1
//! Different kinds of messages that can be encoded in channel cells.
2

            
3
use super::{BoxedCellBody, CELL_DATA_LEN, ChanCmd, RawCellBody};
4
use std::net::{IpAddr, Ipv4Addr};
5

            
6
use tor_basic_utils::skip_fmt;
7
use tor_bytes::{self, EncodeError, EncodeResult, Error, Readable, Reader, Result, Writer};
8
use tor_memquota::derive_deftly_template_HasMemoryCost;
9
use tor_units::IntegerMilliseconds;
10

            
11
use caret::caret_int;
12
use derive_deftly::Deftly;
13
use educe::Educe;
14

            
15
/// Trait for the 'bodies' of channel messages.
16
pub trait Body: Readable {
17
    /// Decode a channel cell body from a provided reader.
18
5015
    fn decode_from_reader(r: &mut Reader<'_>) -> Result<Self> {
19
5015
        r.extract()
20
5015
    }
21
    /// Consume this message and encode its body onto `w`.
22
    ///
23
    /// Does not encode anything _but_ the cell body, and does not pad
24
    /// to the cell length.
25
    fn encode_onto<W: Writer + ?Sized>(self, w: &mut W) -> EncodeResult<()>;
26
}
27

            
28
crate::restrict::restricted_msg! {
29
/// Decoded message from a channel.
30
///
31
/// A ChanMsg is an item received on a channel -- a message from
32
/// another Tor client or relay that we are connected to directly over
33
/// a TLS connection.
34
#[derive(Clone, Debug, Deftly)]
35
#[derive_deftly(HasMemoryCost)]
36
#[non_exhaustive]
37
@omit_from "avoid_conflict_with_a_blanket_implementation"
38
pub enum AnyChanMsg : ChanMsg {
39
    /// A Padding message
40
    Padding,
41
    /// Variable-length padding message
42
    Vpadding,
43
    /// (Deprecated) TAP-based cell to create a new circuit.
44
    Create,
45
    /// (Mostly deprecated) HMAC-based cell to create a new circuit.
46
    CreateFast,
47
    /// Cell to create a new circuit
48
    Create2,
49
    /// (Deprecated) Answer to a Create cell
50
    Created,
51
    /// (Mostly Deprecated) Answer to a CreateFast cell
52
    CreatedFast,
53
    /// Answer to a Create2 cell
54
    Created2,
55
    /// A message sent along a circuit, likely to a more-distant relay.
56
    Relay,
57
    /// A message sent along a circuit (limited supply)
58
    RelayEarly,
59
    /// Tear down a circuit
60
    Destroy,
61
    /// Part of channel negotiation: describes our position on the network
62
    Netinfo,
63
    /// Part of channel negotiation: describes what link protocol versions
64
    /// we support
65
    Versions,
66
    /// Negotiates what kind of channel padding to send
67
    PaddingNegotiate,
68
    /// Part of channel negotiation: additional certificates not in the
69
    /// TLS handshake
70
    Certs,
71
    /// Part of channel negotiation: additional random material to be used
72
    /// as part of authentication
73
    AuthChallenge,
74
    /// Part of channel negotiation: used to authenticate relays when they
75
    /// initiate the channel.
76
    Authenticate,
77
    _ =>
78
    /// Any cell whose command we don't recognize
79
    Unrecognized,
80
}
81
}
82

            
83
/// A Padding message is a fixed-length message on a channel that is
84
/// ignored.
85
///
86
/// Padding message can be used to disguise the true amount of data on a
87
/// channel, or as a "keep-alive".
88
///
89
/// The correct response to a padding cell is to drop it and do nothing.
90
#[derive(Clone, Debug, Default, Deftly)]
91
#[derive_deftly(HasMemoryCost)]
92
#[non_exhaustive]
93
pub struct Padding {}
94
impl Padding {
95
    /// Create a new fixed-length padding cell
96
295
    pub fn new() -> Self {
97
295
        Padding {}
98
295
    }
99
}
100
impl Body for Padding {
101
8
    fn encode_onto<W: Writer + ?Sized>(self, _w: &mut W) -> EncodeResult<()> {
102
8
        Ok(())
103
8
    }
104
}
105
impl Readable for Padding {
106
177
    fn take_from(_b: &mut Reader<'_>) -> Result<Self> {
107
177
        Ok(Padding {})
108
177
    }
109
}
110

            
111
/// A VPadding message is a variable-length padding message.
112
///
113
/// The correct response to a padding cell is to drop it and do nothing.
114
#[derive(Clone, Debug, Deftly)]
115
#[derive_deftly(HasMemoryCost)]
116
pub struct Vpadding {
117
    /// How much padding to send in this cell's body.
118
    len: u16,
119
}
120
impl Vpadding {
121
    /// Return a new vpadding cell with given length.
122
118
    pub fn new(len: u16) -> Self {
123
118
        Vpadding { len }
124
118
    }
125
}
126
impl Body for Vpadding {
127
8
    fn encode_onto<W: Writer + ?Sized>(self, w: &mut W) -> EncodeResult<()> {
128
8
        w.write_zeros(self.len as usize);
129
8
        Ok(())
130
8
    }
131
}
132
impl Readable for Vpadding {
133
354
    fn take_from(b: &mut Reader<'_>) -> Result<Self> {
134
354
        if b.remaining() > u16::MAX as usize {
135
            return Err(Error::InvalidMessage(
136
                "Too many bytes in VPADDING cell".into(),
137
            ));
138
354
        }
139
354
        Ok(Vpadding {
140
354
            len: b.remaining() as u16,
141
354
        })
142
354
    }
143
}
144

            
145
/// helper -- declare a fixed-width cell for handshake commands, in which
146
/// a fixed number of bytes matter and the rest are ignored
147
macro_rules! fixed_len_handshake {
148
    {
149
        $(#[$meta:meta])*
150
        $name:ident , $cmd:ident, $len:ident
151
    } => {
152
        $(#[$meta])*
153
        #[derive(Clone,Debug,Deftly)]
154
        #[derive_deftly(HasMemoryCost)]
155
        pub struct $name {
156
            handshake: Vec<u8>
157
        }
158
        impl $name {
159
            /// Create a new cell from a provided handshake.
160
44
            pub fn new<B>(handshake: B) -> Self
161
44
                where B: Into<Vec<u8>>
162
            {
163
44
                let handshake = handshake.into();
164
44
                $name { handshake }
165
44
            }
166
        }
167
        impl Body for $name {
168
16
            fn encode_onto<W: Writer + ?Sized>(self, w: &mut W)  -> EncodeResult<()> {
169
16
                w.write_all(&self.handshake[..]);
170
16
                Ok(())
171
16
            }
172
        }
173
        impl Readable for $name {
174
236
            fn take_from(b: &mut Reader<'_>) -> Result<Self> {
175
                Ok($name {
176
236
                    handshake: b.take($len)?.into(),
177
                })
178
236
            }
179
        }
180
    }
181
}
182

