t *cell = NULL;
- ed25519_keypair_t auth_key_kp;
- /* Generate the auth_key of the cell. */
- if (ed25519_keypair_generate(&auth_key_kp, 0) < 0) {
- goto err;
- }
- cell = trn_cell_introduce1_new();
- tt_assert(cell);
- /* Set the auth key. */
- {
- size_t auth_key_len = sizeof(auth_key_kp.pubkey);
- trn_cell_introduce1_set_auth_key_type(cell,
- HS_INTRO_AUTH_KEY_TYPE_ED25519);
- trn_cell_introduce1_set_auth_key_len(cell, auth_key_len);
- trn_cell_introduce1_setlen_auth_key(cell, auth_key_len);
- uint8_t *auth_key_ptr = trn_cell_introduce1_getarray_auth_key(cell);
- memcpy(auth_key_ptr, auth_key_kp.pubkey.pubkey, auth_key_len);
- }
- /* Set the cell extensions to none. */
- {
- trn_cell_extension_t *ext = trn_cell_extension_new();
- trn_cell_extension_set_num(ext, 0);
- trn_cell_introduce1_set_extensions(cell, ext);
- }
- /* Set the encrypted section to some data. */
- {
- size_t enc_len = 128;
- trn_cell_introduce1_setlen_encrypted(cell, enc_len);
- uint8_t *enc_ptr = trn_cell_introduce1_getarray_encrypted(cell);
- memset(enc_ptr, 'a', enc_len);
- }
- return cell;
- err:
- done:
- trn_cell_introduce1_free(cell);
- return NULL;
- }
- /* Try sending an ESTABLISH_INTRO cell on a circuit that is already an intro
- * point. Should fail. */
- static void
- test_establish_intro_wrong_purpose(void *arg)
- {
- int retval;
- ssize_t cell_len = 0;
- char circ_nonce[DIGEST_LEN] = {0};
- uint8_t cell_body[RELAY_PAYLOAD_SIZE];
- or_circuit_t *intro_circ = or_circuit_new(0,NULL);
- (void)arg;
- /* Get the auth key of the intro point */
- crypto_rand(circ_nonce, sizeof(circ_nonce));
- memcpy(intro_circ->rend_circ_nonce, circ_nonce, DIGEST_LEN);
- /* Set a bad circuit purpose!! :) */
- circuit_change_purpose(TO_CIRCUIT(intro_circ), CIRCUIT_PURPOSE_INTRO_POINT);
- /* Create outgoing ESTABLISH_INTRO cell and extract its payload so that we
- attempt to parse it. */
- cell_len = new_establish_intro_encoded_cell(circ_nonce, cell_body);
- tt_i64_op(cell_len, OP_GT, 0);
- /* Receive the cell. Should fail. */
- setup_full_capture_of_logs(LOG_INFO);
- retval = hs_intro_received_establish_intro(intro_circ, cell_body, cell_len);
- expect_log_msg_containing("Rejecting ESTABLISH_INTRO on non-OR circuit.");
- teardown_capture_of_logs();
- tt_int_op(retval, OP_EQ, -1);
- done:
- circuit_free_(TO_CIRCUIT(intro_circ));
- }
- /* Prepare a circuit for accepting an ESTABLISH_INTRO cell */
- static void
- helper_prepare_circ_for_intro(or_circuit_t *circ, const char *circ_nonce)
- {
- /* Prepare the circuit for the incoming ESTABLISH_INTRO */
- circuit_change_purpose(TO_CIRCUIT(circ), CIRCUIT_PURPOSE_OR);
- memcpy(circ->rend_circ_nonce, circ_nonce, DIGEST_LEN);
- }
- /* Send an empty ESTABLISH_INTRO cell. Should fail. */
- static void
- test_establish_intro_wrong_keytype(void *arg)
- {
- int retval;
- or_circuit_t *intro_circ = or_circuit_new(0,NULL);
- char circ_nonce[DIGEST_LEN] = {0};
- (void) arg;
- /* Get the auth key of the intro point */
- crypto_rand(circ_nonce, sizeof(circ_nonce));
- helper_prepare_circ_for_intro(intro_circ, circ_nonce);
- /* Receive the cell. Should fail. */
- setup_full_capture_of_logs(LOG_INFO);
- retval = hs_intro_received_establish_intro(intro_circ, (uint8_t *) "", 0);
- expect_log_msg_containing("Empty ESTABLISH_INTRO cell.");
- teardown_capture_of_logs();
