test_cell_formats.c 32 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888
  1. /* Copyright (c) 2001-2004, Roger Dingledine.
  2. * Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
  3. * Copyright (c) 2007-2012, The Tor Project, Inc. */
  4. /* See LICENSE for licensing information */
  5. #include "orconfig.h"
  6. #define CONNECTION_EDGE_PRIVATE
  7. #define RELAY_PRIVATE
  8. #include "or.h"
  9. #include "connection_edge.h"
  10. #include "onion.h"
  11. #include "onion_tap.h"
  12. #include "onion_fast.h"
  13. #include "onion_ntor.h"
  14. #include "relay.h"
  15. #include "test.h"
  16. #include <stdlib.h>
  17. #include <string.h>
  18. static void
  19. test_cfmt_relay_header(void *arg)
  20. {
  21. relay_header_t rh;
  22. const uint8_t hdr_1[RELAY_HEADER_SIZE] =
  23. "\x03" "\x00\x00" "\x21\x22" "ABCD" "\x01\x03";
  24. uint8_t hdr_out[RELAY_HEADER_SIZE];
  25. (void)arg;
  26. tt_int_op(sizeof(hdr_1), ==, RELAY_HEADER_SIZE);
  27. relay_header_unpack(&rh, hdr_1);
  28. tt_int_op(rh.command, ==, 3);
  29. tt_int_op(rh.recognized, ==, 0);
  30. tt_int_op(rh.stream_id, ==, 0x2122);
  31. test_mem_op(rh.integrity, ==, "ABCD", 4);
  32. tt_int_op(rh.length, ==, 0x103);
  33. relay_header_pack(hdr_out, &rh);
  34. test_mem_op(hdr_out, ==, hdr_1, RELAY_HEADER_SIZE);
  35. done:
  36. ;
  37. }
  38. static void
  39. make_relay_cell(cell_t *out, uint8_t command,
  40. const void *body, size_t bodylen)
  41. {
  42. relay_header_t rh;
  43. memset(&rh, 0, sizeof(rh));
  44. rh.stream_id = 5;
  45. rh.command = command;
  46. rh.length = bodylen;
  47. out->command = CELL_RELAY;
  48. out->circ_id = 10;
  49. relay_header_pack(out->payload, &rh);
  50. memcpy(out->payload + RELAY_HEADER_SIZE, body, bodylen);
  51. }
  52. static void
  53. test_cfmt_begin_cells(void *arg)
  54. {
  55. cell_t cell;
  56. begin_cell_t bcell;
  57. uint8_t end_reason;
  58. (void)arg;
  59. /* Try begindir. */
  60. memset(&bcell, 0x7f, sizeof(bcell));
  61. make_relay_cell(&cell, RELAY_COMMAND_BEGIN_DIR, "", 0);
  62. tt_int_op(0, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  63. tt_ptr_op(NULL, ==, bcell.address);
  64. tt_int_op(0, ==, bcell.flags);
  65. tt_int_op(0, ==, bcell.port);
  66. tt_int_op(5, ==, bcell.stream_id);
  67. tt_int_op(1, ==, bcell.is_begindir);
  68. /* A Begindir with extra stuff. */
  69. memset(&bcell, 0x7f, sizeof(bcell));
  70. make_relay_cell(&cell, RELAY_COMMAND_BEGIN_DIR, "12345", 5);
  71. tt_int_op(0, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  72. tt_ptr_op(NULL, ==, bcell.address);
  73. tt_int_op(0, ==, bcell.flags);
  74. tt_int_op(0, ==, bcell.port);
  75. tt_int_op(5, ==, bcell.stream_id);
  76. tt_int_op(1, ==, bcell.is_begindir);
  77. /* A short but valid begin cell */
  78. memset(&bcell, 0x7f, sizeof(bcell));
  79. make_relay_cell(&cell, RELAY_COMMAND_BEGIN, "a.b:9", 6);
  80. tt_int_op(0, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  81. tt_str_op("a.b", ==, bcell.address);
  82. tt_int_op(0, ==, bcell.flags);
  83. tt_int_op(9, ==, bcell.port);
  84. tt_int_op(5, ==, bcell.stream_id);
  85. tt_int_op(0, ==, bcell.is_begindir);
  86. tor_free(bcell.address);
  87. /* A significantly loner begin cell */
  88. memset(&bcell, 0x7f, sizeof(bcell));
  89. {
  90. const char c[] = "here-is-a-nice-long.hostname.com:65535";
  91. make_relay_cell(&cell, RELAY_COMMAND_BEGIN, c, strlen(c)+1);
  92. }
  93. tt_int_op(0, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  94. tt_str_op("here-is-a-nice-long.hostname.com", ==, bcell.address);
  95. tt_int_op(0, ==, bcell.flags);
  96. tt_int_op(65535, ==, bcell.port);
  97. tt_int_op(5, ==, bcell.stream_id);
  98. tt_int_op(0, ==, bcell.is_begindir);
  99. tor_free(bcell.address);
  100. /* An IPv4 begin cell. */
  101. memset(&bcell, 0x7f, sizeof(bcell));
  102. make_relay_cell(&cell, RELAY_COMMAND_BEGIN, "18.9.22.169:80", 15);
  103. tt_int_op(0, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  104. tt_str_op("18.9.22.169", ==, bcell.address);
  105. tt_int_op(0, ==, bcell.flags);
  106. tt_int_op(80, ==, bcell.port);
  107. tt_int_op(5, ==, bcell.stream_id);
  108. tt_int_op(0, ==, bcell.is_begindir);
  109. tor_free(bcell.address);
  110. /* An IPv6 begin cell. Let's make sure we handle colons*/
  111. memset(&bcell, 0x7f, sizeof(bcell));
  112. make_relay_cell(&cell, RELAY_COMMAND_BEGIN,
  113. "[2620::6b0:b:1a1a:0:26e5:480e]:80", 34);