            
183
/// Number of bytes used for a TAP handshake by the initiator.
184
pub(crate) const TAP_C_HANDSHAKE_LEN: usize = 128 + 16 + 42;
185
/// Number of bytes used for a TAP handshake response
186
pub(crate) const TAP_S_HANDSHAKE_LEN: usize = 128 + 20;
187

            
188
/// Number of bytes used for a CREATE_FAST handshake by the initiator
189
const FAST_C_HANDSHAKE_LEN: usize = 20;
190
/// Number of bytes used for a CREATE_FAST handshake response
191
const FAST_S_HANDSHAKE_LEN: usize = 20 + 20;
192

            
193
fixed_len_handshake! {
194
    /// A Create message creates a circuit, using the TAP handshake.
195
    ///
196
    /// TAP is an obsolete handshake based on RSA-1024 and DH-1024.
197
    /// Relays respond to Create message with a Created reply on
198
    /// success, or a Destroy message on failure.
199
    ///
200
    /// In Tor today, Create is only used for the deprecated v2 onion
201
    /// service protocol.
202
    Create, CREATE, TAP_C_HANDSHAKE_LEN
203
}
204
fixed_len_handshake! {
205
    /// A Created message responds to a Created message, using the TAP
206
    /// handshake.
207
    ///
208
    /// TAP is an obsolete handshake based on RSA-1024 and DH-1024.
209
    Created, CREATED, TAP_S_HANDSHAKE_LEN
210
}
211
fixed_len_handshake! {
212
    /// A CreateFast message creates a circuit using no public-key crypto.
213
    ///
214
    /// CreateFast is safe only when used on an already-secure TLS
215
    /// connection.  It can only be used for the first hop of a circuit.
216
    ///
217
    /// Relays reply to a CreateFast message with CreatedFast on
218
    /// success, or a Destroy message on failure.
219
    ///
220
    /// This handshake was originally used for the first hop of every
221
    /// circuit.  Nowadays it is used for creating one-hop circuits
222
    /// when we don't know any onion key for the first hop.
223
    CreateFast, CREATE_FAST, FAST_C_HANDSHAKE_LEN
224
}
225
impl CreateFast {
226
    /// Return the content of this handshake
227
413
    pub fn handshake(&self) -> &[u8] {
228
413
        &self.handshake
229
413
    }
230
}
231
fixed_len_handshake! {
232
    /// A CreatedFast message responds to a CreateFast message
233
    ///
234
    /// Relays send this message back to indicate that the CrateFast handshake
235
    /// is complete.
236
    CreatedFast, CREATED_FAST, FAST_S_HANDSHAKE_LEN
237
}
238
impl CreatedFast {
239
    /// Consume this message and return the content of this handshake
240
413
    pub fn into_handshake(self) -> Vec<u8> {
241
413
        self.handshake
242
413
    }
243
}
244

            
245
caret_int! {
246
    /// Handshake type, corresponding to [`HTYPE` in
247
    /// tor-spec](https://spec.torproject.org/tor-spec/create-created-cells.html).
248
    #[derive(Deftly)]
249
    #[derive_deftly(HasMemoryCost)]
250
    pub struct HandshakeType(u16) {
251
        /// [TAP](https://spec.torproject.org/tor-spec/create-created-cells.html#TAP) -- the original Tor handshake.
252
        TAP = 0,
253

            
254
        // 1 is reserved
255

            
256
        /// [ntor](https://spec.torproject.org/tor-spec/create-created-cells.html#ntor) -- the ntor+curve25519+sha256 handshake.
257
        NTOR = 2,
258
        /// [ntor-v3](https://spec.torproject.org/tor-spec/create-created-cells.html#ntor-v3) -- ntor extended with extra data.
259
        NTOR_V3 = 3,
260
    }
261
}
262

            
263
/// A Create2 message create a circuit on the current channel.
264
///
265
/// To create a circuit, the client sends a Create2 cell containing a
266
/// handshake of a given type; the relay responds with a Created2 cell
267
/// containing a reply.
268
///
269
/// Currently, most Create2 cells contain a client-side instance of the
270
/// "ntor" handshake.
271
#[derive(Clone, Debug, Deftly)]
272
#[derive_deftly(HasMemoryCost)]
273
pub struct Create2 {
274
    /// Identifier for what kind of handshake this is.
275
    handshake_type: HandshakeType,
276
    /// Body of the handshake.
277
    handshake: Vec<u8>,
278
}
279
impl Body for Create2 {
280
4
    fn encode_onto<W: Writer + ?Sized>(self, w: &mut W) -> EncodeResult<()> {
281
4
        w.write_u16(self.handshake_type.into());
282
4
        let handshake_len = self
283
4
            .handshake
284
4
            .len()
285
4
            .try_into()
286
4
            .map_err(|_| EncodeError::BadLengthValue)?;
287
4
        w.write_u16(handshake_len);
288
4
        w.write_all(&self.handshake[..]);
289
4
        Ok(())
290
4
    }
291
}
292
impl Readable for Create2 {
293
59
    fn take_from(b: &mut Reader<'_>) -> Result<Self> {
294
59
        let handshake_type = HandshakeType::from(b.take_u16()?);
295
59
        let hlen = b.take_u16()?;
296
59
        let handshake = b.take(hlen as usize)?.into();
297
59
        Ok(Create2 {
298
59
            handshake_type,
299
59
            handshake,
300
59
        })
301
59
    }
302
}
303
impl Create2 {
304
    /// Wrap a typed handshake as a Create2 message
305
56
    pub fn new<B>(handshake_type: HandshakeType, handshake: B) -> Self
306
56
    where
307
56
        B: Into<Vec<u8>>,
308
    {
309
56
        let handshake = handshake.into();
310
56
        Create2 {
311
56
            handshake_type,
312
56
            handshake,
313
56
        }
314
56
    }
315

            
316
    /// Return the type of this handshake.
317
177
    pub fn handshake_type(&self) -> HandshakeType {
318
177
        self.handshake_type
319
177
    }
320

            
321
    /// Return the body of this handshake.
322
1121
    pub fn body(&self) -> &[u8] {
323
1121
        &self.handshake[..]
324
1121
    }
325
}
326