- tt_int_op(retval, OP_EQ, -1);
- done:
- circuit_free_(TO_CIRCUIT(intro_circ));
- }
- /* Send an ESTABLISH_INTRO cell with an unknown auth key type. Should fail. */
- static void
- test_establish_intro_wrong_keytype2(void *arg)
- {
- int retval;
- char circ_nonce[DIGEST_LEN] = {0};
- uint8_t cell_body[RELAY_PAYLOAD_SIZE];
- ssize_t cell_len = 0;
- or_circuit_t *intro_circ = or_circuit_new(0,NULL);
- (void) arg;
- /* Get the auth key of the intro point */
- crypto_rand(circ_nonce, sizeof(circ_nonce));
- helper_prepare_circ_for_intro(intro_circ, circ_nonce);
- /* Create outgoing ESTABLISH_INTRO cell and extract its payload so that we
- * attempt to parse it. */
- cell_len = new_establish_intro_encoded_cell(circ_nonce, cell_body);
- tt_i64_op(cell_len, OP_GT, 0);
- /* Mutate the auth key type! :) */
- cell_body[0] = 42;
- /* Receive the cell. Should fail. */
- setup_full_capture_of_logs(LOG_INFO);
- retval = hs_intro_received_establish_intro(intro_circ, cell_body, cell_len);
- expect_log_msg_containing("Unrecognized AUTH_KEY_TYPE 42.");
- teardown_capture_of_logs();
- tt_int_op(retval, OP_EQ, -1);
- done:
- circuit_free_(TO_CIRCUIT(intro_circ));
- }
- /* Send a legit ESTABLISH_INTRO cell but with a wrong MAC. Should fail. */
- static void
- test_establish_intro_wrong_mac(void *arg)
- {
- int retval;
- char circ_nonce[DIGEST_LEN] = {0};
- ssize_t cell_len = 0;
- uint8_t cell_body[RELAY_PAYLOAD_SIZE];
- trn_cell_establish_intro_t *cell = NULL;
- or_circuit_t *intro_circ = or_circuit_new(0,NULL);
- (void) arg;
- /* Get the auth key of the intro point */
- crypto_rand(circ_nonce, sizeof(circ_nonce));
- helper_prepare_circ_for_intro(intro_circ, circ_nonce);
- /* Create outgoing ESTABLISH_INTRO cell and extract its payload so that we
- * attempt to parse it. */
- cell_len = new_establish_intro_cell(circ_nonce, &cell);
- tt_i64_op(cell_len, OP_GT, 0);
- tt_assert(cell);
- /* Mangle one byte of the MAC. */
- uint8_t *handshake_ptr =
- trn_cell_establish_intro_getarray_handshake_mac(cell);
- handshake_ptr[TRUNNEL_SHA3_256_LEN - 1]++;
- /* We need to resign the payload with that change. */
- {
- ed25519_signature_t sig;
- ed25519_keypair_t key_struct;
- /* New keypair for the signature since we don't have access to the private
- * key material generated earlier when creating the cell. */
- retval = ed25519_keypair_generate(&key_struct, 0);
- tt_int_op(retval, OP_EQ, 0);
- uint8_t *auth_key_ptr =
- trn_cell_establish_intro_getarray_auth_key(cell);
- memcpy(auth_key_ptr, key_struct.pubkey.pubkey, ED25519_PUBKEY_LEN);
- /* Encode payload so we can sign it. */
- cell_len = trn_cell_establish_intro_encode(cell_body, sizeof(cell_body),
- cell);
- tt_i64_op(cell_len, OP_GT, 0);
- retval = ed25519_sign_prefixed(&sig, cell_body,
- cell_len -
- (ED25519_SIG_LEN + sizeof(cell->sig_len)),
- ESTABLISH_INTRO_SIG_PREFIX, &key_struct);
- tt_int_op(retval, OP_EQ, 0);
- /* And write the signature to the cell */
- uint8_t *sig_ptr =
- trn_cell_establish_intro_getarray_sig(cell);
- memcpy(sig_ptr, sig.sig, cell->sig_len);
- /* Re-encode with the new signature. */
- cell_len = trn_cell_establish_intro_encode(cell_body, sizeof(cell_body),
- cell);
- tt_i64_op(cell_len, OP_GT, 0);
- }
- /* Receive the cell. Should fail because our MAC is wrong. */
- setup_full_capture_of_logs(LOG_INFO);
