Bitcoin Core  26.1.0
P2P Digital Currency
net_tests.cpp
Go to the documentation of this file.
1 // Copyright (c) 2012-2022 The Bitcoin Core developers
2 // Distributed under the MIT software license, see the accompanying
3 // file COPYING or http://www.opensource.org/licenses/mit-license.php.
4 
5 #include <chainparams.h>
6 #include <clientversion.h>
7 #include <common/args.h>
8 #include <compat/compat.h>
9 #include <cstdint>
10 #include <net.h>
11 #include <net_processing.h>
12 #include <netaddress.h>
13 #include <netbase.h>
14 #include <netmessagemaker.h>
15 #include <serialize.h>
16 #include <span.h>
17 #include <streams.h>
18 #include <test/util/random.h>
19 #include <test/util/setup_common.h>
20 #include <test/util/validation.h>
21 #include <timedata.h>
22 #include <util/strencodings.h>
23 #include <util/string.h>
24 #include <validation.h>
25 #include <version.h>
26 
27 #include <boost/test/unit_test.hpp>
28 
29 #include <algorithm>
30 #include <ios>
31 #include <memory>
32 #include <optional>
33 #include <string>
34 
35 using namespace std::literals;
36 
37 BOOST_FIXTURE_TEST_SUITE(net_tests, RegTestingSetup)
38 
39 BOOST_AUTO_TEST_CASE(cnode_listen_port)
40 {
41  // test default
42  uint16_t port{GetListenPort()};
43  BOOST_CHECK(port == Params().GetDefaultPort());
44  // test set port
45  uint16_t altPort = 12345;
46  BOOST_CHECK(gArgs.SoftSetArg("-port", ToString(altPort)));
47  port = GetListenPort();
48  BOOST_CHECK(port == altPort);
49 }
50 
51 BOOST_AUTO_TEST_CASE(cnode_simple_test)
52 {
53  NodeId id = 0;
54 
55  in_addr ipv4Addr;
56  ipv4Addr.s_addr = 0xa0b0c001;
57 
58  CAddress addr = CAddress(CService(ipv4Addr, 7777), NODE_NETWORK);
59  std::string pszDest;
60 
61  std::unique_ptr<CNode> pnode1 = std::make_unique<CNode>(id++,
62  /*sock=*/nullptr,
63  addr,
64  /*nKeyedNetGroupIn=*/0,
65  /*nLocalHostNonceIn=*/0,
66  CAddress(),
67  pszDest,
69  /*inbound_onion=*/false);
70  BOOST_CHECK(pnode1->IsFullOutboundConn() == true);
71  BOOST_CHECK(pnode1->IsManualConn() == false);
72  BOOST_CHECK(pnode1->IsBlockOnlyConn() == false);
73  BOOST_CHECK(pnode1->IsFeelerConn() == false);
74  BOOST_CHECK(pnode1->IsAddrFetchConn() == false);
75  BOOST_CHECK(pnode1->IsInboundConn() == false);
76  BOOST_CHECK(pnode1->m_inbound_onion == false);
77  BOOST_CHECK_EQUAL(pnode1->ConnectedThroughNetwork(), Network::NET_IPV4);
78 
79  std::unique_ptr<CNode> pnode2 = std::make_unique<CNode>(id++,
80  /*sock=*/nullptr,
81  addr,
82  /*nKeyedNetGroupIn=*/1,
83  /*nLocalHostNonceIn=*/1,
84  CAddress(),
85  pszDest,
87  /*inbound_onion=*/false);
88  BOOST_CHECK(pnode2->IsFullOutboundConn() == false);
89  BOOST_CHECK(pnode2->IsManualConn() == false);
90  BOOST_CHECK(pnode2->IsBlockOnlyConn() == false);
91  BOOST_CHECK(pnode2->IsFeelerConn() == false);
92  BOOST_CHECK(pnode2->IsAddrFetchConn() == false);
93  BOOST_CHECK(pnode2->IsInboundConn() == true);
94  BOOST_CHECK(pnode2->m_inbound_onion == false);
95  BOOST_CHECK_EQUAL(pnode2->ConnectedThroughNetwork(), Network::NET_IPV4);
96 
97  std::unique_ptr<CNode> pnode3 = std::make_unique<CNode>(id++,
98  /*sock=*/nullptr,
99  addr,
100  /*nKeyedNetGroupIn=*/0,
101  /*nLocalHostNonceIn=*/0,
102  CAddress(),
103  pszDest,
105  /*inbound_onion=*/false);
106  BOOST_CHECK(pnode3->IsFullOutboundConn() == true);
107  BOOST_CHECK(pnode3->IsManualConn() == false);
108  BOOST_CHECK(pnode3->IsBlockOnlyConn() == false);
109  BOOST_CHECK(pnode3->IsFeelerConn() == false);
110  BOOST_CHECK(pnode3->IsAddrFetchConn() == false);
111  BOOST_CHECK(pnode3->IsInboundConn() == false);
112  BOOST_CHECK(pnode3->m_inbound_onion == false);
113  BOOST_CHECK_EQUAL(pnode3->ConnectedThroughNetwork(), Network::NET_IPV4);
114 
115  std::unique_ptr<CNode> pnode4 = std::make_unique<CNode>(id++,
116  /*sock=*/nullptr,
117  addr,
118  /*nKeyedNetGroupIn=*/1,
119  /*nLocalHostNonceIn=*/1,
120  CAddress(),
121  pszDest,
123  /*inbound_onion=*/true);
124  BOOST_CHECK(pnode4->IsFullOutboundConn() == false);
125  BOOST_CHECK(pnode4->IsManualConn() == false);
126  BOOST_CHECK(pnode4->IsBlockOnlyConn() == false);
127  BOOST_CHECK(pnode4->IsFeelerConn() == false);
128  BOOST_CHECK(pnode4->IsAddrFetchConn() == false);
129  BOOST_CHECK(pnode4->IsInboundConn() == true);
130  BOOST_CHECK(pnode4->m_inbound_onion == true);
131  BOOST_CHECK_EQUAL(pnode4->ConnectedThroughNetwork(), Network::NET_ONION);
132 }
133 
134 BOOST_AUTO_TEST_CASE(cnetaddr_basic)
135 {
136  CNetAddr addr;
137 
138  // IPv4, INADDR_ANY
139  addr = LookupHost("0.0.0.0", false).value();
140  BOOST_REQUIRE(!addr.IsValid());
141  BOOST_REQUIRE(addr.IsIPv4());
142 
143  BOOST_CHECK(addr.IsBindAny());
145  BOOST_CHECK_EQUAL(addr.ToStringAddr(), "0.0.0.0");
146 
147  // IPv4, INADDR_NONE
148  addr = LookupHost("255.255.255.255", false).value();
149  BOOST_REQUIRE(!addr.IsValid());
150  BOOST_REQUIRE(addr.IsIPv4());
151 
152  BOOST_CHECK(!addr.IsBindAny());
153  BOOST_CHECK(addr.IsAddrV1Compatible());
154  BOOST_CHECK_EQUAL(addr.ToStringAddr(), "255.255.255.255");
155 
156  // IPv4, casual
157  addr = LookupHost("12.34.56.78", false).value();
158  BOOST_REQUIRE(addr.IsValid());
159  BOOST_REQUIRE(addr.IsIPv4());
160 
161  BOOST_CHECK(!addr.IsBindAny());
162  BOOST_CHECK(addr.IsAddrV1Compatible());
163  BOOST_CHECK_EQUAL(addr.ToStringAddr(), "12.34.56.78");
164 
165  // IPv6, in6addr_any
166  addr = LookupHost("::", false).value();
167  BOOST_REQUIRE(!addr.IsValid());
168  BOOST_REQUIRE(addr.IsIPv6());
169 
170  BOOST_CHECK(addr.IsBindAny());
171  BOOST_CHECK(addr.IsAddrV1Compatible());
172  BOOST_CHECK_EQUAL(addr.ToStringAddr(), "::");
173 
174  // IPv6, casual
175  addr = LookupHost("1122:3344:5566:7788:9900:aabb:ccdd:eeff", false).value();
176  BOOST_REQUIRE(addr.IsValid());
177  BOOST_REQUIRE(addr.IsIPv6());
178 
179  BOOST_CHECK(!addr.IsBindAny());
180  BOOST_CHECK(addr.IsAddrV1Compatible());
181  BOOST_CHECK_EQUAL(addr.ToStringAddr(), "1122:3344:5566:7788:9900:aabb:ccdd:eeff");
182 
183  // IPv6, scoped/link-local. See https://tools.ietf.org/html/rfc4007
184  // We support non-negative decimal integers (uint32_t) as zone id indices.
185  // Normal link-local scoped address functionality is to append "%" plus the
186  // zone id, for example, given a link-local address of "fe80::1" and a zone
187  // id of "32", return the address as "fe80::1%32".
188  const std::string link_local{"fe80::1"};
189  const std::string scoped_addr{link_local + "%32"};
190  addr = LookupHost(scoped_addr, false).value();
191  BOOST_REQUIRE(addr.IsValid());
192  BOOST_REQUIRE(addr.IsIPv6());
193  BOOST_CHECK(!addr.IsBindAny());
194  BOOST_CHECK_EQUAL(addr.ToStringAddr(), scoped_addr);
195 
196  // Test that the delimiter "%" and default zone id of 0 can be omitted for the default scope.
197  addr = LookupHost(link_local + "%0", false).value();
198  BOOST_REQUIRE(addr.IsValid());
199  BOOST_REQUIRE(addr.IsIPv6());
200  BOOST_CHECK(!addr.IsBindAny());
201  BOOST_CHECK_EQUAL(addr.ToStringAddr(), link_local);
202 
203  // TORv2, no longer supported
204  BOOST_CHECK(!addr.SetSpecial("6hzph5hv6337r6p2.onion"));
205 
206  // TORv3
207  const char* torv3_addr = "pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion";
208  BOOST_REQUIRE(addr.SetSpecial(torv3_addr));
209  BOOST_REQUIRE(addr.IsValid());
210  BOOST_REQUIRE(addr.IsTor());
211 
212  BOOST_CHECK(!addr.IsI2P());
213  BOOST_CHECK(!addr.IsBindAny());
214  BOOST_CHECK(!addr.IsAddrV1Compatible());
215  BOOST_CHECK_EQUAL(addr.ToStringAddr(), torv3_addr);
216 
217  // TORv3, broken, with wrong checksum
218  BOOST_CHECK(!addr.SetSpecial("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscsad.onion"));
219 
220  // TORv3, broken, with wrong version
221  BOOST_CHECK(!addr.SetSpecial("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscrye.onion"));
222 
223  // TORv3, malicious
224  BOOST_CHECK(!addr.SetSpecial(std::string{
225  "pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd\0wtf.onion", 66}));
226 
227  // TOR, bogus length
228  BOOST_CHECK(!addr.SetSpecial(std::string{"mfrggzak.onion"}));
229 
230  // TOR, invalid base32
231  BOOST_CHECK(!addr.SetSpecial(std::string{"mf*g zak.onion"}));
232 
233  // I2P
234  const char* i2p_addr = "UDHDrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.I2P";
235  BOOST_REQUIRE(addr.SetSpecial(i2p_addr));
236  BOOST_REQUIRE(addr.IsValid());
237  BOOST_REQUIRE(addr.IsI2P());
238 
239  BOOST_CHECK(!addr.IsTor());
240  BOOST_CHECK(!addr.IsBindAny());
241  BOOST_CHECK(!addr.IsAddrV1Compatible());
242  BOOST_CHECK_EQUAL(addr.ToStringAddr(), ToLower(i2p_addr));
243 
244  // I2P, correct length, but decodes to less than the expected number of bytes.