            
327
/// A Created2 message completes a circuit-creation handshake.
328
///
329
/// When a relay receives a valid Create2 message that it can handle, it
330
/// establishes the circuit and replies with a Created2.
331
#[derive(Clone, Debug, Deftly)]
332
#[derive_deftly(HasMemoryCost)]
333
pub struct Created2 {
334
    /// Body of the handshake reply
335
    handshake: Vec<u8>,
336
}
337
impl Created2 {
338
    /// Create a new Created2 to hold a given handshake.
339
86
    pub fn new<B>(handshake: B) -> Self
340
86
    where
341
86
        B: Into<Vec<u8>>,
342
    {
343
86
        let handshake = handshake.into();
344
86
        Created2 { handshake }
345
86
    }
346
    /// Consume this created2 cell and return its body.
347
1239
    pub fn into_body(self) -> Vec<u8> {
348
1239
        self.handshake
349
1239
    }
350
}
351
impl Body for Created2 {
352
4
    fn encode_onto<W: Writer + ?Sized>(self, w: &mut W) -> EncodeResult<()> {
353
4
        let handshake_len = self
354
4
            .handshake
355
4
            .len()
356
4
            .try_into()
357
4
            .map_err(|_| EncodeError::BadLengthValue)?;
358
4
        w.write_u16(handshake_len);
359
4
        w.write_all(&self.handshake[..]);
360
4
        Ok(())
361
4
    }
362
}
363
impl Readable for Created2 {
364
59
    fn take_from(b: &mut Reader<'_>) -> Result<Self> {
365
59
        let hlen = b.take_u16()?;
366
59
        let handshake = b.take(hlen as usize)?.into();
367
59
        Ok(Created2 { handshake })
368
59
    }
369
}
370

            
371
/// A Relay cell - that is, one transmitted over a circuit.
372
///
373
/// Once a circuit has been established, relay cells can be sent over
374
/// it.  Clients can send relay cells to any relay on the circuit. Any
375
/// relay on the circuit can send relay cells to the client, either
376
/// directly (if it is the first hop), or indirectly through the
377
/// intermediate hops.
378
///
379
/// A different protocol is defined over the relay cells; it is implemented
380
/// in the [crate::relaycell] module.
381
#[derive(Clone, Educe, derive_more::From, Deftly)]
382
#[derive_deftly(HasMemoryCost)]
383
#[educe(Debug)]
384
pub struct Relay {
385
    /// The contents of the relay cell as encoded for transfer.
386
    ///
387
    /// TODO(nickm): It's nice that this is boxed, since we don't want to copy
388
    /// cell data all over the place. But unfortunately, there are some other
389
    /// places where we _don't_ Box things that we should, and more copies than
390
    /// necessary happen. We should refactor our data handling until we're mostly
391
    /// moving around pointers rather than copying data;  see ticket #7.
392
    #[educe(Debug(method = "skip_fmt"))]
393
    body: BoxedCellBody,
394
}
395
impl Relay {
396
    /// Construct a Relay message from a slice containing its contents.
397
40
    pub fn new<P>(body: P) -> Self
398
40
    where
399
40
        P: AsRef<[u8]>,
400
    {
401
40
        let body = body.as_ref();
402
40
        let mut r = [0_u8; CELL_DATA_LEN];
403
        // TODO: This will panic if body is too long, but that would be a
404
        // programming error anyway.
405
40
        r[..body.len()].copy_from_slice(body);
406
40
        Relay { body: Box::new(r) }
407
40
    }
408
    /// Construct a Relay message from its body.
409
59
    pub fn from_raw(body: RawCellBody) -> Self {
410
59
        Relay {
411
59
            body: Box::new(body),
412
59
        }
413
59
    }
414
    /// Consume this Relay message and return a BoxedCellBody for
415
    /// encryption/decryption.
416
135405
    pub fn into_relay_body(self) -> BoxedCellBody {
417
135405
        self.body
418
135405
    }
419
    /// Wrap this Relay message into a RelayMsg as a RELAY_EARLY cell.
420
59
    pub fn into_early(self) -> AnyChanMsg {
421
59
        AnyChanMsg::RelayEarly(RelayEarly(self))
422
59
    }
423
}
424
impl Body for Relay {
425
12
    fn encode_onto<W: Writer + ?Sized>(self, w: &mut W) -> EncodeResult<()> {
426
12
        w.write_all(&self.body[..]);
427
12
        Ok(())
428
12
    }
429
}
430
impl Readable for Relay {
431
354
    fn take_from(b: &mut Reader<'_>) -> Result<Self> {
432
354
        let mut body = Box::new([0_u8; CELL_DATA_LEN]);
433
354
        body.copy_from_slice(b.take(CELL_DATA_LEN)?);
434
354
        Ok(Relay { body })
435
354
    }
436
}
437

            
438
/// A Relay cell that is allowed to contain a CREATE message.
439
///
440
/// Only a limited number of these may be sent on each circuit.
441
#[derive(Clone, Debug, derive_more::Deref, derive_more::From, derive_more::Into, Deftly)]
442
#[derive_deftly(HasMemoryCost)]
443
pub struct RelayEarly(Relay);
444
impl Readable for RelayEarly {
445
59
    fn take_from(r: &mut Reader<'_>) -> Result<Self> {
446
59
        Ok(RelayEarly(Relay::take_from(r)?))
447
59
    }
448
}
449
impl Body for RelayEarly {
450
4
    fn encode_onto<W: Writer + ?Sized>(self, w: &mut W) -> EncodeResult<()> {
451
4
        self.0.encode_onto(w)
452
4
    }
453
}
454
impl RelayEarly {
455
    /// Consume this RelayEarly message and return a BoxedCellBody for
456
    /// encryption/decryption.
457
    //
458
    // (Since this method takes `self` by value, we can't take advantage of
459
    // Deref.)
460
2242
    pub fn into_relay_body(self) -> BoxedCellBody {
461
2242
        self.0.body
462
2242
    }
463
}
464

            
465
/// The Destroy message tears down a circuit.
466
///
467
/// On receiving a Destroy message, a Tor implementation should
468
/// tear down the associated circuit, and pass the destroy message
469
/// down the circuit to later/earlier hops on the circuit (if any).
470
#[derive(Clone, Debug, Deftly)]
471
#[derive_deftly(HasMemoryCost)]
472
pub struct Destroy {
473
    /// Reason code given for tearing down this circuit
474
    reason: DestroyReason,
475
}
476
impl Destroy {
477
    /// Create a new destroy cell.
478
4307
    pub fn new(reason: DestroyReason) -> Self {
479
4307
        Destroy { reason }
480
4307
    }
481
    /// Return the provided reason for destroying the circuit.
482
708
    pub fn reason(&self) -> DestroyReason {
483
708
        self.reason
484
708
    }
485
}
486
impl Body for Destroy {
487
20
    fn encode_onto<W: Writer + ?Sized>(self, w: &mut W) -> EncodeResult<()> {
488
20
        w.write_u8(self.reason.into());
489
20
        Ok(())
490
20
    }
491
}
492
impl Readable for Destroy {
493
472
    fn take_from(r: &mut Reader<'_>) -> Result<Self> {
494
472
        let reason = r.take_u8()?.into();
495
472
        Ok(Destroy { reason })
496
472
    }
497
}
498