- retval = hs_intro_received_establish_intro(intro_circ, cell_body, cell_len);
- expect_log_msg_containing("ESTABLISH_INTRO handshake_auth not as expected");
- teardown_capture_of_logs();
- tt_int_op(retval, OP_EQ, -1);
- done:
- trn_cell_establish_intro_free(cell);
- circuit_free_(TO_CIRCUIT(intro_circ));
- }
- /* Send a legit ESTABLISH_INTRO cell but with a wrong auth key length. Should
- * fail. */
- static void
- test_establish_intro_wrong_auth_key_len(void *arg)
- {
- int retval;
- char circ_nonce[DIGEST_LEN] = {0};
- uint8_t cell_body[RELAY_PAYLOAD_SIZE];
- ssize_t cell_len = 0;
- size_t bad_auth_key_len = ED25519_PUBKEY_LEN - 1;
- trn_cell_establish_intro_t *cell = NULL;
- or_circuit_t *intro_circ = or_circuit_new(0,NULL);
- (void) arg;
- /* Get the auth key of the intro point */
- crypto_rand(circ_nonce, sizeof(circ_nonce));
- helper_prepare_circ_for_intro(intro_circ, circ_nonce);
- /* Create outgoing ESTABLISH_INTRO cell and extract its payload so that we
- * attempt to parse it. */
- cell_len = new_establish_intro_cell(circ_nonce, &cell);
- tt_i64_op(cell_len, OP_GT, 0);
- tt_assert(cell);
- /* Mangle the auth key length. */
- trn_cell_establish_intro_set_auth_key_len(cell, bad_auth_key_len);
- trn_cell_establish_intro_setlen_auth_key(cell, bad_auth_key_len);
- /* Encode cell. */
- cell_len = trn_cell_establish_intro_encode(cell_body, sizeof(cell_body),
- cell);
- tt_int_op(cell_len, OP_GT, 0);
- /* Receive the cell. Should fail. */
- setup_full_capture_of_logs(LOG_INFO);
- retval = hs_intro_received_establish_intro(intro_circ, cell_body, cell_len);
- expect_log_msg_containing("ESTABLISH_INTRO auth key length is invalid");
- teardown_capture_of_logs();
- tt_int_op(retval, OP_EQ, -1);
- done:
- trn_cell_establish_intro_free(cell);
- circuit_free_(TO_CIRCUIT(intro_circ));
- }
- /* Send a legit ESTABLISH_INTRO cell but with a wrong sig length. Should
- * fail. */
- static void
- test_establish_intro_wrong_sig_len(void *arg)
- {
- int retval;
- char circ_nonce[DIGEST_LEN] = {0};
- uint8_t cell_body[RELAY_PAYLOAD_SIZE];
- ssize_t cell_len = 0;
- size_t bad_sig_len = ED25519_SIG_LEN - 1;
- trn_cell_establish_intro_t *cell = NULL;
- or_circuit_t *intro_circ = or_circuit_new(0,NULL);
- (void) arg;
- /* Get the auth key of the intro point */
- crypto_rand(circ_nonce, sizeof(circ_nonce));
- helper_prepare_circ_for_intro(intro_circ, circ_nonce);
- /* Create outgoing ESTABLISH_INTRO cell and extract its payload so that we
- * attempt to parse it. */
- cell_len = new_establish_intro_cell(circ_nonce, &cell);
- tt_i64_op(cell_len, OP_GT, 0);
- tt_assert(cell);
- /* Mangle the signature length. */
- trn_cell_establish_intro_set_sig_len(cell, bad_sig_len);
- trn_cell_establish_intro_setlen_sig(cell, bad_sig_len);
- /* Encode cell. */
- cell_len = trn_cell_establish_intro_encode(cell_body, sizeof(cell_body),
- cell);
- tt_int_op(cell_len, OP_GT, 0);
- /* Receive the cell. Should fail. */
- setup_full_capture_of_logs(LOG_INFO);
- retval = hs_intro_received_establish_intro(intro_circ, cell_body, cell_len);
- expect_log_msg_containing("ESTABLISH_INTRO sig len is invalid");
- teardown_capture_of_logs();
- tt_int_op(retval, OP_EQ, -1);
- done:
- trn_cell_establish_intro_free(cell);
- circuit_free_(TO_CIRCUIT(intro_circ));
- }
- /* Send a legit ESTABLISH_INTRO cell but slightly change the signature. Should
