2014-01-01 12:18:37 +08:00
|
|
|
#ifdef HAVE_CONFIG_H
|
|
|
|
#include "config.h"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <stdint.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <check.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <time.h>
|
|
|
|
|
|
|
|
#include "../toxcore/onion.h"
|
2014-01-05 08:40:43 +08:00
|
|
|
#include "../toxcore/onion_announce.h"
|
2014-01-30 09:59:50 +08:00
|
|
|
#include "../toxcore/onion_client.h"
|
2014-01-07 06:59:44 +08:00
|
|
|
#include "../toxcore/util.h"
|
2014-01-01 12:18:37 +08:00
|
|
|
|
2014-01-20 07:18:25 +08:00
|
|
|
#if defined(_WIN32) || defined(__WIN32__) || defined (WIN32)
|
2014-01-06 08:22:38 +08:00
|
|
|
#define c_sleep(x) Sleep(1*x)
|
|
|
|
#else
|
|
|
|
#include <unistd.h>
|
|
|
|
#define c_sleep(x) usleep(1000*x)
|
|
|
|
#endif
|
|
|
|
|
2014-01-01 12:18:37 +08:00
|
|
|
void do_onion(Onion *onion)
|
|
|
|
{
|
|
|
|
networking_poll(onion->net);
|
|
|
|
do_DHT(onion->dht);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int handled_test_1;
|
2014-06-16 08:49:39 +08:00
|
|
|
static int handle_test_1(void *object, IP_Port source, const uint8_t *packet, uint32_t length)
|
2014-01-01 12:18:37 +08:00
|
|
|
{
|
|
|
|
Onion *onion = object;
|
|
|
|
|
|
|
|
if (memcmp(packet, "Install Gentoo", sizeof("Install Gentoo")) != 0)
|
|
|
|
return 1;
|
|
|
|
|
2014-01-05 08:40:43 +08:00
|
|
|
if (send_onion_response(onion->net, source, (uint8_t *)"install gentoo", sizeof("install gentoo"),
|
2014-01-04 11:13:20 +08:00
|
|
|
packet + sizeof("Install Gentoo")) == -1)
|
2014-01-01 12:18:37 +08:00
|
|
|
return 1;
|
|
|
|
|
|
|
|
handled_test_1 = 1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int handled_test_2;
|
2014-06-16 08:49:39 +08:00
|
|
|
static int handle_test_2(void *object, IP_Port source, const uint8_t *packet, uint32_t length)
|
2014-01-01 12:18:37 +08:00
|
|
|
{
|
|
|
|
if (length != sizeof("install Gentoo"))
|
|
|
|
return 1;
|
|
|
|
|
2014-01-05 08:40:43 +08:00
|
|
|
if (memcmp(packet, (uint8_t *)"install gentoo", sizeof("install gentoo")) != 0)
|
2014-01-01 12:18:37 +08:00
|
|
|
return 1;
|
|
|
|
|
|
|
|
handled_test_2 = 1;
|
|
|
|
return 0;
|
|
|
|
}
|
2014-01-06 08:22:38 +08:00
|
|
|
/*
|
|
|
|
void print_client_id(uint8_t *client_id, uint32_t length)
|
|
|
|
{
|
|
|
|
uint32_t j;
|
|
|
|
|
|
|
|
for (j = 0; j < length; j++) {
|
|
|
|
printf("%02hhX", client_id[j]);
|
|
|
|
}
|
|
|
|
printf("\n");
|
|
|
|
}
|
|
|
|
*/
|
2014-01-09 09:15:35 +08:00
|
|
|
uint8_t sb_data[ONION_ANNOUNCE_SENDBACK_DATA_LENGTH];
|
2014-01-06 08:22:38 +08:00
|
|
|
static int handled_test_3;
|
|
|
|
