test_controller.c 30 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975
  1. /* Copyright (c) 2015-2016, The Tor Project, Inc. */
  2. /* See LICENSE for licensing information */
  3. #define CONTROL_PRIVATE
  4. #include "or.h"
  5. #include "control.h"
  6. #include "networkstatus.h"
  7. #include "rendservice.h"
  8. #include "routerlist.h"
  9. #include "test.h"
  10. static void
  11. test_add_onion_helper_keyarg(void *arg)
  12. {
  13. crypto_pk_t *pk = NULL;
  14. crypto_pk_t *pk2 = NULL;
  15. const char *key_new_alg = NULL;
  16. char *key_new_blob = NULL;
  17. char *err_msg = NULL;
  18. char *encoded = NULL;
  19. char *arg_str = NULL;
  20. (void) arg;
  21. /* Test explicit RSA1024 key generation. */
  22. pk = add_onion_helper_keyarg("NEW:RSA1024", 0, &key_new_alg, &key_new_blob,
  23. &err_msg);
  24. tt_assert(pk);
  25. tt_str_op(key_new_alg, OP_EQ, "RSA1024");
  26. tt_assert(key_new_blob);
  27. tt_assert(!err_msg);
  28. /* Test "BEST" key generation (Assumes BEST = RSA1024). */
  29. crypto_pk_free(pk);
  30. tor_free(key_new_blob);
  31. pk = add_onion_helper_keyarg("NEW:BEST", 0, &key_new_alg, &key_new_blob,
  32. &err_msg);
  33. tt_assert(pk);
  34. tt_str_op(key_new_alg, OP_EQ, "RSA1024");
  35. tt_assert(key_new_blob);
  36. tt_assert(!err_msg);
  37. /* Test discarding the private key. */
  38. crypto_pk_free(pk);
  39. tor_free(key_new_blob);
  40. pk = add_onion_helper_keyarg("NEW:BEST", 1, &key_new_alg, &key_new_blob,
  41. &err_msg);
  42. tt_assert(pk);
  43. tt_assert(!key_new_alg);
  44. tt_assert(!key_new_blob);
  45. tt_assert(!err_msg);
  46. /* Test generating a invalid key type. */
  47. crypto_pk_free(pk);
  48. pk = add_onion_helper_keyarg("NEW:RSA512", 0, &key_new_alg, &key_new_blob,
  49. &err_msg);
  50. tt_assert(!pk);
  51. tt_assert(!key_new_alg);
  52. tt_assert(!key_new_blob);
  53. tt_assert(err_msg);
  54. /* Test loading a RSA1024 key. */
  55. tor_free(err_msg);
  56. pk = pk_generate(0);
  57. tt_int_op(0, OP_EQ, crypto_pk_base64_encode(pk, &encoded));
  58. tor_asprintf(&arg_str, "RSA1024:%s", encoded);
  59. pk2 = add_onion_helper_keyarg(arg_str, 0, &key_new_alg, &key_new_blob,
  60. &err_msg);
  61. tt_assert(pk2);
  62. tt_assert(!key_new_alg);
  63. tt_assert(!key_new_blob);
  64. tt_assert(!err_msg);
  65. tt_assert(crypto_pk_cmp_keys(pk, pk2) == 0);
  66. /* Test loading a invalid key type. */
  67. tor_free(arg_str);
  68. crypto_pk_free(pk); pk = NULL;
  69. tor_asprintf(&arg_str, "RSA512:%s", encoded);
  70. pk = add_onion_helper_keyarg(arg_str, 0, &key_new_alg, &key_new_blob,
  71. &err_msg);
  72. tt_assert(!pk);
  73. tt_assert(!key_new_alg);
  74. tt_assert(!key_new_blob);
  75. tt_assert(err_msg);
  76. /* Test loading a invalid key. */
  77. tor_free(arg_str);
  78. crypto_pk_free(pk); pk = NULL;
  79. tor_free(err_msg);
  80. encoded[strlen(encoded)/2] = '\0';
  81. tor_asprintf(&arg_str, "RSA1024:%s", encoded);
  82. pk = add_onion_helper_keyarg(arg_str, 0, &key_new_alg, &key_new_blob,
  83. &err_msg);
  84. tt_assert(!pk);
  85. tt_assert(!key_new_alg);
  86. tt_assert(!key_new_blob);
  87. tt_assert(err_msg);
  88. done:
  89. crypto_pk_free(pk);
  90. crypto_pk_free(pk2);
  91. tor_free(key_new_blob);
  92. tor_free(err_msg);
  93. tor_free(encoded);
  94. tor_free(arg_str);
  95. }
  96. static void
  97. test_rend_service_parse_port_config(void *arg)
  98. {
  99. const char *sep = ",";
  100. rend_service_port_config_t *cfg = NULL;
  101. char *err_msg = NULL;
  102. (void)arg;
  103. /* Test "VIRTPORT" only. */
  104. cfg = rend_service_parse_port_config("80", sep, &err_msg);
  105. tt_assert(cfg);
  106. tt_assert(!err_msg);
  107. /* Test "VIRTPORT,TARGET" (Target is port). */
  108. rend_service_port_config_free(cfg);
  109. cfg = rend_service_parse_port_config("80,8080", sep, &err_msg);
  110. tt_assert(cfg);
  111. tt_assert(!err_msg);
  112. /* Test "VIRTPORT,TARGET" (Target is IPv4:port). */
  113. rend_service_port_config_free(cfg);
  114. cfg = rend_service_parse_port_config("80,192.0.2.1:8080", sep, &err_msg);