            
499
caret_int! {
500
    /// Declared reason for ending a circuit.
501
    #[derive(Deftly)]
502
    #[derive_deftly(HasMemoryCost)]
503
    pub struct DestroyReason(u8) {
504
        /// No reason given.
505
        ///
506
        /// This is the only reason that clients send.
507
        NONE = 0,
508
        /// Protocol violation
509
        PROTOCOL = 1,
510
        /// Internal error.
511
        INTERNAL = 2,
512
        /// Client sent a TRUNCATE command.
513
        REQUESTED = 3,
514
        /// Relay is hibernating and not accepting requests
515
        HIBERNATING = 4,
516
        /// Ran out of memory, sockets, or circuit IDs
517
        RESOURCELIMIT = 5,
518
        /// Couldn't connect to relay.
519
        CONNECTFAILED = 6,
520
        /// Connected to a relay, but its OR identity wasn't as requested.
521
        OR_IDENTITY = 7,
522
        /// One of the OR channels carrying this circuit died.
523
        CHANNEL_CLOSED = 8,
524
        /// Circuit expired for being too dirty or old
525
        FINISHED = 9,
526
        /// Circuit construction took too long
527
        TIMEOUT = 10,
528
        /// Circuit was destroyed w/o client truncate (?)
529
        DESTROYED = 11,
530
        /// Request for unknown onion service
531
        NOSUCHSERVICE = 12
532
    }
533
}
534

            
535
impl DestroyReason {
536
    /// Return a human-readable string for this reason.
537
358
    pub fn human_str(&self) -> &'static str {
538
358
        match *self {
539
            DestroyReason::NONE => "No reason",
540
            DestroyReason::PROTOCOL => "Protocol violation",
541
            DestroyReason::INTERNAL => "Internal error",
542
            DestroyReason::REQUESTED => "Client sent a TRUNCATE command",
543
354
            DestroyReason::HIBERNATING => "Relay is hibernating and not accepting requests",
544
            DestroyReason::RESOURCELIMIT => "Relay ran out of resources",
545
2
            DestroyReason::CONNECTFAILED => "Couldn't connect to relay",
546
            DestroyReason::OR_IDENTITY => "Connected to relay with different OR identity",
547
            DestroyReason::CHANNEL_CLOSED => "The OR channels carrying this circuit died",
548
            DestroyReason::FINISHED => "Circuit expired for being too dirty or old",
549
            DestroyReason::TIMEOUT => "Circuit construction took too long",
550
            DestroyReason::DESTROYED => "Circuit was destroyed without client truncate",
551
            DestroyReason::NOSUCHSERVICE => "No such onion service",
552
2
            _ => "Unrecognized reason",
553
        }
554
358
    }
555
}
556

            
557
/// The netinfo message ends channel negotiation.
558
///
559
/// It tells the other party on the channel our view of the current time,
560
/// our own list of public addresses, and our view of its address.
561
///
562
/// When we get a netinfo cell, we can start creating circuits on a
563
/// channel and sending data.
564
#[derive(Clone, Debug, Deftly)]
565
#[derive_deftly(HasMemoryCost)]
566
pub struct Netinfo {
567
    /// Time when this cell was sent, or 0 if this cell is sent by a client.
568
    ///
569
    /// TODO-SPEC(nickm): Y2038 issue here.  Better add a new handshake version
570
    /// to solve it.  See
571
    /// [torspec#80](https://gitlab.torproject.org/tpo/core/torspec/-/issues/80).
572
    timestamp: u32,
573
    /// Observed address for party that did not send the netinfo cell.
574
    their_addr: Option<IpAddr>,
575
    /// Canonical addresses for the party that did send the netinfo cell.
576
    my_addr: Vec<IpAddr>,
577
}
578
/// helper: encode a single address in the form that netinfo messages expect
579
76
fn enc_one_netinfo_addr<W: Writer + ?Sized>(w: &mut W, addr: &IpAddr) {
580
76
    match addr {
581
68
        IpAddr::V4(ipv4) => {
582
68
            w.write_u8(0x04); // type.
583
68
            w.write_u8(4); // length.
584
68
            w.write_all(&ipv4.octets()[..]);
585
68
        }
586
8
        IpAddr::V6(ipv6) => {
587
8
            w.write_u8(0x06); // type.
588
8
            w.write_u8(16); // length.
589
8
            w.write_all(&ipv6.octets()[..]);
590
8
        }
591
    }
592
76
}
593
/// helper: take an address as encoded in a netinfo message
594
1298
fn take_one_netinfo_addr(r: &mut Reader<'_>) -> Result<Option<IpAddr>> {
595
1298
    let atype = r.take_u8()?;
596
1298
    let alen = r.take_u8()?;
597
1298
    let abody = r.take(alen as usize)?;
598
1298
    match (atype, alen) {
599
        (0x04, 4) => {
600
885
            let bytes = [abody[0], abody[1], abody[2], abody[3]];
601
885
            Ok(Some(IpAddr::V4(bytes.into())))
602
        }
603
        (0x06, 16) => {
604
            // TODO(nickm) is there a better way?
605
177
            let mut bytes = [0_u8; 16];
606
177
            bytes.copy_from_slice(abody);
607
177
            Ok(Some(IpAddr::V6(bytes.into())))
608
        }
609
236
        (_, _) => Ok(None),
610
    }
611
1298
}
612
impl Netinfo {
613
    /// Construct a new Netinfo to be sent by a client.
614
236
    pub fn from_client(their_addr: Option<IpAddr>) -> Self {
615
236
        Netinfo {
616
236
            timestamp: 0, // clients don't report their timestamps.
617
236
            their_addr,
618
236
            my_addr: Vec::new(), // clients don't report their addrs.
619
236
        }
620
236
    }
621
    /// Construct a new Netinfo to be sent by a relay
622
6
    pub fn from_relay<V>(timestamp: u32, their_addr: Option<IpAddr>, my_addrs: V) -> Self
623
6
    where
624
6
        V: Into<Vec<IpAddr>>,
625
    {
626
6
        let my_addr = my_addrs.into();
627
6
        Netinfo {
628
6
            timestamp,
629
6
            their_addr,
630
6
            my_addr,
631
6
        }
632
6
    }
633
    /// Return the time reported in this NETINFO cell.
634
236
    pub fn timestamp(&self) -> Option<std::time::SystemTime> {
635
        use std::time::{Duration, SystemTime};
636
236
        if self.timestamp == 0 {
637
59
            None
638
        } else {
639
177
            Some(SystemTime::UNIX_EPOCH + Duration::from_secs(self.timestamp.into()))
640
        }
641
236
    }
642

