test_cell_formats.c 30 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841
  1. /* Copyright (c) 2001-2004, Roger Dingledine.
  2. * Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
  3. * Copyright (c) 2007-2012, The Tor Project, Inc. */
  4. /* See LICENSE for licensing information */
  5. #include "orconfig.h"
  6. #define CONNECTION_EDGE_PRIVATE
  7. #define RELAY_PRIVATE
  8. #include "or.h"
  9. #include "connection_edge.h"
  10. #include "onion.h"
  11. #include "onion_tap.h"
  12. #include "onion_fast.h"
  13. #include "onion_ntor.h"
  14. #include "relay.h"
  15. #include "test.h"
  16. #include <stdlib.h>
  17. #include <string.h>
  18. static void
  19. test_cfmt_relay_header(void *arg)
  20. {
  21. relay_header_t rh;
  22. const uint8_t hdr_1[RELAY_HEADER_SIZE] =
  23. "\x03" "\x00\x00" "\x21\x22" "ABCD" "\x01\x03";
  24. uint8_t hdr_out[RELAY_HEADER_SIZE];
  25. (void)arg;
  26. tt_int_op(sizeof(hdr_1), ==, RELAY_HEADER_SIZE);
  27. relay_header_unpack(&rh, hdr_1);
  28. tt_int_op(rh.command, ==, 3);
  29. tt_int_op(rh.recognized, ==, 0);
  30. tt_int_op(rh.stream_id, ==, 0x2122);
  31. test_mem_op(rh.integrity, ==, "ABCD", 4);
  32. tt_int_op(rh.length, ==, 0x103);
  33. relay_header_pack(hdr_out, &rh);
  34. test_mem_op(hdr_out, ==, hdr_1, RELAY_HEADER_SIZE);
  35. done:
  36. ;
  37. }
  38. static void
  39. make_relay_cell(cell_t *out, uint8_t command,
  40. const void *body, size_t bodylen)
  41. {
  42. relay_header_t rh;
  43. memset(&rh, 0, sizeof(rh));
  44. rh.stream_id = 5;
  45. rh.command = command;
  46. rh.length = bodylen;
  47. out->command = CELL_RELAY;
  48. out->circ_id = 10;
  49. relay_header_pack(out->payload, &rh);
  50. memcpy(out->payload + RELAY_HEADER_SIZE, body, bodylen);
  51. }
  52. static void
  53. test_cfmt_begin_cells(void *arg)
  54. {
  55. cell_t cell;
  56. begin_cell_t bcell;
  57. uint8_t end_reason;
  58. (void)arg;
  59. /* Try begindir. */
  60. memset(&bcell, 0x7f, sizeof(bcell));
  61. make_relay_cell(&cell, RELAY_COMMAND_BEGIN_DIR, "", 0);
  62. tt_int_op(0, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  63. tt_ptr_op(NULL, ==, bcell.address);
  64. tt_int_op(0, ==, bcell.flags);
  65. tt_int_op(0, ==, bcell.port);
  66. tt_int_op(5, ==, bcell.stream_id);
  67. tt_int_op(1, ==, bcell.is_begindir);
  68. /* A Begindir with extra stuff. */
  69. memset(&bcell, 0x7f, sizeof(bcell));
  70. make_relay_cell(&cell, RELAY_COMMAND_BEGIN_DIR, "12345", 5);
  71. tt_int_op(0, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  72. tt_ptr_op(NULL, ==, bcell.address);
  73. tt_int_op(0, ==, bcell.flags);
  74. tt_int_op(0, ==, bcell.port);
  75. tt_int_op(5, ==, bcell.stream_id);
  76. tt_int_op(1, ==, bcell.is_begindir);
  77. /* A short but valid begin cell */
  78. memset(&bcell, 0x7f, sizeof(bcell));
  79. make_relay_cell(&cell, RELAY_COMMAND_BEGIN, "a.b:9", 6);
  80. tt_int_op(0, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  81. tt_str_op("a.b", ==, bcell.address);
  82. tt_int_op(0, ==, bcell.flags);
  83. tt_int_op(9, ==, bcell.port);
  84. tt_int_op(5, ==, bcell.stream_id);
  85. tt_int_op(0, ==, bcell.is_begindir);
  86. tor_free(bcell.address);
  87. /* A significantly loner begin cell */
  88. memset(&bcell, 0x7f, sizeof(bcell));
  89. {
  90. const char c[] = "here-is-a-nice-long.hostname.com:65535";
  91. make_relay_cell(&cell, RELAY_COMMAND_BEGIN, c, strlen(c)+1);
  92. }
  93. tt_int_op(0, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  94. tt_str_op("here-is-a-nice-long.hostname.com", ==, bcell.address);
  95. tt_int_op(0, ==, bcell.flags);
  96. tt_int_op(65535, ==, bcell.port);
  97. tt_int_op(5, ==, bcell.stream_id);
  98. tt_int_op(0, ==, bcell.is_begindir);
  99. tor_free(bcell.address);
  100. /* An IPv4 begin cell. */
  101. memset(&bcell, 0x7f, sizeof(bcell));
  102. make_relay_cell(&cell, RELAY_COMMAND_BEGIN, "18.9.22.169:80", 15);
  103. tt_int_op(0, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  104. tt_str_op("18.9.22.169", ==, bcell.address);
  105. tt_int_op(0, ==, bcell.flags);
  106. tt_int_op(80, ==, bcell.port);
  107. tt_int_op(5, ==, bcell.stream_id);
