test_routerkeys.c 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527
  1. /* Copyright (c) 2001-2004, Roger Dingledine.
  2. * Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
  3. * Copyright (c) 2007-2015, The Tor Project, Inc. */
  4. /* See LICENSE for licensing information */
  5. #include "orconfig.h"
  6. #define ROUTER_PRIVATE
  7. #include "or.h"
  8. #include "config.h"
  9. #include "router.h"
  10. #include "routerkeys.h"
  11. #include "util.h"
  12. #include "crypto.h"
  13. #include "torcert.h"
  14. #include "test.h"
  15. #ifdef _WIN32
  16. /* For mkdir() */
  17. #include <direct.h>
  18. #endif
  19. static void
  20. test_routerkeys_write_fingerprint(void *arg)
  21. {
  22. crypto_pk_t *key = pk_generate(2);
  23. or_options_t *options = get_options_mutable();
  24. const char *ddir = get_fname("write_fingerprint");
  25. char *cp = NULL, *cp2 = NULL;
  26. char fp[FINGERPRINT_LEN+1];
  27. (void)arg;
  28. tt_assert(key);
  29. options->ORPort_set = 1; /* So that we can get the server ID key */
  30. tor_free(options->DataDirectory);
  31. options->DataDirectory = tor_strdup(ddir);
  32. options->Nickname = tor_strdup("haflinger");
  33. set_server_identity_key(key);
  34. set_client_identity_key(crypto_pk_dup_key(key));
  35. tt_int_op(0, OP_EQ, check_private_dir(ddir, CPD_CREATE, NULL));
  36. tt_int_op(crypto_pk_cmp_keys(get_server_identity_key(),key),OP_EQ,0);
  37. /* Write fingerprint file */
  38. tt_int_op(0, OP_EQ, router_write_fingerprint(0));
  39. cp = read_file_to_str(get_fname("write_fingerprint/fingerprint"),
  40. 0, NULL);
  41. crypto_pk_get_fingerprint(key, fp, 0);
  42. tor_asprintf(&cp2, "haflinger %s\n", fp);
  43. tt_str_op(cp, OP_EQ, cp2);
  44. tor_free(cp);
  45. tor_free(cp2);
  46. /* Write hashed-fingerprint file */
  47. tt_int_op(0, OP_EQ, router_write_fingerprint(1));
  48. cp = read_file_to_str(get_fname("write_fingerprint/hashed-fingerprint"),
  49. 0, NULL);
  50. crypto_pk_get_hashed_fingerprint(key, fp);
  51. tor_asprintf(&cp2, "haflinger %s\n", fp);
  52. tt_str_op(cp, OP_EQ, cp2);
  53. tor_free(cp);
  54. tor_free(cp2);
  55. /* Replace outdated file */
  56. write_str_to_file(get_fname("write_fingerprint/hashed-fingerprint"),
  57. "junk goes here", 0);
  58. tt_int_op(0, OP_EQ, router_write_fingerprint(1));
  59. cp = read_file_to_str(get_fname("write_fingerprint/hashed-fingerprint"),
  60. 0, NULL);
  61. crypto_pk_get_hashed_fingerprint(key, fp);
  62. tor_asprintf(&cp2, "haflinger %s\n", fp);
  63. tt_str_op(cp, OP_EQ, cp2);
  64. tor_free(cp);
  65. tor_free(cp2);
  66. done:
  67. crypto_pk_free(key);
  68. set_client_identity_key(NULL);
  69. tor_free(cp);
  70. tor_free(cp2);
  71. }
  72. static void
  73. test_routerkeys_ed_certs(void *args)
  74. {
  75. (void)args;
  76. ed25519_keypair_t kp1, kp2;
  77. tor_cert_t *cert[2] = {NULL, NULL};