  115. tt_assert(cfg);
  116. tt_assert(!err_msg);
  117. /* Test "VIRTPORT,TARGET" (Target is IPv6:port). */
  118. rend_service_port_config_free(cfg);
  119. cfg = rend_service_parse_port_config("80,[2001:db8::1]:8080", sep, &err_msg);
  120. tt_assert(cfg);
  121. tt_assert(!err_msg);
  122. /* XXX: Someone should add tests for AF_UNIX targets if supported. */
  123. /* Test empty config. */
  124. rend_service_port_config_free(cfg);
  125. cfg = rend_service_parse_port_config("", sep, &err_msg);
  126. tt_assert(!cfg);
  127. tt_assert(err_msg);
  128. /* Test invalid port. */
  129. tor_free(err_msg);
  130. cfg = rend_service_parse_port_config("90001", sep, &err_msg);
  131. tt_assert(!cfg);
  132. tt_assert(err_msg);
  133. done:
  134. rend_service_port_config_free(cfg);
  135. tor_free(err_msg);
  136. }
  137. static void
  138. test_add_onion_helper_clientauth(void *arg)
  139. {
  140. rend_authorized_client_t *client = NULL;
  141. char *err_msg = NULL;
  142. int created = 0;
  143. (void)arg;
  144. /* Test "ClientName" only. */
  145. client = add_onion_helper_clientauth("alice", &created, &err_msg);
  146. tt_assert(client);
  147. tt_assert(created);
  148. tt_assert(!err_msg);
  149. rend_authorized_client_free(client);
  150. /* Test "ClientName:Blob" */
  151. client = add_onion_helper_clientauth("alice:475hGBHPlq7Mc0cRZitK/B",
  152. &created, &err_msg);
  153. tt_assert(client);
  154. tt_assert(!created);
  155. tt_assert(!err_msg);
  156. rend_authorized_client_free(client);
  157. /* Test invalid client names */
  158. client = add_onion_helper_clientauth("no*asterisks*allowed", &created,
  159. &err_msg);
  160. tt_assert(!client);
  161. tt_assert(err_msg);
  162. tor_free(err_msg);
  163. /* Test invalid auth cookie */
  164. client = add_onion_helper_clientauth("alice:12345", &created, &err_msg);
  165. tt_assert(!client);
  166. tt_assert(err_msg);
  167. tor_free(err_msg);
  168. /* Test invalid syntax */
  169. client = add_onion_helper_clientauth(":475hGBHPlq7Mc0cRZitK/B", &created,
  170. &err_msg);
  171. tt_assert(!client);
  172. tt_assert(err_msg);
  173. tor_free(err_msg);
  174. done:
  175. rend_authorized_client_free(client);
  176. tor_free(err_msg);
  177. }
  178. /* Mocks and data/variables used for GETINFO download status tests */
  179. static const download_status_t dl_status_default =
  180. { 0, 0, 0, DL_SCHED_CONSENSUS, DL_WANT_ANY_DIRSERVER,
  181. DL_SCHED_INCREMENT_FAILURE, DL_SCHED_RANDOM_EXPONENTIAL, 0, 0 };
  182. static download_status_t ns_dl_status[N_CONSENSUS_FLAVORS];
  183. static download_status_t ns_dl_status_bootstrap[N_CONSENSUS_FLAVORS];
  184. static download_status_t ns_dl_status_running[N_CONSENSUS_FLAVORS];
  185. /*
  186. * These should explore all the possible cases of download_status_to_string()
  187. * in control.c
  188. */
  189. static const download_status_t dls_sample_1 =
  190. { 1467163900, 0, 0, DL_SCHED_GENERIC, DL_WANT_ANY_DIRSERVER,
  191. DL_SCHED_INCREMENT_FAILURE, DL_SCHED_DETERMINISTIC, 0, 0 };
  192. static const char * dls_sample_1_str =
  193. "next-attempt-at 2016-06-29 01:31:40\n"
  194. "n-download-failures 0\n"
  195. "n-download-attempts 0\n"
  196. "schedule DL_SCHED_GENERIC\n"
  197. "want-authority DL_WANT_ANY_DIRSERVER\n"
  198. "increment-on DL_SCHED_INCREMENT_FAILURE\n"
  199. "backoff DL_SCHED_DETERMINISTIC\n";
  200. static const download_status_t dls_sample_2 =
  201. { 1467164400, 1, 2, DL_SCHED_CONSENSUS, DL_WANT_AUTHORITY,
  202. DL_SCHED_INCREMENT_FAILURE, DL_SCHED_DETERMINISTIC, 0, 0 };
  203. static const char * dls_sample_2_str =
  204. "next-attempt-at 2016-06-29 01:40:00\n"
  205. "n-download-failures 1\n"
  206. "n-download-attempts 2\n"
  207. "schedule DL_SCHED_CONSENSUS\n"
  208. "want-authority DL_WANT_AUTHORITY\n"
  209. "increment-on DL_SCHED_INCREMENT_FAILURE\n"
  210. "backoff DL_SCHED_DETERMINISTIC\n";
  211. static const download_status_t dls_sample_3 =
  212. { 1467154400, 12, 25, DL_SCHED_BRIDGE, DL_WANT_ANY_DIRSERVER,