  108. tt_int_op(0, ==, bcell.is_begindir);
  109. tor_free(bcell.address);
  110. /* An IPv6 begin cell. Let's make sure we handle colons*/
  111. memset(&bcell, 0x7f, sizeof(bcell));
  112. make_relay_cell(&cell, RELAY_COMMAND_BEGIN,
  113. "[2620::6b0:b:1a1a:0:26e5:480e]:80", 34);
  114. tt_int_op(0, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  115. tt_str_op("[2620::6b0:b:1a1a:0:26e5:480e]", ==, bcell.address);
  116. tt_int_op(0, ==, bcell.flags);
  117. tt_int_op(80, ==, bcell.port);
  118. tt_int_op(5, ==, bcell.stream_id);
  119. tt_int_op(0, ==, bcell.is_begindir);
  120. tor_free(bcell.address);
  121. /* a begin cell with extra junk but not enough for flags. */
  122. memset(&bcell, 0x7f, sizeof(bcell));
  123. {
  124. const char c[] = "another.example.com:80\x00\x01\x02";
  125. make_relay_cell(&cell, RELAY_COMMAND_BEGIN, c, sizeof(c)-1);
  126. }
  127. tt_int_op(0, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  128. tt_str_op("another.example.com", ==, bcell.address);
  129. tt_int_op(0, ==, bcell.flags);
  130. tt_int_op(80, ==, bcell.port);
  131. tt_int_op(5, ==, bcell.stream_id);
  132. tt_int_op(0, ==, bcell.is_begindir);
  133. tor_free(bcell.address);
  134. /* a begin cell with flags. */
  135. memset(&bcell, 0x7f, sizeof(bcell));
  136. {
  137. const char c[] = "another.example.com:443\x00\x01\x02\x03\x04";
  138. make_relay_cell(&cell, RELAY_COMMAND_BEGIN, c, sizeof(c)-1);
  139. }
  140. tt_int_op(0, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  141. tt_str_op("another.example.com", ==, bcell.address);
  142. tt_int_op(0x1020304, ==, bcell.flags);
  143. tt_int_op(443, ==, bcell.port);
  144. tt_int_op(5, ==, bcell.stream_id);
  145. tt_int_op(0, ==, bcell.is_begindir);
  146. tor_free(bcell.address);
  147. /* a begin cell with flags and even more cruft after that. */
  148. memset(&bcell, 0x7f, sizeof(bcell));
  149. {
  150. const char c[] = "a-further.example.com:22\x00\xee\xaa\x00\xffHi mom";
  151. make_relay_cell(&cell, RELAY_COMMAND_BEGIN, c, sizeof(c)-1);
  152. }
  153. tt_int_op(0, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  154. tt_str_op("a-further.example.com", ==, bcell.address);
  155. tt_int_op(0xeeaa00ff, ==, bcell.flags);
  156. tt_int_op(22, ==, bcell.port);
  157. tt_int_op(5, ==, bcell.stream_id);
  158. tt_int_op(0, ==, bcell.is_begindir);
  159. tor_free(bcell.address);
  160. /* bad begin cell: impossible length. */
  161. memset(&bcell, 0x7f, sizeof(bcell));
  162. make_relay_cell(&cell, RELAY_COMMAND_BEGIN, "a.b:80", 7);
  163. cell.payload[9] = 0x01; /* Set length to 510 */
  164. cell.payload[10] = 0xfe;
  165. {
  166. relay_header_t rh;
  167. relay_header_unpack(&rh, cell.payload);
  168. tt_int_op(rh.length, ==, 510);
  169. }
  170. tt_int_op(-2, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  171. /* Bad begin cell: no body. */
  172. memset(&bcell, 0x7f, sizeof(bcell));
  173. make_relay_cell(&cell, RELAY_COMMAND_BEGIN, "", 0);
  174. tt_int_op(-1, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  175. /* bad begin cell: no body. */
  176. memset(&bcell, 0x7f, sizeof(bcell));
  177. make_relay_cell(&cell, RELAY_COMMAND_BEGIN, "", 0);
  178. tt_int_op(-1, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  179. /* bad begin cell: no colon */
  180. memset(&bcell, 0x7f, sizeof(bcell));
  181. make_relay_cell(&cell, RELAY_COMMAND_BEGIN, "a.b", 4);
  182. tt_int_op(-1, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  183. /* bad begin cell: no ports */
  184. memset(&bcell, 0x7f, sizeof(bcell));
  185. make_relay_cell(&cell, RELAY_COMMAND_BEGIN, "a.b:", 5);
  186. tt_int_op(-1, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  187. /* bad begin cell: bad port */
  188. memset(&bcell, 0x7f, sizeof(bcell));
  189. make_relay_cell(&cell, RELAY_COMMAND_BEGIN, "a.b:xyz", 8);
  190. tt_int_op(-1, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  191. memset(&bcell, 0x7f, sizeof(bcell));
  192. make_relay_cell(&cell, RELAY_COMMAND_BEGIN, "a.b:100000", 11);
  193. tt_int_op(-1, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  194. /* bad begin cell: no nul */
  195. memset(&bcell, 0x7f, sizeof(bcell));