  114. tt_int_op(0, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  115. tt_str_op("[2620::6b0:b:1a1a:0:26e5:480e]", ==, bcell.address);
  116. tt_int_op(0, ==, bcell.flags);
  117. tt_int_op(80, ==, bcell.port);
  118. tt_int_op(5, ==, bcell.stream_id);
  119. tt_int_op(0, ==, bcell.is_begindir);
  120. tor_free(bcell.address);
  121. /* a begin cell with extra junk but not enough for flags. */
  122. memset(&bcell, 0x7f, sizeof(bcell));
  123. {
  124. const char c[] = "another.example.com:80\x00\x01\x02";
  125. make_relay_cell(&cell, RELAY_COMMAND_BEGIN, c, sizeof(c)-1);
  126. }
  127. tt_int_op(0, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  128. tt_str_op("another.example.com", ==, bcell.address);
  129. tt_int_op(0, ==, bcell.flags);
  130. tt_int_op(80, ==, bcell.port);
  131. tt_int_op(5, ==, bcell.stream_id);
  132. tt_int_op(0, ==, bcell.is_begindir);
  133. tor_free(bcell.address);
  134. /* a begin cell with flags. */
  135. memset(&bcell, 0x7f, sizeof(bcell));
  136. {
  137. const char c[] = "another.example.com:443\x00\x01\x02\x03\x04";
  138. make_relay_cell(&cell, RELAY_COMMAND_BEGIN, c, sizeof(c)-1);
  139. }
  140. tt_int_op(0, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  141. tt_str_op("another.example.com", ==, bcell.address);
  142. tt_int_op(0x1020304, ==, bcell.flags);
  143. tt_int_op(443, ==, bcell.port);
  144. tt_int_op(5, ==, bcell.stream_id);
  145. tt_int_op(0, ==, bcell.is_begindir);
  146. tor_free(bcell.address);
  147. /* a begin cell with flags and even more cruft after that. */
  148. memset(&bcell, 0x7f, sizeof(bcell));
  149. {
  150. const char c[] = "a-further.example.com:22\x00\xee\xaa\x00\xffHi mom";
  151. make_relay_cell(&cell, RELAY_COMMAND_BEGIN, c, sizeof(c)-1);
  152. }
  153. tt_int_op(0, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  154. tt_str_op("a-further.example.com", ==, bcell.address);
  155. tt_int_op(0xeeaa00ff, ==, bcell.flags);
  156. tt_int_op(22, ==, bcell.port);
  157. tt_int_op(5, ==, bcell.stream_id);
  158. tt_int_op(0, ==, bcell.is_begindir);
  159. tor_free(bcell.address);
  160. /* bad begin cell: impossible length. */
  161. memset(&bcell, 0x7f, sizeof(bcell));
  162. make_relay_cell(&cell, RELAY_COMMAND_BEGIN, "a.b:80", 7);
  163. cell.payload[9] = 0x01; /* Set length to 510 */
  164. cell.payload[10] = 0xfe;
  165. {
  166. relay_header_t rh;
  167. relay_header_unpack(&rh, cell.payload);
  168. tt_int_op(rh.length, ==, 510);
  169. }
  170. tt_int_op(-2, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  171. /* Bad begin cell: no body. */
  172. memset(&bcell, 0x7f, sizeof(bcell));
  173. make_relay_cell(&cell, RELAY_COMMAND_BEGIN, "", 0);
  174. tt_int_op(-1, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  175. /* bad begin cell: no body. */
  176. memset(&bcell, 0x7f, sizeof(bcell));
  177. make_relay_cell(&cell, RELAY_COMMAND_BEGIN, "", 0);
  178. tt_int_op(-1, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  179. /* bad begin cell: no colon */
  180. memset(&bcell, 0x7f, sizeof(bcell));
  181. make_relay_cell(&cell, RELAY_COMMAND_BEGIN, "a.b", 4);
  182. tt_int_op(-1, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  183. /* bad begin cell: no ports */
  184. memset(&bcell, 0x7f, sizeof(bcell));
  185. make_relay_cell(&cell, RELAY_COMMAND_BEGIN, "a.b:", 5);
  186. tt_int_op(-1, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  187. /* bad begin cell: bad port */
  188. memset(&bcell, 0x7f, sizeof(bcell));
  189. make_relay_cell(&cell, RELAY_COMMAND_BEGIN, "a.b:xyz", 8);
  190. tt_int_op(-1, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  191. memset(&bcell, 0x7f, sizeof(bcell));
  192. make_relay_cell(&cell, RELAY_COMMAND_BEGIN, "a.b:100000", 11);
  193. tt_int_op(-1, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  194. /* bad begin cell: no nul */
  195. memset(&bcell, 0x7f, sizeof(bcell));
  196. make_relay_cell(&cell, RELAY_COMMAND_BEGIN, "a.b:80", 6);
  197. tt_int_op(-1, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  198. done:
  199. tor_free(bcell.address);
  200. }
  201. static void
  202. test_cfmt_connected_cells(void *arg)
  203. {
  204. relay_header_t rh;
  205. cell_t cell;
  206. tor_addr_t addr;
  207. int ttl, r;
  208. char *mem_op_hex_tmp = NULL;
  209. (void)arg;
  210. /* Let's try an oldschool one with nothing in it. */
  211. make_relay_cell(&cell, RELAY_COMMAND_CONNECTED, "", 0);
  212. relay_header_unpack(&rh, cell.payload);