            
643
    /// Return a reference to the their address field.
644
    ///
645
    /// None is returned if their address is 0.0.0.0/:: (unspecified).
646
118
    pub fn their_addr(&self) -> Option<&IpAddr> {
647
118
        self.their_addr.as_ref()
648
118
    }
649

            
650
    /// Return a reference to the my address field.
651
118
    pub fn my_addrs(&self) -> &[IpAddr] {
652
118
        &self.my_addr
653
118
    }
654
}
655
impl Body for Netinfo {
656
64
    fn encode_onto<W: Writer + ?Sized>(self, w: &mut W) -> EncodeResult<()> {
657
64
        w.write_u32(self.timestamp);
658
64
        let their_addr = self
659
64
            .their_addr
660
64
            .unwrap_or_else(|| Ipv4Addr::UNSPECIFIED.into());
661
64
        enc_one_netinfo_addr(w, &their_addr);
662
64
        let n_addrs: u8 = self
663
64
            .my_addr
664
64
            .len()
665
64
            .try_into()
666
64
            .map_err(|_| EncodeError::BadLengthValue)?;
667
64
        w.write_u8(n_addrs);
668
76
        for addr in &self.my_addr {
669
12
            enc_one_netinfo_addr(w, addr);
670
12
        }
671
64
        Ok(())
672
64
    }
673
}
674
impl Readable for Netinfo {
675
649
    fn take_from(r: &mut Reader<'_>) -> Result<Self> {
676
649
        let timestamp = r.take_u32()?;
677
658
        let their_addr = take_one_netinfo_addr(r)?.filter(|a| !a.is_unspecified());
678
649
        let my_n_addrs = r.take_u8()?;
679
649
        let mut my_addr = Vec::with_capacity(my_n_addrs as usize);
680
649
        for _ in 0..my_n_addrs {
681
649
            if let Some(a) = take_one_netinfo_addr(r)? {
682
531
                my_addr.push(a);
683
531
            }
684
        }
685
649
        Ok(Netinfo {
686
649
            timestamp,
687
649
            their_addr,
688
649
            my_addr,
689
649
        })
690
649
    }
691
}
692

            
693
/// A Versions message begins channel negotiation.
694
///
695
/// Every channel must begin by sending a Versions message.  This message
696
/// lists the link protocol versions that this Tor implementation supports.
697
///
698
/// Note that we should never actually send Versions cells using the
699
/// usual channel cell encoding: Versions cells _always_ use two-byte
700
/// circuit IDs, whereas all the other cell types use four-byte
701
/// circuit IDs [assuming a non-obsolete version is negotiated].
702
#[derive(Clone, Debug, Deftly)]
703
#[derive_deftly(HasMemoryCost)]
704
pub struct Versions {
705
    /// List of supported link protocol versions
706
    versions: Vec<u16>,
707
}
708
impl Versions {
709
    /// Construct a new Versions message using a provided list of link
710
    /// protocols.
711
    ///
712
    /// Returns an error if the list of versions is too long.
713
58
    pub fn new<B>(vs: B) -> crate::Result<Self>
714
58
    where
715
58
        B: Into<Vec<u16>>,
716
    {
717
58
        let versions = vs.into();
718
58
        if versions.len() < (u16::MAX / 2) as usize {
719
58
            Ok(Self { versions })
720
        } else {
721
            Err(crate::Error::CantEncode("Too many versions"))
722
        }
723
58
    }
724
    /// Encode this VERSIONS cell in the manner expected for a handshake.
725
    ///
726
    /// (That's different from a standard cell encoding, since we
727
    /// have not negotiated versions yet, and so our circuit-ID length
728
    /// is an obsolete 2 bytes).
729
1475
    pub fn encode_for_handshake(self) -> EncodeResult<Vec<u8>> {
730
1475
        let mut v = Vec::new();
731
1475
        v.write_u16(0); // obsolete circuit ID length.
732
1475
        v.write_u8(ChanCmd::VERSIONS.into());
733
1475
        v.write_u16((self.versions.len() * 2) as u16); // message length.
734
1475
        self.encode_onto(&mut v)?;
735
1475
        Ok(v)
736
1475
    }
737
    /// Return the best (numerically highest) link protocol that is
738
    /// shared by this versions cell and my_protos.
739
944
    pub fn best_shared_link_protocol(&self, my_protos: &[u16]) -> Option<u16> {
740
        // NOTE: this implementation is quadratic, but it shouldn't matter
741
        // much so long as my_protos is small.
742
944
        let p = my_protos
743
944
            .iter()
744
2081
            .filter(|p| self.versions.contains(p))
745
1609
            .fold(0_u16, |a, b| u16::max(a, *b));
746
944
        if p == 0 { None } else { Some(p) }
747
944
    }
748
}
749
impl Body for Versions {
750
1593
    fn encode_onto<W: Writer + ?Sized>(self, w: &mut W) -> EncodeResult<()> {
751
4248
        for v in &self.versions {
752
2655
            w.write_u16(*v);
753
2655
        }
754
1593
        Ok(())
755
1593
    }
756
}
757
impl Readable for Versions {
758
1062
    fn take_from(r: &mut Reader<'_>) -> Result<Self> {
759
1062
        let mut versions = Vec::new();
760
3481
        while r.remaining() > 0 {
761
2419
            versions.push(r.take_u16()?);
762
        }
763
1062
        Ok(Versions { versions })
764
1062
    }
765
}
766

            
767
caret_int! {
768
    /// A ChanCmd is the type of a channel cell.  The value of the ChanCmd
769
    /// indicates the meaning of the cell, and (possibly) its length.
770
    #[derive(Deftly)]
771
    #[derive_deftly(HasMemoryCost)]
772
    pub struct PaddingNegotiateCmd(u8) {
773
        /// Start padding
774
        START = 2,
775