245  BOOST_CHECK(!addr.SetSpecial("udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jn=.b32.i2p"));
246 
247  // I2P, extra unnecessary padding
248  BOOST_CHECK(!addr.SetSpecial("udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna=.b32.i2p"));
249 
250  // I2P, malicious
251  BOOST_CHECK(!addr.SetSpecial("udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v\0wtf.b32.i2p"s));
252 
253  // I2P, valid but unsupported (56 Base32 characters)
254  // See "Encrypted LS with Base 32 Addresses" in
255  // https://geti2p.net/spec/encryptedleaseset.txt
256  BOOST_CHECK(
257  !addr.SetSpecial("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscsad.b32.i2p"));
258 
259  // I2P, invalid base32
260  BOOST_CHECK(!addr.SetSpecial(std::string{"tp*szydbh4dp.b32.i2p"}));
261 
262  // Internal
263  addr.SetInternal("esffpp");
264  BOOST_REQUIRE(!addr.IsValid()); // "internal" is considered invalid
265  BOOST_REQUIRE(addr.IsInternal());
266 
267  BOOST_CHECK(!addr.IsBindAny());
268  BOOST_CHECK(addr.IsAddrV1Compatible());
269  BOOST_CHECK_EQUAL(addr.ToStringAddr(), "esffpvrt3wpeaygy.internal");
270 
271  // Totally bogus
272  BOOST_CHECK(!addr.SetSpecial("totally bogus"));
273 }
274 
275 BOOST_AUTO_TEST_CASE(cnetaddr_tostring_canonical_ipv6)
276 {
277  // Test that CNetAddr::ToString formats IPv6 addresses with zero compression as described in
278  // RFC 5952 ("A Recommendation for IPv6 Address Text Representation").
279  const std::map<std::string, std::string> canonical_representations_ipv6{
280  {"0000:0000:0000:0000:0000:0000:0000:0000", "::"},
281  {"000:0000:000:00:0:00:000:0000", "::"},
282  {"000:000:000:000:000:000:000:000", "::"},
283  {"00:00:00:00:00:00:00:00", "::"},
284  {"0:0:0:0:0:0:0:0", "::"},
285  {"0:0:0:0:0:0:0:1", "::1"},
286  {"2001:0:0:1:0:0:0:1", "2001:0:0:1::1"},
287  {"2001:0db8:0:0:1:0:0:1", "2001:db8::1:0:0:1"},
288  {"2001:0db8:85a3:0000:0000:8a2e:0370:7334", "2001:db8:85a3::8a2e:370:7334"},
289  {"2001:0db8::0001", "2001:db8::1"},
290  {"2001:0db8::0001:0000", "2001:db8::1:0"},
291  {"2001:0db8::1:0:0:1", "2001:db8::1:0:0:1"},
292  {"2001:db8:0000:0:1::1", "2001:db8::1:0:0:1"},
293  {"2001:db8:0000:1:1:1:1:1", "2001:db8:0:1:1:1:1:1"},
294  {"2001:db8:0:0:0:0:2:1", "2001:db8::2:1"},
295  {"2001:db8:0:0:0::1", "2001:db8::1"},
296  {"2001:db8:0:0:1:0:0:1", "2001:db8::1:0:0:1"},
297  {"2001:db8:0:0:1::1", "2001:db8::1:0:0:1"},
298  {"2001:DB8:0:0:1::1", "2001:db8::1:0:0:1"},
299  {"2001:db8:0:0::1", "2001:db8::1"},
300  {"2001:db8:0:0:aaaa::1", "2001:db8::aaaa:0:0:1"},
301  {"2001:db8:0:1:1:1:1:1", "2001:db8:0:1:1:1:1:1"},
302  {"2001:db8:0::1", "2001:db8::1"},
303  {"2001:db8:85a3:0:0:8a2e:370:7334", "2001:db8:85a3::8a2e:370:7334"},
304  {"2001:db8::0:1", "2001:db8::1"},
305  {"2001:db8::0:1:0:0:1", "2001:db8::1:0:0:1"},
306  {"2001:DB8::1", "2001:db8::1"},
307  {"2001:db8::1", "2001:db8::1"},
308  {"2001:db8::1:0:0:1", "2001:db8::1:0:0:1"},
309  {"2001:db8::1:1:1:1:1", "2001:db8:0:1:1:1:1:1"},
310  {"2001:db8::aaaa:0:0:1", "2001:db8::aaaa:0:0:1"},
311  {"2001:db8:aaaa:bbbb:cccc:dddd:0:1", "2001:db8:aaaa:bbbb:cccc:dddd:0:1"},
312  {"2001:db8:aaaa:bbbb:cccc:dddd::1", "2001:db8:aaaa:bbbb:cccc:dddd:0:1"},
313  {"2001:db8:aaaa:bbbb:cccc:dddd:eeee:0001", "2001:db8:aaaa:bbbb:cccc:dddd:eeee:1"},
314  {"2001:db8:aaaa:bbbb:cccc:dddd:eeee:001", "2001:db8:aaaa:bbbb:cccc:dddd:eeee:1"},
315  {"2001:db8:aaaa:bbbb:cccc:dddd:eeee:01", "2001:db8:aaaa:bbbb:cccc:dddd:eeee:1"},
316  {"2001:db8:aaaa:bbbb:cccc:dddd:eeee:1", "2001:db8:aaaa:bbbb:cccc:dddd:eeee:1"},
317  {"2001:db8:aaaa:bbbb:cccc:dddd:eeee:aaaa", "2001:db8:aaaa:bbbb:cccc:dddd:eeee:aaaa"},
318  {"2001:db8:aaaa:bbbb:cccc:dddd:eeee:AAAA", "2001:db8:aaaa:bbbb:cccc:dddd:eeee:aaaa"},
319  {"2001:db8:aaaa:bbbb:cccc:dddd:eeee:AaAa", "2001:db8:aaaa:bbbb:cccc:dddd:eeee:aaaa"},
320  };
321  for (const auto& [input_address, expected_canonical_representation_output] : canonical_representations_ipv6) {
322  const std::optional<CNetAddr> net_addr{LookupHost(input_address, false)};
323  BOOST_REQUIRE(net_addr.value().IsIPv6());
324  BOOST_CHECK_EQUAL(net_addr.value().ToStringAddr(), expected_canonical_representation_output);
325  }
326 }
327 
328 BOOST_AUTO_TEST_CASE(cnetaddr_serialize_v1)
329 {
330  CNetAddr addr;
331  DataStream s{};
332  const auto ser_params{CAddress::V1_NETWORK};
333 
334  s << WithParams(ser_params, addr);
335  BOOST_CHECK_EQUAL(HexStr(s), "00000000000000000000000000000000");
336  s.clear();
337 
338  addr = LookupHost("1.2.3.4", false).value();
339  s << WithParams(ser_params, addr);
340  BOOST_CHECK_EQUAL(HexStr(s), "00000000000000000000ffff01020304");
341  s.clear();
342 
343  addr = LookupHost("1a1b:2a2b:3a3b:4a4b:5a5b:6a6b:7a7b:8a8b", false).value();
344  s << WithParams(ser_params, addr);
345  BOOST_CHECK_EQUAL(HexStr(s), "1a1b2a2b3a3b4a4b5a5b6a6b7a7b8a8b");
346  s.clear();
347 
348  // TORv2, no longer supported
349  BOOST_CHECK(!addr.SetSpecial("6hzph5hv6337r6p2.onion"));
350 
351  BOOST_REQUIRE(addr.SetSpecial("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion"));
352  s << WithParams(ser_params, addr);
353  BOOST_CHECK_EQUAL(HexStr(s), "00000000000000000000000000000000");
354  s.clear();
355 
356  addr.SetInternal("a");
357  s << WithParams(ser_params, addr);
358  BOOST_CHECK_EQUAL(HexStr(s), "fd6b88c08724ca978112ca1bbdcafac2");
359  s.clear();
360 }
361 
362 BOOST_AUTO_TEST_CASE(cnetaddr_serialize_v2)
363 {
364  CNetAddr addr;
365  DataStream s{};
366  const auto ser_params{CAddress::V2_NETWORK};
367 
368  s << WithParams(ser_params, addr);
369  BOOST_CHECK_EQUAL(HexStr(s), "021000000000000000000000000000000000");
370  s.clear();
371 
372  addr = LookupHost("1.2.3.4", false).value();
373  s << WithParams(ser_params, addr);
374  BOOST_CHECK_EQUAL(HexStr(s), "010401020304");
375  s.clear();
376 
377  addr = LookupHost("1a1b:2a2b:3a3b:4a4b:5a5b:6a6b:7a7b:8a8b", false).value();
378  s << WithParams(ser_params, addr);
379  BOOST_CHECK_EQUAL(HexStr(s), "02101a1b2a2b3a3b4a4b5a5b6a6b7a7b8a8b");
380  s.clear();
381 
382  // TORv2, no longer supported
383  BOOST_CHECK(!addr.SetSpecial("6hzph5hv6337r6p2.onion"));
384 
385  BOOST_REQUIRE(addr.SetSpecial("kpgvmscirrdqpekbqjsvw5teanhatztpp2gl6eee4zkowvwfxwenqaid.onion"));
386  s << WithParams(ser_params, addr);
387  BOOST_CHECK_EQUAL(HexStr(s), "042053cd5648488c4707914182655b7664034e09e66f7e8cbf1084e654eb56c5bd88");
388  s.clear();
389 
390  BOOST_REQUIRE(addr.SetInternal("a"));
391  s << WithParams(ser_params, addr);
392  BOOST_CHECK_EQUAL(HexStr(s), "0210fd6b88c08724ca978112ca1bbdcafac2");
393  s.clear();
394 }
395 
396 BOOST_AUTO_TEST_CASE(cnetaddr_unserialize_v2)
397 {
398  CNetAddr addr;
399  DataStream s{};
400  const auto ser_params{CAddress::V2_NETWORK};
401 
402  // Valid IPv4.
