blob: 977c20b485a33e10e6256cdb6c513e7fb36ff2bf [file] [log] [blame]
// Copyright 2018 The Chromium OS Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "shill/net/arp_packet.h"
#include <base/stl_util.h>
#include <gtest/gtest.h>
#include "shill/mock_log.h"
using testing::_;
using testing::HasSubstr;
using testing::Test;
namespace shill {
namespace {
const uint8_t kArpRequestV4[] = {0x00, 0x01, 0x08, 0x00,
0x06, 0x04, 0x00, 0x01};
const uint8_t kArpRequestV6[] = {0x00, 0x01, 0x86, 0xdd,
0x06, 0x10, 0x00, 0x01};
const uint8_t kArpReplyV4[] = {0x00, 0x01, 0x08, 0x00, 0x06, 0x04, 0x00, 0x02};
const uint8_t kArpReplyV6[] = {0x00, 0x01, 0x86, 0xdd, 0x06, 0x10, 0x00, 0x02};
const char kIPv4Address0[] = "192.168.0.1";
const char kIPv4Address1[] = "10.0.12.13";
const char kIPv6Address0[] = "fe80::1aa9:5ff:7ebf:14c5";
const char kIPv6Address1[] = "1980:0:0:1000:1b02:1aa9:5ff:7ebf";
const uint8_t kMacAddress0[] = {0x00, 0x01, 0x02, 0x03, 0x04, 0x05};
const uint8_t kMacAddress1[] = {0x88, 0x87, 0x86, 0x85, 0x84, 0x83};
const uint8_t kInsertedByte[] = {0x00};
const size_t kArpPaddingSizeV4 = 18;
const size_t kArpPaddingSizeV6 = 0;
} // namespace
class ArpPacketTest : public Test {
public:
ArpPacketTest()
: ipv4_address0_(IPAddress::kFamilyIPv4),
ipv4_address1_(IPAddress::kFamilyIPv4),
ipv6_address0_(IPAddress::kFamilyIPv6),
ipv6_address1_(IPAddress::kFamilyIPv6),
mac_address0_(kMacAddress0, base::size(kMacAddress0)),
mac_address1_(kMacAddress1, base::size(kMacAddress1)),
inserted_byte_(kInsertedByte, base::size(kInsertedByte)) {}
~ArpPacketTest() override = default;
void SetUp() override {
EXPECT_TRUE(ipv4_address0_.SetAddressFromString(kIPv4Address0));
EXPECT_TRUE(ipv4_address1_.SetAddressFromString(kIPv4Address1));
EXPECT_TRUE(ipv6_address0_.SetAddressFromString(kIPv6Address0));
EXPECT_TRUE(ipv6_address1_.SetAddressFromString(kIPv6Address1));
}
protected:
IPAddress ipv4_address0_;
IPAddress ipv4_address1_;
IPAddress ipv6_address0_;
IPAddress ipv6_address1_;
ByteString mac_address0_;
ByteString mac_address1_;
ByteString inserted_byte_;
ArpPacket packet_;
};
TEST_F(ArpPacketTest, Constructor) {
EXPECT_FALSE(packet_.local_ip_address().IsValid());
EXPECT_FALSE(packet_.remote_ip_address().IsValid());
EXPECT_TRUE(packet_.local_mac_address().IsEmpty());
EXPECT_TRUE(packet_.remote_mac_address().IsEmpty());
}
TEST_F(ArpPacketTest, GettersAndSetters) {
packet_.set_local_ip_address(ipv4_address0_);
packet_.set_remote_ip_address(ipv6_address1_);
packet_.set_local_mac_address(mac_address0_);
packet_.set_remote_mac_address(mac_address1_);
EXPECT_TRUE(ipv4_address0_.Equals(packet_.local_ip_address()));
EXPECT_TRUE(ipv6_address1_.Equals(packet_.remote_ip_address()));
EXPECT_TRUE(mac_address0_.Equals(packet_.local_mac_address()));
EXPECT_TRUE(mac_address1_.Equals(packet_.remote_mac_address()));
}
TEST_F(ArpPacketTest, ParseTinyPacket) {
ScopedMockLog log;
EXPECT_CALL(log, Log(logging::LOGGING_ERROR, _,
HasSubstr("too short to contain ARP header.")))