  213. r = connected_cell_parse(&rh, &cell, &addr, &ttl);
  214. tt_int_op(r, ==, 0);
  215. tt_int_op(tor_addr_family(&addr), ==, AF_UNSPEC);
  216. tt_int_op(ttl, ==, -1);
  217. /* A slightly less oldschool one: only an IPv4 address */
  218. make_relay_cell(&cell, RELAY_COMMAND_CONNECTED, "\x20\x30\x40\x50", 4);
  219. relay_header_unpack(&rh, cell.payload);
  220. r = connected_cell_parse(&rh, &cell, &addr, &ttl);
  221. tt_int_op(r, ==, 0);
  222. tt_int_op(tor_addr_family(&addr), ==, AF_INET);
  223. tt_str_op(fmt_addr(&addr), ==, "32.48.64.80");
  224. tt_int_op(ttl, ==, -1);
  225. /* Bogus but understandable: truncated TTL */
  226. make_relay_cell(&cell, RELAY_COMMAND_CONNECTED, "\x11\x12\x13\x14\x15", 5);
  227. relay_header_unpack(&rh, cell.payload);
  228. r = connected_cell_parse(&rh, &cell, &addr, &ttl);
  229. tt_int_op(r, ==, 0);
  230. tt_int_op(tor_addr_family(&addr), ==, AF_INET);
  231. tt_str_op(fmt_addr(&addr), ==, "17.18.19.20");
  232. tt_int_op(ttl, ==, -1);
  233. /* Regular IPv4 one: address and TTL */
  234. make_relay_cell(&cell, RELAY_COMMAND_CONNECTED,
  235. "\x02\x03\x04\x05\x00\x00\x0e\x10", 8);
  236. relay_header_unpack(&rh, cell.payload);
  237. r = connected_cell_parse(&rh, &cell, &addr, &ttl);
  238. tt_int_op(r, ==, 0);
  239. tt_int_op(tor_addr_family(&addr), ==, AF_INET);
  240. tt_str_op(fmt_addr(&addr), ==, "2.3.4.5");
  241. tt_int_op(ttl, ==, 3600);
  242. /* IPv4 with too-big TTL */
  243. make_relay_cell(&cell, RELAY_COMMAND_CONNECTED,
  244. "\x02\x03\x04\x05\xf0\x00\x00\x00", 8);
  245. relay_header_unpack(&rh, cell.payload);
  246. r = connected_cell_parse(&rh, &cell, &addr, &ttl);
  247. tt_int_op(r, ==, 0);
  248. tt_int_op(tor_addr_family(&addr), ==, AF_INET);
  249. tt_str_op(fmt_addr(&addr), ==, "2.3.4.5");
  250. tt_int_op(ttl, ==, -1);
  251. /* IPv6 (ttl is mandatory) */
  252. make_relay_cell(&cell, RELAY_COMMAND_CONNECTED,
  253. "\x00\x00\x00\x00\x06"
  254. "\x26\x07\xf8\xb0\x40\x0c\x0c\x02"
  255. "\x00\x00\x00\x00\x00\x00\x00\x68"
  256. "\x00\x00\x02\x58", 25);
  257. relay_header_unpack(&rh, cell.payload);
  258. r = connected_cell_parse(&rh, &cell, &addr, &ttl);
  259. tt_int_op(r, ==, 0);
  260. tt_int_op(tor_addr_family(&addr), ==, AF_INET6);
  261. tt_str_op(fmt_addr(&addr), ==, "2607:f8b0:400c:c02::68");
  262. tt_int_op(ttl, ==, 600);
  263. /* IPv6 (ttl too big) */
  264. make_relay_cell(&cell, RELAY_COMMAND_CONNECTED,
  265. "\x00\x00\x00\x00\x06"
  266. "\x26\x07\xf8\xb0\x40\x0c\x0c\x02"
  267. "\x00\x00\x00\x00\x00\x00\x00\x68"
  268. "\x90\x00\x02\x58", 25);
  269. relay_header_unpack(&rh, cell.payload);
  270. r = connected_cell_parse(&rh, &cell, &addr, &ttl);
  271. tt_int_op(r, ==, 0);
  272. tt_int_op(tor_addr_family(&addr), ==, AF_INET6);
  273. tt_str_op(fmt_addr(&addr), ==, "2607:f8b0:400c:c02::68");
  274. tt_int_op(ttl, ==, -1);
  275. /* Bogus size: 3. */
  276. make_relay_cell(&cell, RELAY_COMMAND_CONNECTED,
  277. "\x00\x01\x02", 3);
  278. relay_header_unpack(&rh, cell.payload);
  279. r = connected_cell_parse(&rh, &cell, &addr, &ttl);
  280. tt_int_op(r, ==, -1);
  281. /* Bogus family: 7. */
  282. make_relay_cell(&cell, RELAY_COMMAND_CONNECTED,
  283. "\x00\x00\x00\x00\x07"
  284. "\x26\x07\xf8\xb0\x40\x0c\x0c\x02"
  285. "\x00\x00\x00\x00\x00\x00\x00\x68"
  286. "\x90\x00\x02\x58", 25);
  287. relay_header_unpack(&rh, cell.payload);
  288. r = connected_cell_parse(&rh, &cell, &addr, &ttl);
  289. tt_int_op(r, ==, -1);
  290. /* Truncated IPv6. */
  291. make_relay_cell(&cell, RELAY_COMMAND_CONNECTED,
  292. "\x00\x00\x00\x00\x06"
  293. "\x26\x07\xf8\xb0\x40\x0c\x0c\x02"
  294. "\x00\x00\x00\x00\x00\x00\x00\x68"
  295. "\x00\x00\x02", 24);
  296. relay_header_unpack(&rh, cell.payload);
  297. r = connected_cell_parse(&rh, &cell, &addr, &ttl);
  298. tt_int_op(r, ==, -1);
  299. /* Now make sure we can generate connected cells correctly. */
  300. /* Try an IPv4 address */
  301. memset(&rh, 0, sizeof(rh));
  302. memset(&cell, 0, sizeof(cell));
  303. tor_addr_parse(&addr, "30.40.50.60");
  304. rh.length = connected_cell_format_payload(cell.payload+RELAY_HEADER_SIZE,
  305. &addr, 128);
  306. tt_int_op(rh.length, ==, 8);
  307. test_memeq_hex(cell.payload+RELAY_HEADER_SIZE, "1e28323c" "00000080");
  308. /* Try parsing it. */
  309. tor_addr_make_unspec(&addr);
  310. r = connected_cell_parse(&rh, &cell, &addr, &ttl);
  311. tt_int_op(r, ==, 0);
  312. tt_int_op(tor_addr_family(&addr), ==, AF_INET);