uint8_t test_3_pub_key[crypto_box_PUBLICKEYBYTES];
|
|
|
|
uint8_t test_3_ping_id[crypto_hash_sha256_BYTES];
|
2014-06-16 08:49:39 +08:00
|
|
|
static int handle_test_3(void *object, IP_Port source, const uint8_t *packet, uint32_t length)
|
2014-01-06 08:22:38 +08:00
|
|
|
{
|
|
|
|
Onion *onion = object;
|
|
|
|
|
2014-01-20 03:41:29 +08:00
|
|
|
if (length != (1 + crypto_box_NONCEBYTES + ONION_ANNOUNCE_SENDBACK_DATA_LENGTH + 1 + crypto_hash_sha256_BYTES +
|
2014-01-09 09:15:35 +08:00
|
|
|
crypto_box_MACBYTES))
|
2014-01-06 08:22:38 +08:00
|
|
|
return 1;
|
|
|
|
|
2014-01-20 03:41:29 +08:00
|
|
|
uint8_t plain[1 + crypto_hash_sha256_BYTES];
|
2014-01-06 08:22:38 +08:00
|
|
|
//print_client_id(packet, length);
|
2014-04-24 00:29:24 +08:00
|
|
|
int len = decrypt_data(test_3_pub_key, onion->dht->self_secret_key, packet + 1 + ONION_ANNOUNCE_SENDBACK_DATA_LENGTH,
|
2014-01-10 08:54:42 +08:00
|
|
|
packet + 1 + ONION_ANNOUNCE_SENDBACK_DATA_LENGTH + crypto_box_NONCEBYTES,
|
2014-01-20 03:41:29 +08:00
|
|
|
1 + crypto_hash_sha256_BYTES + crypto_box_MACBYTES, plain);
|
2014-01-06 08:22:38 +08:00
|
|
|
|
|
|
|
if (len == -1)
|
|
|
|
return 1;
|
|
|
|
|
2014-01-10 08:54:42 +08:00
|
|
|
|
|
|
|
if (memcmp(packet + 1, sb_data, ONION_ANNOUNCE_SENDBACK_DATA_LENGTH) != 0)
|
2014-01-09 09:15:35 +08:00
|
|
|
return 1;
|
|
|
|
|
2014-01-20 03:41:29 +08:00
|
|
|
memcpy(test_3_ping_id, plain + 1, crypto_hash_sha256_BYTES);
|
2014-01-06 08:22:38 +08:00
|
|
|
//print_client_id(test_3_ping_id, sizeof(test_3_ping_id));
|
|
|
|
handled_test_3 = 1;
|
|
|
|
return 0;
|
|
|
|
}
|
2014-01-05 08:40:43 +08:00
|
|
|
|
2014-01-15 03:20:42 +08:00
|
|
|
uint8_t nonce[crypto_box_NONCEBYTES];
|
2014-01-07 06:59:44 +08:00
|
|
|
static int handled_test_4;
|
2014-06-16 08:49:39 +08:00
|
|
|
static int handle_test_4(void *object, IP_Port source, const uint8_t *packet, uint32_t length)
|
2014-01-07 06:59:44 +08:00
|
|
|
{
|
|
|
|
Onion *onion = object;
|
|
|
|
|
|
|
|
if (length != (1 + crypto_box_NONCEBYTES + crypto_box_PUBLICKEYBYTES + sizeof("Install gentoo") + crypto_box_MACBYTES))
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
uint8_t plain[sizeof("Install gentoo")] = {0};
|
2014-01-15 03:20:42 +08:00
|
|
|
|
|
|
|
if (memcmp(nonce, packet + 1, crypto_box_NONCEBYTES) != 0)
|
|
|
|
return 1;
|
|
|
|
|
2014-04-24 00:29:24 +08:00
|
|
|
int len = decrypt_data(packet + 1 + crypto_box_NONCEBYTES, onion->dht->self_secret_key, packet + 1,
|
2014-01-07 06:59:44 +08:00
|
|
|
packet + 1 + crypto_box_NONCEBYTES + crypto_box_PUBLICKEYBYTES, sizeof("Install gentoo") + crypto_box_MACBYTES, plain);
|
|
|
|
|
|
|
|
