1
//! Relay cell cryptography
2
//!
3
//! The Tor protocol centers around "RELAY cells", which are transmitted through
4
//! the network along circuits.  The client that creates a circuit shares two
5
//! different sets of keys and state with each of the relays on the circuit: one
6
//! for "outbound" traffic, and one for "inbound" traffic.
7
//!
8
//! So for example, if a client creates a 3-hop circuit with relays R1, R2, and
9
//! R3, the client has:
10
//!   * An "inbound" cryptographic state shared with R1.
11
//!   * An "inbound" cryptographic state shared with R2.
12
//!   * An "inbound" cryptographic state shared with R3.
13
//!   * An "outbound" cryptographic state shared with R1.
14
//!   * An "outbound" cryptographic state shared with R2.
15
//!   * An "outbound" cryptographic state shared with R3.
16
//!
17
//! In this module at least, we'll call each of these state objects a "layer" of
18
//! the circuit's encryption.
19
//!
20
//! The Tor specification does not describe these layer objects very explicitly.
21
//! In the current relay cryptography protocol, each layer contains:
22
//!    * A keyed AES-CTR state. (AES-128 or AES-256)  This cipher uses a key
23
//!      called `Kf` or `Kb` in the spec, where `Kf` is a "forward" key used in
24
//!      the outbound direction, and `Kb` is a "backward" key used in the
25
//!      inbound direction.
26
//!    * A running digest. (SHA1 or SHA3)  This digest is initialized with a
27
//!      value called `Df` or `Db` in the spec.
28
//!
29
//! This `crypto::cell` module itself provides traits and implementations that
30
//! should work for all current future versions of the relay cell crypto design.
31
//! The current Tor protocols are instantiated in a `tor1` submodule.
32

            
33
#[cfg(feature = "bench")]
34
pub(crate) mod bench_utils;
35
#[cfg(feature = "counter-galois-onion")]
36
pub(crate) mod cgo;
37
pub(crate) mod tor1;
38

            
39
use crate::{Error, Result};
40
use derive_deftly::Deftly;
41
use tor_cell::{
42
    chancell::{BoxedCellBody, ChanCmd},
43
    relaycell::msg::SendmeTag,
44
};
45
use tor_memquota::derive_deftly_template_HasMemoryCost;
46

            
47
use super::binding::CircuitBinding;
48

            
49
/// Type for the body of a relay cell.
50
#[cfg_attr(feature = "bench", visibility::make(pub))]
51
#[derive(Clone, derive_more::From, derive_more::Into)]
52
pub(crate) struct RelayCellBody(BoxedCellBody);
53

            
54
impl AsRef<[u8]> for RelayCellBody {
55
1810
    fn as_ref(&self) -> &[u8] {
56
1810
        &self.0[..]
57
1810
    }
58
}
59
impl AsMut<[u8]> for RelayCellBody {
60
4186
    fn as_mut(&mut self) -> &mut [u8] {
61
4186
        &mut self.0[..]
62
4186
    }
63
}
64

            
65
/// Represents the ability for one hop of a circuit's cryptographic state to be
66
/// initialized from a given seed.
67
#[cfg_attr(feature = "bench", visibility::make(pub))]
68
pub(crate) trait CryptInit: Sized {
69
    /// Return the number of bytes that this state will require.
70
    fn seed_len() -> usize;
71
    /// Construct this state from a seed of the appropriate length.
72
    fn initialize(seed: &[u8]) -> Result<Self>;
73
    /// Initialize this object from a key generator.
74
84
    fn construct<K: super::handshake::KeyGenerator>(keygen: K) -> Result<Self> {
75
84
        let seed = keygen.expand(Self::seed_len())?;
76
84
        Self::initialize(&seed[..])
77
84
    }
78
}
79

            
80
/// A paired object containing the inbound and outbound cryptographic layers
81
/// used by a client to communicate with a single hop on one of its circuits.
82
///
83
/// TODO: Maybe we should fold this into CryptInit.
84
#[cfg_attr(feature = "bench", visibility::make(pub))]
85
pub(crate) trait ClientLayer<F, B>
86
where
87
    F: OutboundClientLayer,
88
    B: InboundClientLayer,
89
{
90
    /// Consume this ClientLayer and return a paired forward and reverse
91
    /// crypto layer, and a [`CircuitBinding`] object
92
    fn split_client_layer(self) -> (F, B, CircuitBinding);
93
}
94