  313. tt_str_op(fmt_addr(&addr), ==, "30.40.50.60");
  314. tt_int_op(ttl, ==, 128);
  315. /* Try an IPv6 address */
  316. memset(&rh, 0, sizeof(rh));
  317. memset(&cell, 0, sizeof(cell));
  318. tor_addr_parse(&addr, "2620::6b0:b:1a1a:0:26e5:480e");
  319. rh.length = connected_cell_format_payload(cell.payload+RELAY_HEADER_SIZE,
  320. &addr, 3600);
  321. tt_int_op(rh.length, ==, 25);
  322. test_memeq_hex(cell.payload + RELAY_HEADER_SIZE,
  323. "00000000" "06"
  324. "2620000006b0000b1a1a000026e5480e" "00000e10");
  325. /* Try parsing it. */
  326. tor_addr_make_unspec(&addr);
  327. r = connected_cell_parse(&rh, &cell, &addr, &ttl);
  328. tt_int_op(r, ==, 0);
  329. tt_int_op(tor_addr_family(&addr), ==, AF_INET6);
  330. tt_str_op(fmt_addr(&addr), ==, "2620:0:6b0:b:1a1a:0:26e5:480e");
  331. tt_int_op(ttl, ==, 3600);
  332. done:
  333. tor_free(mem_op_hex_tmp);
  334. }
  335. static void
  336. test_cfmt_create_cells(void *arg)
  337. {
  338. uint8_t b[MAX_ONIONSKIN_CHALLENGE_LEN];
  339. create_cell_t cc;
  340. cell_t cell;
  341. cell_t cell2;
  342. (void)arg;
  343. /* === Let's try parsing some good cells! */
  344. /* A valid create cell. */
  345. memset(&cell, 0, sizeof(cell));
  346. memset(b, 0, sizeof(b));
  347. crypto_rand((char*)b, TAP_ONIONSKIN_CHALLENGE_LEN);
  348. cell.command = CELL_CREATE;
  349. memcpy(cell.payload, b, TAP_ONIONSKIN_CHALLENGE_LEN);
  350. tt_int_op(0, ==, create_cell_parse(&cc, &cell));
  351. tt_int_op(CELL_CREATE, ==, cc.cell_type);
  352. tt_int_op(ONION_HANDSHAKE_TYPE_TAP, ==, cc.handshake_type);
  353. tt_int_op(TAP_ONIONSKIN_CHALLENGE_LEN, ==, cc.handshake_len);
  354. test_memeq(cc.onionskin, b, TAP_ONIONSKIN_CHALLENGE_LEN + 10);
  355. tt_int_op(0, ==, create_cell_format(&cell2, &cc));
  356. tt_int_op(cell.command, ==, cell2.command);
  357. test_memeq(cell.payload, cell2.payload, CELL_PAYLOAD_SIZE);
  358. /* A valid create_fast cell. */
  359. memset(&cell, 0, sizeof(cell));
  360. memset(b, 0, sizeof(b));
  361. crypto_rand((char*)b, CREATE_FAST_LEN);
  362. cell.command = CELL_CREATE_FAST;
  363. memcpy(cell.payload, b, CREATE_FAST_LEN);
  364. tt_int_op(0, ==, create_cell_parse(&cc, &cell));
  365. tt_int_op(CELL_CREATE_FAST, ==, cc.cell_type);
  366. tt_int_op(ONION_HANDSHAKE_TYPE_FAST, ==, cc.handshake_type);
  367. tt_int_op(CREATE_FAST_LEN, ==, cc.handshake_len);
  368. test_memeq(cc.onionskin, b, CREATE_FAST_LEN + 10);
  369. tt_int_op(0, ==, create_cell_format(&cell2, &cc));
  370. tt_int_op(cell.command, ==, cell2.command);
  371. test_memeq(cell.payload, cell2.payload, CELL_PAYLOAD_SIZE);
  372. /* A valid create2 cell with a TAP payload */
  373. memset(&cell, 0, sizeof(cell));
  374. memset(b, 0, sizeof(b));
  375. crypto_rand((char*)b, TAP_ONIONSKIN_CHALLENGE_LEN);
  376. cell.command = CELL_CREATE2;
  377. memcpy(cell.payload, "\x00\x00\x00\xBA", 4); /* TAP, 186 bytes long */
  378. memcpy(cell.payload+4, b, TAP_ONIONSKIN_CHALLENGE_LEN);
  379. tt_int_op(0, ==, create_cell_parse(&cc, &cell));
  380. tt_int_op(CELL_CREATE2, ==, cc.cell_type);
  381. tt_int_op(ONION_HANDSHAKE_TYPE_TAP, ==, cc.handshake_type);
  382. tt_int_op(TAP_ONIONSKIN_CHALLENGE_LEN, ==, cc.handshake_len);
  383. test_memeq(cc.onionskin, b, TAP_ONIONSKIN_CHALLENGE_LEN + 10);
  384. tt_int_op(0, ==, create_cell_format(&cell2, &cc));
  385. tt_int_op(cell.command, ==, cell2.command);
  386. test_memeq(cell.payload, cell2.payload, CELL_PAYLOAD_SIZE);
  387. /* A valid create2 cell with an ntor payload */
  388. memset(&cell, 0, sizeof(cell));
  389. memset(b, 0, sizeof(b));
  390. crypto_rand((char*)b, NTOR_ONIONSKIN_LEN);
  391. cell.command = CELL_CREATE2;
  392. memcpy(cell.payload, "\x00\x02\x00\x54", 4); /* ntor, 84 bytes long */
  393. memcpy(cell.payload+4, b, NTOR_ONIONSKIN_LEN);
  394. #ifdef CURVE25519_ENABLED
  395. tt_int_op(0, ==, create_cell_parse(&cc, &cell));
  396. tt_int_op(CELL_CREATE2, ==, cc.cell_type);
  397. tt_int_op(ONION_HANDSHAKE_TYPE_NTOR, ==, cc.handshake_type);
  398. tt_int_op(NTOR_ONIONSKIN_LEN, ==, cc.handshake_len);
  399. test_memeq(cc.onionskin, b, NTOR_ONIONSKIN_LEN + 10);
  400. tt_int_op(0, ==, create_cell_format(&cell2, &cc));
  401. tt_int_op(cell.command, ==, cell2.command);
  402. test_memeq(cell.payload, cell2.payload, CELL_PAYLOAD_SIZE);
  403. #else
  404. tt_int_op(-1, ==, create_cell_parse(&cc, &cell));
  405. #endif
  406. /* A valid create cell with an ntor payload, in legacy format. */
