forked from Green-Sky/tomato
c9cdae001 fix(toxav): remove extra copy of video frame on encode 4f6d4546b test: Improve the fake network library. a2581e700 refactor(toxcore): generate `Friend_Request` and `Dht_Nodes_Response` 2aaa11770 refactor(toxcore): use Tox_Memory in generated events 5c367452b test(toxcore): fix incorrect mutex in tox_scenario_get_time 8f92e710f perf: Add a timed limit of number of cookie requests. 695b6417a test: Add some more simulated network support. 815ae9ce9 test(toxcore): fix thread-safety in scenario framework 6d85c754e test(toxcore): add unit tests for net_crypto 9c22e79cc test(support): add SimulatedEnvironment for deterministic testing f34fcb195 chore: Update windows Dockerfile to debian stable (trixie). ece0e8980 fix(group_moderation): allow validating unsorted sanction list signatures a4fa754d7 refactor: rename struct Packet to struct Net_Packet d6f330f85 cleanup: Fix some warnings from coverity. e206bffa2 fix(group_chats): fix sync packets reverting topics 0e4715598 test: Add new scenario testing framework. 668291f44 refactor(toxcore): decouple Network_Funcs from sockaddr via IP_Port fc4396cef fix: potential division by zero in toxav and unsafe hex parsing 8e8b352ab refactor: Add nullable annotations to struct members. 7740bb421 refactor: decouple net_crypto from DHT 1936d4296 test: add benchmark for toxav audio and video 46bfdc2df fix: correct printf format specifiers for unsigned integers REVERT: 1828c5356 fix(toxav): remove extra copy of video frame on encode git-subtree-dir: external/toxcore/c-toxcore git-subtree-split: c9cdae001341e701fca980c9bb9febfeb95d2902
366 lines
14 KiB
C++
366 lines
14 KiB
C++
// clang-format off
|
|
#include "../testing/support/public/simulated_environment.hh"
|
|
#include "TCP_client.h"
|
|
// clang-format on
|
|
|
|
#include <gtest/gtest.h>
|
|
|
|
#include <vector>
|
|
|
|
#include "TCP_common.h"
|
|
#include "crypto_core.h"
|
|
#include "logger.h"
|
|
#include "mono_time.h"
|
|
#include "net_profile.h"
|
|
#include "network.h"
|
|
#include "util.h"
|
|
|
|
namespace {
|
|
|
|
using namespace tox::test;
|
|
|
|
class TCPClientTest : public ::testing::Test {
|
|
protected:
|
|
SimulatedEnvironment env;
|
|
|
|
Mono_Time *create_mono_time(const Memory *mem)
|
|
{
|
|
Mono_Time *mt = mono_time_new(mem, nullptr, nullptr);
|
|
mono_time_set_current_time_callback(
|
|
mt,
|
|
[](void *user_data) -> uint64_t {
|
|
auto *clock = static_cast<FakeClock *>(user_data);
|
|
return clock->current_time_ms();
|
|
},
|
|
&env.fake_clock());
|
|
return mt;
|
|
}
|
|
|
|
static void log_cb(void *context, Logger_Level level, const char *file, uint32_t line,
|
|
const char *func, const char *message, void *userdata)
|
|
{
|
|
if (level > LOGGER_LEVEL_TRACE) {
|
|
fprintf(stderr, "[%d] %s:%u %s: %s\n", level, file, line, func, message);
|
|
}
|
|
}
|
|
|
|
static void net_profile_deleter(Net_Profile *p, const Memory *mem) { netprof_kill(mem, p); }
|
|
};
|
|
|
|
TEST_F(TCPClientTest, ConnectsToRelay)
|
|
{
|
|