403  s << Span{ParseHex("01" // network type (IPv4)
404  "04" // address length
405  "01020304")}; // address
406  s >> WithParams(ser_params, addr);
407  BOOST_CHECK(addr.IsValid());
408  BOOST_CHECK(addr.IsIPv4());
410  BOOST_CHECK_EQUAL(addr.ToStringAddr(), "1.2.3.4");
411  BOOST_REQUIRE(s.empty());
412 
413  // Invalid IPv4, valid length but address itself is shorter.
414  s << Span{ParseHex("01" // network type (IPv4)
415  "04" // address length
416  "0102")}; // address
417  BOOST_CHECK_EXCEPTION(s >> WithParams(ser_params, addr), std::ios_base::failure, HasReason("end of data"));
418  BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
419  s.clear();
420 
421  // Invalid IPv4, with bogus length.
422  s << Span{ParseHex("01" // network type (IPv4)
423  "05" // address length
424  "01020304")}; // address
425  BOOST_CHECK_EXCEPTION(s >> WithParams(ser_params, addr), std::ios_base::failure,
426  HasReason("BIP155 IPv4 address with length 5 (should be 4)"));
427  BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
428  s.clear();
429 
430  // Invalid IPv4, with extreme length.
431  s << Span{ParseHex("01" // network type (IPv4)
432  "fd0102" // address length (513 as CompactSize)
433  "01020304")}; // address
434  BOOST_CHECK_EXCEPTION(s >> WithParams(ser_params, addr), std::ios_base::failure,
435  HasReason("Address too long: 513 > 512"));
436  BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
437  s.clear();
438 
439  // Valid IPv6.
440  s << Span{ParseHex("02" // network type (IPv6)
441  "10" // address length
442  "0102030405060708090a0b0c0d0e0f10")}; // address
443  s >> WithParams(ser_params, addr);
444  BOOST_CHECK(addr.IsValid());
445  BOOST_CHECK(addr.IsIPv6());
447  BOOST_CHECK_EQUAL(addr.ToStringAddr(), "102:304:506:708:90a:b0c:d0e:f10");
448  BOOST_REQUIRE(s.empty());
449 
450  // Valid IPv6, contains embedded "internal".
451  s << Span{ParseHex(
452  "02" // network type (IPv6)
453  "10" // address length
454  "fd6b88c08724ca978112ca1bbdcafac2")}; // address: 0xfd + sha256("bitcoin")[0:5] +
455  // sha256(name)[0:10]
456  s >> WithParams(ser_params, addr);
457  BOOST_CHECK(addr.IsInternal());
459  BOOST_CHECK_EQUAL(addr.ToStringAddr(), "zklycewkdo64v6wc.internal");
460  BOOST_REQUIRE(s.empty());
461 
462  // Invalid IPv6, with bogus length.
463  s << Span{ParseHex("02" // network type (IPv6)
464  "04" // address length
465  "00")}; // address
466  BOOST_CHECK_EXCEPTION(s >> WithParams(ser_params, addr), std::ios_base::failure,
467  HasReason("BIP155 IPv6 address with length 4 (should be 16)"));
468  BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
469  s.clear();
470 
471  // Invalid IPv6, contains embedded IPv4.
472  s << Span{ParseHex("02" // network type (IPv6)
473  "10" // address length
474  "00000000000000000000ffff01020304")}; // address
475  s >> WithParams(ser_params, addr);
476  BOOST_CHECK(!addr.IsValid());
477  BOOST_REQUIRE(s.empty());
478 
479  // Invalid IPv6, contains embedded TORv2.
480  s << Span{ParseHex("02" // network type (IPv6)
481  "10" // address length
482  "fd87d87eeb430102030405060708090a")}; // address
483  s >> WithParams(ser_params, addr);
484  BOOST_CHECK(!addr.IsValid());
485  BOOST_REQUIRE(s.empty());
486 
487  // TORv2, no longer supported.
488  s << Span{ParseHex("03" // network type (TORv2)
489  "0a" // address length
490  "f1f2f3f4f5f6f7f8f9fa")}; // address
491  s >> WithParams(ser_params, addr);
492  BOOST_CHECK(!addr.IsValid());
493  BOOST_REQUIRE(s.empty());
494 
495  // Valid TORv3.
496  s << Span{ParseHex("04" // network type (TORv3)
497  "20" // address length
498  "79bcc625184b05194975c28b66b66b04" // address
499  "69f7f6556fb1ac3189a79b40dda32f1f"
500  )};
501  s >> WithParams(ser_params, addr);
502  BOOST_CHECK(addr.IsValid());
503  BOOST_CHECK(addr.IsTor());
506  "pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion");
507  BOOST_REQUIRE(s.empty());
508 
509  // Invalid TORv3, with bogus length.
510  s << Span{ParseHex("04" // network type (TORv3)
511  "00" // address length
512  "00" // address
513  )};
514  BOOST_CHECK_EXCEPTION(s >> WithParams(ser_params, addr), std::ios_base::failure,
515  HasReason("BIP155 TORv3 address with length 0 (should be 32)"));
516  BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
517  s.clear();
518 
519  // Valid I2P.
520  s << Span{ParseHex("05" // network type (I2P)
521  "20" // address length
522  "a2894dabaec08c0051a481a6dac88b64" // address
523  "f98232ae42d4b6fd2fa81952dfe36a87")};
524  s >> WithParams(ser_params, addr);
525  BOOST_CHECK(addr.IsValid());
526  BOOST_CHECK(addr.IsI2P());
529  "ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p");
530  BOOST_REQUIRE(s.empty());
531 
532  // Invalid I2P, with bogus length.
533  s << Span{ParseHex("05" // network type (I2P)
534  "03" // address length
535  "00" // address
536  )};
537  BOOST_CHECK_EXCEPTION(s >> WithParams(ser_params, addr), std::ios_base::failure,
538  HasReason("BIP155 I2P address with length 3 (should be 32)"));
539  BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
540  s.clear();
541 
542  // Valid CJDNS.
543  s << Span{ParseHex("06" // network type (CJDNS)
544  "10" // address length
545  "fc000001000200030004000500060007" // address
546  )};
547  s >> WithParams(ser_params, addr);
548  BOOST_CHECK(addr.IsValid());
549  BOOST_CHECK(addr.IsCJDNS());
551  BOOST_CHECK_EQUAL(addr.ToStringAddr(), "fc00:1:2:3:4:5:6:7");
552  BOOST_REQUIRE(s.empty());
553 
554  // Invalid CJDNS, wrong prefix.
555  s << Span{ParseHex("06" // network type (CJDNS)
556  "10" // address length
557  "aa000001000200030004000500060007" // address
558  )};
559  s >> WithParams(ser_params, addr);
560  BOOST_CHECK(addr.IsCJDNS());
561  BOOST_CHECK(!addr.IsValid());
562  BOOST_REQUIRE(s.empty());
563 
564  // Invalid CJDNS, with bogus length.
565  s << Span{ParseHex("06" // network type (CJDNS)
566  "01" // address length
567  "00" // address
568  )};
569  BOOST_CHECK_EXCEPTION(s >> WithParams(ser_params, addr), std::ios_base::failure,
570  HasReason("BIP155 CJDNS address with length 1 (should be 16)"));
571  BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
572  s.clear();
573 
574  // Unknown, with extreme length.
575  s << Span{ParseHex("aa" // network type (unknown)
576  "fe00000002" // address length (CompactSize's MAX_SIZE)
577  "01020304050607" // address
578  )};
579  BOOST_CHECK_EXCEPTION(s >> WithParams(ser_params, addr), std::ios_base::failure,
580  HasReason("Address too long: 33554432 > 512"));
581  BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
582  s.clear();
583 
584  // Unknown, with reasonable length.
585  s << Span{ParseHex("aa" // network type (unknown)
586  "04" // address length
587  "01020304" // address
588  )};
589  s >> WithParams(ser_params, addr);
590  BOOST_CHECK(!addr.IsValid());
591  BOOST_REQUIRE(s.empty());
592 
593  // Unknown, with zero length.
594  s << Span{ParseHex("aa" // network type (unknown)
595  "00" // address length
596  "" // address
597  )};
598  s >> WithParams(ser_params, addr);
599  BOOST_CHECK(!addr.IsValid());
600  BOOST_REQUIRE(s.empty());
601 }
602 
603 // prior to PR #14728, this test triggers an undefined behavior
604 BOOST_AUTO_TEST_CASE(ipv4_peer_with_ipv6_addrMe_test)
605 {
606  // set up local addresses; all that's necessary to reproduce the bug is
607  // that a normal IPv4 address is among the entries, but if this address is
608  // !IsRoutable the undefined behavior is easier to trigger deterministically
609  in_addr raw_addr;
610  raw_addr.s_addr = htonl(0x7f000001);
611  const CNetAddr mapLocalHost_entry = CNetAddr(raw_addr);
612  {
614  LocalServiceInfo lsi;
615  lsi.nScore = 23;
616  lsi.nPort = 42;
617  mapLocalHost[mapLocalHost_entry] = lsi;
618  }
619 
620  // create a peer with an IPv4 address
621  in_addr ipv4AddrPeer;
622  ipv4AddrPeer.s_addr = 0xa0b0c001;
623  CAddress addr = CAddress(CService(ipv4AddrPeer, 7777), NODE_NETWORK);
624  std::unique_ptr<CNode> pnode = std::make_unique<CNode>(/*id=*/0,
625  /*sock=*/nullptr,
626  addr,
627  /*nKeyedNetGroupIn=*/0,
628  /*nLocalHostNonceIn=*/0,
629  CAddress{},
630  /*pszDest=*/std::string{},
632  /*inbound_onion=*/false);
633  pnode->fSuccessfullyConnected.store(true);
634 
635  // the peer claims to be reaching us via IPv6
636  in6_addr ipv6AddrLocal;
637  memset(ipv6AddrLocal.s6_addr, 0, 16);
638  ipv6AddrLocal.s6_addr[0] = 0xcc;
639  CAddress addrLocal = CAddress(CService(ipv6AddrLocal, 7777), NODE_NETWORK);
640  pnode->SetAddrLocal(addrLocal);
641 
642  // before patch, this causes undefined behavior detectable with clang's -fsanitize=memory
643  GetLocalAddrForPeer(*pnode);
644 
645  // suppress no-checks-run warning; if this test fails, it's by triggering a sanitizer
646  BOOST_CHECK(1);
647 
648  // Cleanup, so that we don't confuse other tests.
