Bitcoin Core  29.1.0
P2P Digital Currency
net_tests.cpp
Go to the documentation of this file.
1 // Copyright (c) 2012-2022 The Bitcoin Core developers
2 // Distributed under the MIT software license, see the accompanying
3 // file COPYING or http://www.opensource.org/licenses/mit-license.php.
4 
5 #include <chainparams.h>
6 #include <clientversion.h>
7 #include <common/args.h>
8 #include <compat/compat.h>
9 #include <cstdint>
10 #include <net.h>
11 #include <net_processing.h>
12 #include <netaddress.h>
13 #include <netbase.h>
14 #include <netmessagemaker.h>
15 #include <node/protocol_version.h>
16 #include <serialize.h>
17 #include <span.h>
18 #include <streams.h>
19 #include <test/util/random.h>
20 #include <test/util/setup_common.h>
21 #include <test/util/validation.h>
22 #include <util/strencodings.h>
23 #include <util/string.h>
24 #include <validation.h>
25 
26 #include <boost/test/unit_test.hpp>
27 
28 #include <algorithm>
29 #include <ios>
30 #include <memory>
31 #include <optional>
32 #include <string>
33 
34 using namespace std::literals;
35 using namespace util::hex_literals;
36 using util::ToString;
37 
39 
40 BOOST_AUTO_TEST_CASE(cnode_listen_port)
41 {
42  // test default
43  uint16_t port{GetListenPort()};
44  BOOST_CHECK(port == Params().GetDefaultPort());
45  // test set port
46  uint16_t altPort = 12345;
47  BOOST_CHECK(gArgs.SoftSetArg("-port", ToString(altPort)));
48  port = GetListenPort();
49  BOOST_CHECK(port == altPort);
50 }
51 
52 BOOST_AUTO_TEST_CASE(cnode_simple_test)
53 {
54  NodeId id = 0;
55 
56  in_addr ipv4Addr;
57  ipv4Addr.s_addr = 0xa0b0c001;
58 
59  CAddress addr = CAddress(CService(ipv4Addr, 7777), NODE_NETWORK);
60  std::string pszDest;
61 
62  std::unique_ptr<CNode> pnode1 = std::make_unique<CNode>(id++,
63  /*sock=*/nullptr,
64  addr,
65  /*nKeyedNetGroupIn=*/0,
66  /*nLocalHostNonceIn=*/0,
67  CAddress(),
68  pszDest,
70  /*inbound_onion=*/false);
71  BOOST_CHECK(pnode1->IsFullOutboundConn() == true);
72  BOOST_CHECK(pnode1->IsManualConn() == false);
73  BOOST_CHECK(pnode1->IsBlockOnlyConn() == false);
74  BOOST_CHECK(pnode1->IsFeelerConn() == false);
75  BOOST_CHECK(pnode1->IsAddrFetchConn() == false);
76  BOOST_CHECK(pnode1->IsInboundConn() == false);
77  BOOST_CHECK(pnode1->m_inbound_onion == false);
78  BOOST_CHECK_EQUAL(pnode1->ConnectedThroughNetwork(), Network::NET_IPV4);
79 
80  std::unique_ptr<CNode> pnode2 = std::make_unique<CNode>(id++,
81  /*sock=*/nullptr,
82  addr,
83  /*nKeyedNetGroupIn=*/1,
84  /*nLocalHostNonceIn=*/1,
85  CAddress(),
86  pszDest,
88  /*inbound_onion=*/false);
89  BOOST_CHECK(pnode2->IsFullOutboundConn() == false);
90  BOOST_CHECK(pnode2->IsManualConn() == false);
91  BOOST_CHECK(pnode2->IsBlockOnlyConn() == false);
92  BOOST_CHECK(pnode2->IsFeelerConn() == false);
93  BOOST_CHECK(pnode2->IsAddrFetchConn() == false);
94  BOOST_CHECK(pnode2->IsInboundConn() == true);
95  BOOST_CHECK(pnode2->m_inbound_onion == false);
96  BOOST_CHECK_EQUAL(pnode2->ConnectedThroughNetwork(), Network::NET_IPV4);
97 
98  std::unique_ptr<CNode> pnode3 = std::make_unique<CNode>(id++,
99  /*sock=*/nullptr,
100  addr,
101  /*nKeyedNetGroupIn=*/0,
102  /*nLocalHostNonceIn=*/0,
103  CAddress(),
104  pszDest,
106  /*inbound_onion=*/false);
107  BOOST_CHECK(pnode3->IsFullOutboundConn() == true);
108  BOOST_CHECK(pnode3->IsManualConn() == false);
109  BOOST_CHECK(pnode3->IsBlockOnlyConn() == false);
110  BOOST_CHECK(pnode3->IsFeelerConn() == false);
111  BOOST_CHECK(pnode3->IsAddrFetchConn() == false);
112  BOOST_CHECK(pnode3->IsInboundConn() == false);
113  BOOST_CHECK(pnode3->m_inbound_onion == false);
114  BOOST_CHECK_EQUAL(pnode3->ConnectedThroughNetwork(), Network::NET_IPV4);
115 
116  std::unique_ptr<CNode> pnode4 = std::make_unique<CNode>(id++,
117  /*sock=*/nullptr,
118  addr,
119  /*nKeyedNetGroupIn=*/1,
120  /*nLocalHostNonceIn=*/1,
121  CAddress(),
122  pszDest,
124  /*inbound_onion=*/true);
125  BOOST_CHECK(pnode4->IsFullOutboundConn() == false);
126  BOOST_CHECK(pnode4->IsManualConn() == false);
127  BOOST_CHECK(pnode4->IsBlockOnlyConn() == false);
128  BOOST_CHECK(pnode4->IsFeelerConn() == false);
129  BOOST_CHECK(pnode4->IsAddrFetchConn() == false);
130  BOOST_CHECK(pnode4->IsInboundConn() == true);
131  BOOST_CHECK(pnode4->m_inbound_onion == true);
132  BOOST_CHECK_EQUAL(pnode4->ConnectedThroughNetwork(), Network::NET_ONION);
133 }
134 
135 BOOST_AUTO_TEST_CASE(cnetaddr_basic)
136 {
137  CNetAddr addr;
138 
139  // IPv4, INADDR_ANY
140  addr = LookupHost("0.0.0.0", false).value();
141  BOOST_REQUIRE(!addr.IsValid());
142  BOOST_REQUIRE(addr.IsIPv4());
143 
144  BOOST_CHECK(addr.IsBindAny());
146  BOOST_CHECK_EQUAL(addr.ToStringAddr(), "0.0.0.0");
147 
148  // IPv4, INADDR_NONE
149  addr = LookupHost("255.255.255.255", false).value();
150  BOOST_REQUIRE(!addr.IsValid());
151  BOOST_REQUIRE(addr.IsIPv4());
152 
153  BOOST_CHECK(!addr.IsBindAny());
154  BOOST_CHECK(addr.IsAddrV1Compatible());
155  BOOST_CHECK_EQUAL(addr.ToStringAddr(), "255.255.255.255");
156 
157  // IPv4, casual
158  addr = LookupHost("12.34.56.78", false).value();
159  BOOST_REQUIRE(addr.IsValid());
160  BOOST_REQUIRE(addr.IsIPv4());
161 
162  BOOST_CHECK(!addr.IsBindAny());
163  BOOST_CHECK(addr.IsAddrV1Compatible());
164  BOOST_CHECK_EQUAL(addr.ToStringAddr(), "12.34.56.78");
165 
166  // IPv6, in6addr_any
167  addr = LookupHost("::", false).value();
168  BOOST_REQUIRE(!addr.IsValid());
169  BOOST_REQUIRE(addr.IsIPv6());
170 
171  BOOST_CHECK(addr.IsBindAny());
172  BOOST_CHECK(addr.IsAddrV1Compatible());
173  BOOST_CHECK_EQUAL(addr.ToStringAddr(), "::");
174 
175  // IPv6, casual
176  addr = LookupHost("1122:3344:5566:7788:9900:aabb:ccdd:eeff", false).value();
177  BOOST_REQUIRE(addr.IsValid());
178  BOOST_REQUIRE(addr.IsIPv6());
179 
180  BOOST_CHECK(!addr.IsBindAny());
181  BOOST_CHECK(addr.IsAddrV1Compatible());
182  BOOST_CHECK_EQUAL(addr.ToStringAddr(), "1122:3344:5566:7788:9900:aabb:ccdd:eeff");
183 
184  // IPv6, scoped/link-local. See https://tools.ietf.org/html/rfc4007
185  // We support non-negative decimal integers (uint32_t) as zone id indices.
186  // Normal link-local scoped address functionality is to append "%" plus the
187  // zone id, for example, given a link-local address of "fe80::1" and a zone
188  // id of "32", return the address as "fe80::1%32".
189  const std::string link_local{"fe80::1"};
190  const std::string scoped_addr{link_local + "%32"};
191  addr = LookupHost(scoped_addr, false).value();
192  BOOST_REQUIRE(addr.IsValid());
193  BOOST_REQUIRE(addr.IsIPv6());
194  BOOST_CHECK(!addr.IsBindAny());
195  BOOST_CHECK_EQUAL(addr.ToStringAddr(), scoped_addr);
196 
197  // TORv2, no longer supported
198  BOOST_CHECK(!addr.SetSpecial("6hzph5hv6337r6p2.onion"));
199 
200  // TORv3
201  const char* torv3_addr = "pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion";
202  BOOST_REQUIRE(addr.SetSpecial(torv3_addr));
203  BOOST_REQUIRE(addr.IsValid());
204  BOOST_REQUIRE(addr.IsTor());
205 
206  BOOST_CHECK(!addr.IsI2P());
207  BOOST_CHECK(!addr.IsBindAny());
208  BOOST_CHECK(!addr.IsAddrV1Compatible());
209  BOOST_CHECK_EQUAL(addr.ToStringAddr(), torv3_addr);
210 
211  // TORv3, broken, with wrong checksum
212  BOOST_CHECK(!addr.SetSpecial("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscsad.onion"));
213 
214  // TORv3, broken, with wrong version
215  BOOST_CHECK(!addr.SetSpecial("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscrye.onion"));
216 
217  // TORv3, malicious
218  BOOST_CHECK(!addr.SetSpecial(std::string{
219  "pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd\0wtf.onion", 66}));
220 
221  // TOR, bogus length
222  BOOST_CHECK(!addr.SetSpecial(std::string{"mfrggzak.onion"}));
223 
224  // TOR, invalid base32
225  BOOST_CHECK(!addr.SetSpecial(std::string{"mf*g zak.onion"}));
226 
227  // I2P
228  const char* i2p_addr = "UDHDrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.I2P";
229  BOOST_REQUIRE(addr.SetSpecial(i2p_addr));
230  BOOST_REQUIRE(addr.IsValid());
231  BOOST_REQUIRE(addr.IsI2P());
232 
233  BOOST_CHECK(!addr.IsTor());
234  BOOST_CHECK(!addr.IsBindAny());
235  BOOST_CHECK(!addr.IsAddrV1Compatible());
236  BOOST_CHECK_EQUAL(addr.ToStringAddr(), ToLower(i2p_addr));
237 
238  // I2P, correct length, but decodes to less than the expected number of bytes.