            
776
        /// Stop padding
777
        STOP = 1,
778
    }
779
}
780

            
781
/// A PaddingNegotiate message is used to negotiate channel padding.
782
///
783
/// Sent by a client to its guard node,
784
/// to instruct the relay to enable/disable channel padding.
785
/// (Not relevant for channels used only for directory lookups,
786
/// nor inter-relay channels.)
787
/// See `padding-spec.txt`, section 2.2.
788
///
789
/// This message is constructed in the channel manager and transmitted by the reactor.
790
///
791
/// The `Default` impl is the same as [`start_default()`](PaddingNegotiate::start_default`)
792
#[derive(Clone, Debug, Eq, PartialEq, Deftly)]
793
#[derive_deftly(HasMemoryCost)]
794
pub struct PaddingNegotiate {
795
    /// Whether to start or stop padding
796
    command: PaddingNegotiateCmd,
797
    /// Suggested lower-bound value for inter-packet timeout in msec.
798
    // TODO(nickm) is that right?
799
    ito_low_ms: u16,
800
    /// Suggested upper-bound value for inter-packet timeout in msec.
801
    // TODO(nickm) is that right?
802
    ito_high_ms: u16,
803
}
804
impl PaddingNegotiate {
805
    /// Create a new PADDING_NEGOTIATE START message requesting consensus timing parameters.
806
    ///
807
    /// This message restores the state to the one which exists at channel startup.
808
10915
    pub fn start_default() -> Self {
809
        // Tor Spec section 7.3, padding-spec section 2.5.
810
10915
        Self {
811
10915
            command: PaddingNegotiateCmd::START,
812
10915
            ito_low_ms: 0,
813
10915
            ito_high_ms: 0,
814
10915
        }
815
10915
    }
816

            
817
    /// Create a new PADDING_NEGOTIATE START message.
818
59
    pub fn start(ito_low: IntegerMilliseconds<u16>, ito_high: IntegerMilliseconds<u16>) -> Self {
819
        // Tor Spec section 7.3
820
59
        Self {
821
59
            command: PaddingNegotiateCmd::START,
822
59
            ito_low_ms: ito_low.as_millis(),
823
59
            ito_high_ms: ito_high.as_millis(),
824
59
        }
825
59
    }
826

            
827
    /// Create a new PADDING_NEGOTIATE STOP message.
828
2773
    pub fn stop() -> Self {
829
        // Tor Spec section 7.3
830
2773
        Self {
831
2773
            command: PaddingNegotiateCmd::STOP,
832
2773
            ito_low_ms: 0,
833
2773
            ito_high_ms: 0,
834
2773
        }
835
2773
    }
836

            
837
    /// Construct from the three fields: command, low_ms, high_ms, as a tuple
838
    ///
839
    /// For testing only
840
    #[cfg(feature = "testing")]
841
1416
    pub fn from_raw(command: PaddingNegotiateCmd, ito_low_ms: u16, ito_high_ms: u16) -> Self {
842
1416
        PaddingNegotiate {
843
1416
            command,
844
1416
            ito_low_ms,
845
1416
            ito_high_ms,
846
1416
        }
847
1416
    }
848
}
849
impl Default for PaddingNegotiate {
850
5605
    fn default() -> Self {
851
5605
        Self::start_default()
852
5605
    }
853
}
854

            
855
impl Body for PaddingNegotiate {
856
8
    fn encode_onto<W: Writer + ?Sized>(self, w: &mut W) -> EncodeResult<()> {
857
8
        w.write_u8(0); // version
858
8
        w.write_u8(self.command.get());
859
8
        w.write_u16(self.ito_low_ms);
860
8
        w.write_u16(self.ito_high_ms);
861
8
        Ok(())
862
8
    }
863
}
864
impl Readable for PaddingNegotiate {
865
177
    fn take_from(r: &mut Reader<'_>) -> Result<Self> {
866
177
        let v = r.take_u8()?;
867
177
        if v != 0 {
868
59
            return Err(Error::InvalidMessage(
869
59
                "Unrecognized padding negotiation version".into(),
870
59
            ));
871
118
        }
872
118
        let command = r.take_u8()?.into();
873
118
        let ito_low_ms = r.take_u16()?;
874
118
        let ito_high_ms = r.take_u16()?;
875
118
        Ok(PaddingNegotiate {
876
118
            command,
877
118
            ito_low_ms,
878
118
            ito_high_ms,
879
118
        })
880
177
    }
881
}
882

            
883
/// A single certificate in a Certs cell.
884
///
885
/// The formats used here are implemented in tor-cert. Ed25519Cert is the
886
/// most common.
887
#[derive(Clone, Debug, Deftly)]
888
#[derive_deftly(HasMemoryCost)]
889
struct TorCert {
890
    /// Type code for this certificate.
891
    certtype: u8,
892
    /// Encoded certificate
893
    cert: Vec<u8>,
894
}
895
/// encode a single TorCert `c` onto a Writer `w`.
896
20
fn enc_one_tor_cert<W: Writer + ?Sized>(w: &mut W, c: &TorCert) -> EncodeResult<()> {
897
20
    w.write_u8(c.certtype);
898
20
    let cert_len: u16 = c
899
20
        .cert
900
20
        .len()
901
20
        .try_into()
902
20
        .map_err(|_| EncodeError::BadLengthValue)?;
903
20
    w.write_u16(cert_len);
904
20
    w.write_all(&c.cert[..]);
905
20
    Ok(())
906
20
}
907
/// Try to extract a TorCert from the reader `r`.
908
649
fn take_one_tor_cert(r: &mut Reader<'_>) -> Result<TorCert> {
909
649
    let certtype = r.take_u8()?;
910
590
    let certlen = r.take_u16()?;
911
590
    let cert = r.take(certlen as usize)?;
912
590
    Ok(TorCert {
913
590
        certtype,
914
590
        cert: cert.into(),
915
590
    })
916
649
}
917
/// A Certs message is used as part of the channel handshake to send
918
/// additional certificates.
919
///
920
/// These certificates are not presented as part of the TLS handshake.
921
/// Originally this was meant to make Tor TLS handshakes look "normal", but
922
/// nowadays it serves less purpose, especially now that we have TLS 1.3.
923
///
924
/// Every relay sends this message as part of channel negotiation;
925
/// clients do not send them.
926
#[derive(Clone, Debug, Deftly)]
927
#[derive_deftly(HasMemoryCost)]
928
pub struct Certs {
929
    /// The certificates in this cell
930
    certs: Vec<TorCert>,
931
}
932
impl Certs {
933
    /// Return a new empty certs cell.
934
1357
    pub fn new_empty() -> Self {
935
1357
        Certs { certs: Vec::new() }
936
1357
    }
937
    /// Add a new encoded certificate to this cell.
938
    ///
939
    /// Does not check anything about the well-formedness of the certificate.
940
68
    pub fn push_cert_body<B>(&mut self, certtype: tor_cert::CertType, cert: B)
941
68
    where
942
68
        B: Into<Vec<u8>>,
943
    {
944
68
        let certtype = certtype.into();
945
68
        let cert = cert.into();
946
68
        self.certs.push(TorCert { certtype, cert });
947
68
    }
948

