test_routerkeys.c 2.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384
  1. /* Copyright (c) 2001-2004, Roger Dingledine.
  2. * Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
  3. * Copyright (c) 2007-2013, The Tor Project, Inc. */
  4. /* See LICENSE for licensing information */
  5. #include "orconfig.h"
  6. #define ROUTER_PRIVATE
  7. #include "or.h"
  8. #include "config.h"
  9. #include "router.h"
  10. #include "util.h"
  11. #include "crypto.h"
  12. #include "test.h"
  13. static void
  14. test_routerkeys_write_fingerprint(void *arg)
  15. {
  16. crypto_pk_t *key = pk_generate(2);
  17. or_options_t *options = get_options_mutable();
  18. const char *ddir = get_fname("write_fingerprint");
  19. char *cp = NULL, *cp2 = NULL;
  20. char fp[FINGERPRINT_LEN+1];
  21. (void)arg;
  22. tt_assert(key);
  23. options->ORPort_set = 1; /* So that we can get the server ID key */
  24. options->DataDirectory = tor_strdup(ddir);
  25. options->Nickname = tor_strdup("haflinger");
  26. set_server_identity_key(key);
  27. set_client_identity_key(crypto_pk_dup_key(key));
  28. check_private_dir(ddir, CPD_CREATE, NULL);
  29. tt_int_op(crypto_pk_cmp_keys(get_server_identity_key(),key),==,0);
  30. /* Write fingerprint file */
  31. tt_int_op(0, ==, router_write_fingerprint(0));
  32. cp = read_file_to_str(get_fname("write_fingerprint/fingerprint"),
  33. 0, NULL);
  34. crypto_pk_get_fingerprint(key, fp, 0);
  35. tor_asprintf(&cp2, "haflinger %s\n", fp);
  36. tt_str_op(cp, ==, cp2);
  37. tor_free(cp);
  38. tor_free(cp2);
  39. /* Write hashed-fingerprint file */
  40. tt_int_op(0, ==, router_write_fingerprint(1));
  41. cp = read_file_to_str(get_fname("write_fingerprint/hashed-fingerprint"),
  42. 0, NULL);
  43. crypto_pk_get_hashed_fingerprint(key, fp);
  44. tor_asprintf(&cp2, "haflinger %s\n", fp);
  45. tt_str_op(cp, ==, cp2);
  46. tor_free(cp);
  47. tor_free(cp2);
  48. /* Replace outdated file */
  49. write_str_to_file(get_fname("write_fingerprint/hashed-fingerprint"),
  50. "junk goes here", 0);
  51. tt_int_op(0, ==, router_write_fingerprint(1));
  52. cp = read_file_to_str(get_fname("write_fingerprint/hashed-fingerprint"),
  53. 0, NULL);
  54. crypto_pk_get_hashed_fingerprint(key, fp);
  55. tor_asprintf(&cp2, "haflinger %s\n", fp);
  56. tt_str_op(cp, ==, cp2);
  57. tor_free(cp);
  58. tor_free(cp2);
  59. done:
  60. crypto_pk_free(key);
  61. set_client_identity_key(NULL);
  62. tor_free(cp);
  63. tor_free(cp2);
  64. }
  65. #define TEST(name, flags) \
  66. { #name , test_routerkeys_ ## name, (flags), NULL, NULL }
  67. struct testcase_t routerkeys_tests[] = {
  68. TEST(write_fingerprint, TT_FORK),
  69. END_OF_TESTCASES
  70. };