if (len == -1)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
if (memcmp(plain, "Install gentoo", sizeof("Install gentoo")) != 0)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
handled_test_4 = 1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-01-01 12:18:37 +08:00
|
|
|
START_TEST(test_basic)
|
|
|
|
{
|
|
|
|
IP ip;
|
|
|
|
ip_init(&ip, 1);
|
|
|
|
ip.ip6.uint8[15] = 1;
|
2014-04-24 00:29:24 +08:00
|
|
|
Onion *onion1 = new_onion(new_DHT(new_networking(ip, 34567)));
|
|
|
|
Onion *onion2 = new_onion(new_DHT(new_networking(ip, 34568)));
|
2014-01-01 12:18:37 +08:00
|
|
|
ck_assert_msg((onion1 != NULL) && (onion2 != NULL), "Onion failed initializing.");
|
|
|
|
networking_registerhandler(onion2->net, 'I', &handle_test_1, onion2);
|
|
|
|
|
|
|
|
IP_Port on1 = {ip, onion1->net->port};
|
|
|
|
Node_format n1;
|
|
|
|
memcpy(n1.client_id, onion1->dht->self_public_key, crypto_box_PUBLICKEYBYTES);
|
|
|
|
n1.ip_port = on1;
|
|
|
|
|
|
|
|
IP_Port on2 = {ip, onion2->net->port};
|
|
|
|
Node_format n2;
|
|
|
|
memcpy(n2.client_id, onion2->dht->self_public_key, crypto_box_PUBLICKEYBYTES);
|
|
|
|
n2.ip_port = on2;
|
|
|
|
|
|
|
|
Node_format nodes[4];
|
|
|
|
nodes[0] = n1;
|
|
|
|
nodes[1] = n2;
|
|
|
|
nodes[2] = n1;
|
|
|
|
nodes[3] = n2;
|
2014-02-27 01:46:11 +08:00
|
|
|
Onion_Path path;
|
|
|
|
create_onion_path(onion1->dht, &path, nodes);
|
|
|
|
int ret = send_onion_packet(onion1->net, &path, nodes[3].ip_port, (uint8_t *)"Install Gentoo",
|
|
|
|
sizeof("Install Gentoo"));
|
2014-01-01 12:18:37 +08:00
|
|
|
ck_assert_msg(ret == 0, "Failed to create/send onion packet.");
|
|
|
|
|
|
|
|
handled_test_1 = 0;
|
|
|
|
|
|
|
|
while (handled_test_1 == 0) {
|
|
|
|
do_onion(onion1);
|
|
|
|
do_onion(onion2);
|
|
|
|
}
|
|
|
|
|
|
|
|
networking_registerhandler(onion1->net, 'i', &handle_test_2, onion1);
|
|
|
|
handled_test_2 = 0;
|
|
|
|
|
|
|
|
while (handled_test_2 == 0) {
|
|
|
|
do_onion(onion1);
|
|
|
|
do_onion(onion2);
|
|
|
|
}
|
2014-01-06 08:22:38 +08:00
|
|
|
|
|
|
|
Onion_Announce *onion1_a = new_onion_announce(onion1->dht);
|
|
|
|
Onion_Announce *onion2_a = new_onion_announce(onion2->dht);
|
|
|
|
networking_registerhandler(onion1->net, NET_PACKET_ANNOUNCE_RESPONSE, &handle_test_3, onion1);
|
|
|
|
ck_assert_msg((onion1_a != NULL) && (onion2_a != NULL), "Onion_Announce failed initializing.");
|
|
|
|
uint8_t zeroes[64] = {0};
|
2014-01-09 09:15:35 +08:00
|
|
|
randombytes(sb_data, sizeof(sb_data));
|
2014-05-13 07:43:44 +08:00
|
|
|
uint64_t s;
|
|
|
|
memcpy(&s, sb_data, sizeof(uint64_t));
|
2014-01-06 08:22:38 +08:00
|
|
|