            
949
    /// Add a new encoded certificate to this cell,
950
    /// taking taking the type from the certificate itself.
951
    #[cfg(feature = "relay")]
952
    pub fn push_cert<C>(&mut self, cert: &C)
953
    where
954
        C: tor_cert::EncodedCert,
955
    {
956
        self.push_cert_body(cert.cert_type(), cert.encoded());
957
    }
958

            
959
    /// Return the body of the certificate tagged with 'tp', if any.
960
2360
    pub fn cert_body(&self, tp: tor_cert::CertType) -> Option<&[u8]> {
961
2360
        let tp: u8 = tp.into();
962
2360
        self.certs
963
2360
            .iter()
964
6117
            .find(|c| c.certtype == tp)
965
2394
            .map(|c| &c.cert[..])
966
2360
    }
967

            
968
    /// Look for a certificate of type 'tp' in this cell; return it if
969
    /// there is one.
970
1121
    pub fn parse_ed_cert(&self, tp: tor_cert::CertType) -> crate::Result<tor_cert::KeyUnknownCert> {
971
1121
        let body = self
972
1121
            .cert_body(tp)
973
1124
            .ok_or_else(|| crate::Error::ChanProto(format!("Missing {} certificate", tp)))?;
974

            
975
944
        let cert = tor_cert::Ed25519Cert::decode(body).map_err(|be| crate::Error::BytesErr {
976
59
            err: be,
977
            parsed: "ed25519 certificate",
978
60
        })?;
979
885
        if cert.peek_cert_type() != tp {
980
            return Err(crate::Error::ChanProto(format!(
981
                "Found a {} certificate labeled as {}",
982
                cert.peek_cert_type(),
983
                tp
984
            )));
985
885
        }
986