239  BOOST_CHECK(!addr.SetSpecial("udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jn=.b32.i2p"));
240 
241  // I2P, extra unnecessary padding
242  BOOST_CHECK(!addr.SetSpecial("udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna=.b32.i2p"));
243 
244  // I2P, malicious
245  BOOST_CHECK(!addr.SetSpecial("udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v\0wtf.b32.i2p"s));
246 
247  // I2P, valid but unsupported (56 Base32 characters)
248  // See "Encrypted LS with Base 32 Addresses" in
249  // https://geti2p.net/spec/encryptedleaseset.txt
250  BOOST_CHECK(
251  !addr.SetSpecial("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscsad.b32.i2p"));
252 
253  // I2P, invalid base32
254  BOOST_CHECK(!addr.SetSpecial(std::string{"tp*szydbh4dp.b32.i2p"}));
255 
256  // Internal
257  addr.SetInternal("esffpp");
258  BOOST_REQUIRE(!addr.IsValid()); // "internal" is considered invalid
259  BOOST_REQUIRE(addr.IsInternal());
260 
261  BOOST_CHECK(!addr.IsBindAny());
262  BOOST_CHECK(addr.IsAddrV1Compatible());
263  BOOST_CHECK_EQUAL(addr.ToStringAddr(), "esffpvrt3wpeaygy.internal");
264 
265  // Totally bogus
266  BOOST_CHECK(!addr.SetSpecial("totally bogus"));
267 }
268 
269 BOOST_AUTO_TEST_CASE(cnetaddr_tostring_canonical_ipv6)
270 {
271  // Test that CNetAddr::ToString formats IPv6 addresses with zero compression as described in
272  // RFC 5952 ("A Recommendation for IPv6 Address Text Representation").
273  const std::map<std::string, std::string> canonical_representations_ipv6{
274  {"0000:0000:0000:0000:0000:0000:0000:0000", "::"},
275  {"000:0000:000:00:0:00:000:0000", "::"},
276  {"000:000:000:000:000:000:000:000", "::"},
277  {"00:00:00:00:00:00:00:00", "::"},
278  {"0:0:0:0:0:0:0:0", "::"},
279  {"0:0:0:0:0:0:0:1", "::1"},
280  {"2001:0:0:1:0:0:0:1", "2001:0:0:1::1"},
281  {"2001:0db8:0:0:1:0:0:1", "2001:db8::1:0:0:1"},
282  {"2001:0db8:85a3:0000:0000:8a2e:0370:7334", "2001:db8:85a3::8a2e:370:7334"},
283  {"2001:0db8::0001", "2001:db8::1"},
284  {"2001:0db8::0001:0000", "2001:db8::1:0"},
285  {"2001:0db8::1:0:0:1", "2001:db8::1:0:0:1"},
286  {"2001:db8:0000:0:1::1", "2001:db8::1:0:0:1"},
287  {"2001:db8:0000:1:1:1:1:1", "2001:db8:0:1:1:1:1:1"},
288  {"2001:db8:0:0:0:0:2:1", "2001:db8::2:1"},
289  {"2001:db8:0:0:0::1", "2001:db8::1"},
290  {"2001:db8:0:0:1:0:0:1", "2001:db8::1:0:0:1"},
291  {"2001:db8:0:0:1::1", "2001:db8::1:0:0:1"},
292  {"2001:DB8:0:0:1::1", "2001:db8::1:0:0:1"},
293  {"2001:db8:0:0::1", "2001:db8::1"},
294  {"2001:db8:0:0:aaaa::1", "2001:db8::aaaa:0:0:1"},
295  {"2001:db8:0:1:1:1:1:1", "2001:db8:0:1:1:1:1:1"},
296  {"2001:db8:0::1", "2001:db8::1"},
297  {"2001:db8:85a3:0:0:8a2e:370:7334", "2001:db8:85a3::8a2e:370:7334"},
298  {"2001:db8::0:1", "2001:db8::1"},
299  {"2001:db8::0:1:0:0:1", "2001:db8::1:0:0:1"},
300  {"2001:DB8::1", "2001:db8::1"},
301  {"2001:db8::1", "2001:db8::1"},
302  {"2001:db8::1:0:0:1", "2001:db8::1:0:0:1"},
303  {"2001:db8::1:1:1:1:1", "2001:db8:0:1:1:1:1:1"},
304  {"2001:db8::aaaa:0:0:1", "2001:db8::aaaa:0:0:1"},
305  {"2001:db8:aaaa:bbbb:cccc:dddd:0:1", "2001:db8:aaaa:bbbb:cccc:dddd:0:1"},
306  {"2001:db8:aaaa:bbbb:cccc:dddd::1", "2001:db8:aaaa:bbbb:cccc:dddd:0:1"},
307  {"2001:db8:aaaa:bbbb:cccc:dddd:eeee:0001", "2001:db8:aaaa:bbbb:cccc:dddd:eeee:1"},
308  {"2001:db8:aaaa:bbbb:cccc:dddd:eeee:001", "2001:db8:aaaa:bbbb:cccc:dddd:eeee:1"},
309  {"2001:db8:aaaa:bbbb:cccc:dddd:eeee:01", "2001:db8:aaaa:bbbb:cccc:dddd:eeee:1"},
310  {"2001:db8:aaaa:bbbb:cccc:dddd:eeee:1", "2001:db8:aaaa:bbbb:cccc:dddd:eeee:1"},
311  {"2001:db8:aaaa:bbbb:cccc:dddd:eeee:aaaa", "2001:db8:aaaa:bbbb:cccc:dddd:eeee:aaaa"},
312  {"2001:db8:aaaa:bbbb:cccc:dddd:eeee:AAAA", "2001:db8:aaaa:bbbb:cccc:dddd:eeee:aaaa"},
313  {"2001:db8:aaaa:bbbb:cccc:dddd:eeee:AaAa", "2001:db8:aaaa:bbbb:cccc:dddd:eeee:aaaa"},
314  };
315  for (const auto& [input_address, expected_canonical_representation_output] : canonical_representations_ipv6) {
316  const std::optional<CNetAddr> net_addr{LookupHost(input_address, false)};
317  BOOST_REQUIRE(net_addr.value().IsIPv6());
318  BOOST_CHECK_EQUAL(net_addr.value().ToStringAddr(), expected_canonical_representation_output);
319  }
320 }
321 
322 BOOST_AUTO_TEST_CASE(cnetaddr_serialize_v1)
323 {
324  CNetAddr addr;
325  DataStream s{};
326  const auto ser_params{CAddress::V1_NETWORK};
327 
328  s << ser_params(addr);
329  BOOST_CHECK_EQUAL(HexStr(s), "00000000000000000000000000000000");
330  s.clear();
331 
332  addr = LookupHost("1.2.3.4", false).value();
333  s << ser_params(addr);
334  BOOST_CHECK_EQUAL(HexStr(s), "00000000000000000000ffff01020304");
335  s.clear();
336 
337  addr = LookupHost("1a1b:2a2b:3a3b:4a4b:5a5b:6a6b:7a7b:8a8b", false).value();
338  s << ser_params(addr);
339  BOOST_CHECK_EQUAL(HexStr(s), "1a1b2a2b3a3b4a4b5a5b6a6b7a7b8a8b");
340  s.clear();
341 
342  // TORv2, no longer supported
343  BOOST_CHECK(!addr.SetSpecial("6hzph5hv6337r6p2.onion"));
344 
345  BOOST_REQUIRE(addr.SetSpecial("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion"));
346  s << ser_params(addr);
347  BOOST_CHECK_EQUAL(HexStr(s), "00000000000000000000000000000000");
348  s.clear();
349 
350  addr.SetInternal("a");
351  s << ser_params(addr);
352  BOOST_CHECK_EQUAL(HexStr(s), "fd6b88c08724ca978112ca1bbdcafac2");
353  s.clear();
354 }
355 
356 BOOST_AUTO_TEST_CASE(cnetaddr_serialize_v2)
357 {
358  CNetAddr addr;
359  DataStream s{};
360  const auto ser_params{CAddress::V2_NETWORK};
361 
362  s << ser_params(addr);
363  BOOST_CHECK_EQUAL(HexStr(s), "021000000000000000000000000000000000");
364  s.clear();
365 
366  addr = LookupHost("1.2.3.4", false).value();
367  s << ser_params(addr);
368  BOOST_CHECK_EQUAL(HexStr(s), "010401020304");
369  s.clear();
370 
371  addr = LookupHost("1a1b:2a2b:3a3b:4a4b:5a5b:6a6b:7a7b:8a8b", false).value();
372  s << ser_params(addr);
373  BOOST_CHECK_EQUAL(HexStr(s), "02101a1b2a2b3a3b4a4b5a5b6a6b7a7b8a8b");
374  s.clear();
375 
376  // TORv2, no longer supported
377  BOOST_CHECK(!addr.SetSpecial("6hzph5hv6337r6p2.onion"));
378 
379  BOOST_REQUIRE(addr.SetSpecial("kpgvmscirrdqpekbqjsvw5teanhatztpp2gl6eee4zkowvwfxwenqaid.onion"));
380  s << ser_params(addr);
381  BOOST_CHECK_EQUAL(HexStr(s), "042053cd5648488c4707914182655b7664034e09e66f7e8cbf1084e654eb56c5bd88");
382  s.clear();
383 
384  BOOST_REQUIRE(addr.SetInternal("a"));
385  s << ser_params(addr);
386  BOOST_CHECK_EQUAL(HexStr(s), "0210fd6b88c08724ca978112ca1bbdcafac2");
387  s.clear();
388 }
389 
390 BOOST_AUTO_TEST_CASE(cnetaddr_unserialize_v2)
391 {
392  CNetAddr addr;
393  DataStream s{};
394  const auto ser_params{CAddress::V2_NETWORK};
395 
396  // Valid IPv4.