  78. tor_cert_t *parsed_cert[2] = {NULL, NULL};
  79. time_t now = 1412094534;
  80. uint8_t *junk = NULL;
  81. tt_int_op(0,==,ed25519_keypair_generate(&kp1, 0));
  82. tt_int_op(0,==,ed25519_keypair_generate(&kp2, 0));
  83. for (int i = 0; i <= 1; ++i) {
  84. uint32_t flags = i ? CERT_FLAG_INCLUDE_SIGNING_KEY : 0;
  85. cert[i] = tor_cert_create(&kp1, 5, &kp2.pubkey, now, 10000, flags);
  86. tt_assert(cert[i]);
  87. tt_assert(cert[i]->sig_bad == 0);
  88. tt_assert(cert[i]->sig_ok == 1);
  89. tt_assert(cert[i]->cert_expired == 0);
  90. tt_assert(cert[i]->cert_valid == 1);
  91. tt_int_op(cert[i]->cert_type, ==, 5);
  92. tt_mem_op(cert[i]->signed_key.pubkey, ==, &kp2.pubkey.pubkey, 32);
  93. tt_mem_op(cert[i]->signing_key.pubkey, ==, &kp1.pubkey.pubkey, 32);
  94. tt_int_op(cert[i]->signing_key_included, ==, i);
  95. tt_assert(cert[i]->encoded);
  96. tt_int_op(cert[i]->encoded_len, ==, 104 + 36 * i);
  97. tt_int_op(cert[i]->encoded[0], ==, 1);
  98. tt_int_op(cert[i]->encoded[1], ==, 5);
  99. parsed_cert[i] = tor_cert_parse(cert[i]->encoded, cert[i]->encoded_len);
  100. tt_assert(parsed_cert[i]);
  101. tt_int_op(cert[i]->encoded_len, ==, parsed_cert[i]->encoded_len);
  102. tt_mem_op(cert[i]->encoded, ==, parsed_cert[i]->encoded,
  103. cert[i]->encoded_len);
  104. tt_assert(parsed_cert[i]->sig_bad == 0);
  105. tt_assert(parsed_cert[i]->sig_ok == 0);
  106. tt_assert(parsed_cert[i]->cert_expired == 0);
  107. tt_assert(parsed_cert[i]->cert_valid == 0);
  108. /* Expired */
  109. tt_int_op(tor_cert_checksig(parsed_cert[i], &kp1.pubkey, now + 30000),
  110. <, 0);
  111. tt_assert(parsed_cert[i]->cert_expired == 1);
  112. parsed_cert[i]->cert_expired = 0;
  113. /* Wrong key */
  114. tt_int_op(tor_cert_checksig(parsed_cert[i], &kp2.pubkey, now), <, 0);
  115. tt_assert(parsed_cert[i]->sig_bad== 1);
  116. parsed_cert[i]->sig_bad = 0;
  117. /* Missing key */
  118. int ok = tor_cert_checksig(parsed_cert[i], NULL, now);
  119. tt_int_op(ok < 0, ==, i == 0);
  120. tt_assert(parsed_cert[i]->sig_bad == 0);
  121. tt_assert(parsed_cert[i]->sig_ok == (i != 0));
  122. tt_assert(parsed_cert[i]->cert_valid == (i != 0));
  123. parsed_cert[i]->sig_bad = 0;
  124. parsed_cert[i]->sig_ok = 0;
  125. parsed_cert[i]->cert_valid = 0;
  126. /* Right key */
  127. tt_int_op(tor_cert_checksig(parsed_cert[i], &kp1.pubkey, now), ==, 0);
  128. tt_assert(parsed_cert[i]->sig_bad == 0);
  129. tt_assert(parsed_cert[i]->sig_ok == 1);
  130. tt_assert(parsed_cert[i]->cert_expired == 0);
  131. tt_assert(parsed_cert[i]->cert_valid == 1);
  132. }
  133. /* Now try some junky certs. */
  134. /* - Truncated */
  135. tt_ptr_op(NULL, ==,tor_cert_parse(cert[0]->encoded, cert[0]->encoded_len-1));
  136. /* - First byte modified */
  137. cert[0]->encoded[0] = 99;
  138. tt_ptr_op(NULL, ==,tor_cert_parse(cert[0]->encoded, cert[0]->encoded_len));