            
987
885
        Ok(cert)
988
1121
    }
989
}
990

            
991
impl Body for Certs {
992
16
    fn encode_onto<W: Writer + ?Sized>(self, w: &mut W) -> EncodeResult<()> {
993
16
        let n_certs: u8 = self
994
16
            .certs
995
16
            .len()
996
16
            .try_into()
997
16
            .map_err(|_| EncodeError::BadLengthValue)?;
998
16
        w.write_u8(n_certs);
999
36
        for c in &self.certs {
20
            enc_one_tor_cert(w, c)?;
        }
16
        Ok(())
16
    }
}
impl Readable for Certs {
590
    fn take_from(r: &mut Reader<'_>) -> Result<Self> {
590
        let n = r.take_u8()?;
590
        let mut certs = Vec::new();
590
        for _ in 0..n {
649
            certs.push(take_one_tor_cert(r)?);
        }
531
        Ok(Certs { certs })
590
    }
}
/// Length of the body for an authentication challenge
const CHALLENGE_LEN: usize = 32;
/// An AuthChallenge message is part of negotiation, sent by
/// responders to initiators.
///
/// The AuthChallenge cell is used to ensure that some unpredictable material
/// has been sent on the channel, and to tell the initiator what
/// authentication methods will be accepted.
///
/// Clients can safely ignore this message: they don't need to authenticate.
#[derive(Clone, Debug, Deftly)]
#[derive_deftly(HasMemoryCost)]
pub struct AuthChallenge {
    /// Random challenge to be used in generating response
    challenge: [u8; CHALLENGE_LEN],
    /// List of permitted authentication methods
    methods: Vec<u16>,
}
impl AuthChallenge {
    /// Construct a new AuthChallenge cell with a given challenge
    /// value (chosen randomly) and a set of acceptable authentication methods.
14
    pub fn new<B, M>(challenge: B, methods: M) -> Self
14
    where
14
        B: Into<[u8; CHALLENGE_LEN]>,
14
        M: Into<Vec<u16>>,
    {
14
        AuthChallenge {
14
            challenge: challenge.into(),
14
            methods: methods.into(),
14
        }
14
    }
    /// Return a reference to the list of methods.
    pub fn methods(&self) -> &[u16] {
        &self.methods
    }
}
impl Body for AuthChallenge {
16
    fn encode_onto<W: Writer + ?Sized>(self, w: &mut W) -> EncodeResult<()> {
16
        w.write_all(&self.challenge[..]);
16
        let n_methods = self
16
            .methods
16
            .len()
16
            .try_into()
16
            .map_err(|_| EncodeError::BadLengthValue)?;
16
        w.write_u16(n_methods);
36
        for m in self.methods {
20
            w.write_u16(m);
20
        }
16
        Ok(())
16
    }
}
impl Readable for AuthChallenge {
767
    fn take_from(r: &mut Reader<'_>) -> Result<Self> {
        //let challenge = r.take(CHALLENGE_LEN)?.into();
767
        let challenge = r.extract()?;
767
        let n_methods = r.take_u16()?;
767
        let mut methods = Vec::new();
767
        for _ in 0..n_methods {
1121
            methods.push(r.take_u16()?);
        }
767
        Ok(AuthChallenge { challenge, methods })
767
    }
}
/// Part of negotiation: sent by initiators to responders.
///
/// The Authenticate cell proves the initiator's identity to the
/// responder, even if TLS client authentication was not used.
///
/// Clients do not use this.
#[derive(Clone, Debug, Deftly, Eq, PartialEq)]
#[derive_deftly(HasMemoryCost)]
pub struct Authenticate {
    /// Authentication method in use
    authtype: u16,
    /// Encoded authentication object
    auth: Vec<u8>,
}
impl Authenticate {
    /// The signature field length.
    const SIG_LEN: usize = 64;
    /// The body length that is all fields except the rand and signature.
    pub const BODY_LEN: usize = 264;
    /// Create a new Authenticate message from a given type and body.
2
    pub fn new<B>(authtype: u16, body: B) -> Self
2
    where
2
        B: Into<Vec<u8>>,
    {
2
        Authenticate {
2
            authtype,
2
            auth: body.into(),
2
        }
2
    }
    /// Return the authentication type value.
    pub fn auth_type(&self) -> u16 {
        self.authtype
    }
    /// Return a referrence to the body of the cell that is all fields minus the random bytes
    /// located before the signature.
    pub fn body_no_rand(&self) -> Result<&[u8]> {
        // The RAND field length.
        const RAND_LEN: usize = 24;
        let body = self.body()?;
        let body_end_offset = body.len().checked_sub(RAND_LEN).ok_or(Error::MissingData)?;
        Ok(&body[..body_end_offset])
    }
    /// Return a referrence to the body of the cell that is all fields except the signature.
    pub fn body(&self) -> Result<&[u8]> {
        let auth = self.auth();
        let sig_end_offset = auth
            .len()
            .checked_sub(Self::SIG_LEN)
            .ok_or(Error::MissingData)?;
        Ok(&auth[..sig_end_offset])
    }
    /// Return a reference to the authentcation object.
    pub fn auth(&self) -> &[u8] {
        &self.auth
    }
    /// Return a reference to the signature bytes.
    pub fn sig(&self) -> Result<&[u8; Self::SIG_LEN]> {
        let auth = self.auth();
        let sig_start_offset = auth
            .len()
            .checked_sub(Self::SIG_LEN)
            .ok_or(Error::MissingData)?;
        (&self.auth[sig_start_offset..])
            .try_into()
            .map_err(|_| Error::Bug(tor_error::internal!("Failed to get signature bytes")))
    }
}
impl Body for Authenticate {
4
    fn encode_onto<W: Writer + ?Sized>(self, w: &mut W) -> EncodeResult<()> {
4
        w.write_u16(self.authtype);
4
        let authlen = self
4
            .auth
4
            .len()
4
            .try_into()
4
            .map_err(|_| EncodeError::BadLengthValue)?;
4
        w.write_u16(authlen);
4
        w.write_all(&self.auth[..]);
4
        Ok(())
4
    }
}
impl Readable for Authenticate {
59
    fn take_from(r: &mut Reader<'_>) -> Result<Self> {
59
        let authtype = r.take_u16()?;
59
        let authlen = r.take_u16()?;
59
        let auth = r.take(authlen as usize)?.into();
59
        Ok(Authenticate { authtype, auth })
59
    }
}
/// Holds any message whose command we don't recognize.
///
/// Well-behaved Tor implementations are required to ignore commands
/// like this.
///
/// TODO: I believe that this is not a risky case of Postel's law,
/// since it is only for channels, but we should be careful here.
#[derive(Clone, Debug, Deftly)]
#[derive_deftly(HasMemoryCost)]
pub struct Unrecognized {
    /// The channel command that we got with this cell
    cmd: ChanCmd,
    /// The contents of the cell
    content: Vec<u8>,
}
impl Unrecognized {
    /// Construct a new cell of arbitrary or unrecognized type.
6
    pub fn new<B>(cmd: ChanCmd, content: B) -> Self
6
    where
6
        B: Into<Vec<u8>>,
    {
6
        let content = content.into();
6
        Unrecognized { cmd, content }
6
    }
    /// Return the command from this cell.
236
    pub fn cmd(&self) -> ChanCmd {
236
        self.cmd
236
    }
    /// Take an unrecognized cell's body from a reader `r`, and apply
    /// the given command to it.
236
    pub fn decode_with_cmd(cmd: ChanCmd, r: &mut Reader<'_>) -> Result<Unrecognized> {
236
        let mut u = Unrecognized::take_from(r)?;
236
        u.cmd = cmd;
236
        Ok(u)
236
    }
}
impl Body for Unrecognized {
12
    fn encode_onto<W: Writer + ?Sized>(self, w: &mut W) -> EncodeResult<()> {
12
        w.write_all(&self.content[..]);
12
        Ok(())
12
    }
}
impl Readable for Unrecognized {
236
    fn take_from(r: &mut Reader<'_>) -> Result<Self> {
        Ok(Unrecognized {
236
            cmd: 0.into(),
236
            content: r.take(r.remaining())?.into(),
        })
236
    }
}
/// Helper: declare a From<> implementation from message types for
/// cells that don't take a circid.
macro_rules! msg_into_cell {
    ($body:ident) => {
        impl From<$body> for super::AnyChanCell {
118
            fn from(body: $body) -> super::AnyChanCell {
118
                super::AnyChanCell {
118
                    circid: None,
118
                    msg: body.into(),
118
                }
118
            }
        }
    };
}
msg_into_cell!(Padding);
msg_into_cell!(Vpadding);
msg_into_cell!(Netinfo);
msg_into_cell!(Versions);
msg_into_cell!(PaddingNegotiate);
msg_into_cell!(Certs);
msg_into_cell!(AuthChallenge);
msg_into_cell!(Authenticate);
/// Helper: declare a ChanMsg implementation for a message type that has a
/// fixed command.
//
// TODO: It might be better to merge Body with ChanMsg, but that is complex,
// since their needs are _slightly_ different.
//
// TODO: If we *do* make the change above, then perhaps we should also implement
// our restricted enums in terms of this, so that there is only one instance of
// [<$body:snake:upper>]
macro_rules! msg_impl_chanmsg {
    ($($body:ident,)*) =>
    {paste::paste!{
       $(impl crate::chancell::ChanMsg for $body {
15458
            fn cmd(&self) -> crate::chancell::ChanCmd { crate::chancell::ChanCmd::[< $body:snake:upper >] }
12
            fn encode_onto<W: tor_bytes::Writer + ?Sized>(self, w: &mut W) -> tor_bytes::EncodeResult<()> {
12
                crate::chancell::msg::Body::encode_onto(self, w)
12
            }
1003
            fn decode_from_reader(cmd: ChanCmd, r: &mut tor_bytes::Reader<'_>) -> tor_bytes::Result<Self> {
1003
                if cmd != crate::chancell::ChanCmd::[< $body:snake:upper >] {
                    return Err(tor_bytes::Error::InvalidMessage(
                        format!("Expected {} command; got {cmd}", stringify!([< $body:snake:upper >])).into()
                    ));
1003
                }
1003
                crate::chancell::msg::Body::decode_from_reader(r)
1003
            }
        })*
    }}
}
// We implement ChanMsg for every body type, so that you can write code that does
// e.g. ChanCell<Relay>.
msg_impl_chanmsg!(
    Padding,
    Vpadding,
    Create,
    CreateFast,
    Create2,
    Created,
    CreatedFast,
    Created2,
    Relay,
    RelayEarly,
    Destroy,
    Netinfo,
    Versions,
    PaddingNegotiate,
    Certs,
    AuthChallenge,
    Authenticate,
);
#[cfg(test)]
mod test {
    // @@ begin test lint list maintained by maint/add_warning @@
    #![allow(clippy::bool_assert_comparison)]
    #![allow(clippy::clone_on_copy)]
    #![allow(clippy::dbg_macro)]
    #![allow(clippy::mixed_attributes_style)]
    #![allow(clippy::print_stderr)]
    #![allow(clippy::print_stdout)]
    #![allow(clippy::single_char_pattern)]
    #![allow(clippy::unwrap_used)]
    #![allow(clippy::unchecked_time_subtraction)]
    #![allow(clippy::useless_vec)]
    #![allow(clippy::needless_pass_by_value)]
    //! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
    use super::*;
    #[test]
    fn destroy_reason() {
        let r1 = DestroyReason::CONNECTFAILED;
        assert_eq!(r1.human_str(), "Couldn't connect to relay");
        let r2 = DestroyReason::from(200); // not a specified number.
        assert_eq!(r2.human_str(), "Unrecognized reason");
    }
}