397  s << "01" // network type (IPv4)
398  "04" // address length
399  "01020304"_hex; // address
400  s >> ser_params(addr);
401  BOOST_CHECK(addr.IsValid());
402  BOOST_CHECK(addr.IsIPv4());
404  BOOST_CHECK_EQUAL(addr.ToStringAddr(), "1.2.3.4");
405  BOOST_REQUIRE(s.empty());
406 
407  // Invalid IPv4, valid length but address itself is shorter.
408  s << "01" // network type (IPv4)
409  "04" // address length
410  "0102"_hex; // address
411  BOOST_CHECK_EXCEPTION(s >> ser_params(addr), std::ios_base::failure, HasReason("end of data"));
412  BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
413  s.clear();
414 
415  // Invalid IPv4, with bogus length.
416  s << "01" // network type (IPv4)
417  "05" // address length
418  "01020304"_hex; // address
419  BOOST_CHECK_EXCEPTION(s >> ser_params(addr), std::ios_base::failure,
420  HasReason("BIP155 IPv4 address with length 5 (should be 4)"));
421  BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
422  s.clear();
423 
424  // Invalid IPv4, with extreme length.
425  s << "01" // network type (IPv4)
426  "fd0102" // address length (513 as CompactSize)
427  "01020304"_hex; // address
428  BOOST_CHECK_EXCEPTION(s >> ser_params(addr), std::ios_base::failure,
429  HasReason("Address too long: 513 > 512"));
430  BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
431  s.clear();
432 
433  // Valid IPv6.
434  s << "02" // network type (IPv6)
435  "10" // address length
436  "0102030405060708090a0b0c0d0e0f10"_hex; // address
437  s >> ser_params(addr);
438  BOOST_CHECK(addr.IsValid());
439  BOOST_CHECK(addr.IsIPv6());
441  BOOST_CHECK_EQUAL(addr.ToStringAddr(), "102:304:506:708:90a:b0c:d0e:f10");
442  BOOST_REQUIRE(s.empty());
443 
444  // Valid IPv6, contains embedded "internal".
445  s << "02" // network type (IPv6)
446  "10" // address length
447  "fd6b88c08724ca978112ca1bbdcafac2"_hex; // address: 0xfd + sha256("bitcoin")[0:5] +
448  // sha256(name)[0:10]
449  s >> ser_params(addr);
450  BOOST_CHECK(addr.IsInternal());
452  BOOST_CHECK_EQUAL(addr.ToStringAddr(), "zklycewkdo64v6wc.internal");
453  BOOST_REQUIRE(s.empty());
454 
455  // Invalid IPv6, with bogus length.
456  s << "02" // network type (IPv6)
457  "04" // address length
458  "00"_hex; // address
459  BOOST_CHECK_EXCEPTION(s >> ser_params(addr), std::ios_base::failure,
460  HasReason("BIP155 IPv6 address with length 4 (should be 16)"));
461  BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
462  s.clear();
463 
464  // Invalid IPv6, contains embedded IPv4.
465  s << "02" // network type (IPv6)
466  "10" // address length
467  "00000000000000000000ffff01020304"_hex; // address
468  s >> ser_params(addr);
469  BOOST_CHECK(!addr.IsValid());
470  BOOST_REQUIRE(s.empty());
471 
472  // Invalid IPv6, contains embedded TORv2.
473  s << "02" // network type (IPv6)
474  "10" // address length
475  "fd87d87eeb430102030405060708090a"_hex; // address
476  s >> ser_params(addr);
477  BOOST_CHECK(!addr.IsValid());
478  BOOST_REQUIRE(s.empty());
479 
480  // TORv2, no longer supported.
481  s << "03" // network type (TORv2)
482  "0a" // address length
483  "f1f2f3f4f5f6f7f8f9fa"_hex; // address
484  s >> ser_params(addr);
485  BOOST_CHECK(!addr.IsValid());
486  BOOST_REQUIRE(s.empty());
487 
488  // Valid TORv3.
489  s << "04" // network type (TORv3)
490  "20" // address length
491  "79bcc625184b05194975c28b66b66b04" // address
492  "69f7f6556fb1ac3189a79b40dda32f1f"_hex;
493  s >> ser_params(addr);
494  BOOST_CHECK(addr.IsValid());
495  BOOST_CHECK(addr.IsTor());
498  "pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion");
499  BOOST_REQUIRE(s.empty());
500 
501  // Invalid TORv3, with bogus length.
502  s << "04" // network type (TORv3)
503  "00" // address length
504  "00"_hex; // address
505  BOOST_CHECK_EXCEPTION(s >> ser_params(addr), std::ios_base::failure,
506  HasReason("BIP155 TORv3 address with length 0 (should be 32)"));
507  BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
508  s.clear();
509 
510  // Valid I2P.
511  s << "05" // network type (I2P)
512  "20" // address length
513  "a2894dabaec08c0051a481a6dac88b64" // address
514  "f98232ae42d4b6fd2fa81952dfe36a87"_hex;
515  s >> ser_params(addr);
516  BOOST_CHECK(addr.IsValid());
517  BOOST_CHECK(addr.IsI2P());
520  "ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p");
521  BOOST_REQUIRE(s.empty());
522 
523  // Invalid I2P, with bogus length.
524  s << "05" // network type (I2P)
525  "03" // address length
526  "00"_hex; // address
527  BOOST_CHECK_EXCEPTION(s >> ser_params(addr), std::ios_base::failure,
528  HasReason("BIP155 I2P address with length 3 (should be 32)"));
529  BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
530  s.clear();
531 
532  // Valid CJDNS.
533  s << "06" // network type (CJDNS)
534  "10" // address length
535  "fc000001000200030004000500060007"_hex; // address
536  s >> ser_params(addr);
537  BOOST_CHECK(addr.IsValid());
538  BOOST_CHECK(addr.IsCJDNS());
540  BOOST_CHECK_EQUAL(addr.ToStringAddr(), "fc00:1:2:3:4:5:6:7");
541  BOOST_REQUIRE(s.empty());
542 
543  // Invalid CJDNS, wrong prefix.
544  s << "06" // network type (CJDNS)
545  "10" // address length
546  "aa000001000200030004000500060007"_hex; // address
547  s >> ser_params(addr);
548  BOOST_CHECK(addr.IsCJDNS());
549  BOOST_CHECK(!addr.IsValid());
550  BOOST_REQUIRE(s.empty());
551 
552  // Invalid CJDNS, with bogus length.
553  s << "06" // network type (CJDNS)
554  "01" // address length
555  "00"_hex; // address
556  BOOST_CHECK_EXCEPTION(s >> ser_params(addr), std::ios_base::failure,
557  HasReason("BIP155 CJDNS address with length 1 (should be 16)"));
558  BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
559  s.clear();
560 
561  // Unknown, with extreme length.
562  s << "aa" // network type (unknown)
563  "fe00000002" // address length (CompactSize's MAX_SIZE)
564  "01020304050607"_hex; // address
565  BOOST_CHECK_EXCEPTION(s >> ser_params(addr), std::ios_base::failure,
566  HasReason("Address too long: 33554432 > 512"));
567  BOOST_REQUIRE(!s.empty()); // The stream is not consumed on invalid input.
568  s.clear();
569 
570  // Unknown, with reasonable length.
571  s << "aa" // network type (unknown)
572  "04" // address length
573  "01020304"_hex; // address
574  s >> ser_params(addr);
575  BOOST_CHECK(!addr.IsValid());
576  BOOST_REQUIRE(s.empty());
577 
578  // Unknown, with zero length.
579  s << "aa" // network type (unknown)
580  "00" // address length
581  ""_hex; // address
582  s >> ser_params(addr);
583  BOOST_CHECK(!addr.IsValid());
584  BOOST_REQUIRE(s.empty());
585 }
586 
587 // prior to PR #14728, this test triggers an undefined behavior
588 BOOST_AUTO_TEST_CASE(ipv4_peer_with_ipv6_addrMe_test)
589 {
590  // set up local addresses; all that's necessary to reproduce the bug is
591  // that a normal IPv4 address is among the entries, but if this address is
592  // !IsRoutable the undefined behavior is easier to trigger deterministically
593  in_addr raw_addr;
594  raw_addr.s_addr = htonl(0x7f000001);
595  const CNetAddr mapLocalHost_entry = CNetAddr(raw_addr);
596  {
598  LocalServiceInfo lsi;
599  lsi.nScore = 23;
600  lsi.nPort = 42;
601  mapLocalHost[mapLocalHost_entry] = lsi;
602  }
603 
604  // create a peer with an IPv4 address
605  in_addr ipv4AddrPeer;
606  ipv4AddrPeer.s_addr = 0xa0b0c001;
607  CAddress addr = CAddress(CService(ipv4AddrPeer, 7777), NODE_NETWORK);
608  std::unique_ptr<CNode> pnode = std::make_unique<CNode>(/*id=*/0,
609  /*sock=*/nullptr,
610  addr,
611  /*nKeyedNetGroupIn=*/0,
612  /*nLocalHostNonceIn=*/0,
613  CAddress{},
614  /*pszDest=*/std::string{},
616  /*inbound_onion=*/false);
617  pnode->fSuccessfullyConnected.store(true);
618 
619  // the peer claims to be reaching us via IPv6
620  in6_addr ipv6AddrLocal;
621  memset(ipv6AddrLocal.s6_addr, 0, 16);
622  ipv6AddrLocal.s6_addr[0] = 0xcc;
623  CAddress addrLocal = CAddress(CService(ipv6AddrLocal, 7777), NODE_NETWORK);
624  pnode->SetAddrLocal(addrLocal);
625 
626  // before patch, this causes undefined behavior detectable with clang's -fsanitize=memory
627  GetLocalAddrForPeer(*pnode);
628 
629  // suppress no-checks-run warning; if this test fails, it's by triggering a sanitizer
630  BOOST_CHECK(1);
631 
632  // Cleanup, so that we don't confuse other tests.
633  {
635  mapLocalHost.erase(mapLocalHost_entry);
636  }
637 }
638 
639 BOOST_AUTO_TEST_CASE(get_local_addr_for_peer_port)
640 {
641  // Test that GetLocalAddrForPeer() properly selects the address to self-advertise:
642  //
643  // 1. GetLocalAddrForPeer() calls GetLocalAddress() which returns an address that is
644  // not routable.
