test_pt.c 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550
  1. /* Copyright (c) 2001-2004, Roger Dingledine.
  2. * Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
  3. * Copyright (c) 2007-2018, The Tor Project, Inc. */
  4. /* See LICENSE for licensing information */
  5. #include "orconfig.h"
  6. #define PT_PRIVATE
  7. #define UTIL_PRIVATE
  8. #define STATEFILE_PRIVATE
  9. #define CONTROL_PRIVATE
  10. #define SUBPROCESS_PRIVATE
  11. #include "or/or.h"
  12. #include "or/config.h"
  13. #include "or/confparse.h"
  14. #include "or/control.h"
  15. #include "or/transports.h"
  16. #include "or/circuitbuild.h"
  17. #include "or/statefile.h"
  18. #include "test/test.h"
  19. #include "lib/process/subprocess.h"
  20. #include "lib/encoding/confline.h"
  21. #include "or/or_state_st.h"
  22. static void
  23. reset_mp(managed_proxy_t *mp)
  24. {
  25. mp->conf_state = PT_PROTO_LAUNCHED;
  26. SMARTLIST_FOREACH(mp->transports, transport_t *, t, transport_free(t));
  27. smartlist_clear(mp->transports);
  28. }
  29. static void
  30. test_pt_parsing(void *arg)
  31. {
  32. char line[200];
  33. transport_t *transport = NULL;
  34. tor_addr_t test_addr;
  35. managed_proxy_t *mp = tor_malloc_zero(sizeof(managed_proxy_t));
  36. (void)arg;
  37. mp->conf_state = PT_PROTO_INFANT;
  38. mp->transports = smartlist_new();
  39. /* incomplete cmethod */
  40. strlcpy(line,"CMETHOD trebuchet",sizeof(line));
  41. tt_int_op(parse_cmethod_line(line, mp), OP_LT, 0);
  42. reset_mp(mp);
  43. /* wrong proxy type */
  44. strlcpy(line,"CMETHOD trebuchet dog 127.0.0.1:1999",sizeof(line));
  45. tt_int_op(parse_cmethod_line(line, mp), OP_LT, 0);
  46. reset_mp(mp);
  47. /* wrong addrport */
  48. strlcpy(line,"CMETHOD trebuchet socks4 abcd",sizeof(line));
  49. tt_int_op(parse_cmethod_line(line, mp), OP_LT, 0);
  50. reset_mp(mp);
  51. /* correct line */
  52. strlcpy(line,"CMETHOD trebuchet socks5 127.0.0.1:1999",sizeof(line));
  53. tt_int_op(parse_cmethod_line(line, mp), OP_EQ, 0);
  54. tt_int_op(smartlist_len(mp->transports), OP_EQ, 1);
  55. transport = smartlist_get(mp->transports, 0);
  56. /* test registered address of transport */
  57. tor_addr_parse(&test_addr, "127.0.0.1");
  58. tt_assert(tor_addr_eq(&test_addr, &transport->addr));
  59. /* test registered port of transport */
  60. tt_uint_op(transport->port, OP_EQ, 1999);
  61. /* test registered SOCKS version of transport */
  62. tt_int_op(transport->socks_version, OP_EQ, PROXY_SOCKS5);
  63. /* test registered name of transport */
  64. tt_str_op(transport->name,OP_EQ, "trebuchet");
  65. reset_mp(mp);
  66. /* incomplete smethod */
  67. strlcpy(line,"SMETHOD trebuchet",sizeof(line));
  68. tt_int_op(parse_smethod_line(line, mp), OP_LT, 0);
  69. reset_mp(mp);
  70. /* wrong addr type */
  71. strlcpy(line,"SMETHOD trebuchet abcd",sizeof(line));
  72. tt_int_op(parse_smethod_line(line, mp), OP_LT, 0);
  73. reset_mp(mp);
  74. /* cowwect */
  75. strlcpy(line,"SMETHOD trebuchy 127.0.0.2:2999",sizeof(line));
  76. tt_int_op(parse_smethod_line(line, mp), OP_EQ, 0);
  77. tt_int_op(smartlist_len(mp->transports), OP_EQ, 1);