  139. cert[0]->encoded[0] = 1;
  140. /* - Extra byte at the end*/
  141. junk = tor_malloc_zero(cert[0]->encoded_len + 1);
  142. memcpy(junk, cert[0]->encoded, cert[0]->encoded_len);
  143. tt_ptr_op(NULL, ==, tor_cert_parse(junk, cert[0]->encoded_len+1));
  144. /* - Multiple signing key instances */
  145. tor_free(junk);
  146. junk = tor_malloc_zero(104 + 36 * 2);
  147. junk[0] = 1; /* version */
  148. junk[1] = 5; /* cert type */
  149. junk[6] = 1; /* key type */
  150. junk[39] = 2; /* n_extensions */
  151. junk[41] = 32; /* extlen */
  152. junk[42] = 4; /* exttype */
  153. junk[77] = 32; /* extlen */
  154. junk[78] = 4; /* exttype */
  155. tt_ptr_op(NULL, ==, tor_cert_parse(junk, 104 + 36 * 2));
  156. done:
  157. tor_cert_free(cert[0]);
  158. tor_cert_free(cert[1]);
  159. tor_cert_free(parsed_cert[0]);
  160. tor_cert_free(parsed_cert[1]);
  161. tor_free(junk);
  162. }
  163. static void
  164. test_routerkeys_ed_key_create(void *arg)
  165. {
  166. (void)arg;
  167. tor_cert_t *cert = NULL;
  168. ed25519_keypair_t *kp1 = NULL, *kp2 = NULL;
  169. time_t now = time(NULL);
  170. /* This is a simple alias for 'make a new keypair' */
  171. kp1 = ed_key_new(NULL, 0, 0, 0, 0, &cert);
  172. tt_assert(kp1);
  173. /* Create a new certificate signed by kp1. */
  174. kp2 = ed_key_new(kp1, INIT_ED_KEY_NEEDCERT, now, 3600, 4, &cert);
  175. tt_assert(kp2);
  176. tt_assert(cert);
  177. tt_mem_op(&cert->signed_key, ==, &kp2->pubkey, sizeof(ed25519_public_key_t));
  178. tt_assert(! cert->signing_key_included);
  179. tt_int_op(cert->valid_until, >=, now);
  180. tt_int_op(cert->valid_until, <=, now+7200);
  181. /* Create a new key-including certificate signed by kp1 */
  182. ed25519_keypair_free(kp2);
  183. tor_cert_free(cert);
  184. cert = NULL; kp2 = NULL;
  185. kp2 = ed_key_new(kp1, (INIT_ED_KEY_NEEDCERT|
  186. INIT_ED_KEY_INCLUDE_SIGNING_KEY_IN_CERT),
  187. now, 3600, 4, &cert);
  188. tt_assert(kp2);
  189. tt_assert(cert);
  190. tt_assert(cert->signing_key_included);
  191. tt_mem_op(&cert->signed_key, ==, &kp2->pubkey, sizeof(ed25519_public_key_t));
  192. tt_mem_op(&cert->signing_key, ==, &kp1->pubkey,sizeof(ed25519_public_key_t));
  193. done:
  194. ed25519_keypair_free(kp1);
  195. ed25519_keypair_free(kp2);
  196. tor_cert_free(cert);
  197. }
  198. static void
  199. test_routerkeys_ed_key_init_basic(void *arg)
  200. {
  201. (void) arg;
  202. tor_cert_t *cert = NULL, *cert2 = NULL;
  203. ed25519_keypair_t *kp1 = NULL, *kp2 = NULL, *kp3 = NULL;
  204. time_t now = time(NULL);
  205. char *fname1 = tor_strdup(get_fname("test_ed_key_1"));
  206. char *fname2 = tor_strdup(get_fname("test_ed_key_2"));
  207. struct stat st;
  208. unlink(fname1);
  209. unlink(fname2);
  210. /* Fail to load a key that isn't there. */