  196. make_relay_cell(&cell, RELAY_COMMAND_BEGIN, "a.b:80", 6);
  197. tt_int_op(-1, ==, begin_cell_parse(&cell, &bcell, &end_reason));
  198. done:
  199. tor_free(bcell.address);
  200. }
  201. static void
  202. test_cfmt_connected_cells(void *arg)
  203. {
  204. relay_header_t rh;
  205. cell_t cell;
  206. tor_addr_t addr;
  207. int ttl, r;
  208. char *mem_op_hex_tmp = NULL;
  209. (void)arg;
  210. /* Let's try an oldschool one with nothing in it. */
  211. make_relay_cell(&cell, RELAY_COMMAND_CONNECTED, "", 0);
  212. relay_header_unpack(&rh, cell.payload);
  213. r = connected_cell_parse(&rh, &cell, &addr, &ttl);
  214. tt_int_op(r, ==, 0);
  215. tt_int_op(tor_addr_family(&addr), ==, AF_UNSPEC);
  216. tt_int_op(ttl, ==, -1);
  217. /* A slightly less oldschool one: only an IPv4 address */
  218. make_relay_cell(&cell, RELAY_COMMAND_CONNECTED, "\x20\x30\x40\x50", 4);
  219. relay_header_unpack(&rh, cell.payload);
  220. r = connected_cell_parse(&rh, &cell, &addr, &ttl);
  221. tt_int_op(r, ==, 0);
  222. tt_int_op(tor_addr_family(&addr), ==, AF_INET);
  223. tt_str_op(fmt_addr(&addr), ==, "32.48.64.80");
  224. tt_int_op(ttl, ==, -1);
  225. /* Bogus but understandable: truncated TTL */
  226. make_relay_cell(&cell, RELAY_COMMAND_CONNECTED, "\x11\x12\x13\x14\x15", 5);
  227. relay_header_unpack(&rh, cell.payload);
  228. r = connected_cell_parse(&rh, &cell, &addr, &ttl);
  229. tt_int_op(r, ==, 0);
  230. tt_int_op(tor_addr_family(&addr), ==, AF_INET);
  231. tt_str_op(fmt_addr(&addr), ==, "17.18.19.20");
  232. tt_int_op(ttl, ==, -1);
  233. /* Regular IPv4 one: address and TTL */
  234. make_relay_cell(&cell, RELAY_COMMAND_CONNECTED,
  235. "\x02\x03\x04\x05\x00\x00\x0e\x10", 8);
  236. relay_header_unpack(&rh, cell.payload);
  237. r = connected_cell_parse(&rh, &cell, &addr, &ttl);
  238. tt_int_op(r, ==, 0);
  239. tt_int_op(tor_addr_family(&addr), ==, AF_INET);
  240. tt_str_op(fmt_addr(&addr), ==, "2.3.4.5");
  241. tt_int_op(ttl, ==, 3600);
  242. /* IPv4 with too-big TTL */
  243. make_relay_cell(&cell, RELAY_COMMAND_CONNECTED,
  244. "\x02\x03\x04\x05\xf0\x00\x00\x00", 8);
  245. relay_header_unpack(&rh, cell.payload);
  246. r = connected_cell_parse(&rh, &cell, &addr, &ttl);
  247. tt_int_op(r, ==, 0);
  248. tt_int_op(tor_addr_family(&addr), ==, AF_INET);
  249. tt_str_op(fmt_addr(&addr), ==, "2.3.4.5");
  250. tt_int_op(ttl, ==, -1);
  251. /* IPv6 (ttl is mandatory) */
  252. make_relay_cell(&cell, RELAY_COMMAND_CONNECTED,
  253. "\x00\x00\x00\x00\x06"
  254. "\x26\x07\xf8\xb0\x40\x0c\x0c\x02"
  255. "\x00\x00\x00\x00\x00\x00\x00\x68"
  256. "\x00\x00\x02\x58", 25);
  257. relay_header_unpack(&rh, cell.payload);
  258. r = connected_cell_parse(&rh, &cell, &addr, &ttl);
  259. tt_int_op(r, ==, 0);
  260. tt_int_op(tor_addr_family(&addr), ==, AF_INET6);
  261. tt_str_op(fmt_addr(&addr), ==, "2607:f8b0:400c:c02::68");
  262. tt_int_op(ttl, ==, 600);
  263. /* IPv6 (ttl too big) */
  264. make_relay_cell(&cell, RELAY_COMMAND_CONNECTED,
  265. "\x00\x00\x00\x00\x06"
  266. "\x26\x07\xf8\xb0\x40\x0c\x0c\x02"
  267. "\x00\x00\x00\x00\x00\x00\x00\x68"
  268. "\x90\x00\x02\x58", 25);
  269. relay_header_unpack(&rh, cell.payload);
  270. r = connected_cell_parse(&rh, &cell, &addr, &ttl);
  271. tt_int_op(r, ==, 0);
  272. tt_int_op(tor_addr_family(&addr), ==, AF_INET6);
  273. tt_str_op(fmt_addr(&addr), ==, "2607:f8b0:400c:c02::68");
  274. tt_int_op(ttl, ==, -1);
  275. /* Bogus size: 3. */
  276. make_relay_cell(&cell, RELAY_COMMAND_CONNECTED,
  277. "\x00\x01\x02", 3);
  278. relay_header_unpack(&rh, cell.payload);
  279. r = connected_cell_parse(&rh, &cell, &addr, &ttl);
  280. tt_int_op(r, ==, -1);
  281. /* Bogus family: 7. */
  282. make_relay_cell(&cell, RELAY_COMMAND_CONNECTED,
  283. "\x00\x00\x00\x00\x07"
  284. "\x26\x07\xf8\xb0\x40\x0c\x0c\x02"
  285. "\x00\x00\x00\x00\x00\x00\x00\x68"
  286. "\x90\x00\x02\x58", 25);
  287. relay_header_unpack(&rh, cell.payload);
  288. r = connected_cell_parse(&rh, &cell, &addr, &ttl);
  289. tt_int_op(r, ==, -1);
  290. /* Truncated IPv6. */
  291. make_relay_cell(&cell, RELAY_COMMAND_CONNECTED,
  292. "\x00\x00\x00\x00\x06"