645  // 2. GetLocalAddrForPeer() overrides the address with whatever the peer has told us
646  // he sees us as.
647  // 2.1. For inbound connections we must override both the address and the port.
648  // 2.2. For outbound connections we must override only the address.
649 
650  // Pretend that we bound to this port.
651  const uint16_t bind_port = 20001;
652  m_node.args->ForceSetArg("-bind", strprintf("3.4.5.6:%u", bind_port));
653 
654  // Our address:port as seen from the peer, completely different from the above.
655  in_addr peer_us_addr;
656  peer_us_addr.s_addr = htonl(0x02030405);
657  const CService peer_us{peer_us_addr, 20002};
658 
659  // Create a peer with a routable IPv4 address (outbound).
660  in_addr peer_out_in_addr;
661  peer_out_in_addr.s_addr = htonl(0x01020304);
662  CNode peer_out{/*id=*/0,
663  /*sock=*/nullptr,
664  /*addrIn=*/CAddress{CService{peer_out_in_addr, 8333}, NODE_NETWORK},
665  /*nKeyedNetGroupIn=*/0,
666  /*nLocalHostNonceIn=*/0,
667  /*addrBindIn=*/CService{},
668  /*addrNameIn=*/std::string{},
669  /*conn_type_in=*/ConnectionType::OUTBOUND_FULL_RELAY,
670  /*inbound_onion=*/false};
671  peer_out.fSuccessfullyConnected = true;
672  peer_out.SetAddrLocal(peer_us);
673 
674  // Without the fix peer_us:8333 is chosen instead of the proper peer_us:bind_port.
675  auto chosen_local_addr = GetLocalAddrForPeer(peer_out);
676  BOOST_REQUIRE(chosen_local_addr);
677  const CService expected{peer_us_addr, bind_port};
678  BOOST_CHECK(*chosen_local_addr == expected);
679 
680  // Create a peer with a routable IPv4 address (inbound).
681  in_addr peer_in_in_addr;
682  peer_in_in_addr.s_addr = htonl(0x05060708);
683  CNode peer_in{/*id=*/0,
684  /*sock=*/nullptr,
685  /*addrIn=*/CAddress{CService{peer_in_in_addr, 8333}, NODE_NETWORK},
686  /*nKeyedNetGroupIn=*/0,
687  /*nLocalHostNonceIn=*/0,
688  /*addrBindIn=*/CService{},
689  /*addrNameIn=*/std::string{},
690  /*conn_type_in=*/ConnectionType::INBOUND,
691  /*inbound_onion=*/false};
692  peer_in.fSuccessfullyConnected = true;
693  peer_in.SetAddrLocal(peer_us);
694 
695  // Without the fix peer_us:8333 is chosen instead of the proper peer_us:peer_us.GetPort().
696  chosen_local_addr = GetLocalAddrForPeer(peer_in);
697  BOOST_REQUIRE(chosen_local_addr);
698  BOOST_CHECK(*chosen_local_addr == peer_us);
699 
700  m_node.args->ForceSetArg("-bind", "");
701 }
702 
703 BOOST_AUTO_TEST_CASE(LimitedAndReachable_Network)
704 {
710 
716 
722 
728 
734 }
735 
736 BOOST_AUTO_TEST_CASE(LimitedAndReachable_NetworkCaseUnroutableAndInternal)
737 {
738  // Should be reachable by default.
741 
743 
746 
754 }
755 
756 CNetAddr UtilBuildAddress(unsigned char p1, unsigned char p2, unsigned char p3, unsigned char p4)
757 {
758  unsigned char ip[] = {p1, p2, p3, p4};
759 
760  struct sockaddr_in sa;
761  memset(&sa, 0, sizeof(sockaddr_in)); // initialize the memory block
762  memcpy(&(sa.sin_addr), &ip, sizeof(ip));
763  return CNetAddr(sa.sin_addr);
764 }
765 
766 
767 BOOST_AUTO_TEST_CASE(LimitedAndReachable_CNetAddr)
768 {
769  CNetAddr addr = UtilBuildAddress(0x001, 0x001, 0x001, 0x001); // 1.1.1.1
770 
773 
776 
777  g_reachable_nets.Add(NET_IPV4); // have to reset this, because this is stateful.
778 }
779 
780 
781 BOOST_AUTO_TEST_CASE(LocalAddress_BasicLifecycle)
782 {
783  CService addr = CService(UtilBuildAddress(0x002, 0x001, 0x001, 0x001), 1000); // 2.1.1.1:1000
784 
786 
787  BOOST_CHECK(!IsLocal(addr));
788  BOOST_CHECK(AddLocal(addr, 1000));
789  BOOST_CHECK(IsLocal(addr));
790 
791  RemoveLocal(addr);
792  BOOST_CHECK(!IsLocal(addr));
793 }
794 
795 BOOST_AUTO_TEST_CASE(initial_advertise_from_version_message)
796 {
798 
799  // Tests the following scenario:
800  // * -bind=3.4.5.6:20001 is specified
801  // * we make an outbound connection to a peer
802  // * the peer reports he sees us as 2.3.4.5:20002 in the version message
803  // (20002 is a random port assigned by our OS for the outgoing TCP connection,
804  // we cannot accept connections to it)
805  // * we should self-advertise to that peer as 2.3.4.5:20001
806 
807  // Pretend that we bound to this port.
808  const uint16_t bind_port = 20001;
809  m_node.args->ForceSetArg("-bind", strprintf("3.4.5.6:%u", bind_port));
810  m_node.args->ForceSetArg("-capturemessages", "1");
811 
812  // Our address:port as seen from the peer - 2.3.4.5:20002 (different from the above).
813  in_addr peer_us_addr;
814  peer_us_addr.s_addr = htonl(0x02030405);
815  const CService peer_us{peer_us_addr, 20002};
816 
817  // Create a peer with a routable IPv4 address.
818  in_addr peer_in_addr;
819  peer_in_addr.s_addr = htonl(0x01020304);
820  CNode peer{/*id=*/0,
821  /*sock=*/nullptr,
822  /*addrIn=*/CAddress{CService{peer_in_addr, 8333}, NODE_NETWORK},
823  /*nKeyedNetGroupIn=*/0,
824  /*nLocalHostNonceIn=*/0,
825  /*addrBindIn=*/CService{},
826  /*addrNameIn=*/std::string{},
827  /*conn_type_in=*/ConnectionType::OUTBOUND_FULL_RELAY,
828  /*inbound_onion=*/false};
829 
830  const uint64_t services{NODE_NETWORK | NODE_WITNESS};
831  const int64_t time{0};
832 
833  // Force ChainstateManager::IsInitialBlockDownload() to return false.
834  // Otherwise PushAddress() isn't called by PeerManager::ProcessMessage().
835  auto& chainman = static_cast<TestChainstateManager&>(*m_node.chainman);
836  chainman.JumpOutOfIbd();
837 
838  m_node.peerman->InitializeNode(peer, NODE_NETWORK);
839 
840  std::atomic<bool> interrupt_dummy{false};
841  std::chrono::microseconds time_received_dummy{0};
842 
843  const auto msg_version =
844  NetMsg::Make(NetMsgType::VERSION, PROTOCOL_VERSION, services, time, services, CAddress::V1_NETWORK(peer_us));
845  DataStream msg_version_stream{msg_version.data};
846 
847  m_node.peerman->ProcessMessage(
848  peer, NetMsgType::VERSION, msg_version_stream, time_received_dummy, interrupt_dummy);
849 
850  const auto msg_verack = NetMsg::Make(NetMsgType::VERACK);
851  DataStream msg_verack_stream{msg_verack.data};
852 
853  // Will set peer.fSuccessfullyConnected to true (necessary in SendMessages()).
854  m_node.peerman->ProcessMessage(
855  peer, NetMsgType::VERACK, msg_verack_stream, time_received_dummy, interrupt_dummy);
856 
857  // Ensure that peer_us_addr:bind_port is sent to the peer.