.Times(1);
ByteString arp_bytes(kArpReplyV4, base::size(kArpReplyV4));
arp_bytes.Resize(arp_bytes.GetLength() - 1);
EXPECT_FALSE(packet_.Parse(arp_bytes));
}
TEST_F(ArpPacketTest, ParseBadHRDType) {
ScopedMockLog log;
EXPECT_CALL(log, Log(logging::LOGGING_ERROR, _,
HasSubstr("Packet is of unknown ARPHRD type 257")))
.Times(1);
ByteString arp_bytes(kArpReplyV4, base::size(kArpReplyV4));
arp_bytes.GetData()[0] = 0x1;
EXPECT_FALSE(packet_.Parse(arp_bytes));
}
TEST_F(ArpPacketTest, ParseBadProtocol) {
ScopedMockLog log;
EXPECT_CALL(log, Log(logging::LOGGING_ERROR, _,
HasSubstr("Packet has unknown protocol 2049")))
.Times(1);
ByteString arp_bytes(kArpReplyV4, base::size(kArpReplyV4));
arp_bytes.GetData()[3] = 0x1;
EXPECT_FALSE(packet_.Parse(arp_bytes));
}
TEST_F(ArpPacketTest, ParseBadHardwareLength) {
ScopedMockLog log;
EXPECT_CALL(log,
Log(logging::LOGGING_ERROR, _,
HasSubstr("Packet has unexpected hardware address length")))
.Times(1);
ByteString arp_bytes(kArpReplyV4, base::size(kArpReplyV4));
arp_bytes.GetData()[4] = 0x1;
EXPECT_FALSE(packet_.Parse(arp_bytes));
}
TEST_F(ArpPacketTest, ParseBadProtocolLength) {
ScopedMockLog log;
EXPECT_CALL(log,
Log(logging::LOGGING_ERROR, _,
HasSubstr("Packet has unexpected protocol address length")))
.Times(1);
ByteString arp_bytes(kArpReplyV4, base::size(kArpReplyV4));
arp_bytes.GetData()[5] = 0x1;
EXPECT_FALSE(packet_.Parse(arp_bytes));
}
TEST_F(ArpPacketTest, ParseBadOpCode) {
ScopedMockLog log;
EXPECT_CALL(
log,
Log(logging::LOGGING_ERROR, _,
HasSubstr("Packet is not an ARP reply or request but of type 258")))
.Times(1);
ByteString arp_bytes(kArpReplyV4, base::size(kArpReplyV4));
arp_bytes.GetData()[6] = 0x1;
EXPECT_FALSE(packet_.Parse(arp_bytes));
}
TEST_F(ArpPacketTest, ParseShortPacket) {
ScopedMockLog log;
EXPECT_CALL(log, Log(logging::LOGGING_ERROR, _,
HasSubstr("is too small to contain entire ARP payload")))
.Times(1);
ByteString arp_bytes(kArpReplyV6, base::size(kArpReplyV6));
arp_bytes.Append(mac_address1_);
arp_bytes.Append(ipv6_address0_.address());
arp_bytes.Append(mac_address0_);
arp_bytes.Append(ipv6_address1_.address());
arp_bytes.Resize(arp_bytes.GetLength() - 1);
EXPECT_FALSE(packet_.Parse(arp_bytes));
}
TEST_F(ArpPacketTest, ParseIPv4) {
ByteString arp_bytes(kArpReplyV4, base::size(kArpReplyV4));
arp_bytes.Append(mac_address0_);
arp_bytes.Append(ipv4_address0_.address());
arp_bytes.Append(mac_address1_);
arp_bytes.Append(ipv4_address1_.address());
EXPECT_TRUE(packet_.Parse(arp_bytes));
EXPECT_TRUE(packet_.IsReply());
EXPECT_TRUE(ipv4_address0_.Equals(packet_.local_ip_address()));
EXPECT_TRUE(ipv4_address1_.Equals(packet_.remote_ip_address()));
EXPECT_TRUE(mac_address0_.Equals(packet_.local_mac_address()));
EXPECT_TRUE(mac_address1_.Equals(packet_.remote_mac_address()));
// Parse should succeed with arbitrary trailing padding.