- * fail. */
- static void
- test_establish_intro_wrong_sig(void *arg)
- {
- int retval;
- char circ_nonce[DIGEST_LEN] = {0};
- uint8_t cell_body[RELAY_PAYLOAD_SIZE];
- ssize_t cell_len = 0;
- or_circuit_t *intro_circ = or_circuit_new(0,NULL);
- (void) arg;
- /* Get the auth key of the intro point */
- crypto_rand(circ_nonce, sizeof(circ_nonce));
- helper_prepare_circ_for_intro(intro_circ, circ_nonce);
- /* Create outgoing ESTABLISH_INTRO cell and extract its payload so that we
- attempt to parse it. */
- cell_len = new_establish_intro_encoded_cell(circ_nonce, cell_body);
- tt_i64_op(cell_len, OP_GT, 0);
- /* Mutate the last byte (signature)! :) */
- cell_body[cell_len - 1]++;
- /* Receive the cell. Should fail. */
- setup_full_capture_of_logs(LOG_INFO);
- retval = hs_intro_received_establish_intro(intro_circ, cell_body,
- (size_t)cell_len);
- expect_log_msg_containing("Failed to verify ESTABLISH_INTRO cell.");
- teardown_capture_of_logs();
- tt_int_op(retval, OP_EQ, -1);
- done:
- circuit_free_(TO_CIRCUIT(intro_circ));
- }
- /* Helper function: Send a well-formed v3 ESTABLISH_INTRO cell to
- * <b>intro_circ</b>. Return the cell. */
- static trn_cell_establish_intro_t *
- helper_establish_intro_v3(or_circuit_t *intro_circ)
- {
- int retval;
- char circ_nonce[DIGEST_LEN] = {0};
- uint8_t cell_body[RELAY_PAYLOAD_SIZE];
- ssize_t cell_len = 0;
- trn_cell_establish_intro_t *cell = NULL;
- tt_assert(intro_circ);
- /* Prepare the circuit for the incoming ESTABLISH_INTRO */
- crypto_rand(circ_nonce, sizeof(circ_nonce));
- helper_prepare_circ_for_intro(intro_circ, circ_nonce);
- /* Create outgoing ESTABLISH_INTRO cell and extract its payload so that we
- * attempt to parse it. */
- cell_len = new_establish_intro_cell(circ_nonce, &cell);
- tt_i64_op(cell_len, OP_GT, 0);
- tt_assert(cell);
- cell_len = trn_cell_establish_intro_encode(cell_body, sizeof(cell_body),
- cell);
- tt_int_op(cell_len, OP_GT, 0);
- /* Receive the cell */
- retval = hs_intro_received_establish_intro(intro_circ, cell_body,
- (size_t) cell_len);
- tt_int_op(retval, OP_EQ, 0);
- done:
- return cell;
- }
- /* Helper function: Send a well-formed v2 ESTABLISH_INTRO cell to
- * <b>intro_circ</b>. Return the public key advertised in the cell. */
- static crypto_pk_t *
- helper_establish_intro_v2(or_circuit_t *intro_circ)
- {
- crypto_pk_t *key1 = NULL;
- int retval;
- uint8_t cell_body[RELAY_PAYLOAD_SIZE];
- ssize_t cell_len = 0;
- char circ_nonce[DIGEST_LEN] = {0};
- tt_assert(intro_circ);
- /* Prepare the circuit for the incoming ESTABLISH_INTRO */
- crypto_rand(circ_nonce, sizeof(circ_nonce));
- helper_prepare_circ_for_intro(intro_circ, circ_nonce);
- /* Send legacy establish_intro */
- key1 = pk_generate(0);
- /* Use old circ_nonce why not */
- cell_len = rend_service_encode_establish_intro_cell(
- (char*)cell_body,
- sizeof(cell_body), key1,
- circ_nonce);
- tt_int_op(cell_len, OP_GT, 0);
- /* Receive legacy establish_intro */
- retval = hs_intro_received_establish_intro(intro_circ,
- cell_body, (size_t) cell_len);
- tt_int_op(retval, OP_EQ, 0);
- done:
- return key1;
- }
- /* Helper function: test circuitmap free_all function outside of
- * test_intro_point_registration to prevent Coverity from seeing a
- * double free if the assertion hypothetically fails.
