6#include <chainparams.h>
28#include <boost/test/unit_test.hpp>
37using namespace std::literals;
49 uint16_t altPort = 12345;
60 ipv4Addr.s_addr = 0xa0b0c001;
65 std::unique_ptr<CNode> pnode1 = std::make_unique<CNode>(
id++,
84 std::unique_ptr<CNode> pnode2 = std::make_unique<CNode>(
id++,
103 std::unique_ptr<CNode> pnode3 = std::make_unique<CNode>(
id++,
122 std::unique_ptr<CNode> pnode4 = std::make_unique<CNode>(
id++,
132 BOOST_CHECK(pnode4->IsFullOutboundConn() ==
false);
148 BOOST_REQUIRE(!addr.
IsValid());
149 BOOST_REQUIRE(addr.
IsIPv4());
156 addr =
LookupHost(
"255.255.255.255",
false).value();
157 BOOST_REQUIRE(!addr.
IsValid());
158 BOOST_REQUIRE(addr.
IsIPv4());
165 addr =
LookupHost(
"12.34.56.78",
false).value();
167 BOOST_REQUIRE(addr.
IsIPv4());
175 BOOST_REQUIRE(!addr.
IsValid());
176 BOOST_REQUIRE(addr.
IsIPv6());
183 addr =
LookupHost(
"1122:3344:5566:7788:9900:aabb:ccdd:eeff",
false).value();
185 BOOST_REQUIRE(addr.
IsIPv6());
196 const std::string link_local{
"fe80::1"};
197 const std::string scoped_addr{link_local +
"%32"};
198 addr =
LookupHost(scoped_addr,
false).value();
200 BOOST_REQUIRE(addr.
IsIPv6());
208 const char* torv3_addr =
"pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion";
211 BOOST_REQUIRE(addr.
IsTor());
226 "pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd\0wtf.onion", 66}));
235 const char* i2p_addr =
"UDHDrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.I2P";
238 BOOST_REQUIRE(addr.
IsI2P());
258 !addr.
SetSpecial(
"pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscsad.b32.i2p"));
265 BOOST_REQUIRE(!addr.
IsValid());
280 const std::map<std::string, std::string> canonical_representations_ipv6{
281 {
"0000:0000:0000:0000:0000:0000:0000:0000",
"::"},
282 {
"000:0000:000:00:0:00:000:0000",
"::"},
283 {
"000:000:000:000:000:000:000:000",
"::"},
284 {
"00:00:00:00:00:00:00:00",
"::"},
285 {
"0:0:0:0:0:0:0:0",
"::"},
286 {
"0:0:0:0:0:0:0:1",
"::1"},
287 {
"2001:0:0:1:0:0:0:1",
"2001:0:0:1::1"},
288 {
"2001:0db8:0:0:1:0:0:1",
"2001:db8::1:0:0:1"},
289 {
"2001:0db8:85a3:0000:0000:8a2e:0370:7334",
"2001:db8:85a3::8a2e:370:7334"},
290 {
"2001:0db8::0001",
"2001:db8::1"},
291 {
"2001:0db8::0001:0000",
"2001:db8::1:0"},
292 {
"2001:0db8::1:0:0:1",
"2001:db8::1:0:0:1"},
293 {
"2001:db8:0000:0:1::1",
"2001:db8::1:0:0:1"},
294 {
"2001:db8:0000:1:1:1:1:1",
"2001:db8:0:1:1:1:1:1"},
295 {
"2001:db8:0:0:0:0:2:1",
"2001:db8::2:1"},
296 {
"2001:db8:0:0:0::1",
"2001:db8::1"},
297 {
"2001:db8:0:0:1:0:0:1",
"2001:db8::1:0:0:1"},
298 {
"2001:db8:0:0:1::1",
"2001:db8::1:0:0:1"},
299 {
"2001:DB8:0:0:1::1",
"2001:db8::1:0:0:1"},
300 {
"2001:db8:0:0::1",
"2001:db8::1"},
301 {
"2001:db8:0:0:aaaa::1",
"2001:db8::aaaa:0:0:1"},
302 {
"2001:db8:0:1:1:1:1:1",
"2001:db8:0:1:1:1:1:1"},
303 {
"2001:db8:0::1",
"2001:db8::1"},
304 {
"2001:db8:85a3:0:0:8a2e:370:7334",
"2001:db8:85a3::8a2e:370:7334"},
305 {
"2001:db8::0:1",