            
95
/// A paired object containing the inbound and outbound cryptographic layers
96
/// used by a relay to implement a client's circuits.
97
///
98
#[allow(dead_code)] // To be used by relays.
99
#[cfg_attr(feature = "bench", visibility::make(pub))]
100
pub(crate) trait RelayLayer<F, B>
101
where
102
    F: OutboundRelayLayer,
103
    B: InboundRelayLayer,
104
{
105
    /// Consume this ClientLayer and return a paired forward and reverse
106
    /// crypto layers, and a [`CircuitBinding`] object
107
    fn split_relay_layer(self) -> (F, B, CircuitBinding);
108
}
109

            
110
/// Represents a relay's view of the inbound crypto state on a given circuit.
111
#[allow(dead_code)] // Relays are not yet implemented.
112
#[cfg_attr(feature = "bench", visibility::make(pub))]
113
pub(crate) trait InboundRelayLayer {
114
    /// Prepare a RelayCellBody to be sent towards the client,
115
    /// and encrypt it.
116
    ///
117
    /// Return the authentication tag.
118
    fn originate(&mut self, cmd: ChanCmd, cell: &mut RelayCellBody) -> SendmeTag;
119
    /// Encrypt a RelayCellBody that is moving towards the client.
120
    fn encrypt_inbound(&mut self, cmd: ChanCmd, cell: &mut RelayCellBody);
121
}
122

            
123
/// Represent a relay's view of the outbound crypto state on a given circuit.
124
#[allow(dead_code)]
125
#[cfg_attr(feature = "bench", visibility::make(pub))]
126
pub(crate) trait OutboundRelayLayer {
127
    /// Decrypt a RelayCellBody that is coming from the client.
128
    ///
129
    /// Return an authentication tag if it is addressed to us.
130
    fn decrypt_outbound(&mut self, cmd: ChanCmd, cell: &mut RelayCellBody) -> Option<SendmeTag>;
131
}
132

            
133
/// A client's view of the cryptographic state shared with a single relay on a
134
/// circuit, as used for outbound cells.
135
#[cfg_attr(feature = "bench", visibility::make(pub))]
136
pub(crate) trait OutboundClientLayer {
137
    /// Prepare a RelayCellBody to be sent to the relay at this layer, and
138
    /// encrypt it.
139
    ///
140
    /// Return the authentication tag.
141
    fn originate_for(&mut self, cmd: ChanCmd, cell: &mut RelayCellBody) -> SendmeTag;
142
    /// Encrypt a RelayCellBody to be decrypted by this layer.
143
    fn encrypt_outbound(&mut self, cmd: ChanCmd, cell: &mut RelayCellBody);
144
}
145

            
146
/// A client's view of the crypto state shared with a single relay on a circuit,
147
/// as used for inbound cells.
148
#[cfg_attr(feature = "bench", visibility::make(pub))]
149
pub(crate) trait InboundClientLayer {
150
    /// Decrypt a CellBody that passed through this layer.
151
    ///
152
    /// Return an authentication tag if this layer is the originator.
153
    fn decrypt_inbound(&mut self, cmd: ChanCmd, cell: &mut RelayCellBody) -> Option<SendmeTag>;
154
}
155

            
156
/// Type to store hop indices on a circuit.
157
///
158
/// Hop indices are zero-based: "0" denotes the first hop on the circuit.
159
#[derive(Copy, Clone, Eq, PartialEq, Debug, Deftly, Ord, PartialOrd)]
160
#[derive_deftly(HasMemoryCost)]
161
pub struct HopNum(u8);
162

            
163
impl HopNum {
164
    /// Return an object that implements [`Display`](std::fmt::Display) for printing `HopNum`s.
165
    ///
166
    /// This will display the `HopNum` as a 1-indexed value (the string representation of the first
167
    /// hop is `"#1"`).
168
    ///
169
    /// To display the zero-based underlying representation of the `HopNum`, use
170
    /// [`Debug`](std::fmt::Debug).
171
96
    pub fn display(&self) -> HopNumDisplay {
172
96
        HopNumDisplay(*self)
173
96
    }
174