  407. memset(&cell, 0, sizeof(cell));
  408. memset(b, 0, sizeof(b));
  409. crypto_rand((char*)b, NTOR_ONIONSKIN_LEN);
  410. cell.command = CELL_CREATE;
  411. memcpy(cell.payload, "ntorNTORntorNTOR", 16);
  412. memcpy(cell.payload+16, b, NTOR_ONIONSKIN_LEN);
  413. #ifdef CURVE25519_ENABLED
  414. tt_int_op(0, ==, create_cell_parse(&cc, &cell));
  415. tt_int_op(CELL_CREATE, ==, cc.cell_type);
  416. tt_int_op(ONION_HANDSHAKE_TYPE_NTOR, ==, cc.handshake_type);
  417. tt_int_op(NTOR_ONIONSKIN_LEN, ==, cc.handshake_len);
  418. test_memeq(cc.onionskin, b, NTOR_ONIONSKIN_LEN + 10);
  419. tt_int_op(0, ==, create_cell_format(&cell2, &cc));
  420. tt_int_op(cell.command, ==, cell2.command);
  421. test_memeq(cell.payload, cell2.payload, CELL_PAYLOAD_SIZE);
  422. #else
  423. tt_int_op(-1, ==, create_cell_parse(&cc, &cell));
  424. #endif
  425. /* == Okay, now let's try to parse some impossible stuff. */
  426. /* It has to be some kind of a create cell! */
  427. cell.command = CELL_CREATED;
  428. tt_int_op(-1, ==, create_cell_parse(&cc, &cell));
  429. /* You can't acutally make an unparseable CREATE or CREATE_FAST cell. */
  430. /* Try some CREATE2 cells. First with a bad type. */
  431. cell.command = CELL_CREATE2;
  432. memcpy(cell.payload, "\x00\x50\x00\x99", 4); /* Type 0x50???? */
  433. tt_int_op(-1, ==, create_cell_parse(&cc, &cell));
  434. /* Now a good type with an incorrect length. */
  435. memcpy(cell.payload, "\x00\x00\x00\xBC", 4); /* TAP, 187 bytes.*/
  436. tt_int_op(-1, ==, create_cell_parse(&cc, &cell));
  437. /* Now a good type with a ridiculous length. */
  438. memcpy(cell.payload, "\x00\x00\x02\x00", 4); /* TAP, 512 bytes.*/
  439. tt_int_op(-1, ==, create_cell_parse(&cc, &cell));
  440. /* == Time to try formatting bad cells. The important thing is that
  441. we reject big lengths, so just check that for now. */
  442. cc.handshake_len = 512;
  443. tt_int_op(-1, ==, create_cell_format(&cell2, &cc));
  444. /* == Try formatting a create2 cell we don't understand. XXXX */
  445. done:
  446. ;
  447. }
  448. static void
  449. test_cfmt_created_cells(void *arg)
  450. {
  451. uint8_t b[512];
  452. created_cell_t cc;
  453. cell_t cell;
  454. cell_t cell2;
  455. (void)arg;
  456. /* A good CREATED cell */
  457. memset(&cell, 0, sizeof(cell));
  458. memset(b, 0, sizeof(b));
  459. crypto_rand((char*)b, TAP_ONIONSKIN_REPLY_LEN);
  460. cell.command = CELL_CREATED;
  461. memcpy(cell.payload, b, TAP_ONIONSKIN_REPLY_LEN);
  462. tt_int_op(0, ==, created_cell_parse(&cc, &cell));
  463. tt_int_op(CELL_CREATED, ==, cc.cell_type);
  464. tt_int_op(TAP_ONIONSKIN_REPLY_LEN, ==, cc.handshake_len);
  465. test_memeq(cc.reply, b, TAP_ONIONSKIN_REPLY_LEN + 10);
  466. tt_int_op(0, ==, created_cell_format(&cell2, &cc));
  467. tt_int_op(cell.command, ==, cell2.command);
  468. test_memeq(cell.payload, cell2.payload, CELL_PAYLOAD_SIZE);
  469. /* A good CREATED_FAST cell */
  470. memset(&cell, 0, sizeof(cell));
  471. memset(b, 0, sizeof(b));
  472. crypto_rand((char*)b, CREATED_FAST_LEN);
  473. cell.command = CELL_CREATED_FAST;
  474. memcpy(cell.payload, b, CREATED_FAST_LEN);
  475. tt_int_op(0, ==, created_cell_parse(&cc, &cell));
  476. tt_int_op(CELL_CREATED_FAST, ==, cc.cell_type);
  477. tt_int_op(CREATED_FAST_LEN, ==, cc.handshake_len);
  478. test_memeq(cc.reply, b, CREATED_FAST_LEN + 10);
  479. tt_int_op(0, ==, created_cell_format(&cell2, &cc));
  480. tt_int_op(cell.command, ==, cell2.command);
  481. test_memeq(cell.payload, cell2.payload, CELL_PAYLOAD_SIZE);
  482. /* A good CREATED2 cell with short reply */
  483. memset(&cell, 0, sizeof(cell));
  484. memset(b, 0, sizeof(b));
  485. crypto_rand((char*)b, 64);
  486. cell.command = CELL_CREATED2;
  487. memcpy(cell.payload, "\x00\x40", 2);
  488. memcpy(cell.payload+2, b, 64);
  489. tt_int_op(0, ==, created_cell_parse(&cc, &cell));
  490. tt_int_op(CELL_CREATED2, ==, cc.cell_type);
  491. tt_int_op(64, ==, cc.handshake_len);
  492. test_memeq(cc.reply, b, 80);
  493. tt_int_op(0, ==, created_cell_format(&cell2, &cc));
  494. tt_int_op(cell.command, ==, cell2.command);
  495. test_memeq(cell.payload, cell2.payload, CELL_PAYLOAD_SIZE);
  496. /* A good CREATED2 cell with maximal reply */
  497. memset(&cell, 0, sizeof(cell));
  498. memset(b, 0, sizeof(b));
  499. crypto_rand((char*)b, 496);
  500. cell.command = CELL_CREATED2;
  501. memcpy(cell.payload, "\x01\xF0", 2);