"2001:db8::1"},
306 {
"2001:db8::0:1:0:0:1",
"2001:db8::1:0:0:1"},
307 {
"2001:DB8::1",
"2001:db8::1"},
308 {
"2001:db8::1",
"2001:db8::1"},
309 {
"2001:db8::1:0:0:1",
"2001:db8::1:0:0:1"},
310 {
"2001:db8::1:1:1:1:1",
"2001:db8:0:1:1:1:1:1"},
311 {
"2001:db8::aaaa:0:0:1",
"2001:db8::aaaa:0:0:1"},
312 {
"2001:db8:aaaa:bbbb:cccc:dddd:0:1",
"2001:db8:aaaa:bbbb:cccc:dddd:0:1"},
313 {
"2001:db8:aaaa:bbbb:cccc:dddd::1",
"2001:db8:aaaa:bbbb:cccc:dddd:0:1"},
314 {
"2001:db8:aaaa:bbbb:cccc:dddd:eeee:0001",
"2001:db8:aaaa:bbbb:cccc:dddd:eeee:1"},
315 {
"2001:db8:aaaa:bbbb:cccc:dddd:eeee:001",
"2001:db8:aaaa:bbbb:cccc:dddd:eeee:1"},
316 {
"2001:db8:aaaa:bbbb:cccc:dddd:eeee:01",
"2001:db8:aaaa:bbbb:cccc:dddd:eeee:1"},
317 {
"2001:db8:aaaa:bbbb:cccc:dddd:eeee:1",
"2001:db8:aaaa:bbbb:cccc:dddd:eeee:1"},
318 {
"2001:db8:aaaa:bbbb:cccc:dddd:eeee:aaaa",
"2001:db8:aaaa:bbbb:cccc:dddd:eeee:aaaa"},
319 {
"2001:db8:aaaa:bbbb:cccc:dddd:eeee:AAAA",
"2001:db8:aaaa:bbbb:cccc:dddd:eeee:aaaa"},
320 {
"2001:db8:aaaa:bbbb:cccc:dddd:eeee:AaAa",
"2001:db8:aaaa:bbbb:cccc:dddd:eeee:aaaa"},
322 for (
const auto& [input_address, expected_canonical_representation_output] : canonical_representations_ipv6) {
323 const std::optional<CNetAddr> net_addr{
LookupHost(input_address,
false)};
324 BOOST_REQUIRE(net_addr.value().IsIPv6());
325 BOOST_CHECK_EQUAL(net_addr.value().ToStringAddr(), expected_canonical_representation_output);
335 s << ser_params(addr);
340 s << ser_params(addr);
344 addr =
LookupHost(
"1a1b:2a2b:3a3b:4a4b:5a5b:6a6b:7a7b:8a8b",
false).value();
345 s << ser_params(addr);
352 BOOST_REQUIRE(addr.
SetSpecial(
"pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion"));
353 s << ser_params(addr);
358 s << ser_params(addr);
369 s << ser_params(addr);
374 s << ser_params(addr);
378 addr =
LookupHost(
"1a1b:2a2b:3a3b:4a4b:5a5b:6a6b:7a7b:8a8b",
false).value();
379 s << ser_params(addr);
386 BOOST_REQUIRE(addr.
SetSpecial(
"kpgvmscirrdqpekbqjsvw5teanhatztpp2gl6eee4zkowvwfxwenqaid.onion"));
387 s << ser_params(addr);
392 s << ser_params(addr);
407 s >> ser_params(addr);
412 BOOST_REQUIRE(
s.empty());
418 BOOST_CHECK_EXCEPTION(
s >> ser_params(addr), std::ios_base::failure,
HasReason(
"end of data"));
419 BOOST_REQUIRE(!
s.empty());
426 BOOST_CHECK_EXCEPTION(
s >> ser_params(addr), std::ios_base::failure,
427 HasReason(
"BIP155 IPv4 address with length 5 (should be 4)"));
428 BOOST_REQUIRE(!
s.empty());
435 BOOST_CHECK_EXCEPTION(
s >> ser_params(addr), std::ios_base::failure,
436 HasReason(
"Address too long: 513 > 512"));
437 BOOST_REQUIRE(!
s.empty());
443 "0102030405060708090a0b0c0d0e0f10"_hex;
444 s >> ser_params(addr);
449 BOOST_REQUIRE(
s.empty());
454 "fd6b88c08724ca978112ca1bbdcafac2"_hex;
456 s >> ser_params(addr);
460 BOOST_REQUIRE(
s.empty());
466 BOOST_CHECK_EXCEPTION(
s >> ser_params(addr), std::ios_base::failure,
467 HasReason(
"BIP155 IPv6 address with length 4 (should be 16)"));