  213. DL_SCHED_INCREMENT_ATTEMPT, DL_SCHED_DETERMINISTIC, 0, 0 };
  214. static const char * dls_sample_3_str =
  215. "next-attempt-at 2016-06-28 22:53:20\n"
  216. "n-download-failures 12\n"
  217. "n-download-attempts 25\n"
  218. "schedule DL_SCHED_BRIDGE\n"
  219. "want-authority DL_WANT_ANY_DIRSERVER\n"
  220. "increment-on DL_SCHED_INCREMENT_ATTEMPT\n"
  221. "backoff DL_SCHED_DETERMINISTIC\n";
  222. static const download_status_t dls_sample_4 =
  223. { 1467166600, 3, 0, DL_SCHED_GENERIC, DL_WANT_ANY_DIRSERVER,
  224. DL_SCHED_INCREMENT_FAILURE, DL_SCHED_RANDOM_EXPONENTIAL, 0, 0 };
  225. static const char * dls_sample_4_str =
  226. "next-attempt-at 2016-06-29 02:16:40\n"
  227. "n-download-failures 3\n"
  228. "n-download-attempts 0\n"
  229. "schedule DL_SCHED_GENERIC\n"
  230. "want-authority DL_WANT_ANY_DIRSERVER\n"
  231. "increment-on DL_SCHED_INCREMENT_FAILURE\n"
  232. "backoff DL_SCHED_RANDOM_EXPONENTIAL\n"
  233. "last-backoff-position 0\n"
  234. "last-delay-used 0\n";
  235. static const download_status_t dls_sample_5 =
  236. { 1467164600, 3, 7, DL_SCHED_CONSENSUS, DL_WANT_ANY_DIRSERVER,
  237. DL_SCHED_INCREMENT_FAILURE, DL_SCHED_RANDOM_EXPONENTIAL, 1, 2112, };
  238. static const char * dls_sample_5_str =
  239. "next-attempt-at 2016-06-29 01:43:20\n"
  240. "n-download-failures 3\n"
  241. "n-download-attempts 7\n"
  242. "schedule DL_SCHED_CONSENSUS\n"
  243. "want-authority DL_WANT_ANY_DIRSERVER\n"
  244. "increment-on DL_SCHED_INCREMENT_FAILURE\n"
  245. "backoff DL_SCHED_RANDOM_EXPONENTIAL\n"
  246. "last-backoff-position 1\n"
  247. "last-delay-used 2112\n";
  248. static const download_status_t dls_sample_6 =
  249. { 1467164200, 4, 9, DL_SCHED_CONSENSUS, DL_WANT_AUTHORITY,
  250. DL_SCHED_INCREMENT_ATTEMPT, DL_SCHED_RANDOM_EXPONENTIAL, 3, 432 };
  251. static const char * dls_sample_6_str =
  252. "next-attempt-at 2016-06-29 01:36:40\n"
  253. "n-download-failures 4\n"
  254. "n-download-attempts 9\n"
  255. "schedule DL_SCHED_CONSENSUS\n"
  256. "want-authority DL_WANT_AUTHORITY\n"
  257. "increment-on DL_SCHED_INCREMENT_ATTEMPT\n"
  258. "backoff DL_SCHED_RANDOM_EXPONENTIAL\n"
  259. "last-backoff-position 3\n"
  260. "last-delay-used 432\n";
  261. /* Simulated auth certs */
  262. static const char *auth_id_digest_1_str =
  263. "63CDD326DFEF0CA020BDD3FEB45A3286FE13A061";
  264. static download_status_t auth_def_cert_download_status_1;
  265. static const char *auth_id_digest_2_str =
  266. "2C209FCDD8D48DC049777B8DC2C0F94A0408BE99";
  267. static download_status_t auth_def_cert_download_status_2;
  268. /* Expected form of digest list returned for GETINFO downloads/cert/fps */
  269. static const char *auth_id_digest_expected_list =
  270. "63CDD326DFEF0CA020BDD3FEB45A3286FE13A061\n"
  271. "2C209FCDD8D48DC049777B8DC2C0F94A0408BE99\n";
  272. /* Signing keys for simulated auth 1 */
  273. static const char *auth_1_sk_1_str =
  274. "AA69566029B1F023BA09451B8F1B10952384EB58";
  275. static download_status_t auth_1_sk_1_dls;
  276. static const char *auth_1_sk_2_str =
  277. "710865C7F06B73C5292695A8C34F1C94F769FF72";
  278. static download_status_t auth_1_sk_2_dls;
  279. /*
  280. * Expected form of sk digest list for
  281. * GETINFO downloads/cert/<auth_id_digest_1_str>/sks
  282. */
  283. static const char *auth_1_sk_digest_expected_list =
  284. "AA69566029B1F023BA09451B8F1B10952384EB58\n"
  285. "710865C7F06B73C5292695A8C34F1C94F769FF72\n";
  286. /* Signing keys for simulated auth 2 */
  287. static const char *auth_2_sk_1_str =
  288. "4299047E00D070AD6703FE00BE7AA756DB061E62";
  289. static download_status_t auth_2_sk_1_dls;
  290. static const char *auth_2_sk_2_str =
  291. "9451B8F1B10952384EB58B5F230C0BB701626C9B";
  292. static download_status_t auth_2_sk_2_dls;
  293. /*
  294. * Expected form of sk digest list for
  295. * GETINFO downloads/cert/<auth_id_digest_2_str>/sks
  296. */
  297. static const char *auth_2_sk_digest_expected_list =
  298. "4299047E00D070AD6703FE00BE7AA756DB061E62\n"
