Merge remote-tracking branch 'teor/fix18809-warnings' into maint-0.2.8
[tor.git] / src / test / test_microdesc.c
blob581f58b45f92c84a398291812989566227148dbf
1 /* Copyright (c) 2010-2016, The Tor Project, Inc. */
2 /* See LICENSE for licensing information */
4 #include "orconfig.h"
5 #include "or.h"
7 #include "config.h"
8 #include "dirvote.h"
9 #include "microdesc.h"
10 #include "networkstatus.h"
11 #include "routerlist.h"
12 #include "routerparse.h"
13 #include "torcert.h"
15 #include "test.h"
17 #include <openssl/rsa.h>
18 #include <openssl/bn.h>
19 #include <openssl/pem.h>
21 #ifdef _WIN32
22 /* For mkdir() */
23 #include <direct.h>
24 #else
25 #include <dirent.h>
26 #endif
28 static const char test_md1[] =
29 "onion-key\n"
30 "-----BEGIN RSA PUBLIC KEY-----\n"
31 "MIGJAoGBAMjlHH/daN43cSVRaHBwgUfnszzAhg98EvivJ9Qxfv51mvQUxPjQ07es\n"
32 "gV/3n8fyh3Kqr/ehi9jxkdgSRfSnmF7giaHL1SLZ29kA7KtST+pBvmTpDtHa3ykX\n"
33 "Xorc7hJvIyTZoc1HU+5XSynj3gsBE5IGK1ZRzrNS688LnuZMVp1tAgMBAAE=\n"
34 "-----END RSA PUBLIC KEY-----\n";
36 static const char test_md2[] =
37 "onion-key\n"
38 "-----BEGIN RSA PUBLIC KEY-----\n"
39 "MIGJAoGBAMIixIowh2DyPmDNMDwBX2DHcYcqdcH1zdIQJZkyV6c6rQHnvbcaDoSg\n"
40 "jgFSLJKpnGmh71FVRqep+yVB0zI1JY43kuEnXry2HbZCD9UDo3d3n7t015X5S7ON\n"
41 "bSSYtQGPwOr6Epf96IF6DoQxy4iDnPUAlejuhAG51s1y6/rZQ3zxAgMBAAE=\n"
42 "-----END RSA PUBLIC KEY-----\n";
44 static const char test_md3[] =
45 "@last-listed 2009-06-22\n"
46 "onion-key\n"
47 "-----BEGIN RSA PUBLIC KEY-----\n"
48 "MIGJAoGBAMH3340d4ENNGrqx7UxT+lB7x6DNUKOdPEOn4teceE11xlMyZ9TPv41c\n"
49 "qj2fRZzfxlc88G/tmiaHshmdtEpklZ740OFqaaJVj4LjPMKFNE+J7Xc1142BE9Ci\n"
50 "KgsbjGYe2RY261aADRWLetJ8T9QDMm+JngL4288hc8pq1uB/3TAbAgMBAAE=\n"
51 "-----END RSA PUBLIC KEY-----\n"
52 "p accept 1-700,800-1000\n"
53 "family nodeX nodeY nodeZ\n";
55 static void
56 test_md_cache(void *data)
58 or_options_t *options = NULL;
59 microdesc_cache_t *mc = NULL ;
60 smartlist_t *added = NULL, *wanted = NULL;
61 microdesc_t *md1, *md2, *md3;
62 char d1[DIGEST256_LEN], d2[DIGEST256_LEN], d3[DIGEST256_LEN];
63 const char *test_md3_noannotation = strchr(test_md3, '\n')+1;
64 time_t time1, time2, time3;
65 char *fn = NULL, *s = NULL;
66 (void)data;
68 options = get_options_mutable();
69 tt_assert(options);
71 time1 = time(NULL);
72 time2 = time(NULL) - 2*24*60*60;
73 time3 = time(NULL) - 15*24*60*60;
75 /* Possibly, turn this into a test setup/cleanup pair */
76 tor_free(options->DataDirectory);
77 options->DataDirectory = tor_strdup(get_fname("md_datadir_test"));
78 #ifdef _WIN32
79 tt_int_op(0, OP_EQ, mkdir(options->DataDirectory));
80 #else
81 tt_int_op(0, OP_EQ, mkdir(options->DataDirectory, 0700));
82 #endif
84 tt_assert(!strcmpstart(test_md3_noannotation, "onion-key"));
86 crypto_digest256(d1, test_md1, strlen(test_md1), DIGEST_SHA256);
87 crypto_digest256(d2, test_md2, strlen(test_md1), DIGEST_SHA256);
88 crypto_digest256(d3, test_md3_noannotation, strlen(test_md3_noannotation),
89 DIGEST_SHA256);
91 mc = get_microdesc_cache();
93 added = microdescs_add_to_cache(mc, test_md1, NULL, SAVED_NOWHERE, 0,
94 time1, NULL);
95 tt_int_op(1, OP_EQ, smartlist_len(added));