            
175
    /// Return true if this is  the first hop of a circuit.
176
    pub(crate) fn is_first_hop(&self) -> bool {
177
        self.0 == 0
178
    }
179
}
180

            
181
/// A helper for displaying [`HopNum`]s.
182
///
183
/// The [`Display`](std::fmt::Display) of this type displays the `HopNum` as a 1-based index
184
/// prefixed with the number sign (`#`). For example, the string representation of the first hop is
185
/// `"#1"`.
186
#[derive(Copy, Clone, Eq, PartialEq, Debug)]
187
pub struct HopNumDisplay(HopNum);
188

            
189
impl std::fmt::Display for HopNumDisplay {
190
96
    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::result::Result<(), std::fmt::Error> {
191
96
        let hop_num: u8 = self.0.into();
192

            
193
96
        write!(f, "#{}", hop_num + 1)
194
96
    }
195
}
196

            
197
impl From<HopNum> for u8 {
198
1044
    fn from(hop: HopNum) -> u8 {
199
1044
        hop.0
200
1044
    }
201
}
202

            
203
impl From<u8> for HopNum {
204
33648
    fn from(v: u8) -> HopNum {
205
33648
        HopNum(v)
206
33648
    }
207
}
208

            
209
impl From<HopNum> for usize {
210
32202
    fn from(hop: HopNum) -> usize {
211
32202
        hop.0 as usize
212
32202
    }
213
}
214

            
215
/// A client's view of the cryptographic state for an entire
216
/// constructed circuit, as used for sending cells.
217
#[cfg_attr(feature = "bench", visibility::make(pub), derive(Default))]
218
pub(crate) struct OutboundClientCrypt {
219
    /// Vector of layers, one for each hop on the circuit, ordered from the
220
    /// closest hop to the farthest.
221
    layers: Vec<Box<dyn OutboundClientLayer + Send>>,
222
}
223

            
224
/// A client's view of the cryptographic state for an entire
225
/// constructed circuit, as used for receiving cells.
226
#[cfg_attr(feature = "bench", visibility::make(pub), derive(Default))]
227
pub(crate) struct InboundClientCrypt {
228
    /// Vector of layers, one for each hop on the circuit, ordered from the
229
    /// closest hop to the farthest.
230
    layers: Vec<Box<dyn InboundClientLayer + Send>>,
231
}
232

            
233
impl OutboundClientCrypt {
234
    /// Return a new (empty) OutboundClientCrypt.
235
416
    #[cfg_attr(feature = "bench", visibility::make(pub))]
236
416
    pub(crate) fn new() -> Self {
237
416
        OutboundClientCrypt { layers: Vec::new() }
238
416
    }
239
    /// Prepare a cell body to sent away from the client.
240
    ///
241
    /// The cell is prepared for the `hop`th hop, and then encrypted with
242
    /// the appropriate keys.
243
    ///
244
    /// On success, returns a reference to tag that should be expected
245
    /// for an authenticated SENDME sent in response to this cell.
246
5580
    #[cfg_attr(feature = "bench", visibility::make(pub))]
247
5580
    pub(crate) fn encrypt(
248
5580
        &mut self,
249
5580
        cmd: ChanCmd,
250
5580
        cell: &mut RelayCellBody,
251
5580
        hop: HopNum,
252
5580
    ) -> Result<SendmeTag> {
253
5580
        let hop: usize = hop.into();
254
5580
        if hop >= self.layers.len() {
255
2
            return Err(Error::NoSuchHop);
256
5578
        }
257

            
258
5578
        let mut layers = self.layers.iter_mut().take(hop + 1).rev();
259
5578
        let first_layer = layers.next().ok_or(Error::NoSuchHop)?;
260
5578
        let tag = first_layer.originate_for(cmd, cell);
261
16494
        for layer in layers {
262
10916
            layer.encrypt_outbound(cmd, cell);
263
10916
        }
264
5578
        Ok(tag)
265
5580
    }
266

