|
|
|
|
@@ -1,6 +1,13 @@
|
|
|
|
|
package peer
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
import (
|
|
|
|
|
"bytes"
|
|
|
|
|
"net/netip"
|
|
|
|
|
"reflect"
|
|
|
|
|
"sync/atomic"
|
|
|
|
|
"testing"
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
type mockIfWriter struct {
|
|
|
|
|
Written [][]byte
|
|
|
|
|
}
|
|
|
|
|
@@ -135,7 +142,7 @@ func TestConnReader_handleNextPacket_unknownStreamID(t *testing.T) {
|
|
|
|
|
|
|
|
|
|
pkt := synPacket{TraceID: 1234}
|
|
|
|
|
|
|
|
|
|
encrypted := h.WRemote.encryptControlPacket(pkt, h.Remote)
|
|
|
|
|
encrypted := encryptControlPacket(1, h.Remote, pkt, newBuf(), newBuf())
|
|
|
|
|
var header header
|
|
|
|
|
header.Parse(encrypted)
|
|
|
|
|
header.StreamID = 100
|
|
|
|
|
@@ -154,7 +161,8 @@ func TestConnReader_handleControlPacket_noCipher(t *testing.T) {
|
|
|
|
|
|
|
|
|
|
pkt := synPacket{TraceID: 1234}
|
|
|
|
|
|
|
|
|
|
encrypted := h.WRemote.encryptControlPacket(pkt, h.Remote)
|
|
|
|
|
//encrypted := h.WRemote.encryptControlPacket(pkt, h.Remote)
|
|
|
|
|
encrypted := encryptControlPacket(1, h.Remote, pkt, newBuf(), newBuf())
|
|
|
|
|
var header header
|
|
|
|
|
header.Parse(encrypted)
|
|
|
|
|
header.SourceIP = 10
|
|
|
|
|
@@ -173,7 +181,7 @@ func TestConnReader_handleControlPacket_incorrectDest(t *testing.T) {
|
|
|
|
|
|
|
|
|
|
pkt := synPacket{TraceID: 1234}
|
|
|
|
|
|
|
|
|
|
encrypted := h.WRemote.encryptControlPacket(pkt, h.Remote)
|
|
|
|
|
encrypted := encryptControlPacket(2, h.Remote, pkt, newBuf(), newBuf())
|
|
|
|
|
var header header
|
|
|
|
|
header.Parse(encrypted)
|
|
|
|
|
header.DestIP++
|
|
|
|
|
@@ -192,7 +200,7 @@ func TestConnReader_handleControlPacket_modified(t *testing.T) {
|
|
|
|
|
|
|
|
|
|
pkt := synPacket{TraceID: 1234}
|
|
|
|
|
|
|
|
|
|
encrypted := h.WRemote.encryptControlPacket(pkt, h.Remote)
|
|
|
|
|
encrypted := encryptControlPacket(2, h.Remote, pkt, newBuf(), newBuf())
|
|
|
|
|
encrypted[len(encrypted)-1]++
|
|
|
|
|
|
|
|
|
|
h.WRemote.writeTo(encrypted, netip.AddrPort{})
|
|
|
|
|
@@ -202,19 +210,21 @@ func TestConnReader_handleControlPacket_modified(t *testing.T) {
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
type emptyPacket struct{}
|
|
|
|
|
type unknownPacket struct{}
|
|
|
|
|
|
|
|
|
|
func (p emptyPacket) Marshal(buf []byte) []byte {
|
|
|
|
|
return buf[:0]
|
|
|
|
|
func (p unknownPacket) Marshal(buf []byte) []byte {
|
|
|
|
|
buf = buf[:1]
|
|
|
|
|
buf[0] = 100
|
|
|
|
|
return buf
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Testing that an empty control packet is ignored.
|
|
|
|
|
func TestConnReader_handleControlPacket_empty(t *testing.T) {
|
|
|
|
|
func TestConnReader_handleControlPacket_unknownPacketType(t *testing.T) {
|
|
|
|
|
h := newConnReadeTestHarness()
|
|
|
|
|
|
|
|
|
|
pkt := emptyPacket{}
|
|
|
|
|
pkt := unknownPacket{}
|
|
|
|
|
|
|
|
|
|
encrypted := h.WRemote.encryptControlPacket(pkt, h.Remote)
|
|
|
|
|
encrypted := encryptControlPacket(2, h.Remote, pkt, newBuf(), newBuf())
|
|
|
|
|
h.WRemote.writeTo(encrypted, netip.AddrPort{})
|
|
|
|
|
h.R.handleNextPacket()
|
|
|
|
|
if len(h.Super.Messages) != 0 {
|
|
|
|
|
@@ -228,13 +238,8 @@ func TestConnReader_handleControlPacket_duplicate(t *testing.T) {
|
|
|
|
|
|
|
|
|
|
pkt := synPacket{TraceID: 1234}
|
|
|
|
|
|
|
|
|
|
log.Printf("%d", h.WRemote.counters[1])
|
|
|
|
|
h.WRemote.SendControlPacket(pkt, h.Remote)
|
|
|
|
|
log.Printf("%d", h.WRemote.counters[1])
|
|
|
|
|
|
|
|
|
|
// Rewind the counter.
|
|
|
|
|
h.WRemote.counters[1] = h.WRemote.counters[1] - 1
|
|
|
|
|
log.Printf("%d", h.WRemote.counters[1])
|
|
|
|
|
*h.Remote.Counter = *h.Remote.Counter - 1
|
|
|
|
|
h.WRemote.SendControlPacket(pkt, h.Remote)
|
|
|
|
|
|
|
|
|
|
h.R.handleNextPacket()
|
|
|
|
|
@@ -250,28 +255,7 @@ func TestConnReader_handleControlPacket_duplicate(t *testing.T) {
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
type invalidPacket struct {
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (p invalidPacket) Marshal(b []byte) []byte {
|
|
|
|
|
out := b[:256]
|
|
|
|
|
clear(out)
|
|
|
|
|
return out
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Testing that an invalid control packet is ignored (fails to parse).
|
|
|
|
|
func TestConnReader_handleControlPacket_cantParse(t *testing.T) {
|
|
|
|
|
h := newConnReadeTestHarness()
|
|
|
|
|
|
|
|
|
|
pkt := invalidPacket{}
|
|
|
|
|
|
|
|
|
|
encrypted := h.WRemote.encryptControlPacket(pkt, h.Remote)
|
|
|
|
|
h.WRemote.writeTo(encrypted, netip.AddrPort{})
|
|
|
|
|
h.R.handleNextPacket()
|
|
|
|
|
if len(h.Super.Messages) != 0 {
|
|
|
|
|
t.Fatal(h.Super.Messages)
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
/*
|
|
|
|
|
|
|
|
|
|
// Testing that we can receive a data packet.
|
|
|
|
|
func TestConnReader_handleDataPacket(t *testing.T) {
|
|
|
|
|
|