96 md1 = smartlist_get(added, 0);
97 smartlist_free(added);
98 added = NULL;
100 wanted = smartlist_new();
101 added = microdescs_add_to_cache(mc, test_md2, NULL, SAVED_NOWHERE, 0,
102 time2, wanted);
103 /* Should fail, since we didn't list test_md2's digest in wanted */
104 tt_int_op(0, OP_EQ, smartlist_len(added));
105 smartlist_free(added);
106 added = NULL;
108 smartlist_add(wanted, tor_memdup(d2, DIGEST256_LEN));
109 smartlist_add(wanted, tor_memdup(d3, DIGEST256_LEN));
110 added = microdescs_add_to_cache(mc, test_md2, NULL, SAVED_NOWHERE, 0,
111 time2, wanted);
112 /* Now it can work. md2 should have been added */
113 tt_int_op(1, OP_EQ, smartlist_len(added));
114 md2 = smartlist_get(added, 0);
115 /* And it should have gotten removed from 'wanted' */
116 tt_int_op(smartlist_len(wanted), OP_EQ, 1);
117 tt_mem_op(smartlist_get(wanted, 0), OP_EQ, d3, DIGEST256_LEN);
118 smartlist_free(added);
119 added = NULL;
121 added = microdescs_add_to_cache(mc, test_md3, NULL,
122 SAVED_NOWHERE, 0, -1, NULL);
123 /* Must fail, since SAVED_NOWHERE precludes annotations */
124 tt_int_op(0, OP_EQ, smartlist_len(added));
125 smartlist_free(added);
126 added = NULL;
128 added = microdescs_add_to_cache(mc, test_md3_noannotation, NULL,
129 SAVED_NOWHERE, 0, time3, NULL);
130 /* Now it can work */
131 tt_int_op(1, OP_EQ, smartlist_len(added));
132 md3 = smartlist_get(added, 0);
133 smartlist_free(added);
134 added = NULL;
136 /* Okay. We added 1...3. Let's poke them to see how they look, and make
137 * sure they're really in the journal. */
138 tt_ptr_op(md1, OP_EQ, microdesc_cache_lookup_by_digest256(mc, d1));
139 tt_ptr_op(md2, OP_EQ, microdesc_cache_lookup_by_digest256(mc, d2));
140 tt_ptr_op(md3, OP_EQ, microdesc_cache_lookup_by_digest256(mc, d3));
142 tt_int_op(md1->last_listed, OP_EQ, time1);
143 tt_int_op(md2->last_listed, OP_EQ, time2);
144 tt_int_op(md3->last_listed, OP_EQ, time3);
146 tt_int_op(md1->saved_location, OP_EQ, SAVED_IN_JOURNAL);
147 tt_int_op(md2->saved_location, OP_EQ, SAVED_IN_JOURNAL);
148 tt_int_op(md3->saved_location, OP_EQ, SAVED_IN_JOURNAL);
150 tt_int_op(md1->bodylen, OP_EQ, strlen(test_md1));
151 tt_int_op(md2->bodylen, OP_EQ, strlen(test_md2));
152 tt_int_op(md3->bodylen, OP_EQ, strlen(test_md3_noannotation));
153 tt_mem_op(md1->body, OP_EQ, test_md1, strlen(test_md1));
154 tt_mem_op(md2->body, OP_EQ, test_md2, strlen(test_md2));
155 tt_mem_op(md3->body, OP_EQ, test_md3_noannotation,
156 strlen(test_md3_noannotation));
158 tor_asprintf(&fn, "%s"PATH_SEPARATOR"cached-microdescs.new",
159 options->DataDirectory);
160 s = read_file_to_str(fn, RFTS_BIN, NULL);
161 tt_assert(s);
162 tt_mem_op(md1->body, OP_EQ, s + md1->off, md1->bodylen);
163 tt_mem_op(md2->body, OP_EQ, s + md2->off, md2->bodylen);
164 tt_mem_op(md3->body, OP_EQ, s + md3->off, md3->bodylen);
166 tt_ptr_op(md1->family, OP_EQ, NULL);
167 tt_ptr_op(md3->family, OP_NE, NULL);
168 tt_int_op(smartlist_len(md3->family), OP_EQ, 3);
169 tt_str_op(smartlist_get(md3->family, 0), OP_EQ, "nodeX");
171 /* Now rebuild the cache! */
172 tt_int_op(microdesc_cache_rebuild(mc, 1), OP_EQ, 0);
174 tt_int_op(md1->saved_location, OP_EQ, SAVED_IN_CACHE);