            
267
    /// Add a new layer to this OutboundClientCrypt
268
1140
    pub(crate) fn add_layer(&mut self, layer: Box<dyn OutboundClientLayer + Send>) {
269
1140
        assert!(self.layers.len() < u8::MAX as usize);
270
1140
        self.layers.push(layer);
271
1140
    }
272

            
273
    /// Return the number of layers configured on this OutboundClientCrypt.
274
74
    pub(crate) fn n_layers(&self) -> usize {
275
74
        self.layers.len()
276
74
    }
277
}
278

            
279
impl InboundClientCrypt {
280
    /// Return a new (empty) InboundClientCrypt.
281
388
    #[cfg_attr(feature = "bench", visibility::make(pub))]
282
388
    pub(crate) fn new() -> Self {
283
388
        InboundClientCrypt { layers: Vec::new() }
284
388
    }
285
    /// Decrypt an incoming cell that is coming to the client.
286
    ///
287
    /// On success, return which hop was the originator of the cell.
288
    // TODO(nickm): Use a real type for the tag, not just `&[u8]`.
289
1356
    #[cfg_attr(feature = "bench", visibility::make(pub))]
290
1356
    pub(crate) fn decrypt(
291
1356
        &mut self,
292
1356
        cmd: ChanCmd,
293
1356
        cell: &mut RelayCellBody,
294
1356
    ) -> Result<(HopNum, SendmeTag)> {
295
3852
        for (hopnum, layer) in self.layers.iter_mut().enumerate() {
296
3852
            if let Some(tag) = layer.decrypt_inbound(cmd, cell) {
297
1354
                let hopnum = HopNum(u8::try_from(hopnum).expect("Somehow > 255 hops"));
298
1354
                return Ok((hopnum, tag));
299
2498
            }
300
        }
301
2
        Err(Error::BadCellAuth)
302
1356
    }
303
    /// Add a new layer to this InboundClientCrypt
304
1056
    pub(crate) fn add_layer(&mut self, layer: Box<dyn InboundClientLayer + Send>) {
305
1056
        assert!(self.layers.len() < u8::MAX as usize);
306
1056
        self.layers.push(layer);
307
1056
    }
308

            
309
    /// Return the number of layers configured on this InboundClientCrypt.
310
    ///
311
    /// TODO: use HopNum
312
    #[allow(dead_code)]
313
2
    pub(crate) fn n_layers(&self) -> usize {
314
2
        self.layers.len()
315
2
    }
316
}
317

            
318
/// Standard Tor relay crypto, as instantiated for RELAY cells.
319
pub(crate) type Tor1RelayCrypto =
320
    tor1::CryptStatePair<tor_llcrypto::cipher::aes::Aes128Ctr, tor_llcrypto::d::Sha1>;
321

            
322
/// Standard Tor relay crypto, as instantiated for the HSv3 protocol.
323
///
324
/// (The use of SHA3 is ridiculously overkill.)
325
#[cfg(feature = "hs-common")]
326
pub(crate) type Tor1Hsv3RelayCrypto =
327
    tor1::CryptStatePair<tor_llcrypto::cipher::aes::Aes256Ctr, tor_llcrypto::d::Sha3_256>;
328

            
329
/// Counter galois onion relay crypto.
330
//
331
// We use `aes` directly here instead of tor_llcrypto::aes, which may or may not be OpenSSL:
332
// the OpenSSL implementations have bad performance when it comes to re-keying
333
// or changing IVs.
334
#[cfg(feature = "counter-galois-onion")]
335
pub(crate) type CgoRelayCrypto = cgo::CryptStatePair<aes::Aes128, aes::Aes128Enc>;
336

            
337
#[cfg(test)]
338
mod test {
339
    // @@ begin test lint list maintained by maint/add_warning @@
340
    #![allow(clippy::bool_assert_comparison)]
341
    #![allow(clippy::clone_on_copy)]
342
    #![allow(clippy::dbg_macro)]
343
    #![allow(clippy::mixed_attributes_style)]
344
    #![allow(clippy::print_stderr)]
345
    #![allow(clippy::print_stdout)]
346
    #![allow(clippy::single_char_pattern)]
347
    #![allow(clippy::unwrap_used)]
348
    #![allow(clippy::unchecked_time_subtraction)]
349
    #![allow(clippy::useless_vec)]
350
    #![allow(clippy::needless_pass_by_value)]
351
    //! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
352

