Files
tomato-testing/toxcore/TCP_client_test.cc
Green Sky 565efa4f39 Squashed 'external/toxcore/c-toxcore/' changes from 1828c5356..c9cdae001
c9cdae001 fix(toxav): remove extra copy of video frame on encode
4f6d4546b test: Improve the fake network library.
a2581e700 refactor(toxcore): generate `Friend_Request` and `Dht_Nodes_Response`
2aaa11770 refactor(toxcore): use Tox_Memory in generated events
5c367452b test(toxcore): fix incorrect mutex in tox_scenario_get_time
8f92e710f perf: Add a timed limit of number of cookie requests.
695b6417a test: Add some more simulated network support.
815ae9ce9 test(toxcore): fix thread-safety in scenario framework
6d85c754e test(toxcore): add unit tests for net_crypto
9c22e79cc test(support): add SimulatedEnvironment for deterministic testing
f34fcb195 chore: Update windows Dockerfile to debian stable (trixie).
ece0e8980 fix(group_moderation): allow validating unsorted sanction list signatures
a4fa754d7 refactor: rename struct Packet to struct Net_Packet
d6f330f85 cleanup: Fix some warnings from coverity.
e206bffa2 fix(group_chats): fix sync packets reverting topics
0e4715598 test: Add new scenario testing framework.
668291f44 refactor(toxcore): decouple Network_Funcs from sockaddr via IP_Port
fc4396cef fix: potential division by zero in toxav and unsafe hex parsing
8e8b352ab refactor: Add nullable annotations to struct members.
7740bb421 refactor: decouple net_crypto from DHT
1936d4296 test: add benchmark for toxav audio and video
46bfdc2df fix: correct printf format specifiers for unsigned integers
REVERT: 1828c5356 fix(toxav): remove extra copy of video frame on encode

git-subtree-dir: external/toxcore/c-toxcore
git-subtree-split: c9cdae001341e701fca980c9bb9febfeb95d2902
2026-01-11 14:42:31 +01:00

366 lines
14 KiB
C++

// clang-format off
#include "../testing/support/public/simulated_environment.hh"
#include "TCP_client.h"
// clang-format on
#include <gtest/gtest.h>
#include <vector>
#include "TCP_common.h"
#include "crypto_core.h"
#include "logger.h"
#include "mono_time.h"
#include "net_profile.h"
#include "network.h"
#include "util.h"
namespace {
using namespace tox::test;
class TCPClientTest : public ::testing::Test {
protected:
SimulatedEnvironment env;
Mono_Time *create_mono_time(const Memory *mem)
{
Mono_Time *mt = mono_time_new(mem, nullptr, nullptr);
mono_time_set_current_time_callback(
mt,
[](void *user_data) -> uint64_t {
auto *clock = static_cast<FakeClock *>(user_data);
return clock->current_time_ms();
},
&env.fake_clock());
return mt;
}
static void log_cb(void *context, Logger_Level level, const char *file, uint32_t line,
const char *func, const char *message, void *userdata)
{
if (level > LOGGER_LEVEL_TRACE) {
fprintf(stderr, "[%d] %s:%u %s: %s\n", level, file, line, func, message);
}
}
static void net_profile_deleter(Net_Profile *p, const Memory *mem) { netprof_kill(mem, p); }
};
TEST_F(TCPClientTest, ConnectsToRelay)
{
auto server_node = env.create_node(33445);
auto client_node = env.create_node(0); // Ephemeral port
Logger *server_log = logger_new(&server_node->c_memory);
logger_callback_log(server_log, &TCPClientTest::log_cb, nullptr, nullptr);
Logger *client_log = logger_new(&client_node->c_memory);
logger_callback_log(client_log, &TCPClientTest::log_cb, nullptr, nullptr);
Mono_Time *client_time = create_mono_time(&client_node->c_memory);
// 1. Setup Server Socket
Socket server_sock