  502. memcpy(cell.payload+2, b, 496);
  503. tt_int_op(0, ==, created_cell_parse(&cc, &cell));
  504. tt_int_op(CELL_CREATED2, ==, cc.cell_type);
  505. tt_int_op(496, ==, cc.handshake_len);
  506. test_memeq(cc.reply, b, 496);
  507. tt_int_op(0, ==, created_cell_format(&cell2, &cc));
  508. tt_int_op(cell.command, ==, cell2.command);
  509. test_memeq(cell.payload, cell2.payload, CELL_PAYLOAD_SIZE);
  510. /* Bogus CREATED2 cell: too long! */
  511. memset(&cell, 0, sizeof(cell));
  512. memset(b, 0, sizeof(b));
  513. crypto_rand((char*)b, 496);
  514. cell.command = CELL_CREATED2;
  515. memcpy(cell.payload, "\x01\xF1", 2);
  516. tt_int_op(-1, ==, created_cell_parse(&cc, &cell));
  517. /* Unformattable CREATED2 cell: too long! */
  518. cc.handshake_len = 497;
  519. tt_int_op(-1, ==, created_cell_format(&cell2, &cc));
  520. done:
  521. ;
  522. }
  523. static void
  524. test_cfmt_extend_cells(void *arg)
  525. {
  526. cell_t cell;
  527. uint8_t b[512];
  528. extend_cell_t ec;
  529. create_cell_t *cc = &ec.create_cell;
  530. uint8_t p[RELAY_PAYLOAD_SIZE];
  531. uint8_t p2[RELAY_PAYLOAD_SIZE];
  532. uint8_t p2_cmd;
  533. uint16_t p2_len;
  534. char *mem_op_hex_tmp = NULL;
  535. (void) arg;
  536. /* Let's start with a simple EXTEND cell. */
  537. memset(p, 0, sizeof(p));
  538. memset(b, 0, sizeof(b));
  539. crypto_rand((char*)b, TAP_ONIONSKIN_CHALLENGE_LEN);
  540. memcpy(p, "\x12\xf4\x00\x01\x01\x02", 6); /* 18 244 0 1 : 258 */
  541. memcpy(p+6,b,TAP_ONIONSKIN_CHALLENGE_LEN);
  542. memcpy(p+6+TAP_ONIONSKIN_CHALLENGE_LEN, "electroencephalogram", 20);
  543. tt_int_op(0, ==, extend_cell_parse(&ec, RELAY_COMMAND_EXTEND,
  544. p, 26+TAP_ONIONSKIN_CHALLENGE_LEN));
  545. tt_int_op(RELAY_COMMAND_EXTEND, ==, ec.cell_type);
  546. tt_str_op("18.244.0.1", ==, fmt_addr(&ec.orport_ipv4.addr));
  547. tt_int_op(258, ==, ec.orport_ipv4.port);
  548. tt_int_op(AF_UNSPEC, ==, tor_addr_family(&ec.orport_ipv6.addr));
  549. test_memeq(ec.node_id, "electroencephalogram", 20);
  550. tt_int_op(cc->cell_type, ==, CELL_CREATE);
  551. tt_int_op(cc->handshake_type, ==, ONION_HANDSHAKE_TYPE_TAP);
  552. tt_int_op(cc->handshake_len, ==, TAP_ONIONSKIN_CHALLENGE_LEN);
  553. test_memeq(cc->onionskin, b, TAP_ONIONSKIN_CHALLENGE_LEN+20);
  554. tt_int_op(0, ==, extend_cell_format(&p2_cmd, &p2_len, p2, &ec));
  555. tt_int_op(p2_cmd, ==, RELAY_COMMAND_EXTEND);
  556. tt_int_op(p2_len, ==, 26+TAP_ONIONSKIN_CHALLENGE_LEN);
  557. test_memeq(p2, p, RELAY_PAYLOAD_SIZE);
  558. /* Let's do an ntor stuffed in a legacy EXTEND cell */
  559. memset(p, 0, sizeof(p));
  560. memset(b, 0, sizeof(b));
  561. crypto_rand((char*)b, NTOR_ONIONSKIN_LEN);
  562. memcpy(p, "\x12\xf4\x00\x01\x01\x02", 6); /* 18 244 0 1 : 258 */
  563. memcpy(p+6,"ntorNTORntorNTOR", 16);
  564. memcpy(p+22, b, NTOR_ONIONSKIN_LEN);
  565. memcpy(p+6+TAP_ONIONSKIN_CHALLENGE_LEN, "electroencephalogram", 20);
  566. tt_int_op(0, ==, extend_cell_parse(&ec, RELAY_COMMAND_EXTEND,
  567. p, 26+TAP_ONIONSKIN_CHALLENGE_LEN));
  568. tt_int_op(RELAY_COMMAND_EXTEND, ==, ec.cell_type);
  569. tt_str_op("18.244.0.1", ==, fmt_addr(&ec.orport_ipv4.addr));
  570. tt_int_op(258, ==, ec.orport_ipv4.port);
  571. tt_int_op(AF_UNSPEC, ==, tor_addr_family(&ec.orport_ipv6.addr));
  572. test_memeq(ec.node_id, "electroencephalogram", 20);
  573. tt_int_op(cc->cell_type, ==, CELL_CREATE2);
  574. tt_int_op(cc->handshake_type, ==, ONION_HANDSHAKE_TYPE_NTOR);
  575. tt_int_op(cc->handshake_len, ==, NTOR_ONIONSKIN_LEN);
  576. test_memeq(cc->onionskin, b, NTOR_ONIONSKIN_LEN+20);
  577. tt_int_op(0, ==, extend_cell_format(&p2_cmd, &p2_len, p2, &ec));
  578. tt_int_op(p2_cmd, ==, RELAY_COMMAND_EXTEND);
  579. tt_int_op(p2_len, ==, 26+TAP_ONIONSKIN_CHALLENGE_LEN);
  580. test_memeq(p2, p, RELAY_PAYLOAD_SIZE);
  581. tt_int_op(0, ==, create_cell_format_relayed(&cell, cc));
  582. /* Now let's do a minimal ntor EXTEND2 cell. */
  583. memset(&ec, 0xff, sizeof(ec));
  584. memset(p, 0, sizeof(p));
  585. memset(b, 0, sizeof(b));
  586. crypto_rand((char*)b, NTOR_ONIONSKIN_LEN);
  587. /* 2 items; one 18.244.0.1:61681 */
  588. memcpy(p, "\x02\x00\x06\x12\xf4\x00\x01\xf0\xf1", 9);
  589. /* The other is a digest. */
  590. memcpy(p+9, "\x02\x14" "anarchoindividualist", 22);
  591. /* Prep for the handshake: type and length */
  592. memcpy(p+31, "\x00\x02\x00\x54", 4);
  593. memcpy(p+35, b, NTOR_ONIONSKIN_LEN);
  594. tt_int_op(0, ==, extend_cell_parse(&ec, RELAY_COMMAND_EXTEND2,