  299. "9451B8F1B10952384EB58B5F230C0BB701626C9B\n";
  300. static void
  301. reset_mocked_dl_statuses(void)
  302. {
  303. int i;
  304. for (i = 0; i < N_CONSENSUS_FLAVORS; ++i) {
  305. memcpy(&(ns_dl_status[i]), &dl_status_default,
  306. sizeof(download_status_t));
  307. memcpy(&(ns_dl_status_bootstrap[i]), &dl_status_default,
  308. sizeof(download_status_t));
  309. memcpy(&(ns_dl_status_running[i]), &dl_status_default,
  310. sizeof(download_status_t));
  311. }
  312. memcpy(&auth_def_cert_download_status_1, &dl_status_default,
  313. sizeof(download_status_t));
  314. memcpy(&auth_def_cert_download_status_2, &dl_status_default,
  315. sizeof(download_status_t));
  316. memcpy(&auth_1_sk_1_dls, &dl_status_default,
  317. sizeof(download_status_t));
  318. memcpy(&auth_1_sk_2_dls, &dl_status_default,
  319. sizeof(download_status_t));
  320. memcpy(&auth_2_sk_1_dls, &dl_status_default,
  321. sizeof(download_status_t));
  322. memcpy(&auth_2_sk_2_dls, &dl_status_default,
  323. sizeof(download_status_t));
  324. }
  325. static download_status_t *
  326. ns_dl_status_mock(consensus_flavor_t flavor)
  327. {
  328. return &(ns_dl_status[flavor]);
  329. }
  330. static download_status_t *
  331. ns_dl_status_bootstrap_mock(consensus_flavor_t flavor)
  332. {
  333. return &(ns_dl_status_bootstrap[flavor]);
  334. }
  335. static download_status_t *
  336. ns_dl_status_running_mock(consensus_flavor_t flavor)
  337. {
  338. return &(ns_dl_status_running[flavor]);
  339. }
  340. static void
  341. setup_ns_mocks(void)
  342. {
  343. MOCK(networkstatus_get_dl_status_by_flavor, ns_dl_status_mock);
  344. MOCK(networkstatus_get_dl_status_by_flavor_bootstrap,
  345. ns_dl_status_bootstrap_mock);
  346. MOCK(networkstatus_get_dl_status_by_flavor_running,
  347. ns_dl_status_running_mock);
  348. reset_mocked_dl_statuses();
  349. }
  350. static void
  351. clear_ns_mocks(void)
  352. {
  353. UNMOCK(networkstatus_get_dl_status_by_flavor);
  354. UNMOCK(networkstatus_get_dl_status_by_flavor_bootstrap);
  355. UNMOCK(networkstatus_get_dl_status_by_flavor_running);
  356. }
  357. static smartlist_t *
  358. cert_dl_status_auth_ids_mock(void)
  359. {
  360. char digest[DIGEST_LEN], *tmp;
  361. int len;
  362. smartlist_t *list = NULL;
  363. /* Just pretend we have only the two hard-coded digests listed above */
  364. list = smartlist_new();
  365. len = base16_decode(digest, DIGEST_LEN,
  366. auth_id_digest_1_str, strlen(auth_id_digest_1_str));
  367. tt_int_op(len, OP_EQ, DIGEST_LEN);
  368. tmp = tor_malloc(DIGEST_LEN);
  369. memcpy(tmp, digest, DIGEST_LEN);
  370. smartlist_add(list, tmp);
  371. len = base16_decode(digest, DIGEST_LEN,
  372. auth_id_digest_2_str, strlen(auth_id_digest_2_str));
  373. tt_int_op(len, OP_EQ, DIGEST_LEN);
  374. tmp = tor_malloc(DIGEST_LEN);
  375. memcpy(tmp, digest, DIGEST_LEN);
  376. smartlist_add(list, tmp);
  377. done:
  378. return list;
  379. }
  380. static download_status_t *
  381. cert_dl_status_def_for_auth_mock(const char *digest)
  382. {
  383. download_status_t *dl = NULL;
  384. char digest_str[HEX_DIGEST_LEN+1];
  385. tt_assert(digest != NULL);
  386. base16_encode(digest_str, HEX_DIGEST_LEN + 1,
  387. digest, DIGEST_LEN);
  388. digest_str[HEX_DIGEST_LEN] = '\0';
  389. if (strcmp(digest_str, auth_id_digest_1_str) == 0) {
  390. dl = &auth_def_cert_download_status_1;
  391. } else if (strcmp(digest_str, auth_id_digest_2_str) == 0) {
  392. dl = &auth_def_cert_download_status_2;
  393. }
  394. done:
  395. return dl;
  396. }
  397. static smartlist_t *
  398. cert_dl_status_sks_for_auth_id_mock(const char *digest)
  399. {
  400. smartlist_t *list = NULL;
  401. char sk[DIGEST_LEN];
  402. char digest_str[HEX_DIGEST_LEN+1];
  403. char *tmp;
  404. int len;
  405. tt_assert(digest != NULL);
  406. base16_encode(digest_str, HEX_DIGEST_LEN + 1,
  407. digest, DIGEST_LEN);
  408. digest_str[HEX_DIGEST_LEN] = '\0';
  409. /*
  410. * Build a list of two hard-coded digests, depending on what we
  411. * were just passed.