649  {
651  mapLocalHost.erase(mapLocalHost_entry);
652  }
653 }
654 
655 BOOST_AUTO_TEST_CASE(get_local_addr_for_peer_port)
656 {
657  // Test that GetLocalAddrForPeer() properly selects the address to self-advertise:
658  //
659  // 1. GetLocalAddrForPeer() calls GetLocalAddress() which returns an address that is
660  // not routable.
661  // 2. GetLocalAddrForPeer() overrides the address with whatever the peer has told us
662  // he sees us as.
663  // 2.1. For inbound connections we must override both the address and the port.
664  // 2.2. For outbound connections we must override only the address.
665 
666  // Pretend that we bound to this port.
667  const uint16_t bind_port = 20001;
668  m_node.args->ForceSetArg("-bind", strprintf("3.4.5.6:%u", bind_port));
669 
670  // Our address:port as seen from the peer, completely different from the above.
671  in_addr peer_us_addr;
672  peer_us_addr.s_addr = htonl(0x02030405);
673  const CService peer_us{peer_us_addr, 20002};
674 
675  // Create a peer with a routable IPv4 address (outbound).
676  in_addr peer_out_in_addr;
677  peer_out_in_addr.s_addr = htonl(0x01020304);
678  CNode peer_out{/*id=*/0,
679  /*sock=*/nullptr,
680  /*addrIn=*/CAddress{CService{peer_out_in_addr, 8333}, NODE_NETWORK},
681  /*nKeyedNetGroupIn=*/0,
682  /*nLocalHostNonceIn=*/0,
683  /*addrBindIn=*/CAddress{},
684  /*addrNameIn=*/std::string{},
685  /*conn_type_in=*/ConnectionType::OUTBOUND_FULL_RELAY,
686  /*inbound_onion=*/false};
687  peer_out.fSuccessfullyConnected = true;
688  peer_out.SetAddrLocal(peer_us);
689 
690  // Without the fix peer_us:8333 is chosen instead of the proper peer_us:bind_port.
691  auto chosen_local_addr = GetLocalAddrForPeer(peer_out);
692  BOOST_REQUIRE(chosen_local_addr);
693  const CService expected{peer_us_addr, bind_port};
694  BOOST_CHECK(*chosen_local_addr == expected);
695 
696  // Create a peer with a routable IPv4 address (inbound).
697  in_addr peer_in_in_addr;
698  peer_in_in_addr.s_addr = htonl(0x05060708);
699  CNode peer_in{/*id=*/0,
700  /*sock=*/nullptr,
701  /*addrIn=*/CAddress{CService{peer_in_in_addr, 8333}, NODE_NETWORK},
702  /*nKeyedNetGroupIn=*/0,
703  /*nLocalHostNonceIn=*/0,
704  /*addrBindIn=*/CAddress{},
705  /*addrNameIn=*/std::string{},
706  /*conn_type_in=*/ConnectionType::INBOUND,
707  /*inbound_onion=*/false};
708  peer_in.fSuccessfullyConnected = true;
709  peer_in.SetAddrLocal(peer_us);
710 
711  // Without the fix peer_us:8333 is chosen instead of the proper peer_us:peer_us.GetPort().
712  chosen_local_addr = GetLocalAddrForPeer(peer_in);
713  BOOST_REQUIRE(chosen_local_addr);
714  BOOST_CHECK(*chosen_local_addr == peer_us);
715 
716  m_node.args->ForceSetArg("-bind", "");
717 }
718 
719 BOOST_AUTO_TEST_CASE(LimitedAndReachable_Network)
720 {
726 
732 
738 
744 
750 }
751 
752 BOOST_AUTO_TEST_CASE(LimitedAndReachable_NetworkCaseUnroutableAndInternal)
753 {
754  // Should be reachable by default.
757 
759 
762 
770 }
771 
772 CNetAddr UtilBuildAddress(unsigned char p1, unsigned char p2, unsigned char p3, unsigned char p4)
773 {
774  unsigned char ip[] = {p1, p2, p3, p4};
775 
776  struct sockaddr_in sa;
777  memset(&sa, 0, sizeof(sockaddr_in)); // initialize the memory block
778  memcpy(&(sa.sin_addr), &ip, sizeof(ip));
779  return CNetAddr(sa.sin_addr);
780 }
781 
782 
783 BOOST_AUTO_TEST_CASE(LimitedAndReachable_CNetAddr)
784 {
785  CNetAddr addr = UtilBuildAddress(0x001, 0x001, 0x001, 0x001); // 1.1.1.1
786 
789 
792 
793  g_reachable_nets.Add(NET_IPV4); // have to reset this, because this is stateful.
794 }
795 
796 
797 BOOST_AUTO_TEST_CASE(LocalAddress_BasicLifecycle)
798 {
799  CService addr = CService(UtilBuildAddress(0x002, 0x001, 0x001, 0x001), 1000); // 2.1.1.1:1000
800 
802 
803  BOOST_CHECK(!IsLocal(addr));
804  BOOST_CHECK(AddLocal(addr, 1000));
805  BOOST_CHECK(IsLocal(addr));
806 
807  RemoveLocal(addr);
808  BOOST_CHECK(!IsLocal(addr));
809 }
810 
811 BOOST_AUTO_TEST_CASE(initial_advertise_from_version_message)
812 {
814 
815  // Tests the following scenario:
816  // * -bind=3.4.5.6:20001 is specified
817  // * we make an outbound connection to a peer
818  // * the peer reports he sees us as 2.3.4.5:20002 in the version message
819  // (20002 is a random port assigned by our OS for the outgoing TCP connection,
820  // we cannot accept connections to it)
821  // * we should self-advertise to that peer as 2.3.4.5:20001
822 
823  // Pretend that we bound to this port.
824  const uint16_t bind_port = 20001;
825  m_node.args->ForceSetArg("-bind", strprintf("3.4.5.6:%u", bind_port));
826  m_node.args->ForceSetArg("-capturemessages", "1");
827 
828  // Our address:port as seen from the peer - 2.3.4.5:20002 (different from the above).
829  in_addr peer_us_addr;
830  peer_us_addr.s_addr = htonl(0x02030405);
831  const CService peer_us{peer_us_addr, 20002};
832 
833  // Create a peer with a routable IPv4 address.
834  in_addr peer_in_addr;
835  peer_in_addr.s_addr = htonl(0x01020304);
836  CNode peer{/*id=*/0,
837  /*sock=*/nullptr,
838  /*addrIn=*/CAddress{CService{peer_in_addr, 8333}, NODE_NETWORK},
839  /*nKeyedNetGroupIn=*/0,
840  /*nLocalHostNonceIn=*/0,
841  /*addrBindIn=*/CAddress{},
842  /*addrNameIn=*/std::string{},
843  /*conn_type_in=*/ConnectionType::OUTBOUND_FULL_RELAY,
844  /*inbound_onion=*/false};
845 
846  const uint64_t services{NODE_NETWORK | NODE_WITNESS};
847  const int64_t time{0};
848  const CNetMsgMaker msg_maker{PROTOCOL_VERSION};
849 
850  // Force ChainstateManager::IsInitialBlockDownload() to return false.
851  // Otherwise PushAddress() isn't called by PeerManager::ProcessMessage().
852  auto& chainman = static_cast<TestChainstateManager&>(*m_node.chainman);
853  chainman.JumpOutOfIbd();
854 
855  m_node.peerman->InitializeNode(peer, NODE_NETWORK);
856 
857  std::atomic<bool> interrupt_dummy{false};
858  std::chrono::microseconds time_received_dummy{0};
859 
860  const auto msg_version =
861  msg_maker.Make(NetMsgType::VERSION, PROTOCOL_VERSION, services, time, services, CAddress::V1_NETWORK(peer_us));
862  CDataStream msg_version_stream{msg_version.data, SER_NETWORK, PROTOCOL_VERSION};
863 
864  m_node.peerman->ProcessMessage(
865  peer, NetMsgType::VERSION, msg_version_stream, time_received_dummy, interrupt_dummy);
866 
867  const auto msg_verack = msg_maker.Make(NetMsgType::VERACK);
868  CDataStream msg_verack_stream{msg_verack.data, SER_NETWORK, PROTOCOL_VERSION};
869 
870  // Will set peer.fSuccessfullyConnected to true (necessary in SendMessages()).
871  m_node.peerman->ProcessMessage(
872  peer, NetMsgType::VERACK, msg_verack_stream, time_received_dummy, interrupt_dummy);
873 
874  // Ensure that peer_us_addr:bind_port is sent to the peer.
875  const CService expected{peer_us_addr, bind_port};
876  bool sent{false};
877 
878  const auto CaptureMessageOrig = CaptureMessage;
879  CaptureMessage = [&sent, &expected](const CAddress& addr,
880  const std::string& msg_type,
882  bool is_incoming) -> void {
883  if (!is_incoming && msg_type == "addr") {
884  DataStream s{data};
885  std::vector<CAddress> addresses;
886 
887  s >> CAddress::V1_NETWORK(addresses);
888 
889  for (const auto& addr : addresses) {
890  if (addr == expected) {
891  sent = true;
892  return;
893  }
894  }
895  }
896  };
897 
898  m_node.peerman->SendMessages(&peer);
899 
900  BOOST_CHECK(sent);
901 
902  CaptureMessage = CaptureMessageOrig;
903  chainman.ResetIbd();
904  m_node.args->ForceSetArg("-capturemessages", "0");
905  m_node.args->ForceSetArg("-bind", "");
906  // PeerManager::ProcessMessage() calls AddTimeData() which changes the internal state
907  // in timedata.cpp and later confuses the test "timedata_tests/addtimedata". Thus reset
908  // that state as it was before our test was run.