            
353
    use super::*;
354
    use rand::{RngCore, seq::IndexedRandom as _};
355
    use tor_basic_utils::{RngExt as _, test_rng::testing_rng};
356
    use tor_bytes::SecretBuf;
357
    use tor_cell::relaycell::RelayCellFormat;
358

            
359
    pub(crate) fn add_layers(
360
        cc_out: &mut OutboundClientCrypt,
361
        cc_in: &mut InboundClientCrypt,
362
        pair: Tor1RelayCrypto,
363
    ) {
364
        let (outbound, inbound, _) = pair.split_client_layer();
365
        cc_out.add_layer(Box::new(outbound));
366
        cc_in.add_layer(Box::new(inbound));
367
    }
368

            
369
    #[test]
370
    fn roundtrip() {
371
        // Take canned keys and make sure we can do crypto correctly.
372
        use crate::crypto::handshake::ShakeKeyGenerator as KGen;
373
        fn s(seed: &[u8]) -> SecretBuf {
374
            seed.to_vec().into()
375
        }
376

            
377
        let seed1 = s(b"hidden we are free");
378
        let seed2 = s(b"free to speak, to free ourselves");
379
        let seed3 = s(b"free to hide no more");
380

            
381
        let mut cc_out = OutboundClientCrypt::new();
382
        let mut cc_in = InboundClientCrypt::new();
383
        let pair = Tor1RelayCrypto::construct(KGen::new(seed1.clone())).unwrap();
384
        add_layers(&mut cc_out, &mut cc_in, pair);
385
        let pair = Tor1RelayCrypto::construct(KGen::new(seed2.clone())).unwrap();
386
        add_layers(&mut cc_out, &mut cc_in, pair);
387
        let pair = Tor1RelayCrypto::construct(KGen::new(seed3.clone())).unwrap();
388
        add_layers(&mut cc_out, &mut cc_in, pair);
389

            
390
        assert_eq!(cc_in.n_layers(), 3);
391
        assert_eq!(cc_out.n_layers(), 3);
392

            
393
        let (mut r1f, mut r1b, _) = Tor1RelayCrypto::construct(KGen::new(seed1))
394
            .unwrap()
395
            .split_relay_layer();
396
        let (mut r2f, mut r2b, _) = Tor1RelayCrypto::construct(KGen::new(seed2))
397
            .unwrap()
398
            .split_relay_layer();
399
        let (mut r3f, mut r3b, _) = Tor1RelayCrypto::construct(KGen::new(seed3))
400
            .unwrap()
401
            .split_relay_layer();
402
        let cmd = ChanCmd::RELAY;
403

            
404
        let mut rng = testing_rng();
405
        for _ in 1..300 {
406
            // outbound cell
407
            let mut cell = Box::new([0_u8; 509]);
408
            let mut cell_orig = [0_u8; 509];
409
            rng.fill_bytes(&mut cell_orig);
410
            cell.copy_from_slice(&cell_orig);
411
            let mut cell = cell.into();
412
            let _tag = cc_out.encrypt(cmd, &mut cell, 2.into()).unwrap();
413
            assert_ne!(&cell.as_ref()[9..], &cell_orig.as_ref()[9..]);
414
            assert!(r1f.decrypt_outbound(cmd, &mut cell).is_none());
415
            assert!(r2f.decrypt_outbound(cmd, &mut cell).is_none());
416
            assert!(r3f.decrypt_outbound(cmd, &mut cell).is_some());
417

            
418
            assert_eq!(&cell.as_ref()[9..], &cell_orig.as_ref()[9..]);
419

            
420
            // inbound cell
421
            let mut cell = Box::new([0_u8; 509]);
422
            let mut cell_orig = [0_u8; 509];
423
            rng.fill_bytes(&mut cell_orig);
424
            cell.copy_from_slice(&cell_orig);
425
            let mut cell = cell.into();
426