  412. */
  413. if (strcmp(digest_str, auth_id_digest_1_str) == 0) {
  414. list = smartlist_new();
  415. len = base16_decode(sk, DIGEST_LEN,
  416. auth_1_sk_1_str, strlen(auth_1_sk_1_str));
  417. tt_int_op(len, OP_EQ, DIGEST_LEN);
  418. tmp = tor_malloc(DIGEST_LEN);
  419. memcpy(tmp, sk, DIGEST_LEN);
  420. smartlist_add(list, tmp);
  421. len = base16_decode(sk, DIGEST_LEN,
  422. auth_1_sk_2_str, strlen(auth_1_sk_2_str));
  423. tt_int_op(len, OP_EQ, DIGEST_LEN);
  424. tmp = tor_malloc(DIGEST_LEN);
  425. memcpy(tmp, sk, DIGEST_LEN);
  426. smartlist_add(list, tmp);
  427. } else if (strcmp(digest_str, auth_id_digest_2_str) == 0) {
  428. list = smartlist_new();
  429. len = base16_decode(sk, DIGEST_LEN,
  430. auth_2_sk_1_str, strlen(auth_2_sk_1_str));
  431. tt_int_op(len, OP_EQ, DIGEST_LEN);
  432. tmp = tor_malloc(DIGEST_LEN);
  433. memcpy(tmp, sk, DIGEST_LEN);
  434. smartlist_add(list, tmp);
  435. len = base16_decode(sk, DIGEST_LEN,
  436. auth_2_sk_2_str, strlen(auth_2_sk_2_str));
  437. tt_int_op(len, OP_EQ, DIGEST_LEN);
  438. tmp = tor_malloc(DIGEST_LEN);
  439. memcpy(tmp, sk, DIGEST_LEN);
  440. smartlist_add(list, tmp);
  441. }
  442. done:
  443. return list;
  444. }
  445. static download_status_t *
  446. cert_dl_status_fp_sk_mock(const char *fp_digest, const char *sk_digest)
  447. {
  448. download_status_t *dl = NULL;
  449. char fp_digest_str[HEX_DIGEST_LEN+1], sk_digest_str[HEX_DIGEST_LEN+1];
  450. /*
  451. * Unpack the digests so we can compare them and figure out which
  452. * dl status we want.
  453. */
  454. tt_assert(fp_digest != NULL);
  455. base16_encode(fp_digest_str, HEX_DIGEST_LEN + 1,
  456. fp_digest, DIGEST_LEN);
  457. fp_digest_str[HEX_DIGEST_LEN] = '\0';
  458. tt_assert(sk_digest != NULL);
  459. base16_encode(sk_digest_str, HEX_DIGEST_LEN + 1,
  460. sk_digest, DIGEST_LEN);
  461. sk_digest_str[HEX_DIGEST_LEN] = '\0';
  462. if (strcmp(fp_digest_str, auth_id_digest_1_str) == 0) {
  463. if (strcmp(sk_digest_str, auth_1_sk_1_str) == 0) {
  464. dl = &auth_1_sk_1_dls;
  465. } else if (strcmp(sk_digest_str, auth_1_sk_2_str) == 0) {
  466. dl = &auth_1_sk_2_dls;
  467. }
  468. } else if (strcmp(fp_digest_str, auth_id_digest_2_str) == 0) {
  469. if (strcmp(sk_digest_str, auth_2_sk_1_str) == 0) {
  470. dl = &auth_2_sk_1_dls;
  471. } else if (strcmp(sk_digest_str, auth_2_sk_2_str) == 0) {
  472. dl = &auth_2_sk_2_dls;
  473. }
  474. }
  475. done:
  476. return dl;
  477. }
  478. static void
  479. setup_cert_mocks(void)
  480. {
  481. MOCK(list_authority_ids_with_downloads, cert_dl_status_auth_ids_mock);
  482. MOCK(id_only_download_status_for_authority_id,
  483. cert_dl_status_def_for_auth_mock);
  484. MOCK(list_sk_digests_for_authority_id,
  485. cert_dl_status_sks_for_auth_id_mock);
  486. MOCK(download_status_for_authority_id_and_sk,
  487. cert_dl_status_fp_sk_mock);
  488. reset_mocked_dl_statuses();
  489. }
  490. static void
  491. clear_cert_mocks(void)
  492. {
  493. UNMOCK(list_authority_ids_with_downloads);
  494. UNMOCK(id_only_download_status_for_authority_id);
  495. UNMOCK(list_sk_digests_for_authority_id);
  496. UNMOCK(download_status_for_authority_id_and_sk);
  497. }
  498. static void
  499. test_download_status_consensus(void *arg)
  500. {
  501. /* We just need one of these to pass, it doesn't matter what's in it */
  502. control_connection_t dummy;
  503. /* Get results out */
  504. char *answer = NULL;
  505. const char *errmsg = NULL;
  506. (void)arg;
  507. /* Check that the unknown prefix case works; no mocks needed yet */
  508. getinfo_helper_downloads(&dummy, "downloads/foo", &answer, &errmsg);
  509. tt_assert(answer == NULL);
  510. tt_str_op(errmsg, OP_EQ, "Unknown download status query");
  511. setup_ns_mocks();
  512. /*
  513. * Check returning serialized dlstatuses, and implicitly also test
  514. * download_status_to_string().