- */
- static void
- test_circuitmap_free_all(void)
- {
- hs_circuitmap_ht *the_hs_circuitmap = NULL;
- the_hs_circuitmap = get_hs_circuitmap();
- tt_assert(the_hs_circuitmap);
- hs_circuitmap_free_all();
- the_hs_circuitmap = get_hs_circuitmap();
- tt_ptr_op(the_hs_circuitmap, OP_EQ, NULL);
- done:
- ;
- }
- /** Successfully register a v2 intro point and a v3 intro point. Ensure that HS
- * circuitmap is maintained properly. */
- static void
- test_intro_point_registration(void *arg)
- {
- int retval;
- hs_circuitmap_ht *the_hs_circuitmap = NULL;
- or_circuit_t *intro_circ = NULL;
- trn_cell_establish_intro_t *establish_intro_cell = NULL;
- ed25519_public_key_t auth_key;
- crypto_pk_t *legacy_auth_key = NULL;
- or_circuit_t *legacy_intro_circ = NULL;
- or_circuit_t *returned_intro_circ = NULL;
- (void) arg;
- MOCK(hs_intro_send_intro_established_cell, mock_send_intro_established_cell);
- hs_circuitmap_init();
- /* Check that the circuitmap is currently empty */
- {
- the_hs_circuitmap = get_hs_circuitmap();
- tt_assert(the_hs_circuitmap);
- tt_int_op(0, OP_EQ, HT_SIZE(the_hs_circuitmap));
- /* Do a circuitmap query in any case */
- returned_intro_circ =hs_circuitmap_get_intro_circ_v3_relay_side(&auth_key);
- tt_ptr_op(returned_intro_circ, OP_EQ, NULL);
- }
- /* Create a v3 intro point */
- {
- intro_circ = or_circuit_new(0, NULL);
- tt_assert(intro_circ);
- establish_intro_cell = helper_establish_intro_v3(intro_circ);
- /* Check that the intro point was registered on the HS circuitmap */
- the_hs_circuitmap = get_hs_circuitmap();
- tt_assert(the_hs_circuitmap);
- tt_int_op(1, OP_EQ, HT_SIZE(the_hs_circuitmap));
- get_auth_key_from_cell(&auth_key, RELAY_COMMAND_ESTABLISH_INTRO,
- establish_intro_cell);
- returned_intro_circ =
- hs_circuitmap_get_intro_circ_v3_relay_side(&auth_key);
- tt_ptr_op(intro_circ, OP_EQ, returned_intro_circ);
- }
- /* Create a v2 intro point */
- {
- char key_digest[DIGEST_LEN];
- legacy_intro_circ = or_circuit_new(1, NULL);
- tt_assert(legacy_intro_circ);
- legacy_auth_key = helper_establish_intro_v2(legacy_intro_circ);
- tt_assert(legacy_auth_key);
- /* Check that the circuitmap now has two elements */
- the_hs_circuitmap = get_hs_circuitmap();
- tt_assert(the_hs_circuitmap);
- tt_int_op(2, OP_EQ, HT_SIZE(the_hs_circuitmap));
- /* Check that the new element is our legacy intro circuit. */
- retval = crypto_pk_get_digest(legacy_auth_key, key_digest);
- tt_int_op(retval, OP_EQ, 0);
- returned_intro_circ =
- hs_circuitmap_get_intro_circ_v2_relay_side((uint8_t*)key_digest);
- tt_ptr_op(legacy_intro_circ, OP_EQ, returned_intro_circ);
- }
- /* XXX Continue test and try to register a second v3 intro point with the
- * same auth key. Make sure that old intro circuit gets closed. */
- done:
- crypto_pk_free(legacy_auth_key);
- circuit_free_(TO_CIRCUIT(intro_circ));
- circuit_free_(TO_CIRCUIT(legacy_intro_circ));
- trn_cell_establish_intro_free(establish_intro_cell);
- test_circuitmap_free_all();