memcpy(test_3_pub_key, nodes[3].client_id, crypto_box_PUBLICKEYBYTES);
|
2014-04-24 00:29:24 +08:00
|
|
|
ret = send_announce_request(onion1->net, &path, nodes[3], onion1->dht->self_public_key,
|
|
|
|
onion1->dht->self_secret_key,
|
2014-05-13 07:43:44 +08:00
|
|
|
zeroes, onion1->dht->self_public_key, onion1->dht->self_public_key, s);
|
2014-01-06 08:22:38 +08:00
|
|
|
ck_assert_msg(ret == 0, "Failed to create/send onion announce_request packet.");
|
|
|
|
handled_test_3 = 0;
|
|
|
|
|
|
|
|
while (handled_test_3 == 0) {
|
|
|
|
do_onion(onion1);
|
|
|
|
do_onion(onion2);
|
2014-04-16 07:16:35 +08:00
|
|
|
c_sleep(50);
|
2014-01-06 08:22:38 +08:00
|
|
|
}
|
|
|
|
|
2014-01-09 09:15:35 +08:00
|
|
|
randombytes(sb_data, sizeof(sb_data));
|
2014-05-13 07:43:44 +08:00
|
|
|
memcpy(&s, sb_data, sizeof(uint64_t));
|
2014-01-07 06:59:44 +08:00
|
|
|
memcpy(onion2_a->entries[1].public_key, onion2->dht->self_public_key, crypto_box_PUBLICKEYBYTES);
|
|
|
|
onion2_a->entries[1].time = unix_time();
|
|
|
|
networking_registerhandler(onion1->net, NET_PACKET_ONION_DATA_RESPONSE, &handle_test_4, onion1);
|
2014-04-24 00:29:24 +08:00
|
|
|
send_announce_request(onion1->net, &path, nodes[3], onion1->dht->self_public_key, onion1->dht->self_secret_key,
|
2014-05-13 07:43:44 +08:00
|
|
|
test_3_ping_id, onion1->dht->self_public_key, onion1->dht->self_public_key, s);
|
2014-01-06 08:22:38 +08:00
|
|
|
|
2014-04-24 00:29:24 +08:00
|
|
|
while (memcmp(onion2_a->entries[ONION_ANNOUNCE_MAX_ENTRIES - 2].public_key, onion1->dht->self_public_key,
|
2014-01-06 08:22:38 +08:00
|
|
|
crypto_box_PUBLICKEYBYTES) != 0) {
|
|
|
|
do_onion(onion1);
|
|
|
|
do_onion(onion2);
|
|
|
|
c_sleep(50);
|
|
|
|
}
|
2014-01-07 06:59:44 +08:00
|
|
|
|
|
|
|
c_sleep(1000);
|
2014-04-24 00:29:24 +08:00
|
|
|
Onion *onion3 = new_onion(new_DHT(new_networking(ip, 34569)));
|
2014-01-07 06:59:44 +08:00
|
|
|
ck_assert_msg((onion3 != NULL), "Onion failed initializing.");
|
2014-01-15 03:20:42 +08:00
|
|
|
|
|
|
|
new_nonce(nonce);
|
2014-04-24 00:29:24 +08:00
|
|
|
ret = send_data_request(onion3->net, &path, nodes[3].ip_port, onion1->dht->self_public_key,
|
|
|
|
onion1->dht->self_public_key,
|
2014-01-20 03:41:29 +08:00
|
|
|
nonce, (uint8_t *)"Install gentoo", sizeof("Install gentoo"));
|
2014-01-07 06:59:44 +08:00
|
|
|
ck_assert_msg(ret == 0, "Failed to create/send onion data_request packet.");
|
|
|
|
handled_test_4 = 0;
|
|
|
|
|
|
|
|
while (handled_test_4 == 0) {
|
|
|
|
do_onion(onion1);
|
|
|
|
do_onion(onion2);
|
|
|
|
c_sleep(50);
|
|
|
|
}
|
2014-01-01 12:18:37 +08:00
|
|
|
}
|
|
|
|
END_TEST
|
|
|
|
|
2014-01-06 08:22:38 +08:00