  293. "\x26\x07\xf8\xb0\x40\x0c\x0c\x02"
  294. "\x00\x00\x00\x00\x00\x00\x00\x68"
  295. "\x00\x00\x02", 24);
  296. relay_header_unpack(&rh, cell.payload);
  297. r = connected_cell_parse(&rh, &cell, &addr, &ttl);
  298. tt_int_op(r, ==, -1);
  299. /* Now make sure we can generate connected cells correctly. */
  300. /* Try an IPv4 address */
  301. memset(&rh, 0, sizeof(rh));
  302. memset(&cell, 0, sizeof(cell));
  303. tor_addr_parse(&addr, "30.40.50.60");
  304. rh.length = connected_cell_format_payload(cell.payload+RELAY_HEADER_SIZE,
  305. &addr, 128);
  306. tt_int_op(rh.length, ==, 8);
  307. test_memeq_hex(cell.payload+RELAY_HEADER_SIZE, "1e28323c" "00000080");
  308. /* Try parsing it. */
  309. tor_addr_make_unspec(&addr);
  310. r = connected_cell_parse(&rh, &cell, &addr, &ttl);
  311. tt_int_op(r, ==, 0);
  312. tt_int_op(tor_addr_family(&addr), ==, AF_INET);
  313. tt_str_op(fmt_addr(&addr), ==, "30.40.50.60");
  314. tt_int_op(ttl, ==, 128);
  315. /* Try an IPv6 address */
  316. memset(&rh, 0, sizeof(rh));
  317. memset(&cell, 0, sizeof(cell));
  318. tor_addr_parse(&addr, "2620::6b0:b:1a1a:0:26e5:480e");
  319. rh.length = connected_cell_format_payload(cell.payload+RELAY_HEADER_SIZE,
  320. &addr, 3600);
  321. tt_int_op(rh.length, ==, 25);
  322. test_memeq_hex(cell.payload + RELAY_HEADER_SIZE,
  323. "00000000" "06"
  324. "2620000006b0000b1a1a000026e5480e" "00000e10");
  325. /* Try parsing it. */
  326. tor_addr_make_unspec(&addr);
  327. r = connected_cell_parse(&rh, &cell, &addr, &ttl);
  328. tt_int_op(r, ==, 0);
  329. tt_int_op(tor_addr_family(&addr), ==, AF_INET6);
  330. tt_str_op(fmt_addr(&addr), ==, "2620:0:6b0:b:1a1a:0:26e5:480e");
  331. tt_int_op(ttl, ==, 3600);
  332. done:
  333. tor_free(mem_op_hex_tmp);
  334. }
  335. static void
  336. test_cfmt_create_cells(void *arg)
  337. {
  338. uint8_t b[MAX_ONIONSKIN_CHALLENGE_LEN];
  339. create_cell_t cc;
  340. cell_t cell;
  341. cell_t cell2;
  342. (void)arg;
  343. /* === Let's try parsing some good cells! */
  344. /* A valid create cell. */
  345. memset(&cell, 0, sizeof(cell));
  346. memset(b, 0, sizeof(b));
  347. crypto_rand((char*)b, TAP_ONIONSKIN_CHALLENGE_LEN);
  348. cell.command = CELL_CREATE;
  349. memcpy(cell.payload, b, TAP_ONIONSKIN_CHALLENGE_LEN);
  350. tt_int_op(0, ==, create_cell_parse(&cc, &cell));
  351. tt_int_op(CELL_CREATE, ==, cc.cell_type);
  352. tt_int_op(ONION_HANDSHAKE_TYPE_TAP, ==, cc.handshake_type);
  353. tt_int_op(TAP_ONIONSKIN_CHALLENGE_LEN, ==, cc.handshake_len);
  354. test_memeq(cc.onionskin, b, TAP_ONIONSKIN_CHALLENGE_LEN + 10);
  355. tt_int_op(0, ==, create_cell_format(&cell2, &cc));
  356. tt_int_op(cell.command, ==, cell2.command);
  357. test_memeq(cell.payload, cell2.payload, CELL_PAYLOAD_SIZE);
  358. /* A valid create_fast cell. */
  359. memset(&cell, 0, sizeof(cell));
  360. memset(b, 0, sizeof(b));
  361. crypto_rand((char*)b, CREATE_FAST_LEN);
  362. cell.command = CELL_CREATE_FAST;
  363. memcpy(cell.payload, b, CREATE_FAST_LEN);
  364. tt_int_op(0, ==, create_cell_parse(&cc, &cell));
  365. tt_int_op(CELL_CREATE_FAST, ==, cc.cell_type);
  366. tt_int_op(ONION_HANDSHAKE_TYPE_FAST, ==, cc.handshake_type);
  367. tt_int_op(CREATE_FAST_LEN, ==, cc.handshake_len);
  368. test_memeq(cc.onionskin, b, CREATE_FAST_LEN + 10);
  369. tt_int_op(0, ==, create_cell_format(&cell2, &cc));
  370. tt_int_op(cell.command, ==, cell2.command);
  371. test_memeq(cell.payload, cell2.payload, CELL_PAYLOAD_SIZE);
  372. /* A valid create2 cell with a TAP payload */
  373. memset(&cell, 0, sizeof(cell));
  374. memset(b, 0, sizeof(b));
  375. crypto_rand((char*)b, TAP_ONIONSKIN_CHALLENGE_LEN);
  376. cell.command = CELL_CREATE2;
  377. memcpy(cell.payload, "\x00\x00\x00\xBA", 4); /* TAP, 186 bytes long */
  378. memcpy(cell.payload+4, b, TAP_ONIONSKIN_CHALLENGE_LEN);
  379. tt_int_op(0, ==, create_cell_parse(&cc, &cell));
  380. tt_int_op(CELL_CREATE2, ==, cc.cell_type);
  381. tt_int_op(ONION_HANDSHAKE_TYPE_TAP, ==, cc.handshake_type);
  382. tt_int_op(TAP_ONIONSKIN_CHALLENGE_LEN, ==, cc.handshake_len);
  383. test_memeq(cc.onionskin, b, TAP_ONIONSKIN_CHALLENGE_LEN + 10);