  78. transport = smartlist_get(mp->transports, 0);
  79. /* test registered address of transport */
  80. tor_addr_parse(&test_addr, "127.0.0.2");
  81. tt_assert(tor_addr_eq(&test_addr, &transport->addr));
  82. /* test registered port of transport */
  83. tt_uint_op(transport->port, OP_EQ, 2999);
  84. /* test registered name of transport */
  85. tt_str_op(transport->name,OP_EQ, "trebuchy");
  86. reset_mp(mp);
  87. /* Include some arguments. Good ones. */
  88. strlcpy(line,"SMETHOD trebuchet 127.0.0.1:9999 "
  89. "ARGS:counterweight=3,sling=snappy",
  90. sizeof(line));
  91. tt_int_op(parse_smethod_line(line, mp), OP_EQ, 0);
  92. tt_int_op(1, OP_EQ, smartlist_len(mp->transports));
  93. {
  94. const transport_t *transport_ = smartlist_get(mp->transports, 0);
  95. tt_assert(transport_);
  96. tt_str_op(transport_->name, OP_EQ, "trebuchet");
  97. tt_int_op(transport_->port, OP_EQ, 9999);
  98. tt_str_op(fmt_addr(&transport_->addr), OP_EQ, "127.0.0.1");
  99. tt_str_op(transport_->extra_info_args, OP_EQ,
  100. "counterweight=3,sling=snappy");
  101. }
  102. reset_mp(mp);
  103. /* unsupported version */
  104. strlcpy(line,"VERSION 666",sizeof(line));
  105. tt_int_op(parse_version(line, mp), OP_LT, 0);
  106. /* incomplete VERSION */
  107. strlcpy(line,"VERSION ",sizeof(line));
  108. tt_int_op(parse_version(line, mp), OP_LT, 0);
  109. /* correct VERSION */
  110. strlcpy(line,"VERSION 1",sizeof(line));
  111. tt_int_op(parse_version(line, mp), OP_EQ, 0);
  112. done:
  113. reset_mp(mp);
  114. smartlist_free(mp->transports);
  115. tor_free(mp);
  116. }
  117. static void
  118. test_pt_get_transport_options(void *arg)
  119. {
  120. char **execve_args;
  121. smartlist_t *transport_list = smartlist_new();
  122. managed_proxy_t *mp;
  123. or_options_t *options = get_options_mutable();
  124. char *opt_str = NULL;
  125. config_line_t *cl = NULL;
  126. (void)arg;
  127. execve_args = tor_malloc(sizeof(char*)*2);
  128. execve_args[0] = tor_strdup("cheeseshop");
  129. execve_args[1] = NULL;
  130. mp = managed_proxy_create(transport_list, execve_args, 1);
  131. tt_ptr_op(mp, OP_NE, NULL);
  132. opt_str = get_transport_options_for_server_proxy(mp);
  133. tt_ptr_op(opt_str, OP_EQ, NULL);
  134. smartlist_add_strdup(mp->transports_to_launch, "gruyere");
  135. smartlist_add_strdup(mp->transports_to_launch, "roquefort");
  136. smartlist_add_strdup(mp->transports_to_launch, "stnectaire");
  137. tt_assert(options);
  138. cl = tor_malloc_zero(sizeof(config_line_t));
  139. cl->value = tor_strdup("gruyere melty=10 hardness=se;ven");
  140. options->ServerTransportOptions = cl;
  141. cl = tor_malloc_zero(sizeof(config_line_t));
  142. cl->value = tor_strdup("stnectaire melty=4 hardness=three");
  143. cl->next = options->ServerTransportOptions;
  144. options->ServerTransportOptions = cl;
  145. cl = tor_malloc_zero(sizeof(config_line_t));
  146. cl->value = tor_strdup("pepperjack melty=12 hardness=five");
  147. cl->next = options->ServerTransportOptions;
  148. options->ServerTransportOptions = cl;
  149. opt_str = get_transport_options_for_server_proxy(mp);
  150. tt_str_op(opt_str, OP_EQ,