- UNMOCK(hs_intro_send_intro_established_cell);
- }
- static void
- test_introduce1_suitable_circuit(void *arg)
- {
- int ret;
- or_circuit_t *circ = NULL;
- (void) arg;
- /* Valid suitable circuit. */
- {
- circ = or_circuit_new(0, NULL);
- circuit_change_purpose(TO_CIRCUIT(circ), CIRCUIT_PURPOSE_OR);
- ret = circuit_is_suitable_for_introduce1(circ);
- circuit_free_(TO_CIRCUIT(circ));
- tt_int_op(ret, OP_EQ, 1);
- }
- /* Test if the circuit purpose safeguard works correctly. */
- {
- circ = or_circuit_new(0, NULL);
- circuit_change_purpose(TO_CIRCUIT(circ), CIRCUIT_PURPOSE_INTRO_POINT);
- ret = circuit_is_suitable_for_introduce1(circ);
- circuit_free_(TO_CIRCUIT(circ));
- tt_int_op(ret, OP_EQ, 0);
- }
- /* Test the non-edge circuit safeguard works correctly. */
- {
- circ = or_circuit_new(0, NULL);
- circuit_change_purpose(TO_CIRCUIT(circ), CIRCUIT_PURPOSE_OR);
- /* Bogus pointer, the check is against NULL on n_chan. */
- circ->base_.n_chan = (channel_t *) circ;
- ret = circuit_is_suitable_for_introduce1(circ);
- circuit_free_(TO_CIRCUIT(circ));
- tt_int_op(ret, OP_EQ, 0);
- }
- /* Mangle the circuit a bit more so see if our only one INTRODUCE1 cell
- * limit works correctly. */
- {
- circ = or_circuit_new(0, NULL);
- circuit_change_purpose(TO_CIRCUIT(circ), CIRCUIT_PURPOSE_OR);
- circ->already_received_introduce1 = 1;
- ret = circuit_is_suitable_for_introduce1(circ);
- circuit_free_(TO_CIRCUIT(circ));
- tt_int_op(ret, OP_EQ, 0);
- }
- done:
- ;
- }
- static void
- test_introduce1_is_legacy(void *arg)
- {
- int ret;
- uint8_t request[256];
- (void) arg;
- /* For a cell to be considered legacy, according to the specification, the
- * first 20 bytes MUST BE non-zero else it's a v3 cell. */
- memset(request, 'a', DIGEST_LEN);
- memset(request + DIGEST_LEN, 0, sizeof(request) - DIGEST_LEN);
- ret = introduce1_cell_is_legacy(request);
- tt_int_op(ret, OP_EQ, 1);
- /* This is a NON legacy cell. */
- memset(request, 0, DIGEST_LEN);
- memset(request + DIGEST_LEN, 'a', sizeof(request) - DIGEST_LEN);
- ret = introduce1_cell_is_legacy(request);
- tt_int_op(ret, OP_EQ, 0);
- done:
- ;
- }
- static void
- test_introduce1_validation(void *arg)
- {
- int ret;
- trn_cell_introduce1_t *cell = NULL;
- (void) arg;
- /* Create our decoy cell that we'll modify as we go to test the validation
- * function of that parsed cell. */
- cell = helper_create_introduce1_cell();
- tt_assert(cell);
- /* It should NOT be a legacy cell which will trigger a BUG(). */
- memset(cell->legacy_key_id, 'a', sizeof(cell->legacy_key_id));
- tor_capture_bugs_(1);
- ret = validate_introduce1_parsed_cell(cell);
- tor_end_capture_bugs_();
- tt_int_op(ret, OP_EQ, -1);
- /* Reset legacy ID and make sure it's correct. */
- memset(cell->legacy_key_id, 0, sizeof(cell->legacy_key_id));
- ret = validate_introduce1_parsed_cell(cell);
- tt_int_op(ret, OP_EQ, 0);
- /* Non existing auth key type. */
- cell->auth_key_type = 42;
- ret = validate_introduce1_parsed_cell(cell);
- tt_int_op(ret, OP_EQ, -1);