auto server_node = env.create_node(33445);
|
|
auto client_node = env.create_node(0); // Ephemeral port
|
|
|
|
Logger *server_log = logger_new(&server_node->c_memory);
|
|
logger_callback_log(server_log, &TCPClientTest::log_cb, nullptr, nullptr);
|
|
Logger *client_log = logger_new(&client_node->c_memory);
|
|
logger_callback_log(client_log, &TCPClientTest::log_cb, nullptr, nullptr);
|
|
|
|
Mono_Time *client_time = create_mono_time(&client_node->c_memory);
|
|
|
|
// 1. Setup Server Socket
|
|
Socket server_sock
|
|
= net_socket(&server_node->c_network, net_family_ipv4(), TOX_SOCK_STREAM, TOX_PROTO_TCP);
|
|
ASSERT_TRUE(sock_valid(server_sock));
|
|
ASSERT_TRUE(set_socket_nonblock(&server_node->c_network, server_sock));
|
|
ASSERT_TRUE(bind_to_port(&server_node->c_network, server_sock, net_family_ipv4(), 33445));
|
|
ASSERT_EQ(0, net_listen(&server_node->c_network, server_sock, 5));
|
|
|
|
// Server Keys
|
|
uint8_t server_pk[CRYPTO_PUBLIC_KEY_SIZE];
|
|
uint8_t server_sk[CRYPTO_SECRET_KEY_SIZE];
|
|
crypto_new_keypair(&server_node->c_random, server_pk, server_sk);
|
|
|
|
// Client Keys
|
|
uint8_t client_pk[CRYPTO_PUBLIC_KEY_SIZE];
|
|
uint8_t client_sk[CRYPTO_SECRET_KEY_SIZE];
|
|
crypto_new_keypair(&client_node->c_random, client_pk, client_sk);
|
|
|
|
Net_Profile *client_profile = netprof_new(client_log, &client_node->c_memory);
|
|
|
|
// 2. Client connects to Server
|
|
IP_Port server_ip_port;
|
|
server_ip_port.ip = server_node->node->ip;
|
|
server_ip_port.port = net_htons(33445);
|
|
|
|
TCP_Client_Connection *client_conn = new_tcp_connection(client_log, &client_node->c_memory,
|
|
client_time, &client_node->c_random, &client_node->c_network, &server_ip_port, server_pk,
|
|
client_pk, client_sk, nullptr, client_profile);
|
|
ASSERT_NE(client_conn, nullptr);
|
|
|
|
// 3. Simulation Loop
|
|
bool connected = false;
|
|
Socket accepted_sock = net_invalid_socket();
|
|
uint64_t start_time = env.clock().current_time_ms();
|
|
|
|
while (env.clock().current_time_ms() - start_time < 5000) {
|
|
env.advance_time(10);
|
|
do_tcp_connection(client_log, client_time, client_conn, nullptr);
|
|
|
|
// Server accepts connection
|
|
if (!sock_valid(accepted_sock)) {
|
|
accepted_sock = net_accept(&server_node->c_network, server_sock);
|
|
if (sock_valid(accepted_sock)) {
|
|
fprintf(stderr, "Server accepted connection! Socket: %d\n", accepted_sock.value);
|
|
set_socket_nonblock(&server_node->c_network, accepted_sock);
|
|
}
|
|
}
|
|
|
|
// Server handles handshake
|
|
if (sock_valid(accepted_sock)) {
|
|
uint8_t buf[TCP_CLIENT_HANDSHAKE_SIZE];
|
|
IP_Port remote = {{{0}}};
|
|
int len = net_recv(
|
|
&server_node->c_network, server_log, accepted_sock, buf, sizeof(buf), &remote);
|
|
|
|
if (len > 0) {
|
|
fprintf(stderr, "Server received %d bytes\n", len);
|
|
}
|
|
|
|
if (len == TCP_CLIENT_HANDSHAKE_SIZE) {
|
|
// Verify client PK
|
|
EXPECT_EQ(0, memcmp(buf, client_pk, CRYPTO_PUBLIC_KEY_SIZE));
|
|
|
|
// Decrypt
|
|
uint8_t shared_key[CRYPTO_SHARED_KEY_SIZE];
|
|