468 BOOST_REQUIRE(!
s.empty());
474 "00000000000000000000ffff01020304"_hex;
475 s >> ser_params(addr);
477 BOOST_REQUIRE(
s.empty());
482 "fd87d87eeb430102030405060708090a"_hex;
483 s >> ser_params(addr);
485 BOOST_REQUIRE(
s.empty());
490 "f1f2f3f4f5f6f7f8f9fa"_hex;
491 s >> ser_params(addr);
493 BOOST_REQUIRE(
s.empty());
498 "79bcc625184b05194975c28b66b66b04"
499 "69f7f6556fb1ac3189a79b40dda32f1f"_hex;
500 s >> ser_params(addr);
505 "pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion");
506 BOOST_REQUIRE(
s.empty());
512 BOOST_CHECK_EXCEPTION(
s >> ser_params(addr), std::ios_base::failure,
513 HasReason(
"BIP155 TORv3 address with length 0 (should be 32)"));
514 BOOST_REQUIRE(!
s.empty());
520 "a2894dabaec08c0051a481a6dac88b64"
521 "f98232ae42d4b6fd2fa81952dfe36a87"_hex;
522 s >> ser_params(addr);
527 "ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p");
528 BOOST_REQUIRE(
s.empty());
534 BOOST_CHECK_EXCEPTION(
s >> ser_params(addr), std::ios_base::failure,
535 HasReason(
"BIP155 I2P address with length 3 (should be 32)"));
536 BOOST_REQUIRE(!
s.empty());
542 "fc000001000200030004000500060007"_hex;
543 s >> ser_params(addr);
548 BOOST_REQUIRE(
s.empty());
553 "aa000001000200030004000500060007"_hex;
554 s >> ser_params(addr);
557 BOOST_REQUIRE(
s.empty());
563 BOOST_CHECK_EXCEPTION(
s >> ser_params(addr), std::ios_base::failure,
564 HasReason(
"BIP155 CJDNS address with length 1 (should be 16)"));
565 BOOST_REQUIRE(!
s.empty());
571 "01020304050607"_hex;
572 BOOST_CHECK_EXCEPTION(
s >> ser_params(addr), std::ios_base::failure,
573 HasReason(
"Address too long: 33554432 > 512"));
574 BOOST_REQUIRE(!
s.empty());
581 s >> ser_params(addr);
583 BOOST_REQUIRE(
s.empty());
589 s >> ser_params(addr);
591 BOOST_REQUIRE(
s.empty());
601 raw_addr.s_addr = htonl(0x7f000001);
608 mapLocalHost[mapLocalHost_entry] = lsi;
612 in_addr ipv4AddrPeer;
613 ipv4AddrPeer.s_addr = 0xa0b0c001;
615 std::unique_ptr<CNode> pnode = std::make_unique<CNode>(0,
625 pnode->fSuccessfullyConnected.store(
true);
628 in6_addr ipv6AddrLocal;
629 memset(ipv6AddrLocal.s6_addr, 0, 16);
630 ipv6AddrLocal.s6_addr[0] = 0xcc;
632 pnode->SetAddrLocal(addrLocal);
643 mapLocalHost.erase(mapLocalHost_entry);
659 const uint16_t bind_port = 20001;
663 in_addr peer_us_addr;
664 peer_us_addr.s_addr = htonl(0x02030405);
665 const CService peer_us{peer_us_addr, 20002};
668 in_addr peer_out_in_addr;
669 peer_out_in_addr.s_addr = htonl(0x01020304);
680 peer_out.fSuccessfullyConnected =
true;
681 peer_out.SetAddrLocal(peer_us);
685 BOOST_REQUIRE(chosen_local_addr);
686 const CService expected{peer_us_addr, bind_port};
690 in_addr peer_in_in_addr;
691 peer_in_in_addr.s_addr = htonl(0x05060708);
702 peer_in.fSuccessfullyConnected =
true;
703 peer_in.SetAddrLocal(peer_us);
707 BOOST_REQUIRE(chosen_local_addr);
768 unsigned char ip[] = {p1, p2, p3, p4};
770 struct sockaddr_in sa;
771 memset(&sa, 0,
sizeof(sockaddr_in));
772 memcpy(&(sa.sin_addr), &
ip,
sizeof(
ip));
819 const uint16_t bind_port = 20001;
824 in_addr peer_us_addr;
825 peer_us_addr.s_addr = htonl(0x02030405);
826 const CService peer_us{peer_us_addr, 20002};
829 in_addr peer_in_addr;
830 peer_in_addr.s_addr = htonl(0x01020304);
843 const int64_t time{0};
