test_hs.c 3.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115
  1. /* Copyright (c) 2007-2013, The Tor Project, Inc. */
  2. /* See LICENSE for licensing information */
  3. /**
  4. * \file test_hs.c
  5. * \brief Unit tests for hidden service.
  6. **/
  7. #define CONTROL_PRIVATE
  8. #include "or.h"
  9. #include "test.h"
  10. #include "control.h"
  11. /* Helper global variable for hidden service descriptor event test.
  12. * It's used as a pointer to dynamically created message buffer in
  13. * send_control_event_string_replacement function, which mocks
  14. * send_control_event_string function.
  15. *
  16. * Always free it after use! */
  17. static char *received_msg = NULL;
  18. /** Mock function for send_control_event_string
  19. */
  20. static void
  21. send_control_event_string_replacement(uint16_t event, event_format_t which,
  22. const char *msg)
  23. {
  24. int msg_len;
  25. (void) event;
  26. (void) which;
  27. msg_len = strlen(msg);
  28. received_msg = tor_malloc_zero(msg_len+1);
  29. strncpy(received_msg, msg, msg_len);
  30. }
  31. /** Make sure each hidden service descriptor async event generation
  32. *
  33. * function generates the message in expected format.
  34. */
  35. static void
  36. test_hs_desc_event(void *arg)
  37. {
  38. #define STR_HS_ADDR "ajhb7kljbiru65qo"
  39. #define STR_HS_DIR_LONGNAME \
  40. "$AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=TestDir at 1.2.3.4"
  41. #define STR_HS_ID "b3oeducbhjmbqmgw2i3jtz4fekkrinwj"
  42. rend_data_t rend_query;
  43. const char *expected_msg;
  44. (void) arg;
  45. MOCK(send_control_event_string,
  46. send_control_event_string_replacement);
  47. /* setup rend_query struct */
  48. strncpy(rend_query.onion_address, STR_HS_ADDR,
  49. REND_SERVICE_ID_LEN_BASE32+1);
  50. rend_query.auth_type = 0;
  51. /* test request event */
  52. control_event_hs_descriptor_requested(&rend_query, STR_HS_DIR_LONGNAME,
  53. STR_HS_ID);
  54. expected_msg =
  55. "650 HS_DESC REQUESTED "STR_HS_ADDR" NO_AUTH "STR_HS_DIR_LONGNAME\
  56. " "STR_HS_ID"\r\n";
  57. test_assert(received_msg);
  58. test_streq(received_msg, expected_msg);
  59. tor_free(received_msg);
  60. received_msg = NULL;
  61. /* test received event */
  62. rend_query.auth_type = 1;
  63. control_event_hs_descriptor_received(&rend_query, STR_HS_DIR_LONGNAME);
  64. expected_msg =
  65. "650 HS_DESC RECEIVED "STR_HS_ADDR" BASIC_AUTH "STR_HS_DIR_LONGNAME"\r\n";
  66. test_assert(received_msg);
  67. test_streq(received_msg, expected_msg);
  68. tor_free(received_msg);
  69. received_msg = NULL;
  70. /* test failed event */
  71. rend_query.auth_type = 2;
  72. control_event_hs_descriptor_failed(&rend_query, STR_HS_DIR_LONGNAME);
  73. expected_msg =
  74. "650 HS_DESC FAILED "STR_HS_ADDR" STEALTH_AUTH "STR_HS_DIR_LONGNAME"\r\n";
  75. test_assert(received_msg);
  76. test_streq(received_msg, expected_msg);
  77. tor_free(received_msg);
  78. received_msg = NULL;
  79. /* test invalid auth type */
  80. rend_query.auth_type = 999;
  81. control_event_hs_descriptor_failed(&rend_query, STR_HS_DIR_LONGNAME);
  82. expected_msg =
  83. "650 HS_DESC FAILED "STR_HS_ADDR" UNKNOWN "STR_HS_DIR_LONGNAME"\r\n";
  84. test_assert(received_msg);
  85. test_streq(received_msg, expected_msg);
  86. tor_free(received_msg);
  87. received_msg = NULL;
  88. done:
  89. UNMOCK(send_control_event_string);
  90. if (received_msg) {
  91. tor_free(received_msg);
  92. received_msg = NULL;
  93. }
  94. }
  95. struct testcase_t hs_tests[] = {
  96. { "hs_desc_event", test_hs_desc_event, TT_FORK,
  97. NULL, NULL },
  98. END_OF_TESTCASES
  99. };