encrypt_precompute(client_pk, server_sk, shared_key);
|
|
|
|
uint8_t plain[TCP_HANDSHAKE_PLAIN_SIZE];
|
|
const uint8_t *nonce_ptr = buf + CRYPTO_PUBLIC_KEY_SIZE;
|
|
const uint8_t *ciphertext_ptr = buf + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE;
|
|
|
|
int res = decrypt_data_symmetric(&server_node->c_memory, shared_key, nonce_ptr,
|
|
ciphertext_ptr,
|
|
TCP_CLIENT_HANDSHAKE_SIZE - (CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE),
|
|
plain);
|
|
|
|
if (res != TCP_HANDSHAKE_PLAIN_SIZE) {
|
|
fprintf(stderr, "Decryption failed: res=%d\n", res);
|
|
}
|
|
|
|
if (res == TCP_HANDSHAKE_PLAIN_SIZE) {
|
|
// Generate Response
|
|
// [Nonce (24)] [Encrypted (PK(32)+Nonce(24)+MAC(16))]
|
|
|
|
uint8_t resp_nonce[CRYPTO_NONCE_SIZE];
|
|
random_nonce(&server_node->c_random, resp_nonce);
|
|
|
|
uint8_t temp_pk[CRYPTO_PUBLIC_KEY_SIZE];
|
|
uint8_t temp_sk[CRYPTO_SECRET_KEY_SIZE];
|
|
crypto_new_keypair(&server_node->c_random, temp_pk, temp_sk);
|
|
|
|
uint8_t resp_plain[TCP_HANDSHAKE_PLAIN_SIZE];
|
|
memcpy(resp_plain, temp_pk, CRYPTO_PUBLIC_KEY_SIZE);
|
|
random_nonce(&server_node->c_random, resp_plain + CRYPTO_PUBLIC_KEY_SIZE);
|
|
|
|
uint8_t response[TCP_SERVER_HANDSHAKE_SIZE];
|
|
memcpy(response, resp_nonce, CRYPTO_NONCE_SIZE);
|
|
|
|
encrypt_data_symmetric(&server_node->c_memory, shared_key,
|
|
resp_nonce, // nonce
|
|
resp_plain, // plain
|
|
TCP_HANDSHAKE_PLAIN_SIZE, // plain len
|
|
response + CRYPTO_NONCE_SIZE // dest
|
|
);
|
|
|
|
net_send(&server_node->c_network, server_log, accepted_sock, response,
|
|
sizeof(response), &remote, nullptr);
|
|
}
|
|
}
|
|
}
|
|
|
|
if (tcp_con_status(client_conn) == TCP_CLIENT_CONFIRMED) {
|
|
connected = true;
|
|
break;
|
|
}
|
|
}
|
|
|
|
EXPECT_TRUE(connected);
|
|
|
|
// Cleanup
|
|
kill_tcp_connection(client_conn);
|
|
net_profile_deleter(client_profile, &client_node->c_memory);
|
|
kill_sock(&server_node->c_network, server_sock);
|
|
if (sock_valid(accepted_sock))
|
|
kill_sock(&server_node->c_network, accepted_sock);
|
|
|
|
logger_kill(client_log);
|
|
logger_kill(server_log);
|
|
mono_time_free(&client_node->c_memory, client_time);
|
|
}
|
|
|
|
TEST_F(TCPClientTest, SendDataIntegerOverflow)
|
|
{
|
|
auto server_node = env.create_node(33446);
|
|
auto client_node = env.create_node(0);
|
|
|
|
Logger *server_log = logger_new(&server_node->c_memory);
|
|
logger_callback_log(server_log, &TCPClientTest::log_cb, nullptr, nullptr);
|
|
Logger *client_log = logger_new(&client_node->c_memory);
|
|
logger_callback_log(client_log, &TCPClientTest::log_cb, nullptr, nullptr);
|
|
|
|
Mono_Time *client_time = create_mono_time(&client_node->c_memory);
|
|
|
|
Socket server_sock
|
|
= net_socket(&server_node->c_network, net_family_ipv4(), TOX_SOCK_STREAM, TOX_PROTO_TCP);
|
|
ASSERT_TRUE(sock_valid(server_sock));
|
|
ASSERT_TRUE(set_socket_nonblock(&server_node->c_network, server_sock));
|
|
ASSERT_TRUE(bind_to_port(&server_node->c_network, server_sock, net_family_ipv4(), 33446));
|
|