  515. */
  516. /* Case 1 default/FLAV_NS*/
  517. memcpy(&(ns_dl_status[FLAV_NS]), &dls_sample_1,
  518. sizeof(download_status_t));
  519. getinfo_helper_downloads(&dummy, "downloads/networkstatus/ns",
  520. &answer, &errmsg);
  521. tt_assert(answer != NULL);
  522. tt_assert(errmsg == NULL);
  523. tt_str_op(answer, OP_EQ, dls_sample_1_str);
  524. tor_free(answer);
  525. errmsg = NULL;
  526. /* Case 2 default/FLAV_MICRODESC */
  527. memcpy(&(ns_dl_status[FLAV_MICRODESC]), &dls_sample_2,
  528. sizeof(download_status_t));
  529. getinfo_helper_downloads(&dummy, "downloads/networkstatus/microdesc",
  530. &answer, &errmsg);
  531. tt_assert(answer != NULL);
  532. tt_assert(errmsg == NULL);
  533. tt_str_op(answer, OP_EQ, dls_sample_2_str);
  534. tor_free(answer);
  535. errmsg = NULL;
  536. /* Case 3 bootstrap/FLAV_NS */
  537. memcpy(&(ns_dl_status_bootstrap[FLAV_NS]), &dls_sample_3,
  538. sizeof(download_status_t));
  539. getinfo_helper_downloads(&dummy, "downloads/networkstatus/ns/bootstrap",
  540. &answer, &errmsg);
  541. tt_assert(answer != NULL);
  542. tt_assert(errmsg == NULL);
  543. tt_str_op(answer, OP_EQ, dls_sample_3_str);
  544. tor_free(answer);
  545. errmsg = NULL;
  546. /* Case 4 bootstrap/FLAV_MICRODESC */
  547. memcpy(&(ns_dl_status_bootstrap[FLAV_MICRODESC]), &dls_sample_4,
  548. sizeof(download_status_t));
  549. getinfo_helper_downloads(&dummy,
  550. "downloads/networkstatus/microdesc/bootstrap",
  551. &answer, &errmsg);
  552. tt_assert(answer != NULL);
  553. tt_assert(errmsg == NULL);
  554. tt_str_op(answer, OP_EQ, dls_sample_4_str);
  555. tor_free(answer);
  556. errmsg = NULL;
  557. /* Case 5 running/FLAV_NS */
  558. memcpy(&(ns_dl_status_running[FLAV_NS]), &dls_sample_5,
  559. sizeof(download_status_t));
  560. getinfo_helper_downloads(&dummy,
  561. "downloads/networkstatus/ns/running",
  562. &answer, &errmsg);
  563. tt_assert(answer != NULL);
  564. tt_assert(errmsg == NULL);
  565. tt_str_op(answer, OP_EQ, dls_sample_5_str);
  566. tor_free(answer);
  567. errmsg = NULL;
  568. /* Case 6 running/FLAV_MICRODESC */
  569. memcpy(&(ns_dl_status_running[FLAV_MICRODESC]), &dls_sample_6,
  570. sizeof(download_status_t));
  571. getinfo_helper_downloads(&dummy,
  572. "downloads/networkstatus/microdesc/running",
  573. &answer, &errmsg);
  574. tt_assert(answer != NULL);
  575. tt_assert(errmsg == NULL);
  576. tt_str_op(answer, OP_EQ, dls_sample_6_str);
  577. tor_free(answer);
  578. errmsg = NULL;
  579. /* Now check the error case */
  580. getinfo_helper_downloads(&dummy, "downloads/networkstatus/foo",
  581. &answer, &errmsg);
  582. tt_assert(answer == NULL);
  583. tt_assert(errmsg != NULL);
  584. tt_str_op(errmsg, OP_EQ, "Unknown flavor");
  585. errmsg = NULL;
  586. done:
  587. clear_ns_mocks();
  588. tor_free(answer);
  589. return;
  590. }
  591. static void
  592. test_download_status_cert(void *arg)
  593. {
  594. /* We just need one of these to pass, it doesn't matter what's in it */
  595. control_connection_t dummy;
  596. /* Get results out */
  597. char *question = NULL;
  598. char *answer = NULL;
  599. const char *errmsg = NULL;
  600. (void)arg;
  601. setup_cert_mocks();
  602. /*
  603. * Check returning serialized dlstatuses and digest lists, and implicitly
  604. * also test download_status_to_string() and digest_list_to_string().
  605. */
  606. /* Case 1 - list of authority identity fingerprints */
  607. getinfo_helper_downloads(&dummy,
  608. "downloads/cert/fps",
  609. &answer, &errmsg);
  610. tt_assert(answer != NULL);
  611. tt_assert(errmsg == NULL);
  612. tt_str_op(answer, OP_EQ, auth_id_digest_expected_list);
  613. tor_free(answer);
  614. errmsg = NULL;
  615. /* Case 2 - download status for default cert for 1st auth id */
  616. memcpy(&auth_def_cert_download_status_1, &dls_sample_1,
  617. sizeof(download_status_t));
  618. tor_asprintf(&question, "downloads/cert/fp/%s", auth_id_digest_1_str);
  619. tt_assert(question != NULL);
  620. getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
  621. tt_assert(answer != NULL);
  622. tt_assert(errmsg == NULL);
  623. tt_str_op(answer, OP_EQ, dls_sample_1_str);
  624. tor_free(question);
  625. tor_free(answer);
  626. errmsg = NULL;
  627. /* Case 3 - download status for default cert for 2nd auth id */
  628. memcpy(&auth_def_cert_download_status_2, &dls_sample_2,
  629. sizeof(download_status_t));
  630. tor_asprintf(&question, "downloads/cert/fp/%s", auth_id_digest_2_str);
  631. tt_assert(question != NULL);
  632. getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
  633. tt_assert(answer != NULL);
  634. tt_assert(errmsg == NULL);
  635. tt_str_op(answer, OP_EQ, dls_sample_2_str);
  636. tor_free(question);
  637. tor_free(answer);
  638. errmsg = NULL;