858  const CService expected{peer_us_addr, bind_port};
859  bool sent{false};
860 
861  const auto CaptureMessageOrig = CaptureMessage;
862  CaptureMessage = [&sent, &expected](const CAddress& addr,
863  const std::string& msg_type,
865  bool is_incoming) -> void {
866  if (!is_incoming && msg_type == "addr") {
867  DataStream s{data};
868  std::vector<CAddress> addresses;
869 
870  s >> CAddress::V1_NETWORK(addresses);
871 
872  for (const auto& addr : addresses) {
873  if (addr == expected) {
874  sent = true;
875  return;
876  }
877  }
878  }
879  };
880 
881  m_node.peerman->SendMessages(&peer);
882 
883  BOOST_CHECK(sent);
884 
885  CaptureMessage = CaptureMessageOrig;
886  chainman.ResetIbd();
887  m_node.args->ForceSetArg("-capturemessages", "0");
888  m_node.args->ForceSetArg("-bind", "");
889 }
890 
891 
892 BOOST_AUTO_TEST_CASE(advertise_local_address)
893 {
894  auto CreatePeer = [](const CAddress& addr) {
895  return std::make_unique<CNode>(/*id=*/0,
896  /*sock=*/nullptr,
897  addr,
898  /*nKeyedNetGroupIn=*/0,
899  /*nLocalHostNonceIn=*/0,
900  CAddress{},
901  /*pszDest=*/std::string{},
903  /*inbound_onion=*/false);
904  };
906 
907  CAddress addr_ipv4{Lookup("1.2.3.4", 8333, false).value(), NODE_NONE};
908  BOOST_REQUIRE(addr_ipv4.IsValid());
909  BOOST_REQUIRE(addr_ipv4.IsIPv4());
910 
911  CAddress addr_ipv6{Lookup("1122:3344:5566:7788:9900:aabb:ccdd:eeff", 8333, false).value(), NODE_NONE};
912  BOOST_REQUIRE(addr_ipv6.IsValid());
913  BOOST_REQUIRE(addr_ipv6.IsIPv6());
914 
915  CAddress addr_ipv6_tunnel{Lookup("2002:3344:5566:7788:9900:aabb:ccdd:eeff", 8333, false).value(), NODE_NONE};
916  BOOST_REQUIRE(addr_ipv6_tunnel.IsValid());
917  BOOST_REQUIRE(addr_ipv6_tunnel.IsIPv6());
918  BOOST_REQUIRE(addr_ipv6_tunnel.IsRFC3964());
919 
920  CAddress addr_teredo{Lookup("2001:0000:5566:7788:9900:aabb:ccdd:eeff", 8333, false).value(), NODE_NONE};
921  BOOST_REQUIRE(addr_teredo.IsValid());
922  BOOST_REQUIRE(addr_teredo.IsIPv6());
923  BOOST_REQUIRE(addr_teredo.IsRFC4380());
924 
925  CAddress addr_onion;
926  BOOST_REQUIRE(addr_onion.SetSpecial("pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion"));
927  BOOST_REQUIRE(addr_onion.IsValid());
928  BOOST_REQUIRE(addr_onion.IsTor());
929 
930  CAddress addr_i2p;
931  BOOST_REQUIRE(addr_i2p.SetSpecial("udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p"));
932  BOOST_REQUIRE(addr_i2p.IsValid());
933  BOOST_REQUIRE(addr_i2p.IsI2P());
934 
935  CService service_cjdns{Lookup("fc00:3344:5566:7788:9900:aabb:ccdd:eeff", 8333, false).value(), NODE_NONE};
936  CAddress addr_cjdns{MaybeFlipIPv6toCJDNS(service_cjdns), NODE_NONE};
937  BOOST_REQUIRE(addr_cjdns.IsValid());
938  BOOST_REQUIRE(addr_cjdns.IsCJDNS());
939 
940  const auto peer_ipv4{CreatePeer(addr_ipv4)};
941  const auto peer_ipv6{CreatePeer(addr_ipv6)};
942  const auto peer_ipv6_tunnel{CreatePeer(addr_ipv6_tunnel)};
943  const auto peer_teredo{CreatePeer(addr_teredo)};
944  const auto peer_onion{CreatePeer(addr_onion)};
945  const auto peer_i2p{CreatePeer(addr_i2p)};
946  const auto peer_cjdns{CreatePeer(addr_cjdns)};
947 
948  // one local clearnet address - advertise to all but privacy peers
949  AddLocal(addr_ipv4);
950  BOOST_CHECK(GetLocalAddress(*peer_ipv4) == addr_ipv4);
951  BOOST_CHECK(GetLocalAddress(*peer_ipv6) == addr_ipv4);
952  BOOST_CHECK(GetLocalAddress(*peer_ipv6_tunnel) == addr_ipv4);
953  BOOST_CHECK(GetLocalAddress(*peer_teredo) == addr_ipv4);
954  BOOST_CHECK(GetLocalAddress(*peer_cjdns) == addr_ipv4);
955  BOOST_CHECK(!GetLocalAddress(*peer_onion).IsValid());
956  BOOST_CHECK(!GetLocalAddress(*peer_i2p).IsValid());
957  RemoveLocal(addr_ipv4);
958 
959  // local privacy addresses - don't advertise to clearnet peers
960  AddLocal(addr_onion);
961  AddLocal(addr_i2p);
962  BOOST_CHECK(!GetLocalAddress(*peer_ipv4).IsValid());
963  BOOST_CHECK(!GetLocalAddress(*peer_ipv6).IsValid());
964  BOOST_CHECK(!GetLocalAddress(*peer_ipv6_tunnel).IsValid());
965  BOOST_CHECK(!GetLocalAddress(*peer_teredo).IsValid());
966  BOOST_CHECK(!GetLocalAddress(*peer_cjdns).IsValid());
967  BOOST_CHECK(GetLocalAddress(*peer_onion) == addr_onion);
968  BOOST_CHECK(GetLocalAddress(*peer_i2p) == addr_i2p);
969  RemoveLocal(addr_onion);
970  RemoveLocal(addr_i2p);
971 
972  // local addresses from all networks
973  AddLocal(addr_ipv4);
974  AddLocal(addr_ipv6);
975  AddLocal(addr_ipv6_tunnel);
976  AddLocal(addr_teredo);
977  AddLocal(addr_onion);
978  AddLocal(addr_i2p);
979  AddLocal(addr_cjdns);
980  BOOST_CHECK(GetLocalAddress(*peer_ipv4) == addr_ipv4);
981  BOOST_CHECK(GetLocalAddress(*peer_ipv6) == addr_ipv6);
982  BOOST_CHECK(GetLocalAddress(*peer_ipv6_tunnel) == addr_ipv6);
983  BOOST_CHECK(GetLocalAddress(*peer_teredo) == addr_ipv4);
984  BOOST_CHECK(GetLocalAddress(*peer_onion) == addr_onion);
985  BOOST_CHECK(GetLocalAddress(*peer_i2p) == addr_i2p);
986  BOOST_CHECK(GetLocalAddress(*peer_cjdns) == addr_cjdns);
987  RemoveLocal(addr_ipv4);
988  RemoveLocal(addr_ipv6);
989  RemoveLocal(addr_ipv6_tunnel);
990  RemoveLocal(addr_teredo);
991  RemoveLocal(addr_onion);
992  RemoveLocal(addr_i2p);
993  RemoveLocal(addr_cjdns);
994 }
995 
996 namespace {
997 
998 CKey GenerateRandomTestKey(FastRandomContext& rng) noexcept
999 {
1000  CKey key;
1001  uint256 key_data = rng.rand256();
1002  key.Set(key_data.begin(), key_data.end(), true);
1003  return key;
1004 }
1005 
1014 class V2TransportTester
1015 {
1016  FastRandomContext& m_rng;
1017  V2Transport m_transport;
1018  BIP324Cipher m_cipher;
1019  bool m_test_initiator;
1020 
1021  std::vector<uint8_t> m_sent_garbage;
1022  std::vector<uint8_t> m_recv_garbage;
1023  std::vector<uint8_t> m_to_send;
1024  std::vector<uint8_t> m_received;
1025  std::deque<CSerializedNetMsg> m_msg_to_send;
1026  bool m_sent_aad{false};
1027 
1028 public:
1030  explicit V2TransportTester(FastRandomContext& rng, bool test_initiator)
1031  : m_rng{rng},
1032  m_transport{0, test_initiator},
1033  m_cipher{GenerateRandomTestKey(m_rng), MakeByteSpan(m_rng.rand256())},
1034  m_test_initiator(test_initiator) {}
1035 
1043  using InteractResult = std::optional<std::vector<std::optional<CNetMessage>>>;
1044 
1050  InteractResult Interact()
1051  {
1052  std::vector<std::optional<CNetMessage>> ret;
1053  while (true) {
1054  bool progress{false};
1055  // Send bytes from m_to_send to the transport.
1056  if (!m_to_send.empty()) {
1057  Span<const uint8_t> to_send = Span{m_to_send}.first(1 + m_rng.randrange(m_to_send.size()));
1058  size_t old_len = to_send.size();
1059  if (!m_transport.ReceivedBytes(to_send)) {
1060  return std::nullopt; // transport error occurred
1061  }
1062  if (old_len != to_send.size()) {
1063  progress = true;
1064  m_to_send.erase(m_to_send.begin(), m_to_send.begin() + (old_len - to_send.size()));
1065  }
1066  }
1067  // Retrieve messages received by the transport.
1068  if (m_transport.ReceivedMessageComplete() && (!progress || m_rng.randbool())) {
1069  bool reject{false};
1070  auto msg = m_transport.GetReceivedMessage({}, reject);
1071  if (reject) {
1072  ret.emplace_back(std::nullopt);
1073  } else {
1074  ret.emplace_back(std::move(msg));
1075  }
1076  progress = true;
1077  }
1078  // Enqueue a message to be sent by the transport to us.
1079  if (!m_msg_to_send.empty() && (!progress || m_rng.randbool())) {
1080  if (m_transport.SetMessageToSend(m_msg_to_send.front())) {
1081  m_msg_to_send.pop_front();
1082  progress = true;
1083  }
1084  }
1085  // Receive bytes from the transport.
1086  const auto& [recv_bytes, _more, _msg_type] = m_transport.GetBytesToSend(!m_msg_to_send.empty());
1087  if (!recv_bytes.empty() && (!progress || m_rng.randbool())) {
1088  size_t to_receive = 1 + m_rng.randrange(recv_bytes.size());
1089  m_received.insert(m_received.end(), recv_bytes.begin(), recv_bytes.begin() + to_receive);
1090  progress = true;
1091  m_transport.MarkBytesSent(to_receive);
1092  }
1093  if (!progress) break;
1094  }
1095  return ret;
1096  }
1097 
1099  BIP324Cipher& GetCipher() { return m_cipher; }
1100 
1102  void Send(Span<const uint8_t> data)
1103  {
1104  m_to_send.insert(m_to_send.end(), data.begin(), data.end());
1105  }
1106 
1108  void SendV1Version(const MessageStartChars& magic)
1109  {
1110  CMessageHeader hdr(magic, "version", 126 + m_rng.randrange(11));
1111  DataStream ser{};
1112  ser << hdr;
1113  m_to_send.insert(m_to_send.end(), UCharCast(ser.data()), UCharCast(ser.data() + ser.size()));
1114  }
1115 
1117  void Send(Span<const std::byte> data) { Send(MakeUCharSpan(data)); }
1118 
1120  void SendKey() { Send(m_cipher.GetOurPubKey()); }
1121 
1123  void SendGarbage(Span<const uint8_t> garbage)
1124  {
1125  // Remember the specified garbage (so we can use it as AAD).
1126  m_sent_garbage.assign(garbage.begin(), garbage.end());
1127  // Schedule it for sending.
1128  Send(m_sent_garbage);
1129  }
1130 
1132  void SendGarbage(size_t garbage_len)
1133  {
1134  // Generate random garbage and send it.
1135  SendGarbage(m_rng.randbytes<uint8_t>(garbage_len));
1136  }
1137 
1139  void SendGarbage()
1140  {
1141  SendGarbage(m_rng.randrange(V2Transport::MAX_GARBAGE_LEN + 1));
1142  }
1143 
1145  void AddMessage(std::string m_type, std::vector<uint8_t> payload)
1146  {
1148  msg.m_type = std::move(m_type);
1149  msg.data = std::move(payload);
1150  m_msg_to_send.push_back(std::move(msg));
1151  }
1152 
1158  void ReceiveKey()
1159  {
1160  // When processing a key, enough bytes need to have been received already.
1161  BOOST_REQUIRE(m_received.size() >= EllSwiftPubKey::size());
1162  // Initialize the cipher using it (acting as the opposite side of the tested transport).