= net_socket(&server_node->c_network, net_family_ipv4(), TOX_SOCK_STREAM, TOX_PROTO_TCP);
ASSERT_TRUE(sock_valid(server_sock));
ASSERT_TRUE(set_socket_nonblock(&server_node->c_network, server_sock));
ASSERT_TRUE(bind_to_port(&server_node->c_network, server_sock, net_family_ipv4(), 33445));
ASSERT_EQ(0, net_listen(&server_node->c_network, server_sock, 5));
// Server Keys
uint8_t server_pk[CRYPTO_PUBLIC_KEY_SIZE];
uint8_t server_sk[CRYPTO_SECRET_KEY_SIZE];
crypto_new_keypair(&server_node->c_random, server_pk, server_sk);
// Client Keys
uint8_t client_pk[CRYPTO_PUBLIC_KEY_SIZE];
uint8_t client_sk[CRYPTO_SECRET_KEY_SIZE];
crypto_new_keypair(&client_node->c_random, client_pk, client_sk);
Net_Profile *client_profile = netprof_new(client_log, &client_node->c_memory);
// 2. Client connects to Server
IP_Port server_ip_port;
server_ip_port.ip = server_node->node->ip;
server_ip_port.port = net_htons(33445);
TCP_Client_Connection *client_conn = new_tcp_connection(client_log, &client_node->c_memory,
client_time, &client_node->c_random, &client_node->c_network, &server_ip_port, server_pk,
client_pk, client_sk, nullptr, client_profile);
ASSERT_NE(client_conn, nullptr);
// 3. Simulation Loop
bool connected = false;
Socket accepted_sock = net_invalid_socket();
uint64_t start_time = env.clock().current_time_ms();
while (env.clock().current_time_ms() - start_time < 5000) {
env.advance_time(10);
do_tcp_connection(client_log, client_time, client_conn, nullptr);
// Server accepts connection
if (!sock_valid(accepted_sock)) {
accepted_sock = net_accept(&server_node->c_network, server_sock);
if (sock_valid(accepted_sock)) {
fprintf(stderr, "Server accepted connection! Socket: %d\n", accepted_sock.value);
set_socket_nonblock(&server_node->c_network, accepted_sock);
}
}
// Server handles handshake
if (sock_valid(accepted_sock)) {
uint8_t buf[TCP_CLIENT_HANDSHAKE_SIZE];
IP_Port remote = {{{0}}};
int len = net_recv(
&server_node->c_network, server_log, accepted_sock, buf, sizeof(buf), &remote);
if (len > 0) {
fprintf(stderr, "Server received %d bytes\n", len);
}
if (len == TCP_CLIENT_HANDSHAKE_SIZE) {
// Verify client PK
EXPECT_EQ(0, memcmp(buf, client_pk, CRYPTO_PUBLIC_KEY_SIZE));
// Decrypt
uint8_t shared_key[CRYPTO_SHARED_KEY_SIZE];
encrypt_precompute(client_pk, server_sk, shared_key);
uint8_t plain[TCP_HANDSHAKE_PLAIN_SIZE];
const uint8_t *nonce_ptr = buf + CRYPTO_PUBLIC_KEY_SIZE;
const uint8_t *ciphertext_ptr = buf + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE;
int res = decrypt_data_symmetric(&server_node->c_memory, shared_key, nonce_ptr,
ciphertext_ptr,
TCP_CLIENT_HANDSHAKE_SIZE - (CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE),
plain);
if (res != TCP_HANDSHAKE_PLAIN_SIZE) {
fprintf(stderr, "Decryption failed: res=%d\n", res);
}
if (res == TCP_HANDSHAKE_PLAIN_SIZE) {
// Generate Response
// [Nonce (24)] [Encrypted (PK(32)+Nonce(24)+MAC(16))]
uint8_t resp_nonce[CRYPTO_NONCE_SIZE];
random_nonce(&server_node->c_random, resp_nonce);
uint8_t temp_pk[CRYPTO_PUBLIC_KEY_SIZE];
uint8_t temp_sk[CRYPTO_SECRET_KEY_SIZE];
crypto_new_keypair(&server_node->c_random, temp_pk, temp_sk);
uint8_t resp_plain[TCP_HANDSHAKE_PLAIN_SIZE];
memcpy(resp_plain, temp_pk, CRYPTO_PUBLIC_KEY_SIZE);
random_nonce(&server_node->c_random, resp_plain + CRYPTO_PUBLIC_KEY_SIZE);
uint8_t response[TCP_SERVER_HANDSHAKE_SIZE];
memcpy(response, resp_nonce, CRYPTO_NONCE_SIZE);
encrypt_data_symmetric(&server_node->c_memory, shared_key,
resp_nonce, // nonce