  211. kp1 = ed_key_init_from_file(fname1, 0, LOG_INFO, NULL, now, 0, 7, &cert);
  212. tt_assert(kp1 == NULL);
  213. tt_assert(cert == NULL);
  214. /* Create the key if requested to do so. */
  215. kp1 = ed_key_init_from_file(fname1, INIT_ED_KEY_CREATE, LOG_INFO,
  216. NULL, now, 0, 7, &cert);
  217. tt_assert(kp1 != NULL);
  218. tt_assert(cert == NULL);
  219. tt_int_op(stat(get_fname("test_ed_key_1_cert"), &st), <, 0);
  220. tt_int_op(stat(get_fname("test_ed_key_1_secret_key"), &st), ==, 0);
  221. /* Fail to load if we say we need a cert */
  222. kp2 = ed_key_init_from_file(fname1, INIT_ED_KEY_NEEDCERT, LOG_INFO,
  223. NULL, now, 0, 7, &cert);
  224. tt_assert(kp2 == NULL);
  225. /* Fail to load if we say the wrong key type */
  226. kp2 = ed_key_init_from_file(fname1, 0, LOG_INFO,
  227. NULL, now, 0, 6, &cert);
  228. tt_assert(kp2 == NULL);
  229. /* Load successfully if we're not picky, whether we say "create" or not. */
  230. kp2 = ed_key_init_from_file(fname1, INIT_ED_KEY_CREATE, LOG_INFO,
  231. NULL, now, 0, 7, &cert);
  232. tt_assert(kp2 != NULL);
  233. tt_assert(cert == NULL);
  234. tt_mem_op(kp1, ==, kp2, sizeof(*kp1));
  235. ed25519_keypair_free(kp2); kp2 = NULL;
  236. kp2 = ed_key_init_from_file(fname1, 0, LOG_INFO,
  237. NULL, now, 0, 7, &cert);
  238. tt_assert(kp2 != NULL);
  239. tt_assert(cert == NULL);
  240. tt_mem_op(kp1, ==, kp2, sizeof(*kp1));
  241. ed25519_keypair_free(kp2); kp2 = NULL;
  242. /* Now create a key with a cert. */
  243. kp2 = ed_key_init_from_file(fname2, (INIT_ED_KEY_CREATE|
  244. INIT_ED_KEY_NEEDCERT),
  245. LOG_INFO, kp1, now, 7200, 7, &cert);
  246. tt_assert(kp2 != NULL);
  247. tt_assert(cert != NULL);
  248. tt_mem_op(kp1, !=, kp2, sizeof(*kp1));
  249. tt_int_op(stat(get_fname("test_ed_key_2_cert"), &st), ==, 0);
  250. tt_int_op(stat(get_fname("test_ed_key_2_secret_key"), &st), ==, 0);
  251. tt_assert(cert->cert_valid == 1);
  252. tt_mem_op(&cert->signed_key, ==, &kp2->pubkey, 32);
  253. /* Now verify we can load the cert... */
  254. kp3 = ed_key_init_from_file(fname2, (INIT_ED_KEY_CREATE|
  255. INIT_ED_KEY_NEEDCERT),
  256. LOG_INFO, kp1, now, 7200, 7, &cert2);
  257. tt_mem_op(kp2, ==, kp3, sizeof(*kp2));
  258. tt_mem_op(cert2->encoded, ==, cert->encoded, cert->encoded_len);
  259. ed25519_keypair_free(kp3); kp3 = NULL;
  260. tor_cert_free(cert2); cert2 = NULL;
  261. /* ... even without create... */
  262. kp3 = ed_key_init_from_file(fname2, INIT_ED_KEY_NEEDCERT,
  263. LOG_INFO, kp1, now, 7200, 7, &cert2);
  264. tt_mem_op(kp2, ==, kp3, sizeof(*kp2));
  265. tt_mem_op(cert2->encoded, ==, cert->encoded, cert->encoded_len);
  266. ed25519_keypair_free(kp3); kp3 = NULL;
  267. tor_cert_free(cert2); cert2 = NULL;
  268. /* ... but that we don't crash or anything if we say we don't want it. */
  269. kp3 = ed_key_init_from_file(fname2, INIT_ED_KEY_NEEDCERT,