853 connman.FlushSendBuffer(peer);
855 auto msg_version_receive =
857 Assert(connman.ReceiveMsgFrom(peer, std::move(msg_version_receive)));
858 peer.fPauseSend =
false;
859 bool more_work{connman.ProcessMessagesOnce(peer)};
863 connman.FlushSendBuffer(peer);
866 peer.fPauseSend =
false;
868 more_work = connman.ProcessMessagesOnce(peer);
872 const CService expected{peer_us_addr, bind_port};
877 const std::string& msg_type,
878 std::span<const unsigned char>
data,
879 bool is_incoming) ->
void {
880 if (!is_incoming && msg_type ==
"addr") {
881 std::vector<CAddress> addresses;
885 for (
const auto& addr : addresses) {
886 if (addr == expected) {
907 auto CreatePeer = [](
const CAddress& addr) {
908 return std::make_unique<CNode>(0,
922 BOOST_REQUIRE(addr_ipv4.IsValid());
923 BOOST_REQUIRE(addr_ipv4.IsIPv4());
926 BOOST_REQUIRE(addr_ipv6.IsValid());
927 BOOST_REQUIRE(addr_ipv6.IsIPv6());
930 BOOST_REQUIRE(addr_ipv6_tunnel.IsValid());
931 BOOST_REQUIRE(addr_ipv6_tunnel.IsIPv6());
932 BOOST_REQUIRE(addr_ipv6_tunnel.IsRFC3964());
935 BOOST_REQUIRE(addr_teredo.IsValid());
936 BOOST_REQUIRE(addr_teredo.IsIPv6());
937 BOOST_REQUIRE(addr_teredo.IsRFC4380());
940 BOOST_REQUIRE(addr_onion.
SetSpecial(
"pg6mmjiyjmcrsslvykfwnntlaru7p5svn6y2ymmju6nubxndf4pscryd.onion"));
941 BOOST_REQUIRE(addr_onion.
IsValid());
942 BOOST_REQUIRE(addr_onion.
IsTor());
945 BOOST_REQUIRE(addr_i2p.
SetSpecial(
"udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p"));
946 BOOST_REQUIRE(addr_i2p.
IsValid());
947 BOOST_REQUIRE(addr_i2p.
IsI2P());
951 BOOST_REQUIRE(addr_cjdns.IsValid());
952 BOOST_REQUIRE(addr_cjdns.IsCJDNS());
954 const auto peer_ipv4{CreatePeer(addr_ipv4)};
955 const auto peer_ipv6{CreatePeer(addr_ipv6)};
956 const auto peer_ipv6_tunnel{CreatePeer(addr_ipv6_tunnel)};
957 const auto peer_teredo{CreatePeer(addr_teredo)};
958 const auto peer_onion{CreatePeer(addr_onion)};
959 const auto peer_i2p{CreatePeer(addr_i2p)};
960 const auto peer_cjdns{CreatePeer(addr_cjdns)};
1015 uint256 key_data = rng.rand256();
1028class V2TransportTester
1033 bool m_test_initiator;
1035 std::vector<uint8_t> m_sent_garbage;
1036 std::vector<uint8_t> m_recv_garbage;
1037 std::vector<uint8_t> m_to_send;
1038 std::vector<uint8_t> m_received;
1039 std::deque<CSerializedNetMsg> m_msg_to_send;
1040 bool m_sent_aad{
false};
1046 m_transport{0, test_initiator},
1047 m_cipher{GenerateRandomTestKey(m_rng),
MakeByteSpan(m_rng.rand256())},
1048 m_test_initiator(test_initiator) {}
1057 using InteractResult = std::optional<std::vector<std::optional<CNetMessage>>>;
1064 InteractResult Interact()
1066 std::vector<std::optional<CNetMessage>>
ret;
1068 bool progress{
false};
1070 if (!m_to_send.empty()) {
1071 std::span<const uint8_t> to_send = std::span{m_to_send}.first(1 + m_rng.
randrange(m_to_send.size()));
1072 size_t old_len = to_send.size();
1074 return std::nullopt;
1076 if (old_len != to_send.size()) {
1078 m_to_send.erase(m_to_send.begin(), m_to_send.begin() + (old_len - to_send.size()));
1086 ret.emplace_back(std::nullopt);
1088 ret.emplace_back(std::move(
msg));
1093 if (!m_msg_to_send.empty() && (!progress || m_rng.
randbool())) {
1095 m_msg_to_send.pop_front();
1100 const auto& [recv_bytes, _more, _msg_type] = m_transport.