  639. /* Case 4 - list of signing key digests for 1st auth id */
  640. tor_asprintf(&question, "downloads/cert/fp/%s/sks", auth_id_digest_1_str);
  641. tt_assert(question != NULL);
  642. getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
  643. tt_assert(answer != NULL);
  644. tt_assert(errmsg == NULL);
  645. tt_str_op(answer, OP_EQ, auth_1_sk_digest_expected_list);
  646. tor_free(question);
  647. tor_free(answer);
  648. errmsg = NULL;
  649. /* Case 5 - list of signing key digests for 2nd auth id */
  650. tor_asprintf(&question, "downloads/cert/fp/%s/sks", auth_id_digest_2_str);
  651. tt_assert(question != NULL);
  652. getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
  653. tt_assert(answer != NULL);
  654. tt_assert(errmsg == NULL);
  655. tt_str_op(answer, OP_EQ, auth_2_sk_digest_expected_list);
  656. tor_free(question);
  657. tor_free(answer);
  658. errmsg = NULL;
  659. /* Case 6 - download status for 1st auth id, 1st sk */
  660. memcpy(&auth_1_sk_1_dls, &dls_sample_3,
  661. sizeof(download_status_t));
  662. tor_asprintf(&question, "downloads/cert/fp/%s/%s",
  663. auth_id_digest_1_str, auth_1_sk_1_str);
  664. tt_assert(question != NULL);
  665. getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
  666. tt_assert(answer != NULL);
  667. tt_assert(errmsg == NULL);
  668. tt_str_op(answer, OP_EQ, dls_sample_3_str);
  669. tor_free(question);
  670. tor_free(answer);
  671. errmsg = NULL;
  672. /* Case 7 - download status for 1st auth id, 2nd sk */
  673. memcpy(&auth_1_sk_2_dls, &dls_sample_4,
  674. sizeof(download_status_t));
  675. tor_asprintf(&question, "downloads/cert/fp/%s/%s",
  676. auth_id_digest_1_str, auth_1_sk_2_str);
  677. tt_assert(question != NULL);
  678. getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
  679. tt_assert(answer != NULL);
  680. tt_assert(errmsg == NULL);
  681. tt_str_op(answer, OP_EQ, dls_sample_4_str);
  682. tor_free(question);
  683. tor_free(answer);
  684. errmsg = NULL;
  685. /* Case 8 - download status for 2nd auth id, 1st sk */
  686. memcpy(&auth_2_sk_1_dls, &dls_sample_5,
  687. sizeof(download_status_t));
  688. tor_asprintf(&question, "downloads/cert/fp/%s/%s",
  689. auth_id_digest_2_str, auth_2_sk_1_str);
  690. tt_assert(question != NULL);
  691. getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
  692. tt_assert(answer != NULL);
  693. tt_assert(errmsg == NULL);
  694. tt_str_op(answer, OP_EQ, dls_sample_5_str);
  695. tor_free(question);
  696. tor_free(answer);
  697. errmsg = NULL;
  698. /* Case 9 - download status for 2nd auth id, 2nd sk */
  699. memcpy(&auth_2_sk_2_dls, &dls_sample_6,
  700. sizeof(download_status_t));
  701. tor_asprintf(&question, "downloads/cert/fp/%s/%s",
  702. auth_id_digest_2_str, auth_2_sk_2_str);
  703. tt_assert(question != NULL);
  704. getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
  705. tt_assert(answer != NULL);
  706. tt_assert(errmsg == NULL);
  707. tt_str_op(answer, OP_EQ, dls_sample_6_str);
  708. tor_free(question);
  709. tor_free(answer);
  710. errmsg = NULL;
  711. /* Now check the error cases */
  712. /* Case 1 - query is garbage after downloads/cert/ part */
  713. getinfo_helper_downloads(&dummy, "downloads/cert/blahdeblah",
  714. &answer, &errmsg);
  715. tt_assert(answer == NULL);
  716. tt_assert(errmsg != NULL);
  717. tt_str_op(errmsg, OP_EQ, "Unknown certificate download status query");
  718. errmsg = NULL;
  719. /*
  720. * Case 2 - looks like downloads/cert/fp/<fp>, but <fp> isn't even
  721. * the right length for a digest.
  722. */
  723. getinfo_helper_downloads(&dummy, "downloads/cert/fp/2B1D36D32B2942406",
  724. &answer, &errmsg);
  725. tt_assert(answer == NULL);
  726. tt_assert(errmsg != NULL);
  727. tt_str_op(errmsg, OP_EQ, "That didn't look like a digest");
  728. errmsg = NULL;
  729. /*
  730. * Case 3 - looks like downloads/cert/fp/<fp>, and <fp> is digest-sized,
  731. * but not parseable as one.
  732. */
  733. getinfo_helper_downloads(&dummy,
  734. "downloads/cert/fp/82F52AF55D250115FE44D3GC81D49643241D56A1",
  735. &answer, &errmsg);
  736. tt_assert(answer == NULL);
  737. tt_assert(errmsg != NULL);
  738. tt_str_op(errmsg, OP_EQ, "That didn't look like a digest");
  739. errmsg = NULL;
  740. /*
  741. * Case 4 - downloads/cert/fp/<fp>, and <fp> is not a known authority
  742. * identity digest
  743. */
  744. getinfo_helper_downloads(&dummy,
  745. "downloads/cert/fp/AC4F23B5745BDD2A77997B85B1FD85D05C2E0F61",
  746. &answer, &errmsg);
  747. tt_assert(answer == NULL);
  748. tt_assert(errmsg != NULL);
  749. tt_str_op(errmsg, OP_EQ,
  750. "Failed to get download status for this authority identity digest");
  751. errmsg = NULL;
  752. /*
  753. * Case 5 - looks like downloads/cert/fp/<fp>/<anything>, but <fp> doesn't
  754. * parse as a sensible digest.