ASSERT_EQ(0, net_listen(&server_node->c_network, server_sock, 5));
|
|
|
|
uint8_t server_pk[CRYPTO_PUBLIC_KEY_SIZE];
|
|
uint8_t server_sk[CRYPTO_SECRET_KEY_SIZE];
|
|
crypto_new_keypair(&server_node->c_random, server_pk, server_sk);
|
|
|
|
uint8_t client_pk[CRYPTO_PUBLIC_KEY_SIZE];
|
|
uint8_t client_sk[CRYPTO_SECRET_KEY_SIZE];
|
|
crypto_new_keypair(&client_node->c_random, client_pk, client_sk);
|
|
|
|
Net_Profile *client_profile = netprof_new(client_log, &client_node->c_memory);
|
|
|
|
IP_Port server_ip_port;
|
|
server_ip_port.ip = server_node->node->ip;
|
|
server_ip_port.port = net_htons(33446);
|
|
|
|
TCP_Client_Connection *client_conn = new_tcp_connection(client_log, &client_node->c_memory,
|
|
client_time, &client_node->c_random, &client_node->c_network, &server_ip_port, server_pk,
|
|
client_pk, client_sk, nullptr, client_profile);
|
|
ASSERT_NE(client_conn, nullptr);
|
|
|
|
bool connected = false;
|
|
Socket accepted_sock = net_invalid_socket();
|
|
uint64_t start_time = env.clock().current_time_ms();
|
|
uint8_t shared_key[CRYPTO_SHARED_KEY_SIZE];
|
|
uint8_t sent_nonce[CRYPTO_NONCE_SIZE] = {0};
|
|
uint8_t recv_nonce[CRYPTO_NONCE_SIZE] = {0};
|
|
|
|
// Helper to send encrypted packet from server to client
|
|
auto server_send_packet = [&](const uint8_t *data, uint16_t length) {
|
|
uint16_t packet_size = sizeof(uint16_t) + length + CRYPTO_MAC_SIZE;
|
|
std::vector<uint8_t> packet(packet_size);
|
|
uint16_t c_length = net_htons(length + CRYPTO_MAC_SIZE);
|
|
memcpy(packet.data(), &c_length, sizeof(uint16_t));
|
|
|
|
encrypt_data_symmetric(&server_node->c_memory, shared_key, sent_nonce, data, length,
|
|
packet.data() + sizeof(uint16_t));
|
|
increment_nonce(sent_nonce);
|
|
|
|
IP_Port remote = {{{0}}};
|
|
net_send(&server_node->c_network, server_log, accepted_sock, packet.data(), packet_size,
|
|
&remote, nullptr);
|
|
};
|
|
|
|
while (env.clock().current_time_ms() - start_time < 5000) {
|
|
env.advance_time(10);
|
|
do_tcp_connection(client_log, client_time, client_conn, nullptr);
|
|
|
|
if (!sock_valid(accepted_sock)) {
|
|
accepted_sock = net_accept(&server_node->c_network, server_sock);
|
|
if (sock_valid(accepted_sock)) {
|
|
set_socket_nonblock(&server_node->c_network, accepted_sock);
|
|
}
|
|
}
|
|
|
|
if (sock_valid(accepted_sock) && !connected) {
|
|
uint8_t buf[TCP_CLIENT_HANDSHAKE_SIZE];
|
|
IP_Port remote = {{{0}}};
|
|
int len = net_recv(
|
|
&server_node->c_network, server_log, accepted_sock, buf, sizeof(buf), &remote);
|
|
|
|
if (len == TCP_CLIENT_HANDSHAKE_SIZE) {
|
|
encrypt_precompute(client_pk, server_sk, shared_key);
|
|
uint8_t plain[TCP_HANDSHAKE_PLAIN_SIZE];
|
|
if (decrypt_data_symmetric(&server_node->c_memory, shared_key,
|
|
buf + CRYPTO_PUBLIC_KEY_SIZE,
|
|
buf + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE,
|
|
TCP_CLIENT_HANDSHAKE_SIZE - (CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE),
|
|
plain)
|
|
== TCP_HANDSHAKE_PLAIN_SIZE) {
|
|
memcpy(recv_nonce, plain + CRYPTO_PUBLIC_KEY_SIZE, CRYPTO_NONCE_SIZE);
|
|