GetBytesToSend(!m_msg_to_send.empty());
1101 if (!recv_bytes.empty() && (!progress || m_rng.
randbool())) {
1102 size_t to_receive = 1 + m_rng.
randrange(recv_bytes.size());
1103 m_received.insert(m_received.end(), recv_bytes.begin(), recv_bytes.begin() + to_receive);
1107 if (!progress)
break;
1116 void Send(std::span<const uint8_t>
data)
1118 m_to_send.insert(m_to_send.end(),
data.begin(),
data.end());
1127 m_to_send.insert(m_to_send.end(),
UCharCast(ser.data()),
UCharCast(ser.data() + ser.size()));
1137 void SendGarbage(std::span<const uint8_t> garbage)
1140 m_sent_garbage.assign(garbage.begin(), garbage.end());
1142 Send(m_sent_garbage);
1146 void SendGarbage(
size_t garbage_len)
1149 SendGarbage(m_rng.
randbytes<uint8_t>(garbage_len));
1159 void AddMessage(std::string m_type, std::vector<uint8_t> payload)
1162 msg.m_type = std::move(m_type);
1163 msg.data = std::move(payload);
1164 m_msg_to_send.push_back(std::move(
msg));
1184 void SendPacket(std::span<const uint8_t> content, std::span<const uint8_t> aad = {},
bool ignore =
false)
1187 std::vector<std::byte> ciphertext;
1199 void SendGarbageTerm()
1206 void SendVersion(std::span<const uint8_t> version_data = {},
bool vers_ignore =
false)
1208 std::span<const std::uint8_t> aad;
1210 if (!m_sent_aad) aad = m_sent_garbage;
1211 SendPacket(version_data, aad, vers_ignore);
1218 std::vector<uint8_t> ReceivePacket(std::span<const std::byte> aad = {})
1220 std::vector<uint8_t> contents;
1230 contents.resize(size);
1251 void ReceiveGarbage()
1261 m_recv_garbage.assign(m_received.begin(), m_received.begin() + garblen);
1267 void ReceiveVersion()
1269 auto contents = ReceivePacket(
MakeByteSpan(m_recv_garbage));
1278 void ReceiveMessage(uint8_t short_id, std::span<const uint8_t> payload)
1280 auto ret = ReceivePacket();
1283 BOOST_CHECK(std::ranges::equal(std::span{
ret}.subspan(1), payload));
1288 void ReceiveMessage(
const std::string& m_type, std::span<const uint8_t> payload)
1290 auto ret = ReceivePacket();
1293 for (
unsigned i = 0; i < 12; ++i) {
1294 if (i < m_type.size()) {
1305 void SendMessage(std::string mtype, std::span<const uint8_t> payload)
1309 std::copy(mtype.begin(), mtype.end(), contents.begin() + 1);
1312 SendPacket(contents);
1317 void SendMessage(uint8_t short_id, std::span<const uint8_t> payload)
1320 std::vector<uint8_t> contents(1 + payload.size());
1321 contents[0] = short_id;
1322 std::copy(payload.begin(), payload.end(), contents.begin() + 1);
1324 SendPacket(contents);
1328 void CompareSessionIDs()
const
1330 auto info = m_transport.