- /* Reset is to correct value and make sure it's correct. */
- cell->auth_key_type = HS_INTRO_AUTH_KEY_TYPE_ED25519;
- ret = validate_introduce1_parsed_cell(cell);
- tt_int_op(ret, OP_EQ, 0);
- /* Really bad key length. */
- cell->auth_key_len = 0;
- ret = validate_introduce1_parsed_cell(cell);
- tt_int_op(ret, OP_EQ, -1);
- cell->auth_key_len = UINT16_MAX;
- ret = validate_introduce1_parsed_cell(cell);
- tt_int_op(ret, OP_EQ, -1);
- /* Correct size, let's try that. */
- cell->auth_key_len = sizeof(ed25519_public_key_t);
- ret = validate_introduce1_parsed_cell(cell);
- tt_int_op(ret, OP_EQ, 0);
- /* Set an invalid size of the auth key buffer. */
- trn_cell_introduce1_setlen_auth_key(cell, 3);
- ret = validate_introduce1_parsed_cell(cell);
- tt_int_op(ret, OP_EQ, -1);
- /* Reset auth key buffer and make sure it works. */
- trn_cell_introduce1_setlen_auth_key(cell, sizeof(ed25519_public_key_t));
- ret = validate_introduce1_parsed_cell(cell);
- tt_int_op(ret, OP_EQ, 0);
- /* Empty encrypted section. */
- trn_cell_introduce1_setlen_encrypted(cell, 0);
- ret = validate_introduce1_parsed_cell(cell);
- tt_int_op(ret, OP_EQ, -1);
- /* Reset it to some non zero bytes and validate. */
- trn_cell_introduce1_setlen_encrypted(cell, 1);
- ret = validate_introduce1_parsed_cell(cell);
- tt_int_op(ret, OP_EQ, 0);
- done:
- trn_cell_introduce1_free(cell);
- }
- static void
- test_received_introduce1_handling(void *arg)
- {
- int ret;
- uint8_t *request = NULL, buf[128];
- trn_cell_introduce1_t *cell = NULL;
- or_circuit_t *circ = NULL;
- (void) arg;
- MOCK(relay_send_command_from_edge_, mock_relay_send_command_from_edge);
- hs_circuitmap_init();
- /* Too small request length. An INTRODUCE1 expect at the very least a
- * DIGEST_LEN size. */
- {
- memset(buf, 0, sizeof(buf));
- circ = helper_create_intro_circuit();
- ret = hs_intro_received_introduce1(circ, buf, DIGEST_LEN - 1);
- tt_int_op(ret, OP_EQ, -1);
- circuit_free_(TO_CIRCUIT(circ));
- }
- /* We have a unit test only for the suitability of a circuit to receive an
- * INTRODUCE1 cell so from now on we'll only test the handling of a cell. */
- /* Bad request. */
- {
- circ = helper_create_intro_circuit();
- uint8_t test[2]; /* Too small request. */
- memset(test, 0, sizeof(test));
- ret = handle_introduce1(circ, test, sizeof(test));
- tor_free(circ->p_chan);
- circuit_free_(TO_CIRCUIT(circ));
- tt_int_op(ret, OP_EQ, -1);
- }
- /* Valid case. */
- {
- cell = helper_create_introduce1_cell();
- ssize_t request_len = trn_cell_introduce1_encoded_len(cell);
- tt_int_op((int)request_len, OP_GT, 0);
- request = tor_malloc_zero(request_len);
- ssize_t encoded_len =
- trn_cell_introduce1_encode(request, request_len, cell);
- tt_int_op((int)encoded_len, OP_GT, 0);
- circ = helper_create_intro_circuit();
- or_circuit_t *service_circ = helper_create_intro_circuit();
- circuit_change_purpose(TO_CIRCUIT(service_circ),
- CIRCUIT_PURPOSE_INTRO_POINT);
- /* Register the circuit in the map for the auth key of the cell. */