            
427
            r3b.originate(cmd, &mut cell);
428
            r2b.encrypt_inbound(cmd, &mut cell);
429
            r1b.encrypt_inbound(cmd, &mut cell);
430
            let (layer, _tag) = cc_in.decrypt(cmd, &mut cell).unwrap();
431
            assert_eq!(layer, 2.into());
432
            assert_eq!(&cell.as_ref()[9..], &cell_orig.as_ref()[9..]);
433

            
434
            // TODO: Test tag somehow.
435
        }
436

            
437
        // Try a failure: sending a cell to a nonexistent hop.
438
        {
439
            let mut cell = Box::new([0_u8; 509]).into();
440
            let err = cc_out.encrypt(cmd, &mut cell, 10.into());
441
            assert!(matches!(err, Err(Error::NoSuchHop)));
442
        }
443

            
444
        // Try a failure: A junk cell with no correct auth from any layer.
445
        {
446
            let mut cell = Box::new([0_u8; 509]).into();
447
            let err = cc_in.decrypt(cmd, &mut cell);
448
            assert!(matches!(err, Err(Error::BadCellAuth)));
449
        }
450
    }
451

            
452
    #[test]
453
    fn hop_num_display() {
454
        for i in 0..10 {
455
            let hop_num = HopNum::from(i);
456
            let expect = format!("#{}", i + 1);
457

            
458
            assert_eq!(expect, hop_num.display().to_string());
459
        }
460
    }
461

            
462
    /// Helper: Clear every field in the tor1 `cell` that is reserved for cryptography by relay cell
463
    /// format `version.
464
    ///
465
    /// We do this so that we can be sure that the _other_ fields have all been transmitted correctly.
466
    fn clean_cell_fields(cell: &mut RelayCellBody, format: RelayCellFormat) {
467
        use super::tor1;
468
        match format {
469
            RelayCellFormat::V0 => {
470
                cell.0[tor1::RECOGNIZED_RANGE].fill(0);
471
                cell.0[tor1::DIGEST_RANGE].fill(0);
472
            }
473
            RelayCellFormat::V1 => {
474
                cell.0[0..16].fill(0);
475
            }
476
            _ => {
477
                panic!("Unrecognized format!");
478
            }
479
        }
480
    }
481

            
482
    /// Helper: Test a single-hop message, forward from the client.
483
    fn test_fwd_one_hop<CS, RS, CF, CB, RF, RB>(format: RelayCellFormat)
484
    where
485
        CS: CryptInit + ClientLayer<CF, CB>,
486
        RS: CryptInit + RelayLayer<RF, RB>,
487
        CF: OutboundClientLayer,
488
        CB: InboundClientLayer,
489
        RF: OutboundRelayLayer,
490
        RB: InboundRelayLayer,
491
    {
492
        let mut rng = testing_rng();
493
        assert_eq!(CS::seed_len(), RS::seed_len());
494
        let mut seed = vec![0; CS::seed_len()];
495
        rng.fill_bytes(&mut seed[..]);
496
        let (mut client, _, _) = CS::initialize(&seed).unwrap().split_client_layer();
497
        let (mut relay, _, _) = RS::initialize(&seed).unwrap().split_relay_layer();
498

            
499
        for _ in 0..5 {
500
            let mut cell = RelayCellBody(Box::new([0_u8; 509]));
501
            rng.fill_bytes(&mut cell.0[..]);
502
            clean_cell_fields(&mut cell, format);
503
            let msg_orig = cell.clone();
504

            
505
            let ctag = client.originate_for(ChanCmd::RELAY, &mut cell);
506
            assert_ne!(cell.0[16..], msg_orig.0[16..]);
507
            let rtag = relay.decrypt_outbound(ChanCmd::RELAY, &mut cell);
508
            clean_cell_fields(&mut cell, format);
509
            assert_eq!(cell.0[..], msg_orig.0[..]);
510
            assert_eq!(rtag, Some(ctag));
511
        }
512
    }
513