  384. tt_int_op(0, ==, create_cell_format(&cell2, &cc));
  385. tt_int_op(cell.command, ==, cell2.command);
  386. test_memeq(cell.payload, cell2.payload, CELL_PAYLOAD_SIZE);
  387. /* A valid create2 cell with an ntor payload */
  388. memset(&cell, 0, sizeof(cell));
  389. memset(b, 0, sizeof(b));
  390. crypto_rand((char*)b, NTOR_ONIONSKIN_LEN);
  391. cell.command = CELL_CREATE2;
  392. memcpy(cell.payload, "\x00\x02\x00\x54", 4); /* ntor, 84 bytes long */
  393. memcpy(cell.payload+4, b, NTOR_ONIONSKIN_LEN);
  394. #ifdef CURVE25519_ENABLED
  395. tt_int_op(0, ==, create_cell_parse(&cc, &cell));
  396. tt_int_op(CELL_CREATE2, ==, cc.cell_type);
  397. tt_int_op(ONION_HANDSHAKE_TYPE_NTOR, ==, cc.handshake_type);
  398. tt_int_op(NTOR_ONIONSKIN_LEN, ==, cc.handshake_len);
  399. test_memeq(cc.onionskin, b, NTOR_ONIONSKIN_LEN + 10);
  400. tt_int_op(0, ==, create_cell_format(&cell2, &cc));
  401. tt_int_op(cell.command, ==, cell2.command);
  402. test_memeq(cell.payload, cell2.payload, CELL_PAYLOAD_SIZE);
  403. #else
  404. tt_int_op(-1, ==, create_cell_parse(&cc, &cell));
  405. #endif
  406. /* == Okay, now let's try to parse some impossible stuff. */
  407. /* It has to be some kind of a create cell! */
  408. cell.command = CELL_CREATED;
  409. tt_int_op(-1, ==, create_cell_parse(&cc, &cell));
  410. /* You can't acutally make an unparseable CREATE or CREATE_FAST cell. */
  411. /* Try some CREATE2 cells. First with a bad type. */
  412. cell.command = CELL_CREATE2;
  413. memcpy(cell.payload, "\x00\x50\x00\x99", 4); /* Type 0x50???? */
  414. tt_int_op(-1, ==, create_cell_parse(&cc, &cell));
  415. /* Now a good type with an incorrect length. */
  416. memcpy(cell.payload, "\x00\x00\x00\xBC", 4); /* TAP, 187 bytes.*/
  417. tt_int_op(-1, ==, create_cell_parse(&cc, &cell));
  418. /* Now a good type with a ridiculous length. */
  419. memcpy(cell.payload, "\x00\x00\x02\x00", 4); /* TAP, 512 bytes.*/
  420. tt_int_op(-1, ==, create_cell_parse(&cc, &cell));
  421. /* == Time to try formatting bad cells. The important thing is that
  422. we reject big lengths, so just check that for now. */
  423. cc.handshake_len = 512;
  424. tt_int_op(-1, ==, create_cell_format(&cell2, &cc));
  425. /* == Try formatting a create2 cell we don't understand. XXXX */
  426. done:
  427. ;
  428. }
  429. static void
  430. test_cfmt_created_cells(void *arg)
  431. {
  432. uint8_t b[512];
  433. created_cell_t cc;
  434. cell_t cell;
  435. cell_t cell2;
  436. (void)arg;
  437. /* A good CREATED cell */
  438. memset(&cell, 0, sizeof(cell));
  439. memset(b, 0, sizeof(b));
  440. crypto_rand((char*)b, TAP_ONIONSKIN_REPLY_LEN);
  441. cell.command = CELL_CREATED;
  442. memcpy(cell.payload, b, TAP_ONIONSKIN_REPLY_LEN);
  443. tt_int_op(0, ==, created_cell_parse(&cc, &cell));
  444. tt_int_op(CELL_CREATED, ==, cc.cell_type);
  445. tt_int_op(TAP_ONIONSKIN_REPLY_LEN, ==, cc.handshake_len);
  446. test_memeq(cc.reply, b, TAP_ONIONSKIN_REPLY_LEN + 10);
  447. tt_int_op(0, ==, created_cell_format(&cell2, &cc));
  448. tt_int_op(cell.command, ==, cell2.command);
  449. test_memeq(cell.payload, cell2.payload, CELL_PAYLOAD_SIZE);
  450. /* A good CREATED_FAST cell */
  451. memset(&cell, 0, sizeof(cell));
  452. memset(b, 0, sizeof(b));
  453. crypto_rand((char*)b, CREATED_FAST_LEN);
  454. cell.command = CELL_CREATED_FAST;
  455. memcpy(cell.payload, b, CREATED_FAST_LEN);
  456. tt_int_op(0, ==, created_cell_parse(&cc, &cell));
  457. tt_int_op(CELL_CREATED_FAST, ==, cc.cell_type);
  458. tt_int_op(CREATED_FAST_LEN, ==, cc.handshake_len);
  459. test_memeq(cc.reply, b, CREATED_FAST_LEN + 10);
  460. tt_int_op(0, ==, created_cell_format(&cell2, &cc));
  461. tt_int_op(cell.command, ==, cell2.command);
  462. test_memeq(cell.payload, cell2.payload, CELL_PAYLOAD_SIZE);
  463. /* A good CREATED2 cell with short reply */
  464. memset(&cell, 0, sizeof(cell));
  465. memset(b, 0, sizeof(b));
  466. crypto_rand((char*)b, 64);
  467. cell.command = CELL_CREATED2;
  468. memcpy(cell.payload, "\x00\x40", 2);
  469. memcpy(cell.payload+2, b, 64);
  470. tt_int_op(0, ==, created_cell_parse(&cc, &cell));