- ed25519_public_key_t auth_key;
- const uint8_t *cell_auth_key =
- trn_cell_introduce1_getconstarray_auth_key(cell);
- memcpy(auth_key.pubkey, cell_auth_key, ED25519_PUBKEY_LEN);
- hs_circuitmap_register_intro_circ_v3_relay_side(service_circ, &auth_key);
- ret = hs_intro_received_introduce1(circ, request, request_len);
- circuit_free_(TO_CIRCUIT(circ));
- circuit_free_(TO_CIRCUIT(service_circ));
- tt_int_op(ret, OP_EQ, 0);
- }
- /* Valid legacy cell. */
- {
- tor_free(request);
- trn_cell_introduce1_free(cell);
- cell = helper_create_introduce1_cell();
- uint8_t *legacy_key_id = trn_cell_introduce1_getarray_legacy_key_id(cell);
- memset(legacy_key_id, 'a', DIGEST_LEN);
- /* Add an arbitrary amount of data for the payload of a v2 cell. */
- size_t request_len = trn_cell_introduce1_encoded_len(cell) + 256;
- tt_size_op(request_len, OP_GT, 0);
- request = tor_malloc_zero(request_len + 256);
- ssize_t encoded_len =
- trn_cell_introduce1_encode(request, request_len, cell);
- tt_int_op((int)encoded_len, OP_GT, 0);
- circ = helper_create_intro_circuit();
- or_circuit_t *service_circ = helper_create_intro_circuit();
- circuit_change_purpose(TO_CIRCUIT(service_circ),
- CIRCUIT_PURPOSE_INTRO_POINT);
- /* Register the circuit in the map for the auth key of the cell. */
- uint8_t token[REND_TOKEN_LEN];
- memcpy(token, legacy_key_id, sizeof(token));
- hs_circuitmap_register_intro_circ_v2_relay_side(service_circ, token);
- ret = hs_intro_received_introduce1(circ, request, request_len);
- circuit_free_(TO_CIRCUIT(circ));
- circuit_free_(TO_CIRCUIT(service_circ));
- tt_int_op(ret, OP_EQ, 0);
- }
- done:
- trn_cell_introduce1_free(cell);
- tor_free(request);
- hs_circuitmap_free_all();
- UNMOCK(relay_send_command_from_edge_);
- }
- struct testcase_t hs_intropoint_tests[] = {
- { "intro_point_registration",
- test_intro_point_registration, TT_FORK, NULL, NULL },
- { "receive_establish_intro_wrong_keytype",
- test_establish_intro_wrong_keytype, TT_FORK, NULL, NULL },
- { "receive_establish_intro_wrong_keytype2",
- test_establish_intro_wrong_keytype2, TT_FORK, NULL, NULL },
- { "receive_establish_intro_wrong_purpose",
- test_establish_intro_wrong_purpose, TT_FORK, NULL, NULL },
- { "receive_establish_intro_wrong_sig",
- test_establish_intro_wrong_sig, TT_FORK, NULL, NULL },
- { "receive_establish_intro_wrong_sig_len",
- test_establish_intro_wrong_sig_len, TT_FORK, NULL, NULL },
- { "receive_establish_intro_wrong_auth_key_len",
- test_establish_intro_wrong_auth_key_len, TT_FORK, NULL, NULL },
- { "receive_establish_intro_wrong_mac",
- test_establish_intro_wrong_mac, TT_FORK, NULL, NULL },
- { "introduce1_suitable_circuit",
- test_introduce1_suitable_circuit, TT_FORK, NULL, NULL },
- { "introduce1_is_legacy",
- test_introduce1_is_legacy, TT_FORK, NULL, NULL },
- { "introduce1_validation",
- test_introduce1_validation, TT_FORK, NULL, NULL },
- { "received_introduce1_handling",
- test_received_introduce1_handling, TT_FORK, NULL, NULL },
- END_OF_TESTCASES
- };
|