GetInfo();
1347 for (
int i = 0; i < 10; ++i) {
1348 V2TransportTester tester(m_rng,
true);
1349 auto ret = tester.Interact();
1350 BOOST_REQUIRE(
ret &&
ret->empty());
1352 tester.SendGarbage();
1353 tester.ReceiveKey();
1354 tester.SendGarbageTerm();
1355 tester.SendVersion();
1356 ret = tester.Interact();
1357 BOOST_REQUIRE(
ret &&
ret->empty());
1358 tester.ReceiveGarbage();
1359 tester.ReceiveVersion();
1360 tester.CompareSessionIDs();
1363 tester.SendMessage(uint8_t(4), msg_data_1);
1364 tester.SendMessage(0, {});
1365 tester.SendMessage(
"tx", msg_data_2);
1366 ret = tester.Interact();
1367 BOOST_REQUIRE(
ret &&
ret->size() == 3);
1375 tester.SendMessage(
"bad", msg_data_1);
1378 ret = tester.Interact();
1383 tester.SendMessage(uint8_t(12), msg_data_3);
1388 for (
int i = 0; i < 10; ++i) {
1389 V2TransportTester tester(m_rng,
false);
1391 tester.SendGarbage();
1392 auto ret = tester.Interact();
1393 BOOST_REQUIRE(
ret &&
ret->empty());
1394 tester.ReceiveKey();
1395 tester.SendGarbageTerm();
1396 tester.SendVersion();
1397 ret = tester.Interact();
1398 BOOST_REQUIRE(
ret &&
ret->empty());
1399 tester.ReceiveGarbage();
1400 tester.ReceiveVersion();
1401 tester.CompareSessionIDs();
1404 tester.SendMessage(uint8_t(14), msg_data_1);
1405 tester.SendMessage(uint8_t(19), msg_data_2);
1406 ret = tester.Interact();
1407 BOOST_REQUIRE(
ret &&
ret->size() == 2);
1412 auto msg_data_3 = m_rng.
randbytes<uint8_t>(4005000);
1413 tester.SendMessage(uint8_t(11), msg_data_3);
1414 ret = tester.Interact();
1419 for (
int i = 0; i < 50; ++i) {
1425 unsigned num_ignore_version = m_rng.
randrange(10);
1429 bool send_immediately = !initiator || m_rng.
randbool();
1432 V2TransportTester tester(m_rng, initiator);
1433 if (send_immediately) {
1435 tester.SendGarbage(garb_len);
1437 auto ret = tester.Interact();
1438 BOOST_REQUIRE(
ret &&
ret->empty());
1439 if (!send_immediately) {
1441 tester.SendGarbage(garb_len);
1443 tester.ReceiveKey();
1444 tester.SendGarbageTerm();
1445 for (
unsigned v = 0; v < num_ignore_version; ++v) {
1447 auto ver_ign_data = m_rng.
randbytes<uint8_t>(ver_ign_data_len);
1448 tester.SendVersion(ver_ign_data,
true);
1450 tester.SendVersion(ver_data,
false);
1451 ret = tester.Interact();
1452 BOOST_REQUIRE(
ret &&
ret->empty());
1453 tester.ReceiveGarbage();
1454 tester.ReceiveVersion();
1455 tester.CompareSessionIDs();
1456 for (
unsigned d = 0; d < num_decoys_1; ++d) {
1458 tester.SendPacket(decoy_data, {},
true);
1461 tester.SendMessage(uint8_t(28), msg_data_1);
1462 for (
unsigned d = 0; d < num_decoys_2; ++d) {
1464 tester.SendPacket(decoy_data, {},
true);
1467 tester.SendMessage(uint8_t(13), msg_data_2);
1470 tester.SendMessage(
"foobar", {});
1471 tester.AddMessage(
"barfoo", {});
1472 ret = tester.Interact();
1473 BOOST_REQUIRE(
ret &&
ret->size() == 4);
1478 tester.ReceiveMessage(
"barfoo", {});
1483 V2TransportTester tester(m_rng,
true);
1484 auto ret = tester.Interact();
1485 BOOST_REQUIRE(
ret &&
ret->empty());
1488 tester.ReceiveKey();
1489 tester.SendGarbageTerm();
1490 ret = tester.Interact();
1496 V2TransportTester tester(m_rng,
false);
1499 auto ret = tester.Interact();
1500 BOOST_REQUIRE(
ret &&
ret->empty());
1501 tester.ReceiveKey();
1502 tester.SendGarbageTerm();
1503 ret = tester.Interact();
1509 V2TransportTester tester(m_rng,
true);
1510 auto ret = tester.Interact();
1511 BOOST_REQUIRE(
ret &&
ret->empty());
1513 tester.ReceiveKey();
1519 auto garbage = m_rng.
randbytes<uint8_t>(len_before + 16 + len_after);
1521 auto garb_term =
MakeUCharSpan(tester.GetCipher().GetSendGarbageTerminator());
1522 std::copy(garb_term.begin(), garb_term.begin() + 16, garbage.begin() + len_before);
1525 garbage[len_before + 15] ^= (uint8_t(1) << m_rng.
randrange(8));
1526 tester.SendGarbage(garbage);
1527 tester.SendGarbageTerm();
1528 tester.SendVersion();
1529 ret = tester.Interact();
1530 BOOST_REQUIRE(
ret &&
ret->empty());
1531 tester.ReceiveGarbage();
1532 tester.ReceiveVersion();
1533 tester.CompareSessionIDs();
1534 auto msg_data_1 = m_rng.