  595. p, 35+NTOR_ONIONSKIN_LEN));
  596. tt_int_op(RELAY_COMMAND_EXTEND2, ==, ec.cell_type);
  597. tt_str_op("18.244.0.1", ==, fmt_addr(&ec.orport_ipv4.addr));
  598. tt_int_op(61681, ==, ec.orport_ipv4.port);
  599. tt_int_op(AF_UNSPEC, ==, tor_addr_family(&ec.orport_ipv6.addr));
  600. test_memeq(ec.node_id, "anarchoindividualist", 20);
  601. tt_int_op(cc->cell_type, ==, CELL_CREATE2);
  602. tt_int_op(cc->handshake_type, ==, ONION_HANDSHAKE_TYPE_NTOR);
  603. tt_int_op(cc->handshake_len, ==, NTOR_ONIONSKIN_LEN);
  604. test_memeq(cc->onionskin, b, NTOR_ONIONSKIN_LEN+20);
  605. tt_int_op(0, ==, extend_cell_format(&p2_cmd, &p2_len, p2, &ec));
  606. tt_int_op(p2_cmd, ==, RELAY_COMMAND_EXTEND2);
  607. tt_int_op(p2_len, ==, 35+NTOR_ONIONSKIN_LEN);
  608. test_memeq(p2, p, RELAY_PAYLOAD_SIZE);
  609. /* Now let's do a fanciful EXTEND2 cell. */
  610. memset(&ec, 0xff, sizeof(ec));
  611. memset(p, 0, sizeof(p));
  612. memset(b, 0, sizeof(b));
  613. crypto_rand((char*)b, 99);
  614. /* 4 items; one 18 244 0 1 61681 */
  615. memcpy(p, "\x04\x00\x06\x12\xf4\x00\x01\xf0\xf1", 9);
  616. /* One is a digest. */
  617. memcpy(p+9, "\x02\x14" "anthropomorphization", 22);
  618. /* One is an ipv6 address */
  619. memcpy(p+31, "\x01\x12\x20\x02\x00\x00\x00\x00\x00\x00"
  620. "\x00\x00\x00\x00\x00\xf0\xc5\x1e\x11\x12", 20);
  621. /* One is the Konami code. */
  622. memcpy(p+51, "\xf0\x20upupdowndownleftrightleftrightba", 34);
  623. /* Prep for the handshake: weird type and length */
  624. memcpy(p+85, "\x01\x05\x00\x63", 4);
  625. memcpy(p+89, b, 99);
  626. tt_int_op(0, ==, extend_cell_parse(&ec, RELAY_COMMAND_EXTEND2, p, 89+99));
  627. tt_int_op(RELAY_COMMAND_EXTEND2, ==, ec.cell_type);
  628. tt_str_op("18.244.0.1", ==, fmt_addr(&ec.orport_ipv4.addr));
  629. tt_int_op(61681, ==, ec.orport_ipv4.port);
  630. tt_str_op("2002::f0:c51e", ==, fmt_addr(&ec.orport_ipv6.addr));
  631. tt_int_op(4370, ==, ec.orport_ipv6.port);
  632. test_memeq(ec.node_id, "anthropomorphization", 20);
  633. tt_int_op(cc->cell_type, ==, CELL_CREATE2);
  634. tt_int_op(cc->handshake_type, ==, 0x105);
  635. tt_int_op(cc->handshake_len, ==, 99);
  636. test_memeq(cc->onionskin, b, 99+20);
  637. tt_int_op(0, ==, extend_cell_format(&p2_cmd, &p2_len, p2, &ec));
  638. tt_int_op(p2_cmd, ==, RELAY_COMMAND_EXTEND2);
  639. /* We'll generate it minus the IPv6 address and minus the konami code */
  640. tt_int_op(p2_len, ==, 89+99-34-20);
  641. test_memeq_hex(p2,
  642. /* Two items: one that same darn IP address. */
  643. "02000612F40001F0F1"
  644. /* The next is a digest : anthropomorphization */
  645. "0214616e7468726f706f6d6f727068697a6174696f6e"
  646. /* Now the handshake prologue */
  647. "01050063");
  648. test_memeq(p2+1+8+22+4, b, 99+20);
  649. tt_int_op(0, ==, create_cell_format_relayed(&cell, cc));
  650. /* == Now try parsing some junk */
  651. /* Try a too-long handshake */
  652. memset(p, 0, sizeof(p));
  653. memcpy(p, "\x02\x00\x06\x12\xf4\x00\x01\xf0\xf1", 9);
  654. memcpy(p+9, "\x02\x14" "anarchoindividualist", 22);
  655. memcpy(p+31, "\xff\xff\x01\xd0", 4);
  656. tt_int_op(-1, ==, extend_cell_parse(&ec, RELAY_COMMAND_EXTEND2,
  657. p, sizeof(p)));
  658. /* Try two identities. */
  659. memset(p, 0, sizeof(p));
  660. memcpy(p, "\x03\x00\x06\x12\xf4\x00\x01\xf0\xf1", 9);
  661. memcpy(p+9, "\x02\x14" "anarchoindividualist", 22);
  662. memcpy(p+31, "\x02\x14" "autodepolymerization", 22);
  663. memcpy(p+53, "\xff\xff\x00\x10", 4);
  664. tt_int_op(-1, ==, extend_cell_parse(&ec, RELAY_COMMAND_EXTEND2,
  665. p, sizeof(p)));
  666. /* No identities. */
  667. memset(p, 0, sizeof(p));
  668. memcpy(p, "\x01\x00\x06\x12\xf4\x00\x01\xf0\xf1", 9);
  669. memcpy(p+53, "\xff\xff\x00\x10", 4);
  670. tt_int_op(-1, ==, extend_cell_parse(&ec, RELAY_COMMAND_EXTEND2,
  671. p, sizeof(p)));
  672. /* Try a bad IPv4 address (too long, too short)*/
  673. memset(p, 0, sizeof(p));
  674. memcpy(p, "\x02\x00\x07\x12\xf4\x00\x01\xf0\xf1\xff", 10);
  675. memcpy(p+10, "\x02\x14" "anarchoindividualist", 22);
  676. memcpy(p+32, "\xff\xff\x00\x10", 4);
  677. tt_int_op(-1, ==, extend_cell_parse(&ec, RELAY_COMMAND_EXTEND2,
  678. p, sizeof(p)));
  679. memset(p, 0, sizeof(p));
  680. memcpy(p, "\x02\x00\x05\x12\xf4\x00\x01\xf0", 8);
  681. memcpy(p+8, "\x02\x14" "anarchoindividualist", 22);
  682. memcpy(p+30, "\xff\xff\x00\x10", 4);
  683. tt_int_op(-1, ==, extend_cell_parse(&ec, RELAY_COMMAND_EXTEND2,