1163  m_cipher.Initialize(MakeByteSpan(m_received).first(EllSwiftPubKey::size()), !m_test_initiator);
1164  // Strip the processed bytes off the front of the receive buffer.
1165  m_received.erase(m_received.begin(), m_received.begin() + EllSwiftPubKey::size());
1166  }
1167 
1170  void SendPacket(Span<const uint8_t> content, Span<const uint8_t> aad = {}, bool ignore = false)
1171  {
1172  // Use cipher to construct ciphertext.
1173  std::vector<std::byte> ciphertext;
1174  ciphertext.resize(content.size() + BIP324Cipher::EXPANSION);
1175  m_cipher.Encrypt(
1176  /*contents=*/MakeByteSpan(content),
1177  /*aad=*/MakeByteSpan(aad),
1178  /*ignore=*/ignore,
1179  /*output=*/ciphertext);
1180  // Schedule it for sending.
1181  Send(ciphertext);
1182  }
1183 
1185  void SendGarbageTerm()
1186  {
1187  // Schedule the garbage terminator to be sent.
1188  Send(m_cipher.GetSendGarbageTerminator());
1189  }
1190 
1192  void SendVersion(Span<const uint8_t> version_data = {}, bool vers_ignore = false)
1193  {
1195  // Set AAD to garbage only for first packet.
1196  if (!m_sent_aad) aad = m_sent_garbage;
1197  SendPacket(/*content=*/version_data, /*aad=*/aad, /*ignore=*/vers_ignore);
1198  m_sent_aad = true;
1199  }
1200 
1204  std::vector<uint8_t> ReceivePacket(Span<const std::byte> aad = {})
1205  {
1206  std::vector<uint8_t> contents;
1207  // Loop as long as there are ignored packets that are to be skipped.
1208  while (true) {
1209  // When processing a packet, at least enough bytes for its length descriptor must be received.
1210  BOOST_REQUIRE(m_received.size() >= BIP324Cipher::LENGTH_LEN);
1211  // Decrypt the content length.
1212  size_t size = m_cipher.DecryptLength(MakeByteSpan(Span{m_received}.first(BIP324Cipher::LENGTH_LEN)));
1213  // Check that the full packet is in the receive buffer.
1214  BOOST_REQUIRE(m_received.size() >= size + BIP324Cipher::EXPANSION);
1215  // Decrypt the packet contents.
1216  contents.resize(size);
1217  bool ignore{false};
1218  bool ret = m_cipher.Decrypt(
1219  /*input=*/MakeByteSpan(
1220  Span{m_received}.first(size + BIP324Cipher::EXPANSION).subspan(BIP324Cipher::LENGTH_LEN)),
1221  /*aad=*/aad,
1222  /*ignore=*/ignore,
1223  /*contents=*/MakeWritableByteSpan(contents));
1224  BOOST_CHECK(ret);
1225  // Don't expect AAD in further packets.
1226  aad = {};
1227  // Strip the processed packet's bytes off the front of the receive buffer.
1228  m_received.erase(m_received.begin(), m_received.begin() + size + BIP324Cipher::EXPANSION);
1229  // Stop if the ignore bit is not set on this packet.
1230  if (!ignore) break;
1231  }
1232  return contents;
1233  }
1234 
1237  void ReceiveGarbage()
1238  {
1239  // Figure out the garbage length.
1240  size_t garblen;
1241  for (garblen = 0; garblen <= V2Transport::MAX_GARBAGE_LEN; ++garblen) {
1242  BOOST_REQUIRE(m_received.size() >= garblen + BIP324Cipher::GARBAGE_TERMINATOR_LEN);
1243  auto term_span = MakeByteSpan(Span{m_received}.subspan(garblen, BIP324Cipher::GARBAGE_TERMINATOR_LEN));
1244  if (std::ranges::equal(term_span, m_cipher.GetReceiveGarbageTerminator())) break;
1245  }
1246  // Copy the garbage to a buffer.
1247  m_recv_garbage.assign(m_received.begin(), m_received.begin() + garblen);
1248  // Strip garbage + garbage terminator off the front of the receive buffer.
1249  m_received.erase(m_received.begin(), m_received.begin() + garblen + BIP324Cipher::GARBAGE_TERMINATOR_LEN);
1250  }
1251 
1253  void ReceiveVersion()
1254  {
1255  auto contents = ReceivePacket(/*aad=*/MakeByteSpan(m_recv_garbage));
1256  // Version packets from real BIP324 peers are expected to be empty, despite the fact that
1257  // this class supports *sending* non-empty version packets (to test that BIP324 peers
1258  // correctly ignore version packet contents).
1259  BOOST_CHECK(contents.empty());
1260  }
1261 
1264  void ReceiveMessage(uint8_t short_id, Span<const uint8_t> payload)
1265  {
1266  auto ret = ReceivePacket();
1267  BOOST_CHECK(ret.size() == payload.size() + 1);
1268  BOOST_CHECK(ret[0] == short_id);
1269  BOOST_CHECK(std::ranges::equal(Span{ret}.subspan(1), payload));
1270  }
1271 
1274  void ReceiveMessage(const std::string& m_type, Span<const uint8_t> payload)
1275  {
1276  auto ret = ReceivePacket();
1277  BOOST_REQUIRE(ret.size() == payload.size() + 1 + CMessageHeader::MESSAGE_TYPE_SIZE);
1278  BOOST_CHECK(ret[0] == 0);
1279  for (unsigned i = 0; i < 12; ++i) {
1280  if (i < m_type.size()) {
1281  BOOST_CHECK(ret[1 + i] == m_type[i]);
1282  } else {
1283  BOOST_CHECK(ret[1 + i] == 0);
1284  }
1285  }
1286  BOOST_CHECK(std::ranges::equal(Span{ret}.subspan(1 + CMessageHeader::MESSAGE_TYPE_SIZE), payload));
1287  }
1288 
1291  void SendMessage(std::string mtype, Span<const uint8_t> payload)
1292  {
1293  // Construct contents consisting of 0x00 + 12-byte message type + payload.
1294  std::vector<uint8_t> contents(1 + CMessageHeader::MESSAGE_TYPE_SIZE + payload.size());
1295  std::copy(mtype.begin(), mtype.end(), reinterpret_cast<char*>(contents.data() + 1));
1296  std::copy(payload.begin(), payload.end(), contents.begin() + 1 + CMessageHeader::MESSAGE_TYPE_SIZE);
1297  // Send a packet with that as contents.
1298  SendPacket(contents);
1299  }
1300 
1303  void SendMessage(uint8_t short_id, Span<const uint8_t> payload)
1304  {
1305  // Construct contents consisting of short_id + payload.
1306  std::vector<uint8_t> contents(1 + payload.size());
1307  contents[0] = short_id;
1308  std::copy(payload.begin(), payload.end(), contents.begin() + 1);
1309  // Send a packet with that as contents.
1310  SendPacket(contents);
1311  }
1312 
1314  void CompareSessionIDs() const
1315  {
1316  auto info = m_transport.GetInfo();
1317  BOOST_CHECK(info.session_id);
1318  BOOST_CHECK(uint256(MakeUCharSpan(m_cipher.GetSessionID())) == *info.session_id);
1319  }
1320 
1322  void Damage()
1323  {
1324  m_to_send[m_rng.randrange(m_to_send.size())] ^= (uint8_t{1} << m_rng.randrange(8));
1325  }
1326 };
1327 
1328 } // namespace
1329 
1330 BOOST_AUTO_TEST_CASE(v2transport_test)
1331 {
1332  // A mostly normal scenario, testing a transport in initiator mode.
1333  for (int i = 0; i < 10; ++i) {
1334  V2TransportTester tester(m_rng, true);
1335  auto ret = tester.Interact();
1336  BOOST_REQUIRE(ret && ret->empty());
1337  tester.SendKey();
1338  tester.SendGarbage();
1339  tester.ReceiveKey();
1340  tester.SendGarbageTerm();
1341  tester.SendVersion();
1342  ret = tester.Interact();
1343  BOOST_REQUIRE(ret && ret->empty());
1344  tester.ReceiveGarbage();
1345  tester.ReceiveVersion();
1346  tester.CompareSessionIDs();
1347  auto msg_data_1 = m_rng.randbytes<uint8_t>(m_rng.randrange(100000));
1348  auto msg_data_2 = m_rng.randbytes<uint8_t>(m_rng.randrange(1000));
1349  tester.SendMessage(uint8_t(4), msg_data_1); // cmpctblock short id
1350  tester.SendMessage(0, {}); // Invalidly encoded message
1351  tester.SendMessage("tx", msg_data_2); // 12-character encoded message type
1352  ret = tester.Interact();
1353  BOOST_REQUIRE(ret && ret->size() == 3);
1354  BOOST_CHECK((*ret)[0] && (*ret)[0]->m_type == "cmpctblock" && std::ranges::equal((*ret)[0]->m_recv, MakeByteSpan(msg_data_1)));
1355  BOOST_CHECK(!(*ret)[1]);
1356  BOOST_CHECK((*ret)[2] && (*ret)[2]->m_type == "tx" && std::ranges::equal((*ret)[2]->m_recv, MakeByteSpan(msg_data_2)));
1357 
1358  // Then send a message with a bit error, expecting failure. It's possible this failure does
1359  // not occur immediately (when the length descriptor was modified), but it should come
1360  // eventually, and no messages can be delivered anymore.
1361  tester.SendMessage("bad", msg_data_1);
1362  tester.Damage();
1363  while (true) {
1364  ret = tester.Interact();
1365  if (!ret) break; // failure
1366  BOOST_CHECK(ret->size() == 0); // no message can be delivered
1367  // Send another message.
1368  auto msg_data_3 = m_rng.randbytes<uint8_t>(m_rng.randrange(10000));
1369  tester.SendMessage(uint8_t(12), msg_data_3); // getheaders short id
1370  }
1371  }
1372 
1373  // Normal scenario, with a transport in responder node.