  270. LOG_INFO, kp1, now, 7200, 7, NULL);
  271. tt_mem_op(kp2, ==, kp3, sizeof(*kp2));
  272. ed25519_keypair_free(kp3); kp3 = NULL;
  273. /* Fail if we're told the wrong signing key */
  274. kp3 = ed_key_init_from_file(fname2, INIT_ED_KEY_NEEDCERT,
  275. LOG_INFO, kp2, now, 7200, 7, &cert2);
  276. tt_assert(kp3 == NULL);
  277. tt_assert(cert2 == NULL);
  278. done:
  279. ed25519_keypair_free(kp1);
  280. ed25519_keypair_free(kp2);
  281. ed25519_keypair_free(kp3);
  282. tor_cert_free(cert);
  283. tor_cert_free(cert2);
  284. tor_free(fname1);
  285. tor_free(fname2);
  286. }
  287. static void
  288. test_routerkeys_ed_key_init_split(void *arg)
  289. {
  290. (void) arg;
  291. tor_cert_t *cert = NULL;
  292. ed25519_keypair_t *kp1 = NULL, *kp2 = NULL;
  293. time_t now = time(NULL);
  294. char *fname1 = tor_strdup(get_fname("test_ed_key_3"));
  295. char *fname2 = tor_strdup(get_fname("test_ed_key_4"));
  296. struct stat st;
  297. const uint32_t flags = INIT_ED_KEY_SPLIT|INIT_ED_KEY_MISSING_SECRET_OK;
  298. unlink(fname1);
  299. unlink(fname2);
  300. /* Can't load key that isn't there. */
  301. kp1 = ed_key_init_from_file(fname1, flags, LOG_INFO, NULL, now, 0, 7, &cert);
  302. tt_assert(kp1 == NULL);
  303. tt_assert(cert == NULL);
  304. /* Create a split key */
  305. kp1 = ed_key_init_from_file(fname1, flags|INIT_ED_KEY_CREATE,
  306. LOG_INFO, NULL, now, 0, 7, &cert);
  307. tt_assert(kp1 != NULL);
  308. tt_assert(cert == NULL);
  309. tt_int_op(stat(get_fname("test_ed_key_3_cert"), &st), <, 0);
  310. tt_int_op(stat(get_fname("test_ed_key_3_secret_key"), &st), ==, 0);
  311. tt_int_op(stat(get_fname("test_ed_key_3_public_key"), &st), ==, 0);
  312. /* Load it. */
  313. kp2 = ed_key_init_from_file(fname1, flags|INIT_ED_KEY_CREATE,
  314. LOG_INFO, NULL, now, 0, 7, &cert);
  315. tt_assert(kp2 != NULL);
  316. tt_assert(cert == NULL);
  317. tt_mem_op(kp1, ==, kp2, sizeof(*kp2));
  318. ed25519_keypair_free(kp2); kp2 = NULL;
  319. /* Okay, try killing the secret key and loading it. */
  320. unlink(get_fname("test_ed_key_3_secret_key"));
  321. kp2 = ed_key_init_from_file(fname1, flags,
  322. LOG_INFO, NULL, now, 0, 7, &cert);
  323. tt_assert(kp2 != NULL);
  324. tt_assert(cert == NULL);
  325. tt_mem_op(&kp1->pubkey, ==, &kp2->pubkey, sizeof(kp2->pubkey));
  326. tt_assert(tor_mem_is_zero((char*)kp2->seckey.seckey,
  327. sizeof(kp2->seckey.seckey)));
  328. ed25519_keypair_free(kp2); kp2 = NULL;
  329. /* Even when we're told to "create", don't create if there's a public key */
  330. kp2 = ed_key_init_from_file(fname1, flags|INIT_ED_KEY_CREATE,
  331. LOG_INFO, NULL, now, 0, 7, &cert);
  332. tt_assert(kp2 != NULL);
  333. tt_assert(cert == NULL);
  334. tt_mem_op(&kp1->pubkey, ==, &kp2->pubkey, sizeof(kp2->pubkey));
  335. tt_assert(tor_mem_is_zero((char*)kp2->seckey.seckey,