  471. tt_int_op(CELL_CREATED2, ==, cc.cell_type);
  472. tt_int_op(64, ==, cc.handshake_len);
  473. test_memeq(cc.reply, b, 80);
  474. tt_int_op(0, ==, created_cell_format(&cell2, &cc));
  475. tt_int_op(cell.command, ==, cell2.command);
  476. test_memeq(cell.payload, cell2.payload, CELL_PAYLOAD_SIZE);
  477. /* A good CREATED2 cell with maximal reply */
  478. memset(&cell, 0, sizeof(cell));
  479. memset(b, 0, sizeof(b));
  480. crypto_rand((char*)b, 496);
  481. cell.command = CELL_CREATED2;
  482. memcpy(cell.payload, "\x01\xF0", 2);
  483. memcpy(cell.payload+2, b, 496);
  484. tt_int_op(0, ==, created_cell_parse(&cc, &cell));
  485. tt_int_op(CELL_CREATED2, ==, cc.cell_type);
  486. tt_int_op(496, ==, cc.handshake_len);
  487. test_memeq(cc.reply, b, 496);
  488. tt_int_op(0, ==, created_cell_format(&cell2, &cc));
  489. tt_int_op(cell.command, ==, cell2.command);
  490. test_memeq(cell.payload, cell2.payload, CELL_PAYLOAD_SIZE);
  491. /* Bogus CREATED2 cell: too long! */
  492. memset(&cell, 0, sizeof(cell));
  493. memset(b, 0, sizeof(b));
  494. crypto_rand((char*)b, 496);
  495. cell.command = CELL_CREATED2;
  496. memcpy(cell.payload, "\x01\xF1", 2);
  497. tt_int_op(-1, ==, created_cell_parse(&cc, &cell));
  498. /* Unformattable CREATED2 cell: too long! */
  499. cc.handshake_len = 497;
  500. tt_int_op(-1, ==, created_cell_format(&cell2, &cc));
  501. done:
  502. ;
  503. }
  504. static void
  505. test_cfmt_extend_cells(void *arg)
  506. {
  507. uint8_t b[512];
  508. extend_cell_t ec;
  509. create_cell_t *cc = &ec.create_cell;
  510. uint8_t p[RELAY_PAYLOAD_SIZE];
  511. uint8_t p2[RELAY_PAYLOAD_SIZE];
  512. uint8_t p2_cmd;
  513. uint16_t p2_len;
  514. char *mem_op_hex_tmp = NULL;
  515. (void) arg;
  516. /* Let's start with a simple EXTEND cell. */
  517. memset(p, 0, sizeof(p));
  518. memset(b, 0, sizeof(b));
  519. crypto_rand((char*)b, TAP_ONIONSKIN_CHALLENGE_LEN);
  520. memcpy(p, "\x12\xf4\x00\x01\x01\x02", 6); /* 18 244 0 1 : 258 */
  521. memcpy(p+6,b,TAP_ONIONSKIN_CHALLENGE_LEN);
  522. memcpy(p+6+TAP_ONIONSKIN_CHALLENGE_LEN, "electroencephalogram", 20);
  523. tt_int_op(0, ==, extend_cell_parse(&ec, RELAY_COMMAND_EXTEND,
  524. p, 26+TAP_ONIONSKIN_CHALLENGE_LEN));
  525. tt_int_op(RELAY_COMMAND_EXTEND, ==, ec.cell_type);
  526. tt_str_op("18.244.0.1", ==, fmt_addr(&ec.orport_ipv4.addr));
  527. tt_int_op(258, ==, ec.orport_ipv4.port);
  528. tt_int_op(AF_UNSPEC, ==, tor_addr_family(&ec.orport_ipv6.addr));
  529. test_memeq(ec.node_id, "electroencephalogram", 20);
  530. tt_int_op(cc->cell_type, ==, CELL_CREATE);
  531. tt_int_op(cc->handshake_type, ==, ONION_HANDSHAKE_TYPE_TAP);
  532. tt_int_op(cc->handshake_len, ==, TAP_ONIONSKIN_CHALLENGE_LEN);
  533. test_memeq(cc->onionskin, b, TAP_ONIONSKIN_CHALLENGE_LEN+20);
  534. tt_int_op(0, ==, extend_cell_format(&p2_cmd, &p2_len, p2, &ec));
  535. tt_int_op(p2_cmd, ==, RELAY_COMMAND_EXTEND);
  536. tt_int_op(p2_len, ==, 26+TAP_ONIONSKIN_CHALLENGE_LEN);
  537. test_memeq(p2, p, RELAY_PAYLOAD_SIZE);
  538. /* Now let's do a minimal ntor EXTEND2 cell. */
  539. memset(&ec, 0xff, sizeof(ec));
  540. memset(p, 0, sizeof(p));
  541. memset(b, 0, sizeof(b));
  542. crypto_rand((char*)b, NTOR_ONIONSKIN_LEN);
  543. /* 2 items; one 18.244.0.1:61681 */
  544. memcpy(p, "\x02\x00\x06\x12\xf4\x00\x01\xf0\xf1", 9);
  545. /* The other is a digest. */
  546. memcpy(p+9, "\x02\x14" "anarchoindividualist", 22);
  547. /* Prep for the handshake: type and length */
  548. memcpy(p+31, "\x00\x02\x00\x54", 4);
  549. memcpy(p+35, b, NTOR_ONIONSKIN_LEN);
  550. tt_int_op(0, ==, extend_cell_parse(&ec, RELAY_COMMAND_EXTEND2,
  551. p, 35+NTOR_ONIONSKIN_LEN));
  552. tt_int_op(RELAY_COMMAND_EXTEND2, ==, ec.cell_type);
  553. tt_str_op("18.244.0.1", ==, fmt_addr(&ec.orport_ipv4.addr));
  554. tt_int_op(61681, ==, ec.orport_ipv4.port);
  555. tt_int_op(AF_UNSPEC, ==, tor_addr_family(&ec.orport_ipv6.addr));
  556. test_memeq(ec.node_id, "anarchoindividualist", 20);
  557. tt_int_op(cc->cell_type, ==, CELL_CREATE2);
  558. tt_int_op(cc->handshake_type, ==, ONION_HANDSHAKE_TYPE_NTOR);
  559. tt_int_op(cc->handshake_len, ==, NTOR_ONIONSKIN_LEN);