randbytes<uint8_t>(4000000);
1535 auto msg_data_2 = m_rng.
randbytes<uint8_t>(4000000);
1536 tester.SendMessage(uint8_t(m_rng.
randrange(223) + 33), {});
1537 tester.SendMessage(uint8_t(2), msg_data_1);
1538 tester.AddMessage(
"blocktxn", msg_data_2);
1539 ret = tester.Interact();
1540 BOOST_REQUIRE(
ret &&
ret->size() == 2);
1543 tester.ReceiveMessage(uint8_t(3), msg_data_2);
1548 V2TransportTester tester(m_rng,
false);
1549 tester.SendV1Version(
Params().MessageStart());
1550 auto ret = tester.Interact();
1556 V2TransportTester tester(m_rng,
false);
1558 auto ret = tester.Interact();
1582 connman.Handshake(
node,
const CChainParams & Params()
Return the currently selected parameters.
#define Assert(val)
Identity function.
bool SoftSetArg(const std::string &strArg, const std::string &strValue) EXCLUSIVE_LOCKS_REQUIRED(!cs_args)
Set an argument if it doesn't already have a value.
void ForceSetArg(const std::string &strArg, const std::string &strValue) EXCLUSIVE_LOCKS_REQUIRED(!cs_args)
The BIP324 packet cipher, encapsulating its key derivation, stream cipher, and AEAD.
bool Decrypt(std::span< const std::byte > input, std::span< const std::byte > aad, bool &ignore, std::span< std::byte > contents) noexcept
Decrypt a packet.
std::span< const std::byte > GetSendGarbageTerminator() const noexcept
Get the Garbage Terminator to send.
static constexpr unsigned GARBAGE_TERMINATOR_LEN
unsigned DecryptLength(std::span< const std::byte > input) noexcept
Decrypt the length of a packet.
std::span< const std::byte > GetSessionID() const noexcept
Get the Session ID.
const EllSwiftPubKey & GetOurPubKey() const noexcept
Retrieve our public key.
std::span< const std::byte > GetReceiveGarbageTerminator() const noexcept
Get the expected Garbage Terminator to receive.
static constexpr unsigned LENGTH_LEN
static constexpr unsigned EXPANSION
void Initialize(const EllSwiftPubKey &their_pubkey, bool initiator, bool self_decrypt=false) noexcept
Initialize when the other side's public key is received.
void Encrypt(std::span< const std::byte > contents, std::span< const std::byte > aad, bool ignore, std::span< std::byte > output) noexcept
Encrypt a packet.
A CService with information about it as peer.
static constexpr SerParams V1_NETWORK
static constexpr SerParams V2_NETWORK
static std::unique_ptr< const CChainParams > Main()
An encapsulated private key.
void Set(const T pbegin, const T pend, bool fCompressedIn)
Initialize using begin and end iterators to byte data.
std::string ToStringAddr() const
bool SetSpecial(std::string_view addr)
Parse a Tor or I2P address and set this object to it.
bool SetInternal(const std::string &name)
Create an "internal" address that represents a name or FQDN.
bool IsAddrV1Compatible() const
Check if the current object can be serialized in pre-ADDRv2/BIP155 format.
Information about a peer.
A combination of a network address (CNetAddr) and a (TCP) port.
Double ended buffer combining vector and stream-like interfaces.
BOOST_CHECK_EXCEPTION predicates to check the specific validation error.
static Mutex g_msgproc_mutex
Mutex for anything that is only accessed via the msg processing thread.
I randrange(I range) noexcept
Generate a random integer in the range [0..range), with range > 0.
bool randbool() noexcept
Generate a random boolean.
std::vector< B > randbytes(size_t len) noexcept
Generate random bytes.
void Add(Network net) EXCLUSIVE_LOCKS_REQUIRED(!m_mutex)
bool Contains(Network net) const EXCLUSIVE_LOCKS_REQUIRED(!m_mutex)
void Remove(Network net) EXCLUSIVE_LOCKS_REQUIRED(!m_mutex)
void RemoveAll() EXCLUSIVE_LOCKS_REQUIRED(!m_mutex)
Minimal stream for reading from an existing byte array by std::span.
void MarkBytesSent(size_t bytes_sent) noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex)
Report how many bytes returned by the last GetBytesToSend() have been sent.
static constexpr uint32_t MAX_GARBAGE_LEN
CNetMessage GetReceivedMessage(NodeClock::time_point time, bool &reject_message) noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex)
Retrieve a completed message from transport.