arp_bytes.Append(ByteString(1000));
EXPECT_TRUE(packet_.Parse(arp_bytes));
}
TEST_F(ArpPacketTest, ParseIPv6) {
ByteString arp_bytes(kArpReplyV6, base::size(kArpReplyV6));
arp_bytes.Append(mac_address1_);
arp_bytes.Append(ipv6_address0_.address());
arp_bytes.Append(mac_address0_);
arp_bytes.Append(ipv6_address1_.address());
EXPECT_TRUE(packet_.Parse(arp_bytes));
EXPECT_TRUE(packet_.IsReply());
EXPECT_TRUE(ipv6_address0_.Equals(packet_.local_ip_address()));
EXPECT_TRUE(ipv6_address1_.Equals(packet_.remote_ip_address()));
EXPECT_TRUE(mac_address1_.Equals(packet_.local_mac_address()));
EXPECT_TRUE(mac_address0_.Equals(packet_.remote_mac_address()));
}
TEST_F(ArpPacketTest, ParseRequest) {
ByteString arp_bytes(kArpRequestV4, base::size(kArpRequestV4));
arp_bytes.Append(mac_address0_);
arp_bytes.Append(ipv4_address0_.address());
arp_bytes.Append(mac_address1_);
arp_bytes.Append(ipv4_address1_.address());
EXPECT_TRUE(packet_.Parse(arp_bytes));
EXPECT_FALSE(packet_.IsReply());
EXPECT_TRUE(ipv4_address0_.Equals(packet_.local_ip_address()));
EXPECT_TRUE(ipv4_address1_.Equals(packet_.remote_ip_address()));
EXPECT_TRUE(mac_address0_.Equals(packet_.local_mac_address()));
EXPECT_TRUE(mac_address1_.Equals(packet_.remote_mac_address()));
}
TEST_F(ArpPacketTest, FormatRequestInvalidAddress) {
ScopedMockLog log;
EXPECT_CALL(log, Log(logging::LOGGING_ERROR, _,
HasSubstr("Local or remote IP address is not valid")))
.Times(3);
ByteString arp_bytes;
EXPECT_FALSE(packet_.FormatRequest(&arp_bytes));
packet_.set_local_ip_address(ipv4_address0_);
EXPECT_FALSE(packet_.FormatRequest(&arp_bytes));
packet_.set_local_ip_address(IPAddress(IPAddress::kFamilyUnknown));
packet_.set_remote_ip_address(ipv4_address0_);
EXPECT_FALSE(packet_.FormatRequest(&arp_bytes));
}
TEST_F(ArpPacketTest, FormatRequestMismatchedAddresses) {
ScopedMockLog log;
EXPECT_CALL(log, Log(logging::LOGGING_ERROR, _,
HasSubstr("IP address families do not match")))
.Times(1);
ByteString arp_bytes;
packet_.set_local_ip_address(ipv4_address0_);
packet_.set_remote_ip_address(ipv6_address1_);
EXPECT_FALSE(packet_.FormatRequest(&arp_bytes));
}
TEST_F(ArpPacketTest, FormatRequestBadMacAddressLength) {
ScopedMockLog log;
EXPECT_CALL(log, Log(logging::LOGGING_ERROR, _,
HasSubstr("MAC address length is incorrect")))
.Times(3);
ByteString arp_bytes;
packet_.set_local_ip_address(ipv4_address0_);
packet_.set_remote_ip_address(ipv4_address1_);
EXPECT_FALSE(packet_.FormatRequest(&arp_bytes));
packet_.set_local_mac_address(mac_address0_);
EXPECT_FALSE(packet_.FormatRequest(&arp_bytes));
packet_.set_local_mac_address(ByteString());
packet_.set_remote_mac_address(mac_address0_);
EXPECT_FALSE(packet_.FormatRequest(&arp_bytes));
}
TEST_F(ArpPacketTest, FormatRequestIPv4) {
ByteString arp_bytes;
packet_.set_local_ip_address(ipv4_address0_);
packet_.set_remote_ip_address(ipv4_address1_);
packet_.set_local_mac_address(mac_address0_);
packet_.set_remote_mac_address(mac_address1_);
EXPECT_TRUE(packet_.FormatRequest(&arp_bytes));
ByteString expected_bytes(kArpRequestV4, base::size(kArpRequestV4));
expected_bytes.Append(mac_address0_);
expected_bytes.Append(ipv4_address0_.address());
expected_bytes.Append(mac_address1_);
expected_bytes.Append(ipv4_address1_.address());
expected_bytes.Append(ByteString(kArpPaddingSizeV4));
EXPECT_TRUE(expected_bytes.Equals(arp_bytes));
}
TEST_F(ArpPacketTest, FormatRequestIPv6) {
ByteString arp_bytes;
packet_.set_local_ip_address(ipv6_address0_);
packet_.set_remote_ip_address(ipv6_address1_);
packet_.set_local_mac_address(mac_address1_);
packet_.set_remote_mac_address(mac_address0_);
EXPECT_TRUE(packet_.FormatRequest(&arp_bytes));
ByteString expected_bytes(kArpRequestV6, base::size(kArpRequestV6));
expected_bytes.Append(mac_address1_);
expected_bytes.Append(ipv6_address0_.address());
expected_bytes.Append(mac_address0_);
expected_bytes.Append(ipv6_address1_.address());
expected_bytes.Append(ByteString(kArpPaddingSizeV6));
EXPECT_TRUE(expected_bytes.Equals(arp_bytes));
}
} // namespace shill