  684. p, sizeof(p)));
  685. /* IPv6 address (too long, too short, no IPv4)*/
  686. memset(p, 0, sizeof(p));
  687. memcpy(p, "\x03\x00\x06\x12\xf4\x00\x01\xf0\xf1", 9);
  688. memcpy(p+9, "\x02\x14" "anarchoindividualist", 22);
  689. memcpy(p+31, "\x01\x13" "xxxxxxxxxxxxxxxxYYZ", 19);
  690. memcpy(p+50, "\xff\xff\x00\x20", 4);
  691. tt_int_op(-1, ==, extend_cell_parse(&ec, RELAY_COMMAND_EXTEND2,
  692. p, sizeof(p)));
  693. memset(p, 0, sizeof(p));
  694. memcpy(p, "\x03\x00\x06\x12\xf4\x00\x01\xf0\xf1", 9);
  695. memcpy(p+9, "\x02\x14" "anarchoindividualist", 22);
  696. memcpy(p+31, "\x01\x11" "xxxxxxxxxxxxxxxxY", 17);
  697. memcpy(p+48, "\xff\xff\x00\x20", 4);
  698. tt_int_op(-1, ==, extend_cell_parse(&ec, RELAY_COMMAND_EXTEND2,
  699. p, sizeof(p)));
  700. memset(p, 0, sizeof(p));
  701. memcpy(p, "\x02", 1);
  702. memcpy(p+1, "\x02\x14" "anarchoindividualist", 22);
  703. memcpy(p+23, "\x01\x12" "xxxxxxxxxxxxxxxxYY", 18);
  704. memcpy(p+41, "\xff\xff\x00\x20", 4);
  705. tt_int_op(-1, ==, extend_cell_parse(&ec, RELAY_COMMAND_EXTEND2,
  706. p, sizeof(p)));
  707. /* Running out of space in specifiers */
  708. memset(p,0,sizeof(p));
  709. memcpy(p, "\x05\x0a\xff", 3);
  710. memcpy(p+3+255, "\x0a\xff", 2);
  711. tt_int_op(-1, ==, extend_cell_parse(&ec, RELAY_COMMAND_EXTEND2,
  712. p, sizeof(p)));
  713. /* Fuzz, because why not. */
  714. memset(&ec, 0xff, sizeof(ec));
  715. {
  716. int i;
  717. memset(p, 0, sizeof(p));
  718. for (i = 0; i < 10000; ++i) {
  719. int n = crypto_rand_int(sizeof(p));
  720. crypto_rand((char *)p, n);
  721. extend_cell_parse(&ec, RELAY_COMMAND_EXTEND2, p, n);
  722. }
  723. }
  724. done:
  725. tor_free(mem_op_hex_tmp);
  726. }
  727. static void
  728. test_cfmt_extended_cells(void *arg)
  729. {
  730. uint8_t b[512];
  731. extended_cell_t ec;
  732. created_cell_t *cc = &ec.created_cell;
  733. uint8_t p[RELAY_PAYLOAD_SIZE];
  734. uint8_t p2[RELAY_PAYLOAD_SIZE];
  735. uint8_t p2_cmd;
  736. uint16_t p2_len;
  737. char *mem_op_hex_tmp = NULL;
  738. (void) arg;
  739. /* Try a regular EXTENDED cell. */
  740. memset(&ec, 0xff, sizeof(ec));
  741. memset(p, 0, sizeof(p));
  742. memset(b, 0, sizeof(b));
  743. crypto_rand((char*)b, TAP_ONIONSKIN_REPLY_LEN);
  744. memcpy(p,b,TAP_ONIONSKIN_REPLY_LEN);
  745. tt_int_op(0, ==, extended_cell_parse(&ec, RELAY_COMMAND_EXTENDED, p,
  746. TAP_ONIONSKIN_REPLY_LEN));
  747. tt_int_op(RELAY_COMMAND_EXTENDED, ==, ec.cell_type);
  748. tt_int_op(cc->cell_type, ==, CELL_CREATED);
  749. tt_int_op(cc->handshake_len, ==, TAP_ONIONSKIN_REPLY_LEN);
  750. test_memeq(cc->reply, b, TAP_ONIONSKIN_REPLY_LEN);
  751. tt_int_op(0, ==, extended_cell_format(&p2_cmd, &p2_len, p2, &ec));
  752. tt_int_op(RELAY_COMMAND_EXTENDED, ==, p2_cmd);
  753. tt_int_op(TAP_ONIONSKIN_REPLY_LEN, ==, p2_len);
  754. test_memeq(p2, p, sizeof(p2));
  755. /* Try an EXTENDED2 cell */
  756. memset(&ec, 0xff, sizeof(ec));
  757. memset(p, 0, sizeof(p));
  758. memset(b, 0, sizeof(b));
  759. crypto_rand((char*)b, 42);
  760. memcpy(p,"\x00\x2a",2);
  761. memcpy(p+2,b,42);
  762. tt_int_op(0, ==, extended_cell_parse(&ec, RELAY_COMMAND_EXTENDED2, p, 2+42));
  763. tt_int_op(RELAY_COMMAND_EXTENDED2, ==, ec.cell_type);
  764. tt_int_op(cc->cell_type, ==, CELL_CREATED2);
  765. tt_int_op(cc->handshake_len, ==, 42);
  766. test_memeq(cc->reply, b, 42+10);
  767. tt_int_op(0, ==, extended_cell_format(&p2_cmd, &p2_len, p2, &ec));
  768. tt_int_op(RELAY_COMMAND_EXTENDED2, ==, p2_cmd);
  769. tt_int_op(2+42, ==, p2_len);
  770. test_memeq(p2, p, sizeof(p2));
  771. /* Try an almost-too-long EXTENDED2 cell */
  772. memcpy(p, "\x01\xf0", 2);
  773. tt_int_op(0, ==,
  774. extended_cell_parse(&ec, RELAY_COMMAND_EXTENDED2, p, sizeof(p)));
  775. /* Now try a too-long extended2 cell. That's the only misparse I can think
  776. * of. */
  777. memcpy(p, "\x01\xf1", 2);
  778. tt_int_op(-1, ==,
  779. extended_cell_parse(&ec, RELAY_COMMAND_EXTENDED2, p, sizeof(p)));
  780. done:
  781. tor_free(mem_op_hex_tmp);
  782. }
  783. #define TEST(name, flags) \
  784. { #name, test_cfmt_ ## name, flags, 0, NULL }
  785. struct testcase_t cell_format_tests[] = {
  786. TEST(relay_header, 0),
  787. TEST(begin_cells, 0),
  788. TEST(connected_cells, 0),
  789. TEST(create_cells, 0),
  790. TEST(created_cells, 0),
  791. TEST(extend_cells, 0),
  792. TEST(extended_cells, 0),
  793. END_OF_TESTCASES
  794. };