  755. */
  756. getinfo_helper_downloads(&dummy,
  757. "downloads/cert/fp/82F52AF55D250115FE44D3GC81D49643241D56A1/blah",
  758. &answer, &errmsg);
  759. tt_assert(answer == NULL);
  760. tt_assert(errmsg != NULL);
  761. tt_str_op(errmsg, OP_EQ, "That didn't look like an identity digest");
  762. errmsg = NULL;
  763. /*
  764. * Case 6 - looks like downloads/cert/fp/<fp>/<anything>, but <fp> doesn't
  765. * parse as a sensible digest.
  766. */
  767. getinfo_helper_downloads(&dummy,
  768. "downloads/cert/fp/82F52AF55D25/blah",
  769. &answer, &errmsg);
  770. tt_assert(answer == NULL);
  771. tt_assert(errmsg != NULL);
  772. tt_str_op(errmsg, OP_EQ, "That didn't look like an identity digest");
  773. errmsg = NULL;
  774. /*
  775. * Case 7 - downloads/cert/fp/<fp>/sks, and <fp> is not a known authority
  776. * digest.
  777. */
  778. getinfo_helper_downloads(&dummy,
  779. "downloads/cert/fp/AC4F23B5745BDD2A77997B85B1FD85D05C2E0F61/sks",
  780. &answer, &errmsg);
  781. tt_assert(answer == NULL);
  782. tt_assert(errmsg != NULL);
  783. tt_str_op(errmsg, OP_EQ,
  784. "Failed to get list of signing key digests for this authority "
  785. "identity digest");
  786. errmsg = NULL;
  787. /*
  788. * Case 8 - looks like downloads/cert/fp/<fp>/<sk>, but <sk> doesn't
  789. * parse as a signing key digest.
  790. */
  791. getinfo_helper_downloads(&dummy,
  792. "downloads/cert/fp/AC4F23B5745BDD2A77997B85B1FD85D05C2E0F61/"
  793. "82F52AF55D250115FE44D3GC81D49643241D56A1",
  794. &answer, &errmsg);
  795. tt_assert(answer == NULL);
  796. tt_assert(errmsg != NULL);
  797. tt_str_op(errmsg, OP_EQ, "That didn't look like a signing key digest");
  798. errmsg = NULL;
  799. /*
  800. * Case 9 - looks like downloads/cert/fp/<fp>/<sk>, but <sk> doesn't
  801. * parse as a signing key digest.
  802. */
  803. getinfo_helper_downloads(&dummy,
  804. "downloads/cert/fp/AC4F23B5745BDD2A77997B85B1FD85D05C2E0F61/"
  805. "82F52AF55D250115FE44D",
  806. &answer, &errmsg);
  807. tt_assert(answer == NULL);
  808. tt_assert(errmsg != NULL);
  809. tt_str_op(errmsg, OP_EQ, "That didn't look like a signing key digest");
  810. errmsg = NULL;
  811. /*
  812. * Case 10 - downloads/cert/fp/<fp>/<sk>, but <fp> isn't a known
  813. * authority identity digest.
  814. */
  815. getinfo_helper_downloads(&dummy,
  816. "downloads/cert/fp/C6B05DF332F74DB9A13498EE3BBC7AA2F69FCB45/"
  817. "3A214FC21AE25B012C2ECCB5F4EC8A3602D0545D",
  818. &answer, &errmsg);
  819. tt_assert(answer == NULL);
  820. tt_assert(errmsg != NULL);
  821. tt_str_op(errmsg, OP_EQ,
  822. "Failed to get download status for this identity/"
  823. "signing key digest pair");
  824. errmsg = NULL;
  825. /*
  826. * Case 11 - downloads/cert/fp/<fp>/<sk>, but <sk> isn't a known
  827. * signing key digest.
  828. */
  829. getinfo_helper_downloads(&dummy,
  830. "downloads/cert/fp/63CDD326DFEF0CA020BDD3FEB45A3286FE13A061/"
  831. "3A214FC21AE25B012C2ECCB5F4EC8A3602D0545D",
  832. &answer, &errmsg);
  833. tt_assert(answer == NULL);
  834. tt_assert(errmsg != NULL);
  835. tt_str_op(errmsg, OP_EQ,
  836. "Failed to get download status for this identity/"
  837. "signing key digest pair");
  838. errmsg = NULL;
  839. /*
  840. * Case 12 - downloads/cert/fp/<fp>/<sk>, but <sk> is on the list for
  841. * a different authority identity digest.
  842. */
  843. getinfo_helper_downloads(&dummy,
  844. "downloads/cert/fp/63CDD326DFEF0CA020BDD3FEB45A3286FE13A061/"
  845. "9451B8F1B10952384EB58B5F230C0BB701626C9B",
  846. &answer, &errmsg);
  847. tt_assert(answer == NULL);
  848. tt_assert(errmsg != NULL);
  849. tt_str_op(errmsg, OP_EQ,
  850. "Failed to get download status for this identity/"
  851. "signing key digest pair");
  852. errmsg = NULL;
  853. done:
  854. clear_cert_mocks();
  855. tor_free(answer);
  856. return;
  857. }
  858. struct testcase_t controller_tests[] = {
  859. { "add_onion_helper_keyarg", test_add_onion_helper_keyarg, 0, NULL, NULL },
  860. { "rend_service_parse_port_config", test_rend_service_parse_port_config, 0,
  861. NULL, NULL },
  862. { "add_onion_helper_clientauth", test_add_onion_helper_clientauth, 0, NULL,
  863. NULL },
  864. { "download_status_consensus", test_download_status_consensus, 0, NULL,
  865. NULL },
  866. { "download_status_cert", test_download_status_cert, 0, NULL,
  867. NULL },
  868. END_OF_TESTCASES
  869. };