  151. "gruyere:melty=10;gruyere:hardness=se\\;ven;"
  152. "stnectaire:melty=4;stnectaire:hardness=three");
  153. done:
  154. tor_free(opt_str);
  155. config_free_lines(cl);
  156. managed_proxy_destroy(mp, 0);
  157. smartlist_free(transport_list);
  158. }
  159. static void
  160. test_pt_protocol(void *arg)
  161. {
  162. char line[200];
  163. managed_proxy_t *mp = tor_malloc_zero(sizeof(managed_proxy_t));
  164. (void)arg;
  165. mp->conf_state = PT_PROTO_LAUNCHED;
  166. mp->transports = smartlist_new();
  167. mp->argv = tor_calloc(2, sizeof(char *));
  168. mp->argv[0] = tor_strdup("<testcase>");
  169. /* various wrong protocol runs: */
  170. strlcpy(line,"VERSION 1",sizeof(line));
  171. handle_proxy_line(line, mp);
  172. tt_assert(mp->conf_state == PT_PROTO_ACCEPTING_METHODS);
  173. strlcpy(line,"VERSION 1",sizeof(line));
  174. handle_proxy_line(line, mp);
  175. tt_assert(mp->conf_state == PT_PROTO_BROKEN);
  176. reset_mp(mp);
  177. strlcpy(line,"CMETHOD trebuchet socks5 127.0.0.1:1999",sizeof(line));
  178. handle_proxy_line(line, mp);
  179. tt_assert(mp->conf_state == PT_PROTO_BROKEN);
  180. reset_mp(mp);
  181. /* correct protocol run: */
  182. strlcpy(line,"VERSION 1",sizeof(line));
  183. handle_proxy_line(line, mp);
  184. tt_assert(mp->conf_state == PT_PROTO_ACCEPTING_METHODS);
  185. strlcpy(line,"CMETHOD trebuchet socks5 127.0.0.1:1999",sizeof(line));
  186. handle_proxy_line(line, mp);
  187. tt_assert(mp->conf_state == PT_PROTO_ACCEPTING_METHODS);
  188. strlcpy(line,"CMETHODS DONE",sizeof(line));
  189. handle_proxy_line(line, mp);
  190. tt_assert(mp->conf_state == PT_PROTO_CONFIGURED);
  191. done:
  192. reset_mp(mp);
  193. smartlist_free(mp->transports);
  194. tor_free(mp->argv[0]);
  195. tor_free(mp->argv);
  196. tor_free(mp);
  197. }
  198. static void
  199. test_pt_get_extrainfo_string(void *arg)
  200. {
  201. managed_proxy_t *mp1 = NULL, *mp2 = NULL;
  202. char **argv1, **argv2;
  203. smartlist_t *t1 = smartlist_new(), *t2 = smartlist_new();
  204. int r;
  205. char *s = NULL;
  206. (void) arg;
  207. argv1 = tor_malloc_zero(sizeof(char*)*3);
  208. argv1[0] = tor_strdup("ewige");
  209. argv1[1] = tor_strdup("Blumenkraft");
  210. argv1[2] = NULL;
  211. argv2 = tor_malloc_zero(sizeof(char*)*4);
  212. argv2[0] = tor_strdup("und");
  213. argv2[1] = tor_strdup("ewige");
  214. argv2[2] = tor_strdup("Schlangenkraft");
  215. argv2[3] = NULL;
  216. mp1 = managed_proxy_create(t1, argv1, 1);
  217. mp2 = managed_proxy_create(t2, argv2, 1);
  218. r = parse_smethod_line("SMETHOD hagbard 127.0.0.1:5555", mp1);
  219. tt_int_op(r, OP_EQ, 0);
  220. r = parse_smethod_line("SMETHOD celine 127.0.0.1:1723 ARGS:card=no-enemy",
  221. mp2);
  222. tt_int_op(r, OP_EQ, 0);
  223. /* Force these proxies to look "completed" or they won't generate output. */
  224. mp1->conf_state = mp2->conf_state = PT_PROTO_COMPLETED;
  225. s = pt_get_extra_info_descriptor_string();
  226. tt_assert(s);
  227. tt_str_op(s, OP_EQ,
  228. "transport hagbard 127.0.0.1:5555\n"
  229. "transport celine 127.0.0.1:1723 card=no-enemy\n");
  230. done:
  231. /* XXXX clean up better */
  232. smartlist_free(t1);