resp_plain, // plain
TCP_HANDSHAKE_PLAIN_SIZE, // plain len
response + CRYPTO_NONCE_SIZE // dest
);
net_send(&server_node->c_network, server_log, accepted_sock, response,
sizeof(response), &remote, nullptr);
}
}
}
if (tcp_con_status(client_conn) == TCP_CLIENT_CONFIRMED) {
connected = true;
break;
}
}
EXPECT_TRUE(connected);
// Cleanup
kill_tcp_connection(client_conn);
net_profile_deleter(client_profile, &client_node->c_memory);
kill_sock(&server_node->c_network, server_sock);
if (sock_valid(accepted_sock))
kill_sock(&server_node->c_network, accepted_sock);
logger_kill(client_log);
logger_kill(server_log);
mono_time_free(&client_node->c_memory, client_time);
}
TEST_F(TCPClientTest, SendDataIntegerOverflow)
{
auto server_node = env.create_node(33446);
auto client_node = env.create_node(0);
Logger *server_log = logger_new(&server_node->c_memory);
logger_callback_log(server_log, &TCPClientTest::log_cb, nullptr, nullptr);
Logger *client_log = logger_new(&client_node->c_memory);
logger_callback_log(client_log, &TCPClientTest::log_cb, nullptr, nullptr);
Mono_Time *client_time = create_mono_time(&client_node->c_memory);
Socket server_sock
= net_socket(&server_node->c_network, net_family_ipv4(), TOX_SOCK_STREAM, TOX_PROTO_TCP);
ASSERT_TRUE(sock_valid(server_sock));
ASSERT_TRUE(set_socket_nonblock(&server_node->c_network, server_sock));
ASSERT_TRUE(bind_to_port(&server_node->c_network, server_sock, net_family_ipv4(), 33446));
ASSERT_EQ(0, net_listen(&server_node->c_network, server_sock, 5));
uint8_t server_pk[CRYPTO_PUBLIC_KEY_SIZE];
uint8_t server_sk[CRYPTO_SECRET_KEY_SIZE];
crypto_new_keypair(&server_node->c_random, server_pk, server_sk);
uint8_t client_pk[CRYPTO_PUBLIC_KEY_SIZE];
uint8_t client_sk[CRYPTO_SECRET_KEY_SIZE];
crypto_new_keypair(&client_node->c_random, client_pk, client_sk);
Net_Profile *client_profile = netprof_new(client_log, &client_node->c_memory);
IP_Port server_ip_port;
server_ip_port.ip = server_node->node->ip;
server_ip_port.port = net_htons(33446);
TCP_Client_Connection *client_conn = new_tcp_connection(client_log, &client_node->c_memory,
client_time, &client_node->c_random, &client_node->c_network, &server_ip_port, server_pk,
client_pk, client_sk, nullptr, client_profile);
ASSERT_NE(client_conn, nullptr);
bool connected = false;
Socket accepted_sock = net_invalid_socket();
uint64_t start_time = env.clock().current_time_ms();
uint8_t shared_key[CRYPTO_SHARED_KEY_SIZE];
uint8_t sent_nonce[CRYPTO_NONCE_SIZE] = {0};
uint8_t recv_nonce[CRYPTO_NONCE_SIZE] = {0};
// Helper to send encrypted packet from server to client
auto server_send_packet = [&](const uint8_t *data, uint16_t length) {
uint16_t packet_size = sizeof(uint16_t) + length + CRYPTO_MAC_SIZE;
std::vector<uint8_t> packet(packet_size);
uint16_t c_length = net_htons(length + CRYPTO_MAC_SIZE);
memcpy(packet.data(), &c_length, sizeof(uint16_t));
encrypt_data_symmetric(&server_node->c_memory, shared_key, sent_nonce, data, length,
packet.data() + sizeof(uint16_t));
increment_nonce(sent_nonce);
IP_Port remote = {{{0}}};
net_send(&server_node->c_network, server_log, accepted_sock, packet.data(), packet_size,
&remote, nullptr);
};
while (env.clock().current_time_ms() - start_time < 5000) {
env.advance_time(10);
do_tcp_connection(client_log, client_time, client_conn, nullptr);
if (!sock_valid(accepted_sock)) {
accepted_sock = net_accept(&server_node->c_network, server_sock);
if (sock_valid(accepted_sock)) {