1374  for (int i = 0; i < 10; ++i) {
1375  V2TransportTester tester(m_rng, false);
1376  tester.SendKey();
1377  tester.SendGarbage();
1378  auto ret = tester.Interact();
1379  BOOST_REQUIRE(ret && ret->empty());
1380  tester.ReceiveKey();
1381  tester.SendGarbageTerm();
1382  tester.SendVersion();
1383  ret = tester.Interact();
1384  BOOST_REQUIRE(ret && ret->empty());
1385  tester.ReceiveGarbage();
1386  tester.ReceiveVersion();
1387  tester.CompareSessionIDs();
1388  auto msg_data_1 = m_rng.randbytes<uint8_t>(m_rng.randrange(100000));
1389  auto msg_data_2 = m_rng.randbytes<uint8_t>(m_rng.randrange(1000));
1390  tester.SendMessage(uint8_t(14), msg_data_1); // inv short id
1391  tester.SendMessage(uint8_t(19), msg_data_2); // pong short id
1392  ret = tester.Interact();
1393  BOOST_REQUIRE(ret && ret->size() == 2);
1394  BOOST_CHECK((*ret)[0] && (*ret)[0]->m_type == "inv" && std::ranges::equal((*ret)[0]->m_recv, MakeByteSpan(msg_data_1)));
1395  BOOST_CHECK((*ret)[1] && (*ret)[1]->m_type == "pong" && std::ranges::equal((*ret)[1]->m_recv, MakeByteSpan(msg_data_2)));
1396 
1397  // Then send a too-large message.
1398  auto msg_data_3 = m_rng.randbytes<uint8_t>(4005000);
1399  tester.SendMessage(uint8_t(11), msg_data_3); // getdata short id
1400  ret = tester.Interact();
1401  BOOST_CHECK(!ret);
1402  }
1403 
1404  // Various valid but unusual scenarios.
1405  for (int i = 0; i < 50; ++i) {
1407  bool initiator = m_rng.randbool();
1409  size_t garb_len = m_rng.randbool() ? 0 : V2Transport::MAX_GARBAGE_LEN;
1411  unsigned num_ignore_version = m_rng.randrange(10);
1413  auto ver_data = m_rng.randbytes<uint8_t>(m_rng.randbool() ? 0 : m_rng.randrange(1000));
1415  bool send_immediately = !initiator || m_rng.randbool();
1417  unsigned num_decoys_1 = m_rng.randrange(1000), num_decoys_2 = m_rng.randrange(1000);
1418  V2TransportTester tester(m_rng, initiator);
1419  if (send_immediately) {
1420  tester.SendKey();
1421  tester.SendGarbage(garb_len);
1422  }
1423  auto ret = tester.Interact();
1424  BOOST_REQUIRE(ret && ret->empty());
1425  if (!send_immediately) {
1426  tester.SendKey();
1427  tester.SendGarbage(garb_len);
1428  }
1429  tester.ReceiveKey();
1430  tester.SendGarbageTerm();
1431  for (unsigned v = 0; v < num_ignore_version; ++v) {
1432  size_t ver_ign_data_len = m_rng.randbool() ? 0 : m_rng.randrange(1000);
1433  auto ver_ign_data = m_rng.randbytes<uint8_t>(ver_ign_data_len);
1434  tester.SendVersion(ver_ign_data, true);
1435  }
1436  tester.SendVersion(ver_data, false);
1437  ret = tester.Interact();
1438  BOOST_REQUIRE(ret && ret->empty());
1439  tester.ReceiveGarbage();
1440  tester.ReceiveVersion();
1441  tester.CompareSessionIDs();
1442  for (unsigned d = 0; d < num_decoys_1; ++d) {
1443  auto decoy_data = m_rng.randbytes<uint8_t>(m_rng.randrange(1000));
1444  tester.SendPacket(/*content=*/decoy_data, /*aad=*/{}, /*ignore=*/true);
1445  }
1446  auto msg_data_1 = m_rng.randbytes<uint8_t>(m_rng.randrange(4000000));
1447  tester.SendMessage(uint8_t(28), msg_data_1);
1448  for (unsigned d = 0; d < num_decoys_2; ++d) {
1449  auto decoy_data = m_rng.randbytes<uint8_t>(m_rng.randrange(1000));
1450  tester.SendPacket(/*content=*/decoy_data, /*aad=*/{}, /*ignore=*/true);
1451  }
1452  auto msg_data_2 = m_rng.randbytes<uint8_t>(m_rng.randrange(1000));
1453  tester.SendMessage(uint8_t(13), msg_data_2); // headers short id
1454  // Send invalidly-encoded message
1455  tester.SendMessage(std::string("blocktxn\x00\x00\x00a", CMessageHeader::MESSAGE_TYPE_SIZE), {});
1456  tester.SendMessage("foobar", {}); // test receiving unknown message type
1457  tester.AddMessage("barfoo", {}); // test sending unknown message type
1458  ret = tester.Interact();
1459  BOOST_REQUIRE(ret && ret->size() == 4);
1460  BOOST_CHECK((*ret)[0] && (*ret)[0]->m_type == "addrv2" && std::ranges::equal((*ret)[0]->m_recv, MakeByteSpan(msg_data_1)));
1461  BOOST_CHECK((*ret)[1] && (*ret)[1]->m_type == "headers" && std::ranges::equal((*ret)[1]->m_recv, MakeByteSpan(msg_data_2)));
1462  BOOST_CHECK(!(*ret)[2]);
1463  BOOST_CHECK((*ret)[3] && (*ret)[3]->m_type == "foobar" && (*ret)[3]->m_recv.empty());
1464  tester.ReceiveMessage("barfoo", {});
1465  }
1466 
1467  // Too long garbage (initiator).
1468  {
1469  V2TransportTester tester(m_rng, true);
1470  auto ret = tester.Interact();
1471  BOOST_REQUIRE(ret && ret->empty());
1472  tester.SendKey();
1473  tester.SendGarbage(V2Transport::MAX_GARBAGE_LEN + 1);
1474  tester.ReceiveKey();
1475  tester.SendGarbageTerm();
1476  ret = tester.Interact();
1477  BOOST_CHECK(!ret);
1478  }
1479 
1480  // Too long garbage (responder).
1481  {
1482  V2TransportTester tester(m_rng, false);
1483  tester.SendKey();
1484  tester.SendGarbage(V2Transport::MAX_GARBAGE_LEN + 1);
1485  auto ret = tester.Interact();
1486  BOOST_REQUIRE(ret && ret->empty());
1487  tester.ReceiveKey();
1488  tester.SendGarbageTerm();
1489  ret = tester.Interact();
1490  BOOST_CHECK(!ret);
1491  }
1492 
1493  // Send garbage that includes the first 15 garbage terminator bytes somewhere.
1494  {
1495  V2TransportTester tester(m_rng, true);
1496  auto ret = tester.Interact();
1497  BOOST_REQUIRE(ret && ret->empty());
1498  tester.SendKey();
1499  tester.ReceiveKey();
1501  size_t len_before = m_rng.randrange(V2Transport::MAX_GARBAGE_LEN - 16 + 1);
1503  size_t len_after = m_rng.randrange(V2Transport::MAX_GARBAGE_LEN - 16 - len_before + 1);
1504  // Construct len_before + 16 + len_after random bytes.
1505  auto garbage = m_rng.randbytes<uint8_t>(len_before + 16 + len_after);
1506  // Replace the designed 16 bytes in the middle with the to-be-sent garbage terminator.
1507  auto garb_term = MakeUCharSpan(tester.GetCipher().GetSendGarbageTerminator());
1508  std::copy(garb_term.begin(), garb_term.begin() + 16, garbage.begin() + len_before);
1509  // Introduce a bit error in the last byte of that copied garbage terminator, making only
1510  // the first 15 of them match.
1511  garbage[len_before + 15] ^= (uint8_t(1) << m_rng.randrange(8));
1512  tester.SendGarbage(garbage);
1513  tester.SendGarbageTerm();
1514  tester.SendVersion();
1515  ret = tester.Interact();
1516  BOOST_REQUIRE(ret && ret->empty());
1517  tester.ReceiveGarbage();
1518  tester.ReceiveVersion();
1519  tester.CompareSessionIDs();
1520  auto msg_data_1 = m_rng.randbytes<uint8_t>(4000000); // test that receiving 4M payload works
1521  auto msg_data_2 = m_rng.randbytes<uint8_t>(4000000); // test that sending 4M payload works
1522  tester.SendMessage(uint8_t(m_rng.randrange(223) + 33), {}); // unknown short id
1523  tester.SendMessage(uint8_t(2), msg_data_1); // "block" short id
1524  tester.AddMessage("blocktxn", msg_data_2); // schedule blocktxn to be sent to us
1525  ret = tester.Interact();
1526  BOOST_REQUIRE(ret && ret->size() == 2);
1527  BOOST_CHECK(!(*ret)[0]);
1528  BOOST_CHECK((*ret)[1] && (*ret)[1]->m_type == "block" && std::ranges::equal((*ret)[1]->m_recv, MakeByteSpan(msg_data_1)));
1529  tester.ReceiveMessage(uint8_t(3), msg_data_2); // "blocktxn" short id
1530  }
1531 
1532  // Send correct network's V1 header
1533  {
1534  V2TransportTester tester(m_rng, false);
1535  tester.SendV1Version(Params().MessageStart());
1536  auto ret = tester.Interact();
1537  BOOST_CHECK(ret);
1538  }
1539 
1540  // Send wrong network's V1 header
1541  {
1542  V2TransportTester tester(m_rng, false);
1543  tester.SendV1Version(CChainParams::Main()->MessageStart());
1544  auto ret = tester.Interact();
1545  BOOST_CHECK(!ret);
1546  }
1547 }
1548 
static Mutex g_msgproc_mutex
Mutex for anything that is only accessed via the msg processing thread.
Definition: net.h:1011
std::vector< B > randbytes(size_t len) noexcept
Generate random bytes.
Definition: random.h:297
Span< const std::byte > GetSendGarbageTerminator() const noexcept
Get the Garbage Terminator to send.
Definition: bip324.h:90
CONSTEXPR_IF_NOT_DEBUG Span< C > first(std::size_t count) const noexcept
Definition: span.h:205
CONSTEXPR_IF_NOT_DEBUG Span< C > subspan(std::size_t offset) const noexcept
Definition: span.h:195
int ret
void Remove(Network net) EXCLUSIVE_LOCKS_REQUIRED(!m_mutex)
Definition: netbase.h:110
bool randbool() noexcept
Generate a random boolean.
Definition: random.h:316
Inbound connections are those initiated by a peer.
A set of addresses that represent the hash of a string or FQDN.
Definition: netaddress.h:53
constexpr C * end() const noexcept
Definition: span.h:176
BOOST_AUTO_TEST_CASE(cnode_listen_port)
Definition: net_tests.cpp:40
node::NodeContext m_node
Definition: bitcoin-gui.cpp:42
CService GetLocalAddress(const CNode &peer)
Definition: net.cpp:226
#define strprintf
Format arguments and return the string or write to given std::ostream (see tinyformat::format doc for...