910 }
911 
912 
913 BOOST_AUTO_TEST_CASE(advertise_local_address)
914 {
915  auto CreatePeer = [](const CAddress& addr) {
916  return std::make_unique<CNode>(/*id=*/0,
917  /*sock=*/nullptr,
918  addr,
919  /*nKeyedNetGroupIn=*/0,
920  /*nLocalHostNonceIn=*/0,
921  CAddress{},
922  /*pszDest=*/std::string{},
924  /*inbound_onion=*/false);
925  };
927 
928  CAddress addr_ipv4{Lookup("1.2.3.4", 8333, false).value(), NODE_NONE};
929  BOOST_REQUIRE(addr_ipv4.IsValid());
930  BOOST_REQUIRE(addr_ipv4.IsIPv4());
931 
932  CAddress addr_ipv6{Lookup("1122:3344:5566:7788:9900:aabb:ccdd:eeff", 8333, false).value(), NODE_NONE};
933  BOOST_REQUIRE(addr_ipv6.IsValid());
934  BOOST_REQUIRE(addr_ipv6.IsIPv6());
935 
936  CAddress addr_ipv6_tunnel{Lookup("2002:3344:5566:7788:9900:aabb:ccdd:eeff", 8333, false).value(), NODE_NONE};
937  BOOST_REQUIRE(addr_ipv6_tunnel.IsValid());
938  BOOST_REQUIRE(addr_ipv6_tunnel.IsIPv6());
939  BOOST_REQUIRE(addr_ipv6_tunnel.IsRFC3964());
940 
941  CAddress addr_teredo{Lookup("2001:0000:5566:7788:9900:aabb:ccdd:eeff", 8333, false).value(), NODE_NONE};
942  BOOST_REQUIRE(addr_teredo.IsValid());
943  BOOST_REQUIRE(addr_teredo.IsIPv6());
944  BOOST_REQUIRE(addr_teredo.IsRFC4380());
945 
946  CAddress addr_onion;
947  BOOST_REQUIRE(addr_onion.SetSpecial("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion"));
948  BOOST_REQUIRE(addr_onion.IsValid());
949  BOOST_REQUIRE(addr_onion.IsTor());
950 
951  CAddress addr_i2p;
952  BOOST_REQUIRE(addr_i2p.SetSpecial("udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p"));
953  BOOST_REQUIRE(addr_i2p.IsValid());
954  BOOST_REQUIRE(addr_i2p.IsI2P());
955 
956  CService service_cjdns{Lookup("fc00:3344:5566:7788:9900:aabb:ccdd:eeff", 8333, false).value(), NODE_NONE};
957  CAddress addr_cjdns{MaybeFlipIPv6toCJDNS(service_cjdns), NODE_NONE};
958  BOOST_REQUIRE(addr_cjdns.IsValid());
959  BOOST_REQUIRE(addr_cjdns.IsCJDNS());
960 
961  const auto peer_ipv4{CreatePeer(addr_ipv4)};
962  const auto peer_ipv6{CreatePeer(addr_ipv6)};
963  const auto peer_ipv6_tunnel{CreatePeer(addr_ipv6_tunnel)};
964  const auto peer_teredo{CreatePeer(addr_teredo)};
965  const auto peer_onion{CreatePeer(addr_onion)};
966  const auto peer_i2p{CreatePeer(addr_i2p)};
967  const auto peer_cjdns{CreatePeer(addr_cjdns)};
968 
969  // one local clearnet address - advertise to all but privacy peers
970  AddLocal(addr_ipv4);
971  BOOST_CHECK(GetLocalAddress(*peer_ipv4) == addr_ipv4);
972  BOOST_CHECK(GetLocalAddress(*peer_ipv6) == addr_ipv4);
973  BOOST_CHECK(GetLocalAddress(*peer_ipv6_tunnel) == addr_ipv4);
974  BOOST_CHECK(GetLocalAddress(*peer_teredo) == addr_ipv4);
975  BOOST_CHECK(GetLocalAddress(*peer_cjdns) == addr_ipv4);
976  BOOST_CHECK(!GetLocalAddress(*peer_onion).IsValid());
977  BOOST_CHECK(!GetLocalAddress(*peer_i2p).IsValid());
978  RemoveLocal(addr_ipv4);
979 
980  // local privacy addresses - don't advertise to clearnet peers
981  AddLocal(addr_onion);
982  AddLocal(addr_i2p);
983  BOOST_CHECK(!GetLocalAddress(*peer_ipv4).IsValid());
984  BOOST_CHECK(!GetLocalAddress(*peer_ipv6).IsValid());
985  BOOST_CHECK(!GetLocalAddress(*peer_ipv6_tunnel).IsValid());
986  BOOST_CHECK(!GetLocalAddress(*peer_teredo).IsValid());
987  BOOST_CHECK(!GetLocalAddress(*peer_cjdns).IsValid());
988  BOOST_CHECK(GetLocalAddress(*peer_onion) == addr_onion);
989  BOOST_CHECK(GetLocalAddress(*peer_i2p) == addr_i2p);
990  RemoveLocal(addr_onion);
991  RemoveLocal(addr_i2p);
992 
993  // local addresses from all networks
994  AddLocal(addr_ipv4);
995  AddLocal(addr_ipv6);
996  AddLocal(addr_ipv6_tunnel);
997  AddLocal(addr_teredo);
998  AddLocal(addr_onion);
999  AddLocal(addr_i2p);
1000  AddLocal(addr_cjdns);
1001  BOOST_CHECK(GetLocalAddress(*peer_ipv4) == addr_ipv4);
1002  BOOST_CHECK(GetLocalAddress(*peer_ipv6) == addr_ipv6);
1003  BOOST_CHECK(GetLocalAddress(*peer_ipv6_tunnel) == addr_ipv6);
1004  BOOST_CHECK(GetLocalAddress(*peer_teredo) == addr_ipv4);
1005  BOOST_CHECK(GetLocalAddress(*peer_onion) == addr_onion);
1006  BOOST_CHECK(GetLocalAddress(*peer_i2p) == addr_i2p);
1007  BOOST_CHECK(GetLocalAddress(*peer_cjdns) == addr_cjdns);
1008  RemoveLocal(addr_ipv4);
1009  RemoveLocal(addr_ipv6);
1010  RemoveLocal(addr_ipv6_tunnel);
1011  RemoveLocal(addr_teredo);
1012  RemoveLocal(addr_onion);
1013  RemoveLocal(addr_i2p);
1014  RemoveLocal(addr_cjdns);
1015 }
1016 
1017 namespace {
1018 
1019 CKey GenerateRandomTestKey() noexcept
1020 {
1021  CKey key;
1022  uint256 key_data = InsecureRand256();
1023  key.Set(key_data.begin(), key_data.end(), true);
1024  return key;
1025 }
1026 
1035 class V2TransportTester
1036 {
1037  V2Transport m_transport;
1038  BIP324Cipher m_cipher;
1039  bool m_test_initiator;
1040 
1041  std::vector<uint8_t> m_sent_garbage;
1042  std::vector<uint8_t> m_recv_garbage;
1043  std::vector<uint8_t> m_to_send;
1044  std::vector<uint8_t> m_received;
1045  std::deque<CSerializedNetMsg> m_msg_to_send;
1046  bool m_sent_aad{false};
1047 
1048 public:
1050  V2TransportTester(bool test_initiator) :
1051  m_transport(0, test_initiator, SER_NETWORK, INIT_PROTO_VERSION),
1052  m_cipher{GenerateRandomTestKey(), MakeByteSpan(InsecureRand256())},
1053  m_test_initiator(test_initiator) {}
1054 
1062  using InteractResult = std::optional<std::vector<std::optional<CNetMessage>>>;
1063 
1069  InteractResult Interact()
1070  {
1071  std::vector<std::optional<CNetMessage>> ret;
1072  while (true) {
1073  bool progress{false};
1074  // Send bytes from m_to_send to the transport.
1075  if (!m_to_send.empty()) {
1076  Span<const uint8_t> to_send = Span{m_to_send}.first(1 + InsecureRandRange(m_to_send.size()));
1077  size_t old_len = to_send.size();
1078  if (!m_transport.ReceivedBytes(to_send)) {
1079  return std::nullopt; // transport error occurred
1080  }
1081  if (old_len != to_send.size()) {
1082  progress = true;
1083  m_to_send.erase(m_to_send.begin(), m_to_send.begin() + (old_len - to_send.size()));
1084  }
1085  }
1086  // Retrieve messages received by the transport.
1087  if (m_transport.ReceivedMessageComplete() && (!progress || InsecureRandBool())) {
1088  bool reject{false};
1089  auto msg = m_transport.GetReceivedMessage({}, reject);
1090  if (reject) {
1091  ret.emplace_back(std::nullopt);
1092  } else {
1093  ret.emplace_back(std::move(msg));
1094  }
1095  progress = true;
1096  }
1097  // Enqueue a message to be sent by the transport to us.
1098  if (!m_msg_to_send.empty() && (!progress || InsecureRandBool())) {
1099  if (m_transport.SetMessageToSend(m_msg_to_send.front())) {
1100  m_msg_to_send.pop_front();
1101  progress = true;
1102  }
1103  }
1104  // Receive bytes from the transport.
1105  const auto& [recv_bytes, _more, _msg_type] = m_transport.GetBytesToSend(!m_msg_to_send.empty());
1106  if (!recv_bytes.empty() && (!progress || InsecureRandBool())) {
1107  size_t to_receive = 1 + InsecureRandRange(recv_bytes.size());
1108  m_received.insert(m_received.end(), recv_bytes.begin(), recv_bytes.begin() + to_receive);
1109  progress = true;
1110  m_transport.MarkBytesSent(to_receive);
1111  }
1112  if (!progress) break;
1113  }
1114  return ret;
1115  }
1116 
1118  BIP324Cipher& GetCipher() { return m_cipher; }
1119 
1121  void Send(Span<const uint8_t> data)
1122  {
1123  m_to_send.insert(m_to_send.end(), data.begin(), data.end());
1124  }
1125 
1127  void SendV1Version(const MessageStartChars& magic)
1128  {
1129  CMessageHeader hdr(magic, "version", 126 + InsecureRandRange(11));
1131  ser << hdr;
1132  m_to_send.insert(m_to_send.end(), UCharCast(ser.data()), UCharCast(ser.data() + ser.size()));
1133  }
1134 
1136  void Send(Span<const std::byte> data) { Send(MakeUCharSpan(data)); }
1137 
1139  void SendKey() { Send(m_cipher.GetOurPubKey()); }
1140 
1142  void SendGarbage(Span<const uint8_t> garbage)
1143  {
1144  // Remember the specified garbage (so we can use it as AAD).
1145  m_sent_garbage.assign(garbage.begin(), garbage.end());
1146  // Schedule it for sending.
1147  Send(m_sent_garbage);
1148  }
1149 
1151  void SendGarbage(size_t garbage_len)
1152  {
1153  // Generate random garbage and send it.
1154  SendGarbage(g_insecure_rand_ctx.randbytes<uint8_t>(garbage_len));
1155  }
1156 
1158  void SendGarbage()
1159  {
1161  }
1162 
1164  void AddMessage(std::string m_type, std::vector<uint8_t> payload)
1165  {
1167  msg.m_type = std::move(m_type);
1168  msg.data = std::move(payload);
1169  m_msg_to_send.push_back(std::move(msg));
1170  }
1171 
1177  void ReceiveKey()
1178  {
1179  // When processing a key, enough bytes need to have been received already.