            
514
    /// Helper: Test a single-hop message, backwards towards the client.
515
    fn test_rev_one_hop<CS, RS, CF, CB, RF, RB>(format: RelayCellFormat)
516
    where
517
        CS: CryptInit + ClientLayer<CF, CB>,
518
        RS: CryptInit + RelayLayer<RF, RB>,
519
        CF: OutboundClientLayer,
520
        CB: InboundClientLayer,
521
        RF: OutboundRelayLayer,
522
        RB: InboundRelayLayer,
523
    {
524
        let mut rng = testing_rng();
525
        assert_eq!(CS::seed_len(), RS::seed_len());
526
        let mut seed = vec![0; CS::seed_len()];
527
        rng.fill_bytes(&mut seed[..]);
528
        let (_, mut client, _) = CS::initialize(&seed).unwrap().split_client_layer();
529
        let (_, mut relay, _) = RS::initialize(&seed).unwrap().split_relay_layer();
530

            
531
        for _ in 0..5 {
532
            let mut cell = RelayCellBody(Box::new([0_u8; 509]));
533
            rng.fill_bytes(&mut cell.0[..]);
534
            clean_cell_fields(&mut cell, format);
535
            let msg_orig = cell.clone();
536

            
537
            let rtag = relay.originate(ChanCmd::RELAY, &mut cell);
538
            assert_ne!(cell.0[16..], msg_orig.0[16..]);
539
            let ctag = client.decrypt_inbound(ChanCmd::RELAY, &mut cell);
540
            clean_cell_fields(&mut cell, format);
541
            assert_eq!(cell.0[..], msg_orig.0[..]);
542
            assert_eq!(ctag, Some(rtag));
543
        }
544
    }
545

            
546
    fn test_fwd_three_hops_leaky<CS, RS, CF, CB, RF, RB>(format: RelayCellFormat)
547
    where
548
        CS: CryptInit + ClientLayer<CF, CB>,
549
        RS: CryptInit + RelayLayer<RF, RB>,
550
        CF: OutboundClientLayer + Send + 'static,
551
        CB: InboundClientLayer,
552
        RF: OutboundRelayLayer,
553
        RB: InboundRelayLayer,
554
    {
555
        let mut rng = testing_rng();
556
        assert_eq!(CS::seed_len(), RS::seed_len());
557
        let mut client = OutboundClientCrypt::new();
558
        let mut relays = Vec::new();
559
        for _ in 0..3 {
560
            let mut seed = vec![0; CS::seed_len()];
561
            rng.fill_bytes(&mut seed[..]);
562
            let (client_layer, _, _) = CS::initialize(&seed).unwrap().split_client_layer();
563
            let (relay_layer, _, _) = RS::initialize(&seed).unwrap().split_relay_layer();
564
            client.add_layer(Box::new(client_layer));
565
            relays.push(relay_layer);
566
        }
567

            
568
        'cell_loop: for _ in 0..32 {
569
            let mut cell = RelayCellBody(Box::new([0_u8; 509]));
570
            rng.fill_bytes(&mut cell.0[..]);
571
            clean_cell_fields(&mut cell, format);
572
            let msg_orig = cell.clone();
573
            let cmd = *[ChanCmd::RELAY, ChanCmd::RELAY_EARLY]
574
                .choose(&mut rng)
575
                .unwrap();
576
            let hop: u8 = rng.gen_range_checked(0_u8..=2).unwrap();
577

            
578
            let ctag = client.encrypt(cmd, &mut cell, hop.into()).unwrap();
579

            
580
            for r_idx in 0..=hop {
581
                let rtag = relays[r_idx as usize].decrypt_outbound(cmd, &mut cell);
582
                if let Some(rtag) = rtag {
583
                    clean_cell_fields(&mut cell, format);
584
                    assert_eq!(cell.0[..], msg_orig.0[..]);
585
                    assert_eq!(rtag, ctag);
586
                    continue 'cell_loop;
587
                }
588
            }
589
            panic!("None of the relays thought that this cell was recognized!");
590
        }
591
    }
592