  560. test_memeq(cc->onionskin, b, NTOR_ONIONSKIN_LEN+20);
  561. tt_int_op(0, ==, extend_cell_format(&p2_cmd, &p2_len, p2, &ec));
  562. tt_int_op(p2_cmd, ==, RELAY_COMMAND_EXTEND2);
  563. tt_int_op(p2_len, ==, 35+NTOR_ONIONSKIN_LEN);
  564. test_memeq(p2, p, RELAY_PAYLOAD_SIZE);
  565. /* Now let's do a fanciful EXTEND2 cell. */
  566. memset(&ec, 0xff, sizeof(ec));
  567. memset(p, 0, sizeof(p));
  568. memset(b, 0, sizeof(b));
  569. crypto_rand((char*)b, 99);
  570. /* 4 items; one 18 244 0 1 61681 */
  571. memcpy(p, "\x04\x00\x06\x12\xf4\x00\x01\xf0\xf1", 9);
  572. /* One is a digest. */
  573. memcpy(p+9, "\x02\x14" "anthropomorphization", 22);
  574. /* One is an ipv6 address */
  575. memcpy(p+31, "\x01\x12\x20\x02\x00\x00\x00\x00\x00\x00"
  576. "\x00\x00\x00\x00\x00\xf0\xc5\x1e\x11\x12", 20);
  577. /* One is the Konami code. */
  578. memcpy(p+51, "\xf0\x20upupdowndownleftrightleftrightba", 34);
  579. /* Prep for the handshake: weird type and length */
  580. memcpy(p+85, "\x01\x05\x00\x63", 4);
  581. memcpy(p+89, b, 99);
  582. tt_int_op(0, ==, extend_cell_parse(&ec, RELAY_COMMAND_EXTEND2, p, 89+99));
  583. tt_int_op(RELAY_COMMAND_EXTEND2, ==, ec.cell_type);
  584. tt_str_op("18.244.0.1", ==, fmt_addr(&ec.orport_ipv4.addr));
  585. tt_int_op(61681, ==, ec.orport_ipv4.port);
  586. tt_str_op("2002::f0:c51e", ==, fmt_addr(&ec.orport_ipv6.addr));
  587. tt_int_op(4370, ==, ec.orport_ipv6.port);
  588. test_memeq(ec.node_id, "anthropomorphization", 20);
  589. tt_int_op(cc->cell_type, ==, CELL_CREATE2);
  590. tt_int_op(cc->handshake_type, ==, 0x105);
  591. tt_int_op(cc->handshake_len, ==, 99);
  592. test_memeq(cc->onionskin, b, 99+20);
  593. tt_int_op(0, ==, extend_cell_format(&p2_cmd, &p2_len, p2, &ec));
  594. tt_int_op(p2_cmd, ==, RELAY_COMMAND_EXTEND2);
  595. /* We'll generate it minus the IPv6 address and minus the konami code */
  596. tt_int_op(p2_len, ==, 89+99-34-20);
  597. test_memeq_hex(p2,
  598. /* Two items: one that same darn IP address. */
  599. "02000612F40001F0F1"
  600. /* The next is a digest : anthropomorphization */
  601. "0214616e7468726f706f6d6f727068697a6174696f6e"
  602. /* Now the handshake prologue */
  603. "01050063");
  604. test_memeq(p2+1+8+22+4, b, 99+20);
  605. /* == Now try parsing some junk */
  606. /* Try a too-long handshake */
  607. memset(p, 0, sizeof(p));
  608. memcpy(p, "\x02\x00\x06\x12\xf4\x00\x01\xf0\xf1", 9);
  609. memcpy(p+9, "\x02\x14" "anarchoindividualist", 22);
  610. memcpy(p+31, "\xff\xff\x01\xd0", 4);
  611. tt_int_op(-1, ==, extend_cell_parse(&ec, RELAY_COMMAND_EXTEND2,
  612. p, sizeof(p)));
  613. /* Try two identities. */
  614. memset(p, 0, sizeof(p));
  615. memcpy(p, "\x03\x00\x06\x12\xf4\x00\x01\xf0\xf1", 9);
  616. memcpy(p+9, "\x02\x14" "anarchoindividualist", 22);
  617. memcpy(p+31, "\x02\x14" "autodepolymerization", 22);
  618. memcpy(p+53, "\xff\xff\x00\x10", 4);
  619. tt_int_op(-1, ==, extend_cell_parse(&ec, RELAY_COMMAND_EXTEND2,
  620. p, sizeof(p)));
  621. /* No identities. */
  622. memset(p, 0, sizeof(p));
  623. memcpy(p, "\x01\x00\x06\x12\xf4\x00\x01\xf0\xf1", 9);
  624. memcpy(p+53, "\xff\xff\x00\x10", 4);
  625. tt_int_op(-1, ==, extend_cell_parse(&ec, RELAY_COMMAND_EXTEND2,
  626. p, sizeof(p)));
  627. /* Try a bad IPv4 address (too long, too short)*/
  628. memset(p, 0, sizeof(p));
  629. memcpy(p, "\x02\x00\x07\x12\xf4\x00\x01\xf0\xf1\xff", 10);
  630. memcpy(p+10, "\x02\x14" "anarchoindividualist", 22);
  631. memcpy(p+32, "\xff\xff\x00\x10", 4);
  632. tt_int_op(-1, ==, extend_cell_parse(&ec, RELAY_COMMAND_EXTEND2,
  633. p, sizeof(p)));
  634. memset(p, 0, sizeof(p));
  635. memcpy(p, "\x02\x00\x05\x12\xf4\x00\x01\xf0", 8);
  636. memcpy(p+8, "\x02\x14" "anarchoindividualist", 22);
  637. memcpy(p+30, "\xff\xff\x00\x10", 4);
  638. tt_int_op(-1, ==, extend_cell_parse(&ec, RELAY_COMMAND_EXTEND2,
  639. p, sizeof(p)));
  640. /* IPv6 address (too long, too short, no IPv4)*/
  641. memset(p, 0, sizeof(p));
  642. memcpy(p, "\x03\x00\x06\x12\xf4\x00\x01\xf0\xf1", 9);
  643. memcpy(p+9, "\x02\x14" "anarchoindividualist", 22);
  644. memcpy(p+31, "\x01\x13" "xxxxxxxxxxxxxxxxYYZ", 19);