  233. smartlist_free(t2);
  234. tor_free(s);
  235. }
  236. #ifdef _WIN32
  237. #define STDIN_HANDLE HANDLE*
  238. #else
  239. #define STDIN_HANDLE int
  240. #endif
  241. static smartlist_t *
  242. tor_get_lines_from_handle_replacement(STDIN_HANDLE handle,
  243. enum stream_status *stream_status_out)
  244. {
  245. static int times_called = 0;
  246. smartlist_t *retval_sl = smartlist_new();
  247. (void) handle;
  248. (void) stream_status_out;
  249. /* Generate some dummy CMETHOD lines the first 5 times. The 6th
  250. time, send 'CMETHODS DONE' to finish configuring the proxy. */
  251. if (times_called++ != 5) {
  252. smartlist_add_asprintf(retval_sl, "SMETHOD mock%d 127.0.0.1:555%d",
  253. times_called, times_called);
  254. } else {
  255. smartlist_add_strdup(retval_sl, "SMETHODS DONE");
  256. }
  257. return retval_sl;
  258. }
  259. /* NOP mock */
  260. static void
  261. tor_process_handle_destroy_replacement(process_handle_t *process_handle,
  262. int also_terminate_process)
  263. {
  264. (void) process_handle;
  265. (void) also_terminate_process;
  266. }
  267. static or_state_t *dummy_state = NULL;
  268. static or_state_t *
  269. get_or_state_replacement(void)
  270. {
  271. return dummy_state;
  272. }
  273. static int controlevent_n = 0;
  274. static uint16_t controlevent_event = 0;
  275. static smartlist_t *controlevent_msgs = NULL;
  276. static void
  277. queue_control_event_string_replacement(uint16_t event, char *msg)
  278. {
  279. ++controlevent_n;
  280. controlevent_event = event;
  281. if (!controlevent_msgs)
  282. controlevent_msgs = smartlist_new();
  283. smartlist_add(controlevent_msgs, msg);
  284. }
  285. /* Test the configure_proxy() function. */
  286. static void
  287. test_pt_configure_proxy(void *arg)
  288. {
  289. int i, retval;
  290. managed_proxy_t *mp = NULL;
  291. (void) arg;
  292. dummy_state = tor_malloc_zero(sizeof(or_state_t));
  293. MOCK(tor_get_lines_from_handle,
  294. tor_get_lines_from_handle_replacement);
  295. MOCK(tor_process_handle_destroy,
  296. tor_process_handle_destroy_replacement);
  297. MOCK(get_or_state,
  298. get_or_state_replacement);
  299. MOCK(queue_control_event_string,
  300. queue_control_event_string_replacement);
  301. control_testing_set_global_event_mask(EVENT_TRANSPORT_LAUNCHED);
  302. mp = tor_malloc_zero(sizeof(managed_proxy_t));
  303. mp->conf_state = PT_PROTO_ACCEPTING_METHODS;
  304. mp->transports = smartlist_new();
  305. mp->transports_to_launch = smartlist_new();
  306. mp->process_handle = tor_malloc_zero(sizeof(process_handle_t));
  307. mp->argv = tor_malloc_zero(sizeof(char*)*2);
  308. mp->argv[0] = tor_strdup("<testcase>");
  309. mp->is_server = 1;
  310. /* Test the return value of configure_proxy() by calling it some
  311. times while it is uninitialized and then finally finalizing its
  312. configuration. */
  313. for (i = 0 ; i < 5 ; i++) {
  314. retval = configure_proxy(mp);
  315. /* retval should be zero because proxy hasn't finished configuring yet */
  316. tt_int_op(retval, OP_EQ, 0);
  317. /* check the number of registered transports */
  318. tt_assert(smartlist_len(mp->transports) == i+1);