Info GetInfo() const noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex)
Retrieve information about this transport.
BytesToSend GetBytesToSend(bool have_next_message) const noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex)
Get bytes to send on the wire, if any, along with other information about it.
bool ReceivedMessageComplete() const noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex)
Returns true if the current message is complete (so GetReceivedMessage can be called).
bool ReceivedBytes(std::span< const uint8_t > &msg_bytes) noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex
Feed wire bytes to the transport.
bool SetMessageToSend(CSerializedNetMsg &msg) noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex)
Set the next message to send.
constexpr unsigned char * end()
constexpr unsigned char * begin()
@ PRIVATE_BROADCAST
Private broadcast connections are short-lived and only opened to privacy networks (Tor,...
@ OUTBOUND_FULL_RELAY
These are the default connections that we use to connect with the network.
@ INBOUND
Inbound connections are those initiated by a peer.
BOOST_FIXTURE_TEST_SUITE(cuckoocache_tests, BasicTestingSetup)
Test Suite for CuckooCache.
BOOST_AUTO_TEST_SUITE_END()
static CService ip(uint32_t i)
std::string HexStr(const std::span< const uint8_t > s)
Convert a span of bytes to a lower-case hexadecimal string.
std::array< uint8_t, 4 > MessageStartChars
CSerializedNetMsg Make(std::string msg_type, Args &&... args)
constexpr const char * VERACK
The verack message acknowledges a previously-received version message, informing the connecting node ...
constexpr const char * VERSION
The version message provides information about the transmitting node to the receiving node at the beg...
""_hex is a compile-time user-defined literal returning a std::array<std::byte>, equivalent to ParseH...
std::string ToString(const T &t)
Locale-independent version of std::to_string.
bool IsLocal(const CService &addr)
check whether a given address is potentially local
void RemoveLocal(const CService &addr)
bool AddLocal(const CService &addr_, int nScore)
std::optional< CService > GetLocalAddrForPeer(CNode &node)
Returns a local address that we should advertise to this peer.
CService GetLocalAddress(const CNode &peer)
GlobalMutex g_maplocalhost_mutex
std::function< void(const CAddress &addr, const std::string &msg_type, std::span< const unsigned char > data, bool is_incoming)> CaptureMessage
Defaults to CaptureMessageToFile(), but can be overridden by unit tests.
BOOST_AUTO_TEST_CASE(cnode_listen_port)
CNetAddr UtilBuildAddress(unsigned char p1, unsigned char p2, unsigned char p3, unsigned char p4)
@ NET_ONION
TOR (v2 or v3)
@ NET_UNROUTABLE
Addresses from these networks are not publicly routable on the global Internet.
@ NET_INTERNAL
A set of addresses that represent the hash of a string or FQDN.
std::vector< CNetAddr > LookupHost(const std::string &name, unsigned int nMaxSolutions, bool fAllowLookup, DNSLookupFn dns_lookup_function)
Resolve a host string to its corresponding network addresses.
std::vector< CService > Lookup(const std::string &name, uint16_t portDefault, bool fAllowLookup, unsigned int nMaxSolutions, DNSLookupFn dns_lookup_function)
Resolve a service string to its corresponding service.
CService MaybeFlipIPv6toCJDNS(const CService &service)
If an IPv6 address belongs to the address range used by the CJDNS network and the CJDNS network is re...
ReachableNets g_reachable_nets
#define BOOST_CHECK_EQUAL(v1, v2)
#define BOOST_CHECK(expr)
static const int PROTOCOL_VERSION
network protocol versioning
auto MakeByteSpan(const V &v) noexcept
constexpr auto MakeUCharSpan(const V &v) -> decltype(UCharSpanCast(std::span{v}))
Like the std::span constructor, but for (const) unsigned char member types only.
auto MakeWritableByteSpan(V &&v) noexcept
unsigned char * UCharCast(char *c)
static constexpr size_t size()
Identical to TestingSetup, but chain set to regtest.
void JumpOutOfIbd()
Toggle IsInitialBlockDownload from true to false.
std::unique_ptr< CConnman > connman
std::unique_ptr< AddrMan > addrman
std::unique_ptr< ChainstateManager > chainman
std::unique_ptr< PeerManager > peerman
std::string ToLower(std::string_view str)
Returns the lowercase equivalent of the given string.