1180  BOOST_REQUIRE(m_received.size() >= EllSwiftPubKey::size());
1181  // Initialize the cipher using it (acting as the opposite side of the tested transport).
1182  m_cipher.Initialize(MakeByteSpan(m_received).first(EllSwiftPubKey::size()), !m_test_initiator);
1183  // Strip the processed bytes off the front of the receive buffer.
1184  m_received.erase(m_received.begin(), m_received.begin() + EllSwiftPubKey::size());
1185  }
1186 
1189  void SendPacket(Span<const uint8_t> content, Span<const uint8_t> aad = {}, bool ignore = false)
1190  {
1191  // Use cipher to construct ciphertext.
1192  std::vector<std::byte> ciphertext;
1193  ciphertext.resize(content.size() + BIP324Cipher::EXPANSION);
1194  m_cipher.Encrypt(
1195  /*contents=*/MakeByteSpan(content),
1196  /*aad=*/MakeByteSpan(aad),
1197  /*ignore=*/ignore,
1198  /*output=*/ciphertext);
1199  // Schedule it for sending.
1200  Send(ciphertext);
1201  }
1202 
1204  void SendGarbageTerm()
1205  {
1206  // Schedule the garbage terminator to be sent.
1207  Send(m_cipher.GetSendGarbageTerminator());
1208  }
1209 
1211  void SendVersion(Span<const uint8_t> version_data = {}, bool vers_ignore = false)
1212  {
1214  // Set AAD to garbage only for first packet.
1215  if (!m_sent_aad) aad = m_sent_garbage;
1216  SendPacket(/*content=*/version_data, /*aad=*/aad, /*ignore=*/vers_ignore);
1217  m_sent_aad = true;
1218  }
1219 
1223  std::vector<uint8_t> ReceivePacket(Span<const std::byte> aad = {})
1224  {
1225  std::vector<uint8_t> contents;
1226  // Loop as long as there are ignored packets that are to be skipped.
1227  while (true) {
1228  // When processing a packet, at least enough bytes for its length descriptor must be received.
1229  BOOST_REQUIRE(m_received.size() >= BIP324Cipher::LENGTH_LEN);
1230  // Decrypt the content length.
1231  size_t size = m_cipher.DecryptLength(MakeByteSpan(Span{m_received}.first(BIP324Cipher::LENGTH_LEN)));
1232  // Check that the full packet is in the receive buffer.
1233  BOOST_REQUIRE(m_received.size() >= size + BIP324Cipher::EXPANSION);
1234  // Decrypt the packet contents.
1235  contents.resize(size);
1236  bool ignore{false};
1237  bool ret = m_cipher.Decrypt(
1238  /*input=*/MakeByteSpan(
1239  Span{m_received}.first(size + BIP324Cipher::EXPANSION).subspan(BIP324Cipher::LENGTH_LEN)),
1240  /*aad=*/aad,
1241  /*ignore=*/ignore,
1242  /*contents=*/MakeWritableByteSpan(contents));
1243  BOOST_CHECK(ret);
1244  // Don't expect AAD in further packets.
1245  aad = {};
1246  // Strip the processed packet's bytes off the front of the receive buffer.
1247  m_received.erase(m_received.begin(), m_received.begin() + size + BIP324Cipher::EXPANSION);
1248  // Stop if the ignore bit is not set on this packet.
1249  if (!ignore) break;
1250  }
1251  return contents;
1252  }
1253 
1256  void ReceiveGarbage()
1257  {
1258  // Figure out the garbage length.
1259  size_t garblen;
1260  for (garblen = 0; garblen <= V2Transport::MAX_GARBAGE_LEN; ++garblen) {
1261  BOOST_REQUIRE(m_received.size() >= garblen + BIP324Cipher::GARBAGE_TERMINATOR_LEN);
1262  auto term_span = MakeByteSpan(Span{m_received}.subspan(garblen, BIP324Cipher::GARBAGE_TERMINATOR_LEN));
1263  if (term_span == m_cipher.GetReceiveGarbageTerminator()) break;
1264  }
1265  // Copy the garbage to a buffer.
1266  m_recv_garbage.assign(m_received.begin(), m_received.begin() + garblen);
1267  // Strip garbage + garbage terminator off the front of the receive buffer.
1268  m_received.erase(m_received.begin(), m_received.begin() + garblen + BIP324Cipher::GARBAGE_TERMINATOR_LEN);
1269  }
1270 
1272  void ReceiveVersion()
1273  {
1274  auto contents = ReceivePacket(/*aad=*/MakeByteSpan(m_recv_garbage));
1275  // Version packets from real BIP324 peers are expected to be empty, despite the fact that
1276  // this class supports *sending* non-empty version packets (to test that BIP324 peers
1277  // correctly ignore version packet contents).
1278  BOOST_CHECK(contents.empty());
1279  }
1280 
1283  void ReceiveMessage(uint8_t short_id, Span<const uint8_t> payload)
1284  {
1285  auto ret = ReceivePacket();
1286  BOOST_CHECK(ret.size() == payload.size() + 1);
1287  BOOST_CHECK(ret[0] == short_id);
1288  BOOST_CHECK(Span{ret}.subspan(1) == payload);
1289  }
1290 
1293  void ReceiveMessage(const std::string& m_type, Span<const uint8_t> payload)
1294  {
1295  auto ret = ReceivePacket();
1296  BOOST_REQUIRE(ret.size() == payload.size() + 1 + CMessageHeader::COMMAND_SIZE);
1297  BOOST_CHECK(ret[0] == 0);
1298  for (unsigned i = 0; i < 12; ++i) {
1299  if (i < m_type.size()) {
1300  BOOST_CHECK(ret[1 + i] == m_type[i]);
1301  } else {
1302  BOOST_CHECK(ret[1 + i] == 0);
1303  }
1304  }
1305  BOOST_CHECK(Span{ret}.subspan(1 + CMessageHeader::COMMAND_SIZE) == payload);
1306  }
1307 
1310  void SendMessage(std::string mtype, Span<const uint8_t> payload)
1311  {
1312  // Construct contents consisting of 0x00 + 12-byte message type + payload.
1313  std::vector<uint8_t> contents(1 + CMessageHeader::COMMAND_SIZE + payload.size());
1314  std::copy(mtype.begin(), mtype.end(), reinterpret_cast<char*>(contents.data() + 1));
1315  std::copy(payload.begin(), payload.end(), contents.begin() + 1 + CMessageHeader::COMMAND_SIZE);
1316  // Send a packet with that as contents.
1317  SendPacket(contents);
1318  }
1319 
1322  void SendMessage(uint8_t short_id, Span<const uint8_t> payload)
1323  {
1324  // Construct contents consisting of short_id + payload.
1325  std::vector<uint8_t> contents(1 + payload.size());
1326  contents[0] = short_id;
1327  std::copy(payload.begin(), payload.end(), contents.begin() + 1);
1328  // Send a packet with that as contents.
1329  SendPacket(contents);
1330  }
1331 
1333  void CompareSessionIDs() const
1334  {
1335  auto info = m_transport.GetInfo();
1336  BOOST_CHECK(info.session_id);
1337  BOOST_CHECK(uint256(MakeUCharSpan(m_cipher.GetSessionID())) == *info.session_id);
1338  }
1339 
1341  void Damage()
1342  {
1343  m_to_send[InsecureRandRange(m_to_send.size())] ^= (uint8_t{1} << InsecureRandRange(8));
1344  }
1345 };
1346 
1347 } // namespace
1348 
1349 BOOST_AUTO_TEST_CASE(v2transport_test)
1350 {
1351  // A mostly normal scenario, testing a transport in initiator mode.
1352  for (int i = 0; i < 10; ++i) {
1353  V2TransportTester tester(true);
1354  auto ret = tester.Interact();
1355  BOOST_REQUIRE(ret && ret->empty());
1356  tester.SendKey();
1357  tester.SendGarbage();
1358  tester.ReceiveKey();
1359  tester.SendGarbageTerm();
1360  tester.SendVersion();
1361  ret = tester.Interact();
1362  BOOST_REQUIRE(ret && ret->empty());
1363  tester.ReceiveGarbage();
1364  tester.ReceiveVersion();
1365  tester.CompareSessionIDs();
1366  auto msg_data_1 = g_insecure_rand_ctx.randbytes<uint8_t>(InsecureRandRange(100000));
1367  auto msg_data_2 = g_insecure_rand_ctx.randbytes<uint8_t>(InsecureRandRange(1000));
1368  tester.SendMessage(uint8_t(4), msg_data_1); // cmpctblock short id
1369  tester.SendMessage(0, {}); // Invalidly encoded message
1370  tester.SendMessage("tx", msg_data_2); // 12-character encoded message type
1371  ret = tester.Interact();
1372  BOOST_REQUIRE(ret && ret->size() == 3);
1373  BOOST_CHECK((*ret)[0] && (*ret)[0]->m_type == "cmpctblock" && Span{(*ret)[0]->m_recv} == MakeByteSpan(msg_data_1));
1374  BOOST_CHECK(!(*ret)[1]);
1375  BOOST_CHECK((*ret)[2] && (*ret)[2]->m_type == "tx" && Span{(*ret)[2]->m_recv} == MakeByteSpan(msg_data_2));
1376 
1377  // Then send a message with a bit error, expecting failure. It's possible this failure does
1378  // not occur immediately (when the length descriptor was modified), but it should come
1379  // eventually, and no messages can be delivered anymore.
1380  tester.SendMessage("bad", msg_data_1);
1381  tester.Damage();
1382  while (true) {
1383  ret = tester.Interact();
1384  if (!ret) break; // failure
1385  BOOST_CHECK(ret->size() == 0); // no message can be delivered
1386  // Send another message.
1387  auto msg_data_3 = g_insecure_rand_ctx.randbytes<uint8_t>(InsecureRandRange(10000));
1388  tester.SendMessage(uint8_t(12), msg_data_3); // getheaders short id
1389  }
1390  }
1391 
1392  // Normal scenario, with a transport in responder node.
