/* * Copyright 2004 The WebRTC Project Authors. All rights reserved. * * Use of this source code is governed by a BSD-style license * that can be found in the LICENSE file in the root of the source * tree. An additional intellectual property rights grant can be found * in the file PATENTS. All contributing project authors may * be found in the AUTHORS file in the root of the source tree. */ #include "p2p/base/stun_server.h" #include #include #include #include "absl/memory/memory.h" #include "rtc_base/byte_buffer.h" #include "rtc_base/ip_address.h" #include "rtc_base/logging.h" #include "rtc_base/test_client.h" #include "rtc_base/thread.h" #include "rtc_base/virtual_socket_server.h" #include "test/gtest.h" namespace cricket { namespace { const rtc::SocketAddress server_addr("99.99.99.1", 3478); const rtc::SocketAddress client_addr("1.2.3.4", 1234); } // namespace class StunServerTest : public ::testing::Test { public: StunServerTest() : ss_(new rtc::VirtualSocketServer()), network_(ss_.get()) {} virtual void SetUp() { server_.reset( new StunServer(rtc::AsyncUDPSocket::Create(ss_.get(), server_addr))); client_.reset(new rtc::TestClient( absl::WrapUnique(rtc::AsyncUDPSocket::Create(ss_.get(), client_addr)))); network_.Start(); } void Send(const StunMessage& msg) { rtc::ByteBufferWriter buf; msg.Write(&buf); Send(buf.Data(), static_cast(buf.Length())); } void Send(const char* buf, int len) { client_->SendTo(buf, len, server_addr); } bool ReceiveFails() { return (client_->CheckNoPacket()); } StunMessage* Receive() { StunMessage* msg = NULL; std::unique_ptr packet = client_->NextPacket(rtc::TestClient::kTimeoutMs); if (packet) { rtc::ByteBufferReader buf(packet->buf, packet->size); msg = new StunMessage(); msg->Read(&buf); } return msg; } private: std::unique_ptr ss_; rtc::Thread network_; std::unique_ptr server_; std::unique_ptr client_; }; // Disable for TSan v2, see // https://code.google.com/p/webrtc/issues/detail?id=2517 for details. #if !defined(THREAD_SANITIZER) TEST_F(StunServerTest, TestGood) { StunMessage req; // kStunLegacyTransactionIdLength = 16 for legacy RFC 3489 request std::string transaction_id = "0123456789abcdef"; req.SetType(STUN_BINDING_REQUEST); req.SetTransactionID(transaction_id); Send(req); StunMessage* msg = Receive(); ASSERT_TRUE(msg != NULL); EXPECT_EQ(STUN_BINDING_RESPONSE, msg->type()); EXPECT_EQ(req.transaction_id(), msg->transaction_id()); const StunAddressAttribute* mapped_addr = msg->GetAddress(STUN_ATTR_MAPPED_ADDRESS); EXPECT_TRUE(mapped_addr != NULL); EXPECT_EQ(1, mapped_addr->family()); EXPECT_EQ(client_addr.port(), mapped_addr->port()); delete msg; } TEST_F(StunServerTest, TestGoodXorMappedAddr) { StunMessage req; // kStunTransactionIdLength = 12 for RFC 5389 request // StunMessage::Write will automatically insert magic cookie (0x2112A442) std::string transaction_id = "0123456789ab"; req.SetType(STUN_BINDING_REQUEST); req.SetTransactionID(transaction_id); Send(req); StunMessage* msg = Receive(); ASSERT_TRUE(msg != NULL); EXPECT_EQ(STUN_BINDING_RESPONSE, msg->type()); EXPECT_EQ(req.transaction_id(), msg->transaction_id()); const StunAddressAttribute* mapped_addr = msg->GetAddress(STUN_ATTR_XOR_MAPPED_ADDRESS); EXPECT_TRUE(mapped_addr != NULL); EXPECT_EQ(1, mapped_addr->family()); EXPECT_EQ(client_addr.port(), mapped_addr->port()); delete msg; } // Send legacy RFC 3489 request, should not get xor mapped addr TEST_F(StunServerTest, TestNoXorMappedAddr) { StunMessage req; // kStunLegacyTransactionIdLength = 16 for legacy RFC 3489 request std::string transaction_id = "0123456789abcdef"; req.SetType(STUN_BINDING_REQUEST); req.SetTransactionID(transaction_id); Send(req); StunMessage* msg = Receive(); ASSERT_TRUE(msg != NULL); EXPECT_EQ(STUN_BINDING_RESPONSE, msg->type()); EXPECT_EQ(req.transaction_id(), msg->transaction_id()); const StunAddressAttribute* mapped_addr = msg->GetAddress(STUN_ATTR_XOR_MAPPED_ADDRESS); EXPECT_TRUE(mapped_addr == NULL); delete msg; } #endif // if !defined(THREAD_SANITIZER) TEST_F(StunServerTest, TestBad) { const char* bad = "this is a completely nonsensical message whose only " "purpose is to make the parser go 'ack'. it doesn't " "look anything like a normal stun message"; Send(bad, static_cast(strlen(bad))); ASSERT_TRUE(ReceiveFails()); } } // namespace cricket