set_socket_nonblock(&server_node->c_network, accepted_sock);
}
}
if (sock_valid(accepted_sock) && !connected) {
uint8_t buf[TCP_CLIENT_HANDSHAKE_SIZE];
IP_Port remote = {{{0}}};
int len = net_recv(
&server_node->c_network, server_log, accepted_sock, buf, sizeof(buf), &remote);
if (len == TCP_CLIENT_HANDSHAKE_SIZE) {
encrypt_precompute(client_pk, server_sk, shared_key);
uint8_t plain[TCP_HANDSHAKE_PLAIN_SIZE];
if (decrypt_data_symmetric(&server_node->c_memory, shared_key,
buf + CRYPTO_PUBLIC_KEY_SIZE,
buf + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE,
TCP_CLIENT_HANDSHAKE_SIZE - (CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE),
plain)
== TCP_HANDSHAKE_PLAIN_SIZE) {
memcpy(recv_nonce, plain + CRYPTO_PUBLIC_KEY_SIZE, CRYPTO_NONCE_SIZE);
uint8_t resp_nonce[CRYPTO_NONCE_SIZE];
random_nonce(&server_node->c_random, resp_nonce);
memcpy(sent_nonce, resp_nonce, CRYPTO_NONCE_SIZE);
uint8_t temp_pk[CRYPTO_PUBLIC_KEY_SIZE];
uint8_t temp_sk[CRYPTO_SECRET_KEY_SIZE];
crypto_new_keypair(&server_node->c_random, temp_pk, temp_sk);
uint8_t resp_plain[TCP_HANDSHAKE_PLAIN_SIZE];
memcpy(resp_plain, temp_pk, CRYPTO_PUBLIC_KEY_SIZE);
random_nonce(&server_node->c_random, resp_plain + CRYPTO_PUBLIC_KEY_SIZE);
// FIX: Save the nonce that client will use for receiving
memcpy(sent_nonce, resp_plain + CRYPTO_PUBLIC_KEY_SIZE, CRYPTO_NONCE_SIZE);
uint8_t response[TCP_SERVER_HANDSHAKE_SIZE];
memcpy(response, resp_nonce, CRYPTO_NONCE_SIZE);
encrypt_data_symmetric(&server_node->c_memory, shared_key, resp_nonce,
resp_plain, TCP_HANDSHAKE_PLAIN_SIZE, response + CRYPTO_NONCE_SIZE);
net_send(&server_node->c_network, server_log, accepted_sock, response,
sizeof(response), &remote, nullptr);
// FIX: Update shared key using Client's Ephemeral PK and Server's Ephemeral SK
encrypt_precompute(plain, temp_sk, shared_key);
}
}
}
if (tcp_con_status(client_conn) == TCP_CLIENT_CONFIRMED) {
connected = true;
break;
}
}
ASSERT_TRUE(connected);
// Establish sub-connection 0
uint8_t con_id = 0;
uint8_t other_pk[CRYPTO_PUBLIC_KEY_SIZE] = {0}; // Dummy PK
// 1. Send Routing Response to set status=1
{
uint8_t packet[1 + 1 + CRYPTO_PUBLIC_KEY_SIZE];
packet[0] = TCP_PACKET_ROUTING_RESPONSE;
packet[1] = con_id + NUM_RESERVED_PORTS;
memcpy(packet + 2, other_pk, CRYPTO_PUBLIC_KEY_SIZE);
server_send_packet(packet, sizeof(packet));
}
// Pump loop to process packet
for (int i = 0; i < 10; ++i) {
env.advance_time(10);
do_tcp_connection(client_log, client_time, client_conn, nullptr);
}
// 2. Send Connection Notification to set status=2
{
uint8_t packet[1 + 1];
packet[0] = TCP_PACKET_CONNECTION_NOTIFICATION;
packet[1] = con_id + NUM_RESERVED_PORTS;
server_send_packet(packet, sizeof(packet));
}
// Pump loop to process packet
for (int i = 0; i < 10; ++i) {
env.advance_time(10);
do_tcp_connection(client_log, client_time, client_conn, nullptr);
}
// Now call send_data with 65535 bytes
std::vector<uint8_t> large_data(65535);
// This should trigger integer overflow: 1 + 65535 = 0. VLA(0). packet[0] write -> Crash/UB
send_data(client_log, client_conn, con_id, large_data.data(), 65535);
// Cleanup
kill_tcp_connection(client_conn);
net_profile_deleter(client_profile, &client_node->c_memory);
kill_sock(&server_node->c_network, server_sock);
if (sock_valid(accepted_sock))
kill_sock(&server_node->c_network, accepted_sock);
logger_kill(client_log);
logger_kill(server_log);
mono_time_free(&client_node->c_memory, client_time);
}
} // namespace