  645. memcpy(p+50, "\xff\xff\x00\x20", 4);
  646. tt_int_op(-1, ==, extend_cell_parse(&ec, RELAY_COMMAND_EXTEND2,
  647. p, sizeof(p)));
  648. memset(p, 0, sizeof(p));
  649. memcpy(p, "\x03\x00\x06\x12\xf4\x00\x01\xf0\xf1", 9);
  650. memcpy(p+9, "\x02\x14" "anarchoindividualist", 22);
  651. memcpy(p+31, "\x01\x11" "xxxxxxxxxxxxxxxxY", 17);
  652. memcpy(p+48, "\xff\xff\x00\x20", 4);
  653. tt_int_op(-1, ==, extend_cell_parse(&ec, RELAY_COMMAND_EXTEND2,
  654. p, sizeof(p)));
  655. memset(p, 0, sizeof(p));
  656. memcpy(p, "\x02", 1);
  657. memcpy(p+1, "\x02\x14" "anarchoindividualist", 22);
  658. memcpy(p+23, "\x01\x12" "xxxxxxxxxxxxxxxxYY", 18);
  659. memcpy(p+41, "\xff\xff\x00\x20", 4);
  660. tt_int_op(-1, ==, extend_cell_parse(&ec, RELAY_COMMAND_EXTEND2,
  661. p, sizeof(p)));
  662. /* Running out of space in specifiers */
  663. memset(p,0,sizeof(p));
  664. memcpy(p, "\x05\x0a\xff", 3);
  665. memcpy(p+3+255, "\x0a\xff", 2);
  666. tt_int_op(-1, ==, extend_cell_parse(&ec, RELAY_COMMAND_EXTEND2,
  667. p, sizeof(p)));
  668. /* Fuzz, because why not. */
  669. memset(&ec, 0xff, sizeof(ec));
  670. {
  671. int i;
  672. memset(p, 0, sizeof(p));
  673. for (i = 0; i < 10000; ++i) {
  674. int n = crypto_rand_int(sizeof(p));
  675. crypto_rand((char *)p, n);
  676. extend_cell_parse(&ec, RELAY_COMMAND_EXTEND2, p, n);
  677. }
  678. }
  679. done:
  680. tor_free(mem_op_hex_tmp);
  681. }
  682. static void
  683. test_cfmt_extended_cells(void *arg)
  684. {
  685. uint8_t b[512];
  686. extended_cell_t ec;
  687. created_cell_t *cc = &ec.created_cell;
  688. uint8_t p[RELAY_PAYLOAD_SIZE];
  689. uint8_t p2[RELAY_PAYLOAD_SIZE];
  690. uint8_t p2_cmd;
  691. uint16_t p2_len;
  692. char *mem_op_hex_tmp = NULL;
  693. (void) arg;
  694. /* Try a regular EXTENDED cell. */
  695. memset(&ec, 0xff, sizeof(ec));
  696. memset(p, 0, sizeof(p));
  697. memset(b, 0, sizeof(b));
  698. crypto_rand((char*)b, TAP_ONIONSKIN_REPLY_LEN);
  699. memcpy(p,b,TAP_ONIONSKIN_REPLY_LEN);
  700. tt_int_op(0, ==, extended_cell_parse(&ec, RELAY_COMMAND_EXTENDED, p,
  701. TAP_ONIONSKIN_REPLY_LEN));
  702. tt_int_op(RELAY_COMMAND_EXTENDED, ==, ec.cell_type);
  703. tt_int_op(cc->cell_type, ==, CELL_CREATED);
  704. tt_int_op(cc->handshake_len, ==, TAP_ONIONSKIN_REPLY_LEN);
  705. test_memeq(cc->reply, b, TAP_ONIONSKIN_REPLY_LEN);
  706. tt_int_op(0, ==, extended_cell_format(&p2_cmd, &p2_len, p2, &ec));
  707. tt_int_op(RELAY_COMMAND_EXTENDED, ==, p2_cmd);
  708. tt_int_op(TAP_ONIONSKIN_REPLY_LEN, ==, p2_len);
  709. test_memeq(p2, p, sizeof(p2));
  710. /* Try an EXTENDED2 cell */
  711. memset(&ec, 0xff, sizeof(ec));
  712. memset(p, 0, sizeof(p));
  713. memset(b, 0, sizeof(b));
  714. crypto_rand((char*)b, 42);
  715. memcpy(p,"\x00\x2a",2);
  716. memcpy(p+2,b,42);
  717. tt_int_op(0, ==, extended_cell_parse(&ec, RELAY_COMMAND_EXTENDED2, p, 2+42));
  718. tt_int_op(RELAY_COMMAND_EXTENDED2, ==, ec.cell_type);
  719. tt_int_op(cc->cell_type, ==, CELL_CREATED2);
  720. tt_int_op(cc->handshake_len, ==, 42);
  721. test_memeq(cc->reply, b, 42+10);
  722. tt_int_op(0, ==, extended_cell_format(&p2_cmd, &p2_len, p2, &ec));
  723. tt_int_op(RELAY_COMMAND_EXTENDED2, ==, p2_cmd);
  724. tt_int_op(2+42, ==, p2_len);
  725. test_memeq(p2, p, sizeof(p2));
  726. /* Try an almost-too-long EXTENDED2 cell */
  727. memcpy(p, "\x01\xf0", 2);
  728. tt_int_op(0, ==,
  729. extended_cell_parse(&ec, RELAY_COMMAND_EXTENDED2, p, sizeof(p)));
  730. /* Now try a too-long extended2 cell. That's the only misparse I can think
  731. * of. */
  732. memcpy(p, "\x01\xf1", 2);
  733. tt_int_op(-1, ==,
  734. extended_cell_parse(&ec, RELAY_COMMAND_EXTENDED2, p, sizeof(p)));
  735. done:
  736. tor_free(mem_op_hex_tmp);
  737. }
  738. #define TEST(name, flags) \
  739. { #name, test_cfmt_ ## name, flags, 0, NULL }
  740. struct testcase_t cell_format_tests[] = {
  741. TEST(relay_header, 0),
  742. TEST(begin_cells, 0),
  743. TEST(connected_cells, 0),
  744. TEST(create_cells, 0),
  745. TEST(created_cells, 0),
  746. TEST(extend_cells, 0),
  747. TEST(extended_cells, 0),
  748. END_OF_TESTCASES
  749. };