1393  for (int i = 0; i < 10; ++i) {
1394  V2TransportTester tester(false);
1395  tester.SendKey();
1396  tester.SendGarbage();
1397  auto ret = tester.Interact();
1398  BOOST_REQUIRE(ret && ret->empty());
1399  tester.ReceiveKey();
1400  tester.SendGarbageTerm();
1401  tester.SendVersion();
1402  ret = tester.Interact();
1403  BOOST_REQUIRE(ret && ret->empty());
1404  tester.ReceiveGarbage();
1405  tester.ReceiveVersion();
1406  tester.CompareSessionIDs();
1407  auto msg_data_1 = g_insecure_rand_ctx.randbytes<uint8_t>(InsecureRandRange(100000));
1408  auto msg_data_2 = g_insecure_rand_ctx.randbytes<uint8_t>(InsecureRandRange(1000));
1409  tester.SendMessage(uint8_t(14), msg_data_1); // inv short id
1410  tester.SendMessage(uint8_t(19), msg_data_2); // pong short id
1411  ret = tester.Interact();
1412  BOOST_REQUIRE(ret && ret->size() == 2);
1413  BOOST_CHECK((*ret)[0] && (*ret)[0]->m_type == "inv" && Span{(*ret)[0]->m_recv} == MakeByteSpan(msg_data_1));
1414  BOOST_CHECK((*ret)[1] && (*ret)[1]->m_type == "pong" && Span{(*ret)[1]->m_recv} == MakeByteSpan(msg_data_2));
1415 
1416  // Then send a too-large message.
1417  auto msg_data_3 = g_insecure_rand_ctx.randbytes<uint8_t>(4005000);
1418  tester.SendMessage(uint8_t(11), msg_data_3); // getdata short id
1419  ret = tester.Interact();
1420  BOOST_CHECK(!ret);
1421  }
1422 
1423  // Various valid but unusual scenarios.
1424  for (int i = 0; i < 50; ++i) {
1426  bool initiator = InsecureRandBool();
1428  size_t garb_len = InsecureRandBool() ? 0 : V2Transport::MAX_GARBAGE_LEN;
1430  unsigned num_ignore_version = InsecureRandRange(10);
1432  auto ver_data = g_insecure_rand_ctx.randbytes<uint8_t>(InsecureRandBool() ? 0 : InsecureRandRange(1000));
1434  bool send_immediately = !initiator || InsecureRandBool();
1436  unsigned num_decoys_1 = InsecureRandRange(1000), num_decoys_2 = InsecureRandRange(1000);
1437  V2TransportTester tester(initiator);
1438  if (send_immediately) {
1439  tester.SendKey();
1440  tester.SendGarbage(garb_len);
1441  }
1442  auto ret = tester.Interact();
1443  BOOST_REQUIRE(ret && ret->empty());
1444  if (!send_immediately) {
1445  tester.SendKey();
1446  tester.SendGarbage(garb_len);
1447  }
1448  tester.ReceiveKey();
1449  tester.SendGarbageTerm();
1450  for (unsigned v = 0; v < num_ignore_version; ++v) {
1451  size_t ver_ign_data_len = InsecureRandBool() ? 0 : InsecureRandRange(1000);
1452  auto ver_ign_data = g_insecure_rand_ctx.randbytes<uint8_t>(ver_ign_data_len);
1453  tester.SendVersion(ver_ign_data, true);
1454  }
1455  tester.SendVersion(ver_data, false);
1456  ret = tester.Interact();
1457  BOOST_REQUIRE(ret && ret->empty());
1458  tester.ReceiveGarbage();
1459  tester.ReceiveVersion();
1460  tester.CompareSessionIDs();
1461  for (unsigned d = 0; d < num_decoys_1; ++d) {
1462  auto decoy_data = g_insecure_rand_ctx.randbytes<uint8_t>(InsecureRandRange(1000));
1463  tester.SendPacket(/*content=*/decoy_data, /*aad=*/{}, /*ignore=*/true);
1464  }
1465  auto msg_data_1 = g_insecure_rand_ctx.randbytes<uint8_t>(InsecureRandRange(4000000));
1466  tester.SendMessage(uint8_t(28), msg_data_1);
1467  for (unsigned d = 0; d < num_decoys_2; ++d) {
1468  auto decoy_data = g_insecure_rand_ctx.randbytes<uint8_t>(InsecureRandRange(1000));
1469  tester.SendPacket(/*content=*/decoy_data, /*aad=*/{}, /*ignore=*/true);
1470  }
1471  auto msg_data_2 = g_insecure_rand_ctx.randbytes<uint8_t>(InsecureRandRange(1000));
1472  tester.SendMessage(uint8_t(13), msg_data_2); // headers short id
1473  // Send invalidly-encoded message
1474  tester.SendMessage(std::string("blocktxn\x00\x00\x00a", CMessageHeader::COMMAND_SIZE), {});
1475  tester.SendMessage("foobar", {}); // test receiving unknown message type
1476  tester.AddMessage("barfoo", {}); // test sending unknown message type
1477  ret = tester.Interact();
1478  BOOST_REQUIRE(ret && ret->size() == 4);
1479  BOOST_CHECK((*ret)[0] && (*ret)[0]->m_type == "addrv2" && Span{(*ret)[0]->m_recv} == MakeByteSpan(msg_data_1));
1480  BOOST_CHECK((*ret)[1] && (*ret)[1]->m_type == "headers" && Span{(*ret)[1]->m_recv} == MakeByteSpan(msg_data_2));
1481  BOOST_CHECK(!(*ret)[2]);
1482  BOOST_CHECK((*ret)[3] && (*ret)[3]->m_type == "foobar" && (*ret)[3]->m_recv.empty());
1483  tester.ReceiveMessage("barfoo", {});
1484  }
1485 
1486  // Too long garbage (initiator).
1487  {
1488  V2TransportTester tester(true);
1489  auto ret = tester.Interact();
1490  BOOST_REQUIRE(ret && ret->empty());
1491  tester.SendKey();
1492  tester.SendGarbage(V2Transport::MAX_GARBAGE_LEN + 1);
1493  tester.ReceiveKey();
1494  tester.SendGarbageTerm();
1495  ret = tester.Interact();
1496  BOOST_CHECK(!ret);
1497  }
1498 
1499  // Too long garbage (responder).
1500  {
1501  V2TransportTester tester(false);
1502  tester.SendKey();
1503  tester.SendGarbage(V2Transport::MAX_GARBAGE_LEN + 1);
1504  auto ret = tester.Interact();
1505  BOOST_REQUIRE(ret && ret->empty());
1506  tester.ReceiveKey();
1507  tester.SendGarbageTerm();
1508  ret = tester.Interact();
1509  BOOST_CHECK(!ret);
1510  }
1511 
1512  // Send garbage that includes the first 15 garbage terminator bytes somewhere.
1513  {
1514  V2TransportTester tester(true);
1515  auto ret = tester.Interact();
1516  BOOST_REQUIRE(ret && ret->empty());
1517  tester.SendKey();
1518  tester.ReceiveKey();
1520  size_t len_before = InsecureRandRange(V2Transport::MAX_GARBAGE_LEN - 16 + 1);
1522  size_t len_after = InsecureRandRange(V2Transport::MAX_GARBAGE_LEN - 16 - len_before + 1);
1523  // Construct len_before + 16 + len_after random bytes.
1524  auto garbage = g_insecure_rand_ctx.randbytes<uint8_t>(len_before + 16 + len_after);
1525  // Replace the designed 16 bytes in the middle with the to-be-sent garbage terminator.
1526  auto garb_term = MakeUCharSpan(tester.GetCipher().GetSendGarbageTerminator());
1527  std::copy(garb_term.begin(), garb_term.begin() + 16, garbage.begin() + len_before);
1528  // Introduce a bit error in the last byte of that copied garbage terminator, making only
1529  // the first 15 of them match.
1530  garbage[len_before + 15] ^= (uint8_t(1) << InsecureRandRange(8));
1531  tester.SendGarbage(garbage);
1532  tester.SendGarbageTerm();
1533  tester.SendVersion();
1534  ret = tester.Interact();
1535  BOOST_REQUIRE(ret && ret->empty());
1536  tester.ReceiveGarbage();
1537  tester.ReceiveVersion();
1538  tester.CompareSessionIDs();
1539  auto msg_data_1 = g_insecure_rand_ctx.randbytes<uint8_t>(4000000); // test that receiving 4M payload works
1540  auto msg_data_2 = g_insecure_rand_ctx.randbytes<uint8_t>(4000000); // test that sending 4M payload works
1541  tester.SendMessage(uint8_t(InsecureRandRange(223) + 33), {}); // unknown short id
1542  tester.SendMessage(uint8_t(2), msg_data_1); // "block" short id
1543  tester.AddMessage("blocktxn", msg_data_2); // schedule blocktxn to be sent to us
1544  ret = tester.Interact();
1545  BOOST_REQUIRE(ret && ret->size() == 2);
1546  BOOST_CHECK(!(*ret)[0]);
1547  BOOST_CHECK((*ret)[1] && (*ret)[1]->m_type == "block" && Span{(*ret)[1]->m_recv} == MakeByteSpan(msg_data_1));
1548  tester.ReceiveMessage(uint8_t(3), msg_data_2); // "blocktxn" short id
1549  }
1550 
1551  // Send correct network's V1 header
1552  {
1553  V2TransportTester tester(false);
1554  tester.SendV1Version(Params().MessageStart());
1555  auto ret = tester.Interact();
1556  BOOST_CHECK(ret);
1557  }
1558 
1559  // Send wrong network's V1 header
1560  {
1561  V2TransportTester tester(false);
1562  tester.SendV1Version(CChainParams::Main()->MessageStart());
1563  auto ret = tester.Interact();
1564  BOOST_CHECK(!ret);
1565  }
1566 }
1567 
static Mutex g_msgproc_mutex
Mutex for anything that is only accessed via the msg processing thread.
Definition: net.h:1007
Span< const std::byte > GetSendGarbageTerminator() const noexcept
Get the Garbage Terminator to send.
Definition: bip324.h:90
CONSTEXPR_IF_NOT_DEBUG Span< C > first(std::size_t count) const noexcept
Definition: span.h:204
CONSTEXPR_IF_NOT_DEBUG Span< C > subspan(std::size_t offset) const noexcept
Definition: span.h:194
int ret
void Remove(Network net) EXCLUSIVE_LOCKS_REQUIRED(!m_mutex)
Definition: netbase.h:80
std::vector< Byte > ParseHex(std::string_view hex_str)
Like TryParseHex, but returns an empty vector on invalid input.
Definition: strencodings.h:65
Inbound connections are those initiated by a peer.
A set of addresses that represent the hash of a string or FQDN.
Definition: netaddress.h:57
constexpr C * end() const noexcept
Definition: span.h:175
static bool InsecureRandBool()
Definition: random.h:65
BOOST_AUTO_TEST_CASE(cnode_listen_port)
Definition: net_tests.cpp:39
node::NodeContext m_node
Definition: bitcoin-gui.cpp:37
CService GetLocalAddress(const CNode &peer)
Definition: net.cpp:217
#define strprintf
Format arguments and return the string or write to given std::ostream (see tinyformat::format doc for...
Definition: tinyformat.h:1162
IPv4.