  319. /* check that the mp is still waiting for transports */
  320. tt_assert(mp->conf_state == PT_PROTO_ACCEPTING_METHODS);
  321. }
  322. /* this last configure_proxy() should finalize the proxy configuration. */
  323. retval = configure_proxy(mp);
  324. /* retval should be 1 since the proxy finished configuring */
  325. tt_int_op(retval, OP_EQ, 1);
  326. /* check the mp state */
  327. tt_assert(mp->conf_state == PT_PROTO_COMPLETED);
  328. tt_int_op(controlevent_n, OP_EQ, 5);
  329. tt_int_op(controlevent_event, OP_EQ, EVENT_TRANSPORT_LAUNCHED);
  330. tt_int_op(smartlist_len(controlevent_msgs), OP_EQ, 5);
  331. smartlist_sort_strings(controlevent_msgs);
  332. tt_str_op(smartlist_get(controlevent_msgs, 0), OP_EQ,
  333. "650 TRANSPORT_LAUNCHED server mock1 127.0.0.1 5551\r\n");
  334. tt_str_op(smartlist_get(controlevent_msgs, 1), OP_EQ,
  335. "650 TRANSPORT_LAUNCHED server mock2 127.0.0.1 5552\r\n");
  336. tt_str_op(smartlist_get(controlevent_msgs, 2), OP_EQ,
  337. "650 TRANSPORT_LAUNCHED server mock3 127.0.0.1 5553\r\n");
  338. tt_str_op(smartlist_get(controlevent_msgs, 3), OP_EQ,
  339. "650 TRANSPORT_LAUNCHED server mock4 127.0.0.1 5554\r\n");
  340. tt_str_op(smartlist_get(controlevent_msgs, 4), OP_EQ,
  341. "650 TRANSPORT_LAUNCHED server mock5 127.0.0.1 5555\r\n");
  342. { /* check that the transport info were saved properly in the tor state */
  343. config_line_t *transport_in_state = NULL;
  344. smartlist_t *transport_info_sl = smartlist_new();
  345. char *name_of_transport = NULL;
  346. char *bindaddr = NULL;
  347. /* Get the bindaddr for "mock1" and check it against the bindaddr
  348. that the mocked tor_get_lines_from_handle() generated. */
  349. transport_in_state = get_transport_in_state_by_name("mock1");
  350. tt_assert(transport_in_state);
  351. smartlist_split_string(transport_info_sl, transport_in_state->value,
  352. NULL, 0, 0);
  353. name_of_transport = smartlist_get(transport_info_sl, 0);
  354. bindaddr = smartlist_get(transport_info_sl, 1);
  355. tt_str_op(name_of_transport, OP_EQ, "mock1");
  356. tt_str_op(bindaddr, OP_EQ, "127.0.0.1:5551");
  357. SMARTLIST_FOREACH(transport_info_sl, char *, cp, tor_free(cp));
  358. smartlist_free(transport_info_sl);
  359. }
  360. done:
  361. or_state_free(dummy_state);
  362. UNMOCK(tor_get_lines_from_handle);
  363. UNMOCK(tor_process_handle_destroy);
  364. UNMOCK(get_or_state);
  365. UNMOCK(queue_control_event_string);
  366. if (controlevent_msgs) {
  367. SMARTLIST_FOREACH(controlevent_msgs, char *, cp, tor_free(cp));
  368. smartlist_free(controlevent_msgs);
  369. controlevent_msgs = NULL;
  370. }
  371. if (mp->transports) {
  372. SMARTLIST_FOREACH(mp->transports, transport_t *, t, transport_free(t));
  373. smartlist_free(mp->transports);
  374. }
  375. smartlist_free(mp->transports_to_launch);
  376. tor_free(mp->process_handle);
  377. tor_free(mp->argv[0]);
  378. tor_free(mp->argv);
  379. tor_free(mp);
  380. }
  381. /* Test the get_pt_proxy_uri() function. */
  382. static void
  383. test_get_pt_proxy_uri(void *arg)
  384. {
  385. or_options_t *options = get_options_mutable();