|
|
|
typedef struct {
|
|
|
|
Onion *onion;
|
|
|
|
Onion_Announce *onion_a;
|
2014-01-30 09:59:50 +08:00
|
|
|
Onion_Client *onion_c;
|
2014-01-06 08:22:38 +08:00
|
|
|
} Onions;
|
|
|
|
|
|
|
|
Onions *new_onions(uint16_t port)
|
|
|
|
{
|
|
|
|
IP ip;
|
|
|
|
ip_init(&ip, 1);
|
|
|
|
ip.ip6.uint8[15] = 1;
|
|
|
|
Onions *on = malloc(sizeof(Onions));
|
2014-04-24 00:29:24 +08:00
|
|
|
DHT *dht = new_DHT(new_networking(ip, port));
|
2014-01-06 08:22:38 +08:00
|
|
|
on->onion = new_onion(dht);
|
|
|
|
on->onion_a = new_onion_announce(dht);
|
2014-04-24 00:29:24 +08:00
|
|
|
on->onion_c = new_onion_client(new_net_crypto(dht));
|
2014-01-06 08:22:38 +08:00
|
|
|
|
2014-01-30 09:59:50 +08:00
|
|
|
if (on->onion && on->onion_a && on->onion_c)
|
2014-01-06 08:22:38 +08:00
|
|
|
return on;
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2014-01-30 09:59:50 +08:00
|
|
|
void do_onions(Onions *on)
|
|
|
|
{
|
|
|
|
networking_poll(on->onion->net);
|
|
|
|
do_DHT(on->onion->dht);
|
|
|
|
do_onion_client(on->onion_c);
|
|
|
|
}
|
|
|
|
|
2014-01-31 03:59:31 +08:00
|
|
|
#define NUM_ONIONS 50
|
2014-01-06 08:22:38 +08:00
|
|
|
|
2014-01-05 08:40:43 +08:00
|
|
|
START_TEST(test_announce)
|
|
|
|
{
|
2014-02-28 05:59:17 +08:00
|
|
|
uint32_t i, j;
|
2014-01-06 08:22:38 +08:00
|
|
|
Onions *onions[NUM_ONIONS];
|
|
|
|
|
|
|
|
for (i = 0; i < NUM_ONIONS; ++i) {
|
|
|
|
onions[i] = new_onions(i + 34655);
|
|
|
|
ck_assert_msg(onions[i] != 0, "Failed to create onions. %u");
|
|
|
|
}
|
|
|
|
|
2014-01-30 09:59:50 +08:00
|
|
|
IP ip;
|
|
|
|
ip_init(&ip, 1);
|
|
|
|
ip.ip6.uint8[15] = 1;
|
|
|
|
|
2014-02-06 08:51:22 +08:00
|
|
|
for (i = 3; i < NUM_ONIONS; ++i) {
|
2014-01-30 09:59:50 +08:00
|
|
|
IP_Port ip_port = {ip, onions[i - 1]->onion->net->port};
|
|
|
|
DHT_bootstrap(onions[i]->onion->dht, ip_port, onions[i - 1]->onion->dht->self_public_key);
|
2014-02-06 08:51:22 +08:00
|
|
|
IP_Port ip_port1 = {ip, onions[i - 2]->onion->net->port};
|
|
|
|
DHT_bootstrap(onions[i]->onion->dht, ip_port1, onions[i - 2]->onion->dht->self_public_key);
|
|
|
|
IP_Port ip_port2 = {ip, onions[i - 3]->onion->net->port};
|
|
|
|
DHT_bootstrap(onions[i]->onion->dht, ip_port2, onions[i - 3]->onion->dht->self_public_key);
|
2014-01-30 09:59:50 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t connected = 0;
|
|
|
|
|
|
|
|
while (connected != NUM_ONIONS) {
|
|
|
|
connected = 0;
|
|
|
|
|
|
|
|
for (i = 0; i < NUM_ONIONS; ++i) {
|
|
|
|
do_onions(onions[i]);
|
|
|
|
connected += DHT_isconnected(onions[i]->onion->dht);
|
|
|
|
}
|
2014-02-06 08:51:22 +08:00
|
|
|
|
|
|
|
c_sleep(50);
|