Definition: netaddress.h:41
bool IsIPv6() const
Definition: netaddress.h:162
void Add(Network net) EXCLUSIVE_LOCKS_REQUIRED(!m_mutex)
Definition: netbase.h:73
static constexpr size_t size()
Definition: pubkey.h:321
void TestOnlyResetTimeData()
Reset the internal state of GetTimeOffset(), GetAdjustedTime() and AddTimeData(). ...
Definition: timedata.cpp:114
Span< std::byte > MakeWritableByteSpan(V &&v) noexcept
Definition: span.h:264
constexpr std::size_t size() const noexcept
Definition: span.h:186
static constexpr SerParams V2_NETWORK
Definition: protocol.h:405
CNetAddr UtilBuildAddress(unsigned char p1, unsigned char p2, unsigned char p3, unsigned char p4)
Definition: net_tests.cpp:772
static constexpr uint32_t MAX_GARBAGE_LEN
Definition: net.h:643
void Initialize(const EllSwiftPubKey &their_pubkey, bool initiator, bool self_decrypt=false) noexcept
Initialize when the other side&#39;s public key is received.
Definition: bip324.cpp:34
unsigned DecryptLength(Span< const std::byte > input) noexcept
Decrypt the length of a packet.
Definition: bip324.cpp:89
bool Contains(Network net) const EXCLUSIVE_LOCKS_REQUIRED(!m_mutex)
Definition: netbase.h:94
bool IsInternal() const
Definition: netaddress.cpp:473
bool IsBindAny() const
Definition: netaddress.cpp:304
CService MaybeFlipIPv6toCJDNS(const CService &service)
If an IPv6 address belongs to the address range used by the CJDNS network and the CJDNS network is re...
Definition: netbase.cpp:779
bool SetSpecial(const std::string &addr)
Parse a Tor or I2P address and set this object to it.
Definition: netaddress.cpp:208
void ForceSetArg(const std::string &strArg, const std::string &strValue)
Definition: args.cpp:545
These are the default connections that we use to connect with the network.
bool SoftSetArg(const std::string &strArg, const std::string &strValue)
Set an argument if it doesn&#39;t already have a value.
Definition: args.cpp:529
The BIP324 packet cipher, encapsulating its key derivation, stream cipher, and AEAD.
Definition: bip324.h:19
BytesToSend GetBytesToSend(bool have_next_message) const noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex)
Get bytes to send on the wire, if any, along with other information about it.
Definition: net.cpp:1483
I2P.
Definition: netaddress.h:50
static std::unique_ptr< const CChainParams > Main()
value_type * data()
Definition: streams.h:234
bool ReceivedMessageComplete() const noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex)
Returns true if the current message is complete (so GetReceivedMessage can be called).
Definition: net.cpp:1039
constexpr unsigned char * begin()
Definition: uint256.h:68
std::string ToStringAddr() const
Definition: netaddress.cpp:581
bool IsValid() const
Definition: netaddress.cpp:425
std::function< void(const CAddress &addr, const std::string &msg_type, Span< const unsigned char > data, bool is_incoming)> CaptureMessage
Defaults to CaptureMessageToFile(), but can be overridden by unit tests.
Definition: net.cpp:3873
uint16_t nPort
Definition: net.h:178
bool IsCJDNS() const
Definition: netaddress.h:180
std::array< uint8_t, 4 > MessageStartChars
void JumpOutOfIbd()
Toggle IsInitialBlockDownload from true to false.
Definition: validation.cpp:18
bool IsIPv4() const
Definition: netaddress.h:161
std::string ToString(const T &t)
Locale-independent version of std::to_string.
Definition: string.h:109
bool IsI2P() const
Definition: netaddress.h:179
Span< const std::byte > GetSessionID() const noexcept
Get the Session ID.
Definition: bip324.h:87
uint16_t GetListenPort()
Definition: net.cpp:134
std::optional< CService > GetLocalAddrForPeer(CNode &node)
Returns a local address that we should advertise to this peer.
Definition: net.cpp:237
static constexpr unsigned GARBAGE_TERMINATOR_LEN
Definition: bip324.h:23
static uint64_t InsecureRandRange(uint64_t range)
Definition: random.h:60
std::string HexStr(const Span< const uint8_t > s)
Convert a span of bytes to a lower-case hexadecimal string.
static constexpr size_t COMMAND_SIZE
Definition: protocol.h:31
const EllSwiftPubKey & GetOurPubKey() const noexcept
Retrieve our public key.
Definition: bip324.h:54
std::vector< CNetAddr > LookupHost(const std::string &name, unsigned int nMaxSolutions, bool fAllowLookup, DNSLookupFn dns_lookup_function)
Resolve a host string to its corresponding network addresses.
Definition: netbase.cpp:158
#define LOCK(cs)
Definition: sync.h:258
Double ended buffer combining vector and stream-like interfaces.
Definition: streams.h:192
ArgsManager * args
Definition: context.h:61
bool AddLocal(const CService &addr_, int nScore)
Definition: net.cpp:273
static const int INIT_PROTO_VERSION
initial proto version, to be increased after version/verack negotiation
Definition: version.h:15
A combination of a network address (CNetAddr) and a (TCP) port.
Definition: netaddress.h:534
BOOST_AUTO_TEST_SUITE_END()
A CService with information about it as peer.
Definition: protocol.h:362
BOOST_CHECK_EXCEPTION predicates to check the specific validation error.
Definition: setup_common.h:200
static CService ip(uint32_t i)
int64_t NodeId
Definition: net.h:99
bool ReceivedBytes(Span< const uint8_t > &msg_bytes) noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex
Feed wire bytes to the transport.
Definition: net.cpp:1291
static auto WithParams(const Params &params, T &&t)
Return a wrapper around t that (de)serializes it with specified parameter params. ...
Definition: serialize.h:1191
bool SetMessageToSend(CSerializedNetMsg &msg) noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex)
Set the next message to send.
Definition: net.cpp:1451
static uint256 InsecureRand256()
Definition: random.h:50
void Set(const T pbegin, const T pend, bool fCompressedIn)
Initialize using begin and end iterators to byte data.
Definition: key.h:99
bool Decrypt(Span< const std::byte > input, Span< const std::byte > aad, bool &ignore, Span< std::byte > contents) noexcept
Decrypt a packet.
Definition: bip324.cpp:100
std::vector< B > randbytes(size_t len)
Generate random bytes.
Definition: random.cpp:596
ArgsManager gArgs
Definition: args.cpp:42
std::string ToLower(std::string_view str)
Returns the lowercase equivalent of the given string.
Info GetInfo() const noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex)
Retrieve information about this transport.
Definition: net.cpp:1548
constexpr C * begin() const noexcept
Definition: span.h:174
const char * VERACK
The verack message acknowledges a previously-received version message, informing the connecting node ...
Definition: protocol.cpp:16
Network address.
Definition: netaddress.h:115
256-bit opaque blob.
Definition: uint256.h:106
std::vector< CService > Lookup(const std::string &name, uint16_t portDefault, bool fAllowLookup, unsigned int nMaxSolutions, DNSLookupFn dns_lookup_function)
Resolve a service string to its corresponding service.
Definition: netbase.cpp:176
int nScore
Definition: net.h:177
const char * VERSION
The version message provides information about the transmitting node to the receiving node at the beg...
Definition: protocol.cpp:15
#define BOOST_CHECK_EQUAL(v1, v2)
Definition: object.cpp:18
const CChainParams & Params()
Return the currently selected parameters.
static const int PROTOCOL_VERSION
network protocol versioning
Definition: version.h:12
GlobalMutex g_maplocalhost_mutex
Definition: net.cpp:116
constexpr unsigned char * end()
Definition: uint256.h:69
Span< const std::byte > MakeByteSpan(V &&v) noexcept
Definition: span.h:259
FastRandomContext g_insecure_rand_ctx
This global and the helpers that use it are not thread-safe.
Definition: random.cpp:14
IPv6.
Definition: netaddress.h:44
void RemoveAll() EXCLUSIVE_LOCKS_REQUIRED(!m_mutex)
Definition: netbase.h:87
TOR (v2 or v3)
Definition: netaddress.h:47
constexpr auto MakeUCharSpan(V &&v) -> decltype(UCharSpanCast(Span
Like the Span constructor, but for (const) unsigned char member types only.
Definition: span.h:281
void Encrypt(Span< const std::byte > contents, Span< const std::byte > aad, bool ignore, Span< std::byte > output) noexcept
Encrypt a packet.
Definition: bip324.cpp:73
unsigned char * UCharCast(char *c)
Definition: span.h:270
CNetMessage GetReceivedMessage(std::chrono::microseconds time, bool &reject_message) noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex)
Retrieve a completed message from transport.
Definition: net.cpp:1421
An encapsulated private key.
Definition: key.h:32
A Span is an object that can refer to a contiguous sequence of objects.
Definition: solver.h:20
Information about a peer.
Definition: net.h:683
Span< const std::byte > GetReceiveGarbageTerminator() const noexcept
Get the expected Garbage Terminator to receive.
Definition: bip324.h:93
bool SetInternal(const std::string &name)
Create an "internal" address that represents a name or FQDN.
Definition: netaddress.cpp:169
static constexpr SerParams V1_NETWORK
Definition: protocol.h:404
static constexpr unsigned EXPANSION
Definition: bip324.h:27
Identical to TestingSetup, but chain set to regtest.
Definition: setup_common.h:86
bool IsAddrV1Compatible() const
Check if the current object can be serialized in pre-ADDRv2/BIP155 format.
Definition: netaddress.cpp:478
static const int CLIENT_VERSION
bitcoind-res.rc includes this file, but it cannot cope with real c++ code.
Definition: clientversion.h:33
CJDNS.
Definition: netaddress.h:53
bool IsTor() const
Definition: netaddress.h:178
static constexpr unsigned LENGTH_LEN
Definition: bip324.h:25
void MarkBytesSent(size_t bytes_sent) noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex)
Report how many bytes returned by the last GetBytesToSend() have been sent.
Definition: net.cpp:1500
std::unique_ptr< ChainstateManager > chainman
Definition: context.h:59
void RemoveLocal(const CService &addr)
Definition: net.cpp:306
bool IsLocal(const CService &addr)
check whether a given address is potentially local
Definition: net.cpp:325
ReachableNets g_reachable_nets
Definition: netbase.cpp:35
#define BOOST_CHECK(expr)
Definition: object.cpp:17
Message header.
Definition: protocol.h:28
Addresses from these networks are not publicly routable on the global Internet.
Definition: netaddress.h:38
std::unique_ptr< PeerManager > peerman
Definition: context.h:58