  336. sizeof(kp2->seckey.seckey)));
  337. ed25519_keypair_free(kp2); kp2 = NULL;
  338. /* Make sure we fail on a tag mismatch, though */
  339. kp2 = ed_key_init_from_file(fname1, flags,
  340. LOG_INFO, NULL, now, 0, 99, &cert);
  341. tt_assert(kp2 == NULL);
  342. done:
  343. ed25519_keypair_free(kp1);
  344. ed25519_keypair_free(kp2);
  345. tor_cert_free(cert);
  346. tor_free(fname1);
  347. tor_free(fname2);
  348. }
  349. static void
  350. test_routerkeys_ed_keys_init_all(void *arg)
  351. {
  352. (void)arg;
  353. char *dir = tor_strdup(get_fname("test_ed_keys_init_all"));
  354. or_options_t *options = tor_malloc_zero(sizeof(or_options_t));
  355. time_t now = time(NULL);
  356. ed25519_public_key_t id;
  357. ed25519_keypair_t sign, link, auth;
  358. // tor_cert_t *cert_is, *cert_sl, *cert_auth;
  359. #ifdef _WIN32
  360. mkdir(dir);
  361. mkdir(get_fname("test_ed_keys_init_all/keys"));
  362. #else
  363. mkdir(dir, 0700);
  364. mkdir(get_fname("test_ed_keys_init_all/keys"), 0700);
  365. #endif
  366. options->DataDirectory = dir;
  367. tt_int_op(0, ==, load_ed_keys(options, now));
  368. tt_assert(get_master_identity_key());
  369. tt_assert(get_master_identity_key());
  370. tt_assert(get_master_signing_keypair());
  371. tt_assert(get_current_link_keypair());
  372. tt_assert(get_current_auth_keypair());
  373. tt_assert(get_master_signing_key_cert());
  374. tt_assert(get_current_link_key_cert());
  375. tt_assert(get_current_auth_key_cert());
  376. memcpy(&id, get_master_identity_key(), sizeof(id));
  377. memcpy(&sign, get_master_signing_keypair(), sizeof(sign));
  378. memcpy(&link, get_current_link_keypair(), sizeof(link));
  379. memcpy(&auth, get_current_auth_keypair(), sizeof(auth));
  380. /* Call load_ed_keys again, but nothing has changed. */
  381. tt_int_op(0, ==, load_ed_keys(options, now));
  382. tt_mem_op(&id, ==, get_master_identity_key(), sizeof(id));
  383. tt_mem_op(&sign, ==, get_master_signing_keypair(), sizeof(sign));
  384. tt_mem_op(&link, ==, get_current_link_keypair(), sizeof(link));
  385. tt_mem_op(&auth, ==, get_current_auth_keypair(), sizeof(auth));
  386. /* Force a reload: we make new link/auth keys. */
  387. routerkeys_free_all();
  388. tt_int_op(0, ==, load_ed_keys(options, now));
  389. tt_mem_op(&id, ==, get_master_identity_key(), sizeof(id));
  390. tt_mem_op(&sign, ==, get_master_signing_keypair(), sizeof(sign));
  391. tt_mem_op(&link, !=, get_current_link_keypair(), sizeof(link));
  392. tt_mem_op(&auth, !=, get_current_auth_keypair(), sizeof(auth));
  393. tt_assert(get_master_signing_key_cert());
  394. tt_assert(get_current_link_key_cert());
  395. tt_assert(get_current_auth_key_cert());
  396. memcpy(&link, get_current_link_keypair(), sizeof(link));
  397. memcpy(&auth, get_current_auth_keypair(), sizeof(auth));
  398. /* Force a link/auth-key regeneration by advancing time. */