2014-01-30 09:59:50 +08:00
|
|
|
}
|
|
|
|
|
2014-02-28 05:59:17 +08:00
|
|
|
for (i = 0; i < 25 * 2; ++i) {
|
|
|
|
for (j = 0; j < NUM_ONIONS; ++j) {
|
|
|
|
do_onions(onions[j]);
|
|
|
|
}
|
|
|
|
|
|
|
|
c_sleep(50);
|
|
|
|
}
|
|
|
|
|
2014-04-24 00:29:24 +08:00
|
|
|
onion_addfriend(onions[7]->onion_c, onions[37]->onion_c->c->self_public_key);
|
|
|
|
int frnum = onion_addfriend(onions[37]->onion_c, onions[7]->onion_c->c->self_public_key);
|
2014-02-06 08:51:22 +08:00
|
|
|
|
|
|
|
int ok = -1;
|
|
|
|
|
|
|
|
IP_Port ip_port;
|
|
|
|
|
|
|
|
while (ok == -1) {
|
|
|
|
for (i = 0; i < NUM_ONIONS; ++i) {
|
|
|
|
networking_poll(onions[i]->onion->net);
|
|
|
|
do_onion_client(onions[i]->onion_c);
|
|
|
|
}
|
|
|
|
|
2014-02-27 01:46:11 +08:00
|
|
|
ok = onion_getfriendip(onions[37]->onion_c, frnum, &ip_port);
|
2014-02-06 08:51:22 +08:00
|
|
|
|
|
|
|
c_sleep(50);
|
|
|
|
}
|
2014-01-30 09:59:50 +08:00
|
|
|
|
2014-02-06 08:51:22 +08:00
|
|
|
printf("id discovered\n");
|
2014-01-30 09:59:50 +08:00
|
|
|
|
2014-01-31 03:59:31 +08:00
|
|
|
while (ok != 1) {
|
|
|
|
for (i = 0; i < NUM_ONIONS; ++i) {
|
|
|
|
do_onions(onions[i]);
|
|
|
|
}
|
2014-01-30 09:59:50 +08:00
|
|
|
|
2014-02-27 01:46:11 +08:00
|
|
|
ok = onion_getfriendip(onions[37]->onion_c, frnum, &ip_port);
|
2014-01-06 08:22:38 +08:00
|
|
|
|
2014-01-31 03:59:31 +08:00
|
|
|
c_sleep(50);
|
|
|
|
}
|
2014-02-06 08:51:22 +08:00
|
|
|
|
|
|
|
ck_assert_msg(ip_port.port == onions[7]->onion->net->port, "Port in returned ip not correct.");
|
2014-01-05 08:40:43 +08:00
|
|
|
}
|
|
|
|
END_TEST
|
2014-01-01 12:18:37 +08:00
|
|
|
|
|
|
|
#define DEFTESTCASE(NAME) \
|
|
|
|
TCase *tc_##NAME = tcase_create(#NAME); \
|
|
|
|
tcase_add_test(tc_##NAME, test_##NAME); \
|
|
|
|
suite_add_tcase(s, tc_##NAME);
|
|
|
|
|
|
|
|
#define DEFTESTCASE_SLOW(NAME, TIMEOUT) \
|
|
|
|
DEFTESTCASE(NAME) \
|
|
|
|
tcase_set_timeout(tc_##NAME, TIMEOUT);
|
|
|
|
Suite *onion_suite(void)
|
|
|
|
{
|
|
|
|
Suite *s = suite_create("Onion");
|
|
|
|
|
|
|
|
DEFTESTCASE_SLOW(basic, 5);
|
2014-02-08 09:39:30 +08:00
|
|
|
DEFTESTCASE_SLOW(announce, 200);
|
2014-01-01 12:18:37 +08:00
|
|
|
return s;
|
|
|
|
}
|
|
|
|
|
|
|
|
int main(int argc, char *argv[])
|
|
|
|
{
|
|
|
|
srand((unsigned int) time(NULL));
|
|
|
|
|
|
|
|
Suite *onion = onion_suite();
|
|
|
|
SRunner *test_runner = srunner_create(onion);
|
|
|
|
|
|
|
|
int number_failed = 0;
|
|
|
|
srunner_run_all(test_runner, CK_NORMAL);
|
|
|
|
number_failed = srunner_ntests_failed(test_runner);
|
|
|
|
|
|
|
|
srunner_free(test_runner);
|
|
|
|
|
|
|
|
return number_failed;
|
|
|
|
}
|