|
|
uint8_t resp_nonce[CRYPTO_NONCE_SIZE];
|
|
random_nonce(&server_node->c_random, resp_nonce);
|
|
memcpy(sent_nonce, resp_nonce, CRYPTO_NONCE_SIZE);
|
|
|
|
uint8_t temp_pk[CRYPTO_PUBLIC_KEY_SIZE];
|
|
uint8_t temp_sk[CRYPTO_SECRET_KEY_SIZE];
|
|
crypto_new_keypair(&server_node->c_random, temp_pk, temp_sk);
|
|
|
|
uint8_t resp_plain[TCP_HANDSHAKE_PLAIN_SIZE];
|
|
memcpy(resp_plain, temp_pk, CRYPTO_PUBLIC_KEY_SIZE);
|
|
random_nonce(&server_node->c_random, resp_plain + CRYPTO_PUBLIC_KEY_SIZE);
|
|
|
|
// FIX: Save the nonce that client will use for receiving
|
|
memcpy(sent_nonce, resp_plain + CRYPTO_PUBLIC_KEY_SIZE, CRYPTO_NONCE_SIZE);
|
|
|
|
uint8_t response[TCP_SERVER_HANDSHAKE_SIZE];
|
|
memcpy(response, resp_nonce, CRYPTO_NONCE_SIZE);
|
|
encrypt_data_symmetric(&server_node->c_memory, shared_key, resp_nonce,
|
|
resp_plain, TCP_HANDSHAKE_PLAIN_SIZE, response + CRYPTO_NONCE_SIZE);
|
|
net_send(&server_node->c_network, server_log, accepted_sock, response,
|
|
sizeof(response), &remote, nullptr);
|
|
|
|
// FIX: Update shared key using Client's Ephemeral PK and Server's Ephemeral SK
|
|
encrypt_precompute(plain, temp_sk, shared_key);
|
|
}
|
|
}
|
|
}
|
|
|
|
if (tcp_con_status(client_conn) == TCP_CLIENT_CONFIRMED) {
|
|
connected = true;
|
|
break;
|
|
}
|
|
}
|
|
ASSERT_TRUE(connected);
|
|
|
|
// Establish sub-connection 0
|
|
uint8_t con_id = 0;
|
|
uint8_t other_pk[CRYPTO_PUBLIC_KEY_SIZE] = {0}; // Dummy PK
|
|
// 1. Send Routing Response to set status=1
|
|
{
|
|
uint8_t packet[1 + 1 + CRYPTO_PUBLIC_KEY_SIZE];
|
|
packet[0] = TCP_PACKET_ROUTING_RESPONSE;
|
|
packet[1] = con_id + NUM_RESERVED_PORTS;
|
|
memcpy(packet + 2, other_pk, CRYPTO_PUBLIC_KEY_SIZE);
|
|
server_send_packet(packet, sizeof(packet));
|
|
}
|
|
|
|
// Pump loop to process packet
|
|
for (int i = 0; i < 10; ++i) {
|
|
env.advance_time(10);
|
|
do_tcp_connection(client_log, client_time, client_conn, nullptr);
|
|
}
|
|
|
|
// 2. Send Connection Notification to set status=2
|
|
{
|
|
uint8_t packet[1 + 1];
|
|
packet[0] = TCP_PACKET_CONNECTION_NOTIFICATION;
|
|
packet[1] = con_id + NUM_RESERVED_PORTS;
|
|
server_send_packet(packet, sizeof(packet));
|
|
}
|
|
|
|
// Pump loop to process packet
|
|
for (int i = 0; i < 10; ++i) {
|
|
env.advance_time(10);
|
|
do_tcp_connection(client_log, client_time, client_conn, nullptr);
|
|
}
|
|
|
|
// Now call send_data with 65535 bytes
|
|
std::vector<uint8_t> large_data(65535);
|
|
// This should trigger integer overflow: 1 + 65535 = 0. VLA(0). packet[0] write -> Crash/UB
|
|
send_data(client_log, client_conn, con_id, large_data.data(), 65535);
|
|
|
|
// Cleanup
|
|
kill_tcp_connection(client_conn);
|
|
net_profile_deleter(client_profile, &client_node->c_memory);
|
|
kill_sock(&server_node->c_network, server_sock);
|
|
if (sock_valid(accepted_sock))
|
|
kill_sock(&server_node->c_network, accepted_sock);
|
|
logger_kill(client_log);
|
|
logger_kill(server_log);
|
|
mono_time_free(&client_node->c_memory, client_time);
|
|
}
|
|
|
|
} // namespace
|