Definition: tinyformat.h:1172
IPv4.
Definition: netaddress.h:37
bool IsIPv6() const
Definition: netaddress.h:158
void Add(Network net) EXCLUSIVE_LOCKS_REQUIRED(!m_mutex)
Definition: netbase.h:103
static constexpr size_t size()
Definition: pubkey.h:327
Span< std::byte > MakeWritableByteSpan(V &&v) noexcept
Definition: span.h:274
constexpr std::size_t size() const noexcept
Definition: span.h:187
static constexpr SerParams V2_NETWORK
Definition: protocol.h:409
CNetAddr UtilBuildAddress(unsigned char p1, unsigned char p2, unsigned char p3, unsigned char p4)
Definition: net_tests.cpp:756
static constexpr uint32_t MAX_GARBAGE_LEN
Definition: net.h:634
void Initialize(const EllSwiftPubKey &their_pubkey, bool initiator, bool self_decrypt=false) noexcept
Initialize when the other side&#39;s public key is received.
Definition: bip324.cpp:34
unsigned DecryptLength(Span< const std::byte > input) noexcept
Decrypt the length of a packet.
Definition: bip324.cpp:89
bool Contains(Network net) const EXCLUSIVE_LOCKS_REQUIRED(!m_mutex)
Definition: netbase.h:124
bool IsInternal() const
Definition: netaddress.cpp:476
bool IsBindAny() const
Definition: netaddress.cpp:307
CService MaybeFlipIPv6toCJDNS(const CService &service)
If an IPv6 address belongs to the address range used by the CJDNS network and the CJDNS network is re...
Definition: netbase.cpp:887
memcpy(result.begin(), stream.data(), stream.size())
bool SetSpecial(const std::string &addr)
Parse a Tor or I2P address and set this object to it.
Definition: netaddress.cpp:211
void ForceSetArg(const std::string &strArg, const std::string &strValue)
Definition: args.cpp:546
These are the default connections that we use to connect with the network.
bool SoftSetArg(const std::string &strArg, const std::string &strValue)
Set an argument if it doesn&#39;t already have a value.
Definition: args.cpp:530
The BIP324 packet cipher, encapsulating its key derivation, stream cipher, and AEAD.
Definition: bip324.h:19
BytesToSend GetBytesToSend(bool have_next_message) const noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex)
Get bytes to send on the wire, if any, along with other information about it.
Definition: net.cpp:1513
I2P.
Definition: netaddress.h:46
static std::unique_ptr< const CChainParams > Main()
value_type * data()
Definition: streams.h:188
CSerializedNetMsg Make(std::string msg_type, Args &&... args)
bool ReceivedMessageComplete() const noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex)
Returns true if the current message is complete (so GetReceivedMessage can be called).
Definition: net.cpp:1070
constexpr unsigned char * begin()
Definition: uint256.h:115
std::string ToStringAddr() const
Definition: netaddress.cpp:584
bool IsValid() const
Definition: netaddress.cpp:428
std::function< void(const CAddress &addr, const std::string &msg_type, Span< const unsigned char > data, bool is_incoming)> CaptureMessage
Defaults to CaptureMessageToFile(), but can be overridden by unit tests.
Definition: net.cpp:4018
uint16_t nPort
Definition: net.h:175
bool IsCJDNS() const
Definition: netaddress.h:176
std::array< uint8_t, 4 > MessageStartChars
void JumpOutOfIbd()
Toggle IsInitialBlockDownload from true to false.
Definition: validation.cpp:18
bool IsIPv4() const
Definition: netaddress.h:157
bool IsI2P() const
Definition: netaddress.h:175
Span< const std::byte > GetSessionID() const noexcept
Get the Session ID.
Definition: bip324.h:87
uint16_t GetListenPort()
Definition: net.cpp:144
constexpr const char * VERSION
The version message provides information about the transmitting node to the receiving node at the beg...
Definition: protocol.h:65
std::optional< CService > GetLocalAddrForPeer(CNode &node)
Returns a local address that we should advertise to this peer.
Definition: net.cpp:246
static constexpr unsigned GARBAGE_TERMINATOR_LEN
Definition: bip324.h:23
const EllSwiftPubKey & GetOurPubKey() const noexcept
Retrieve our public key.
Definition: bip324.h:54
BOOST_FIXTURE_TEST_SUITE(cuckoocache_tests, BasicTestingSetup)
Test Suite for CuckooCache.
std::vector< CNetAddr > LookupHost(const std::string &name, unsigned int nMaxSolutions, bool fAllowLookup, DNSLookupFn dns_lookup_function)
Resolve a host string to its corresponding network addresses.
Definition: netbase.cpp:177
#define LOCK(cs)
Definition: sync.h:257
Double ended buffer combining vector and stream-like interfaces.
Definition: streams.h:146
ArgsManager * args
Definition: context.h:74
bool AddLocal(const CService &addr_, int nScore)
Definition: net.cpp:277
constexpr const char * VERACK
The verack message acknowledges a previously-received version message, informing the connecting node ...
Definition: protocol.h:70
A combination of a network address (CNetAddr) and a (TCP) port.
Definition: netaddress.h:530
Fast randomness source.
Definition: random.h:376
BOOST_AUTO_TEST_SUITE_END()
A CService with information about it as peer.
Definition: protocol.h:366
BOOST_CHECK_EXCEPTION predicates to check the specific validation error.
Definition: setup_common.h:295
static const int PROTOCOL_VERSION
network protocol versioning
static CService ip(uint32_t i)
int64_t NodeId
Definition: net.h:97
bool ReceivedBytes(Span< const uint8_t > &msg_bytes) noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex
Feed wire bytes to the transport.
Definition: net.cpp:1322
""_hex is a compile-time user-defined literal returning a std::array<std::byte>, equivalent to ParseH...
Definition: strencodings.h:427
bool SetMessageToSend(CSerializedNetMsg &msg) noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex)
Set the next message to send.
Definition: net.cpp:1481
void Set(const T pbegin, const T pend, bool fCompressedIn)
Initialize using begin and end iterators to byte data.
Definition: key.h:103
bool Decrypt(Span< const std::byte > input, Span< const std::byte > aad, bool &ignore, Span< std::byte > contents) noexcept
Decrypt a packet.
Definition: bip324.cpp:100
ArgsManager gArgs
Definition: args.cpp:42
std::string ToLower(std::string_view str)
Returns the lowercase equivalent of the given string.
Info GetInfo() const noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex)
Retrieve information about this transport.
Definition: net.cpp:1578
constexpr C * begin() const noexcept
Definition: span.h:175
Network address.
Definition: netaddress.h:111
256-bit opaque blob.
Definition: uint256.h:201
std::vector< CService > Lookup(const std::string &name, uint16_t portDefault, bool fAllowLookup, unsigned int nMaxSolutions, DNSLookupFn dns_lookup_function)
Resolve a service string to its corresponding service.
Definition: netbase.cpp:195
int nScore
Definition: net.h:174
#define BOOST_CHECK_EQUAL(v1, v2)
Definition: object.cpp:18
const CChainParams & Params()
Return the currently selected parameters.
GlobalMutex g_maplocalhost_mutex
Definition: net.cpp:124
uint256 rand256() noexcept
generate a random uint256.
Definition: random.h:308
constexpr unsigned char * end()
Definition: uint256.h:116
Span< const std::byte > MakeByteSpan(V &&v) noexcept
Definition: span.h:269
IPv6.
Definition: netaddress.h:40
void RemoveAll() EXCLUSIVE_LOCKS_REQUIRED(!m_mutex)
Definition: netbase.h:117
std::string HexStr(const Span< const uint8_t > s)
Convert a span of bytes to a lower-case hexadecimal string.
Definition: hex_base.cpp:29
TOR (v2 or v3)
Definition: netaddress.h:43
constexpr auto MakeUCharSpan(V &&v) -> decltype(UCharSpanCast(Span
Like the Span constructor, but for (const) unsigned char member types only.
Definition: span.h:296
I randrange(I range) noexcept
Generate a random integer in the range [0..range), with range > 0.
Definition: random.h:254
void Encrypt(Span< const std::byte > contents, Span< const std::byte > aad, bool ignore, Span< std::byte > output) noexcept
Encrypt a packet.
Definition: bip324.cpp:73
unsigned char * UCharCast(char *c)
Definition: span.h:280
CNetMessage GetReceivedMessage(std::chrono::microseconds time, bool &reject_message) noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex)
Retrieve a completed message from transport.
Definition: net.cpp:1452
An encapsulated private key.
Definition: key.h:34
Information about a peer.
Definition: net.h:672
Span< const std::byte > GetReceiveGarbageTerminator() const noexcept
Get the expected Garbage Terminator to receive.
Definition: bip324.h:93
bool SetInternal(const std::string &name)
Create an "internal" address that represents a name or FQDN.
Definition: netaddress.cpp:172
static constexpr SerParams V1_NETWORK
Definition: protocol.h:408
static constexpr unsigned EXPANSION
Definition: bip324.h:27
Identical to TestingSetup, but chain set to regtest.
Definition: setup_common.h:128
bool IsAddrV1Compatible() const
Check if the current object can be serialized in pre-ADDRv2/BIP155 format.
Definition: netaddress.cpp:481
static constexpr size_t MESSAGE_TYPE_SIZE
Definition: protocol.h:31
CJDNS.
Definition: netaddress.h:49
bool IsTor() const
Definition: netaddress.h:174
static constexpr unsigned LENGTH_LEN
Definition: bip324.h:25
void MarkBytesSent(size_t bytes_sent) noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex)
Report how many bytes returned by the last GetBytesToSend() have been sent.
Definition: net.cpp:1530
std::unique_ptr< ChainstateManager > chainman
Definition: context.h:72
std::string ToString(const T &t)
Locale-independent version of std::to_string.
Definition: string.h:233
void RemoveLocal(const CService &addr)
Definition: net.cpp:310
bool IsLocal(const CService &addr)
check whether a given address is potentially local
Definition: net.cpp:329
ReachableNets g_reachable_nets
Definition: netbase.cpp:43
#define BOOST_CHECK(expr)
Definition: object.cpp:17
Message header.
Definition: protocol.h:28
Addresses from these networks are not publicly routable on the global Internet.
Definition: netaddress.h:34
std::unique_ptr< PeerManager > peerman
Definition: context.h:71