  399. tt_int_op(0, ==, load_ed_keys(options, now+3*86400));
  400. tt_mem_op(&id, ==, get_master_identity_key(), sizeof(id));
  401. tt_mem_op(&sign, ==, get_master_signing_keypair(), sizeof(sign));
  402. tt_mem_op(&link, !=, get_current_link_keypair(), sizeof(link));
  403. tt_mem_op(&auth, !=, get_current_auth_keypair(), sizeof(auth));
  404. tt_assert(get_master_signing_key_cert());
  405. tt_assert(get_current_link_key_cert());
  406. tt_assert(get_current_auth_key_cert());
  407. memcpy(&link, get_current_link_keypair(), sizeof(link));
  408. memcpy(&auth, get_current_auth_keypair(), sizeof(auth));
  409. /* Force a signing-key regeneration by advancing time. */
  410. tt_int_op(0, ==, load_ed_keys(options, now+100*86400));
  411. tt_mem_op(&id, ==, get_master_identity_key(), sizeof(id));
  412. tt_mem_op(&sign, !=, get_master_signing_keypair(), sizeof(sign));
  413. tt_mem_op(&link, !=, get_current_link_keypair(), sizeof(link));
  414. tt_mem_op(&auth, !=, get_current_auth_keypair(), sizeof(auth));
  415. tt_assert(get_master_signing_key_cert());
  416. tt_assert(get_current_link_key_cert());
  417. tt_assert(get_current_auth_key_cert());
  418. memcpy(&sign, get_master_signing_keypair(), sizeof(sign));
  419. memcpy(&link, get_current_link_keypair(), sizeof(link));
  420. memcpy(&auth, get_current_auth_keypair(), sizeof(auth));
  421. /* Demonstrate that we can start up with no secret identity key */
  422. routerkeys_free_all();
  423. unlink(get_fname("test_ed_keys_init_all/keys/"
  424. "ed25519_master_id_secret_key"));
  425. tt_int_op(0, ==, load_ed_keys(options, now));
  426. tt_mem_op(&id, ==, get_master_identity_key(), sizeof(id));
  427. tt_mem_op(&sign, ==, get_master_signing_keypair(), sizeof(sign));
  428. tt_mem_op(&link, !=, get_current_link_keypair(), sizeof(link));
  429. tt_mem_op(&auth, !=, get_current_auth_keypair(), sizeof(auth));
  430. tt_assert(get_master_signing_key_cert());
  431. tt_assert(get_current_link_key_cert());
  432. tt_assert(get_current_auth_key_cert());
  433. /* But we're in trouble if we have no id key and our signing key has
  434. expired. */
  435. log_global_min_severity_ = LOG_ERR; /* Suppress warnings.
  436. * XXX (better way to do this)? */
  437. routerkeys_free_all();
  438. tt_int_op(-1, ==, load_ed_keys(options, now+200*86400));
  439. done:
  440. tor_free(dir);
  441. tor_free(options);
  442. routerkeys_free_all();
  443. }
  444. #define TEST(name, flags) \
  445. { #name , test_routerkeys_ ## name, (flags), NULL, NULL }
  446. struct testcase_t routerkeys_tests[] = {
  447. TEST(write_fingerprint, TT_FORK),
  448. TEST(ed_certs, TT_FORK),
  449. TEST(ed_key_create, TT_FORK),
  450. TEST(ed_key_init_basic, TT_FORK),
  451. TEST(ed_key_init_split, TT_FORK),
  452. TEST(ed_keys_init_all, TT_FORK),
  453. END_OF_TESTCASES
  454. };