|
@@ -0,0 +1,115 @@
|
|
|
+/* Copyright (c) 2007-2013, The Tor Project, Inc. */
|
|
|
+/* See LICENSE for licensing information */
|
|
|
+
|
|
|
+/**
|
|
|
+ * \file test_hs.c
|
|
|
+ * \brief Unit tests for hidden service.
|
|
|
+ **/
|
|
|
+
|
|
|
+#define CONTROL_PRIVATE
|
|
|
+#include "or.h"
|
|
|
+#include "test.h"
|
|
|
+#include "control.h"
|
|
|
+
|
|
|
+/* Helper global variable for hidden service descriptor event test.
|
|
|
+ * It's used as a pointer to dynamically created message buffer in
|
|
|
+ * send_control_event_string_replacement function, which mocks
|
|
|
+ * send_control_event_string function.
|
|
|
+ *
|
|
|
+ * Always free it after use! */
|
|
|
+static char *received_msg = NULL;
|
|
|
+
|
|
|
+/** Mock function for send_control_event_string
|
|
|
+ */
|
|
|
+static void
|
|
|
+send_control_event_string_replacement(uint16_t event, event_format_t which,
|
|
|
+ const char *msg)
|
|
|
+{
|
|
|
+ int msg_len;
|
|
|
+
|
|
|
+ (void) event;
|
|
|
+ (void) which;
|
|
|
+ msg_len = strlen(msg);
|
|
|
+ received_msg = tor_malloc_zero(msg_len+1);
|
|
|
+ strncpy(received_msg, msg, msg_len);
|
|
|
+}
|
|
|
+
|
|
|
+/** Make sure each hidden service descriptor async event generation
|
|
|
+ *
|
|
|
+ * function generates the message in expected format.
|
|
|
+ */
|
|
|
+static void
|
|
|
+test_hs_desc_event(void *arg)
|
|
|
+{
|
|
|
+ #define STR_HS_ADDR "ajhb7kljbiru65qo"
|
|
|
+ #define STR_HS_DIR_LONGNAME \
|
|
|
+ "$AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=TestDir at 1.2.3.4"
|
|
|
+ #define STR_HS_ID "b3oeducbhjmbqmgw2i3jtz4fekkrinwj"
|
|
|
+
|
|
|
+ rend_data_t rend_query;
|
|
|
+ const char *expected_msg;
|
|
|
+
|
|
|
+ (void) arg;
|
|
|
+ MOCK(send_control_event_string,
|
|
|
+ send_control_event_string_replacement);
|
|
|
+
|
|
|
+ /* setup rend_query struct */
|
|
|
+ strncpy(rend_query.onion_address, STR_HS_ADDR,
|
|
|
+ REND_SERVICE_ID_LEN_BASE32+1);
|
|
|
+ rend_query.auth_type = 0;
|
|
|
+
|
|
|
+ /* test request event */
|
|
|
+ control_event_hs_descriptor_requested(&rend_query, STR_HS_DIR_LONGNAME,
|
|
|
+ STR_HS_ID);
|
|
|
+ expected_msg =
|
|
|
+ "650 HS_DESC REQUESTED "STR_HS_ADDR" NO_AUTH "STR_HS_DIR_LONGNAME\
|
|
|
+ " "STR_HS_ID"\r\n";
|
|
|
+ test_assert(received_msg);
|
|
|
+ test_streq(received_msg, expected_msg);
|
|
|
+ tor_free(received_msg);
|
|
|
+ received_msg = NULL;
|
|
|
+
|
|
|
+ /* test received event */
|
|
|
+ rend_query.auth_type = 1;
|
|
|
+ control_event_hs_descriptor_received(&rend_query, STR_HS_DIR_LONGNAME);
|
|
|
+ expected_msg =
|
|
|
+ "650 HS_DESC RECEIVED "STR_HS_ADDR" BASIC_AUTH "STR_HS_DIR_LONGNAME"\r\n";
|
|
|
+ test_assert(received_msg);
|
|
|
+ test_streq(received_msg, expected_msg);
|
|
|
+ tor_free(received_msg);
|
|
|
+ received_msg = NULL;
|
|
|
+
|
|
|
+ /* test failed event */
|
|
|
+ rend_query.auth_type = 2;
|
|
|
+ control_event_hs_descriptor_failed(&rend_query, STR_HS_DIR_LONGNAME);
|
|
|
+ expected_msg =
|
|
|
+ "650 HS_DESC FAILED "STR_HS_ADDR" STEALTH_AUTH "STR_HS_DIR_LONGNAME"\r\n";
|
|
|
+ test_assert(received_msg);
|
|
|
+ test_streq(received_msg, expected_msg);
|
|
|
+ tor_free(received_msg);
|
|
|
+ received_msg = NULL;
|
|
|
+
|
|
|
+ /* test invalid auth type */
|
|
|
+ rend_query.auth_type = 999;
|
|
|
+ control_event_hs_descriptor_failed(&rend_query, STR_HS_DIR_LONGNAME);
|
|
|
+ expected_msg =
|
|
|
+ "650 HS_DESC FAILED "STR_HS_ADDR" UNKNOWN "STR_HS_DIR_LONGNAME"\r\n";
|
|
|
+ test_assert(received_msg);
|
|
|
+ test_streq(received_msg, expected_msg);
|
|
|
+ tor_free(received_msg);
|
|
|
+ received_msg = NULL;
|
|
|
+
|
|
|
+ done:
|
|
|
+ UNMOCK(send_control_event_string);
|
|
|
+ if (received_msg) {
|
|
|
+ tor_free(received_msg);
|
|
|
+ received_msg = NULL;
|
|
|
+ }
|
|
|
+}
|
|
|
+
|
|
|
+struct testcase_t hs_tests[] = {
|
|
|
+ { "hs_desc_event", test_hs_desc_event, TT_FORK,
|
|
|
+ NULL, NULL },
|
|
|
+ END_OF_TESTCASES
|
|
|
+};
|
|
|
+
|