  386. char *uri = NULL;
  387. int ret;
  388. (void) arg;
  389. /* Test with no proxy. */
  390. uri = get_pt_proxy_uri();
  391. tt_ptr_op(uri, OP_EQ, NULL);
  392. /* Test with a SOCKS4 proxy. */
  393. options->Socks4Proxy = tor_strdup("192.0.2.1:1080");
  394. ret = tor_addr_port_lookup(options->Socks4Proxy,
  395. &options->Socks4ProxyAddr,
  396. &options->Socks4ProxyPort);
  397. tt_int_op(ret, OP_EQ, 0);
  398. uri = get_pt_proxy_uri();
  399. tt_str_op(uri, OP_EQ, "socks4a://192.0.2.1:1080");
  400. tor_free(uri);
  401. tor_free(options->Socks4Proxy);
  402. /* Test with a SOCKS5 proxy, no username/password. */
  403. options->Socks5Proxy = tor_strdup("192.0.2.1:1080");
  404. ret = tor_addr_port_lookup(options->Socks5Proxy,
  405. &options->Socks5ProxyAddr,
  406. &options->Socks5ProxyPort);
  407. tt_int_op(ret, OP_EQ, 0);
  408. uri = get_pt_proxy_uri();
  409. tt_str_op(uri, OP_EQ, "socks5://192.0.2.1:1080");
  410. tor_free(uri);
  411. /* Test with a SOCKS5 proxy, with username/password. */
  412. options->Socks5ProxyUsername = tor_strdup("hwest");
  413. options->Socks5ProxyPassword = tor_strdup("r34n1m470r");
  414. uri = get_pt_proxy_uri();
  415. tt_str_op(uri, OP_EQ, "socks5://hwest:r34n1m470r@192.0.2.1:1080");
  416. tor_free(uri);
  417. tor_free(options->Socks5Proxy);
  418. tor_free(options->Socks5ProxyUsername);
  419. tor_free(options->Socks5ProxyPassword);
  420. /* Test with a HTTPS proxy, no authenticator. */
  421. options->HTTPSProxy = tor_strdup("192.0.2.1:80");
  422. ret = tor_addr_port_lookup(options->HTTPSProxy,
  423. &options->HTTPSProxyAddr,
  424. &options->HTTPSProxyPort);
  425. tt_int_op(ret, OP_EQ, 0);
  426. uri = get_pt_proxy_uri();
  427. tt_str_op(uri, OP_EQ, "http://192.0.2.1:80");
  428. tor_free(uri);
  429. /* Test with a HTTPS proxy, with authenticator. */
  430. options->HTTPSProxyAuthenticator = tor_strdup("hwest:r34n1m470r");
  431. uri = get_pt_proxy_uri();
  432. tt_str_op(uri, OP_EQ, "http://hwest:r34n1m470r@192.0.2.1:80");
  433. tor_free(uri);
  434. tor_free(options->HTTPSProxy);
  435. tor_free(options->HTTPSProxyAuthenticator);
  436. /* Token nod to the fact that IPv6 exists. */
  437. options->Socks4Proxy = tor_strdup("[2001:db8::1]:1080");
  438. ret = tor_addr_port_lookup(options->Socks4Proxy,
  439. &options->Socks4ProxyAddr,
  440. &options->Socks4ProxyPort);
  441. tt_int_op(ret, OP_EQ, 0);
  442. uri = get_pt_proxy_uri();
  443. tt_str_op(uri, OP_EQ, "socks4a://[2001:db8::1]:1080");
  444. tor_free(uri);
  445. tor_free(options->Socks4Proxy);
  446. done:
  447. if (uri)
  448. tor_free(uri);
  449. }
  450. #define PT_LEGACY(name) \
  451. { #name, test_pt_ ## name , 0, NULL, NULL }
  452. struct testcase_t pt_tests[] = {
  453. PT_LEGACY(parsing),
  454. PT_LEGACY(protocol),
  455. { "get_transport_options", test_pt_get_transport_options, TT_FORK,
  456. NULL, NULL },
  457. { "get_extrainfo_string", test_pt_get_extrainfo_string, TT_FORK,
  458. NULL, NULL },
  459. { "configure_proxy",test_pt_configure_proxy, TT_FORK,
  460. NULL, NULL },
  461. { "get_pt_proxy_uri", test_get_pt_proxy_uri, TT_FORK,
  462. NULL, NULL },
  463. END_OF_TESTCASES
  464. };