            
593
    fn test_rev_three_hops_leaky<CS, RS, CF, CB, RF, RB>(format: RelayCellFormat)
594
    where
595
        CS: CryptInit + ClientLayer<CF, CB>,
596
        RS: CryptInit + RelayLayer<RF, RB>,
597
        CF: OutboundClientLayer,
598
        CB: InboundClientLayer + Send + 'static,
599
        RF: OutboundRelayLayer,
600
        RB: InboundRelayLayer,
601
    {
602
        let mut rng = testing_rng();
603
        assert_eq!(CS::seed_len(), RS::seed_len());
604
        let mut client = InboundClientCrypt::new();
605
        let mut relays = Vec::new();
606
        for _ in 0..3 {
607
            let mut seed = vec![0; CS::seed_len()];
608
            rng.fill_bytes(&mut seed[..]);
609
            let (_, client_layer, _) = CS::initialize(&seed).unwrap().split_client_layer();
610
            let (_, relay_layer, _) = RS::initialize(&seed).unwrap().split_relay_layer();
611
            client.add_layer(Box::new(client_layer));
612
            relays.push(relay_layer);
613
        }
614

            
615
        for _ in 0..32 {
616
            let mut cell = RelayCellBody(Box::new([0_u8; 509]));
617
            rng.fill_bytes(&mut cell.0[..]);
618
            clean_cell_fields(&mut cell, format);
619
            let msg_orig = cell.clone();
620
            let cmd = *[ChanCmd::RELAY, ChanCmd::RELAY_EARLY]
621
                .choose(&mut rng)
622
                .unwrap();
623
            let hop: u8 = rng.gen_range_checked(0_u8..=2).unwrap();
624

            
625
            let rtag = relays[hop as usize].originate(cmd, &mut cell);
626
            for r_idx in (0..hop.into()).rev() {
627
                relays[r_idx as usize].encrypt_inbound(cmd, &mut cell);
628
            }
629

            
630
            let (observed_hop, ctag) = client.decrypt(cmd, &mut cell).unwrap();
631
            assert_eq!(observed_hop, hop.into());
632
            clean_cell_fields(&mut cell, format);
633
            assert_eq!(cell.0[..], msg_orig.0[..]);
634
            assert_eq!(ctag, rtag);
635
        }
636
    }
637

            
638
    macro_rules! integration_tests { { $modname:ident($fmt:expr, $ctype:ty, $rtype:ty) } => {
639
        mod $modname {
640
            use super::*;
641
            #[test]
642
            fn test_fwd_one_hop() {
643
                super::test_fwd_one_hop::<$ctype, $rtype, _, _, _, _>($fmt);
644
            }
645
            #[test]
646
            fn test_rev_one_hop() {
647
                super::test_rev_one_hop::<$ctype, $rtype, _, _, _, _>($fmt);
648
            }
649
            #[test]
650
            fn test_fwd_three_hops_leaky() {
651
                super::test_fwd_three_hops_leaky::<$ctype, $rtype, _, _, _, _>($fmt);
652
            }
653
            #[test]
654
            fn test_rev_three_hops_leaky() {
655
                super::test_rev_three_hops_leaky::<$ctype, $rtype, _, _, _, _>($fmt);
656
            }
657
        }
658
    }}
659

            
660
    integration_tests! { tor1(RelayCellFormat::V0, Tor1RelayCrypto, Tor1RelayCrypto) }
661
    #[cfg(feature = "hs-common")]
662
    integration_tests! { tor1_hs(RelayCellFormat::V0, Tor1Hsv3RelayCrypto, Tor1Hsv3RelayCrypto) }
663

            
664
    #[cfg(feature = "counter-galois-onion")]
665
    integration_tests! {
666
        cgo_aes128(RelayCellFormat::V1,
667
            cgo::CryptStatePair<aes::Aes128Dec, aes::Aes128Enc>,// client
668
            cgo::CryptStatePair<aes::Aes128Enc, aes::Aes128Enc> // relay
669
        )
670
    }
671
    #[cfg(feature = "counter-galois-onion")]
672
    integration_tests! {
673
        cgo_aes256(RelayCellFormat::V1,
674
            cgo::CryptStatePair<aes::Aes256Dec, aes::Aes256Enc>,// client
675
            cgo::CryptStatePair<aes::Aes256Enc, aes::Aes256Enc> // relay
676
        )
677
    }
678
}