175 tt_int_op(md2->saved_location, OP_EQ, SAVED_IN_CACHE);
176 tt_int_op(md3->saved_location, OP_EQ, SAVED_IN_CACHE);
178 /* The journal should be empty now */
179 tor_free(s);
180 s = read_file_to_str(fn, RFTS_BIN, NULL);
181 tt_str_op(s, OP_EQ, "");
182 tor_free(s);
183 tor_free(fn);
185 /* read the cache. */
186 tor_asprintf(&fn, "%s"PATH_SEPARATOR"cached-microdescs",
187 options->DataDirectory);
188 s = read_file_to_str(fn, RFTS_BIN, NULL);
189 tt_mem_op(md1->body, OP_EQ, s + md1->off, strlen(test_md1));
190 tt_mem_op(md2->body, OP_EQ, s + md2->off, strlen(test_md2));
191 tt_mem_op(md3->body, OP_EQ, s + md3->off, strlen(test_md3_noannotation));
193 /* Okay, now we are going to forget about the cache entirely, and reload it
194 * from the disk. */
195 microdesc_free_all();
196 mc = get_microdesc_cache();
197 md1 = microdesc_cache_lookup_by_digest256(mc, d1);
198 md2 = microdesc_cache_lookup_by_digest256(mc, d2);
199 md3 = microdesc_cache_lookup_by_digest256(mc, d3);
200 tt_assert(md1);
201 tt_assert(md2);
202 tt_assert(md3);
203 tt_mem_op(md1->body, OP_EQ, s + md1->off, strlen(test_md1));
204 tt_mem_op(md2->body, OP_EQ, s + md2->off, strlen(test_md2));
205 tt_mem_op(md3->body, OP_EQ, s + md3->off, strlen(test_md3_noannotation));
207 tt_int_op(md1->last_listed, OP_EQ, time1);
208 tt_int_op(md2->last_listed, OP_EQ, time2);
209 tt_int_op(md3->last_listed, OP_EQ, time3);
211 /* Okay, now we are going to clear out everything older than a week old.
212 * In practice, that means md3 */
213 microdesc_cache_clean(mc, time(NULL)-7*24*60*60, 1/*force*/);
214 tt_ptr_op(md1, OP_EQ, microdesc_cache_lookup_by_digest256(mc, d1));
215 tt_ptr_op(md2, OP_EQ, microdesc_cache_lookup_by_digest256(mc, d2));
216 tt_ptr_op(NULL, OP_EQ, microdesc_cache_lookup_by_digest256(mc, d3));
217 md3 = NULL; /* it's history now! */
219 /* rebuild again, make sure it stays gone. */
220 tt_int_op(microdesc_cache_rebuild(mc, 1), OP_EQ, 0);
221 tt_ptr_op(md1, OP_EQ, microdesc_cache_lookup_by_digest256(mc, d1));
222 tt_ptr_op(md2, OP_EQ, microdesc_cache_lookup_by_digest256(mc, d2));
223 tt_ptr_op(NULL, OP_EQ, microdesc_cache_lookup_by_digest256(mc, d3));
225 /* Re-add md3, and make sure we can rebuild the cache. */
226 added = microdescs_add_to_cache(mc, test_md3_noannotation, NULL,
227 SAVED_NOWHERE, 0, time3, NULL);
228 tt_int_op(1, OP_EQ, smartlist_len(added));
229 md3 = smartlist_get(added, 0);
230 smartlist_free(added);
231 added = NULL;
232 tt_int_op(md1->saved_location, OP_EQ, SAVED_IN_CACHE);
233 tt_int_op(md2->saved_location, OP_EQ, SAVED_IN_CACHE);
234 tt_int_op(md3->saved_location, OP_EQ, SAVED_IN_JOURNAL);
236 tt_int_op(microdesc_cache_rebuild(mc, 1), OP_EQ, 0);
237 tt_int_op(md3->saved_location, OP_EQ, SAVED_IN_CACHE);
239 done:
240 if (options)
241 tor_free(options->DataDirectory);
242 microdesc_free_all();
244 smartlist_free(added);
245 if (wanted)
246 SMARTLIST_FOREACH(wanted, char *, cp, tor_free(cp));
247 smartlist_free(wanted);
248 tor_free(s);
249 tor_free(fn);
252 static const char truncated_md[] =
253 "@last-listed 2013-08-08 19:02:59\n"
254 "onion-key\n"
255 "-----BEGIN RSA PUBLIC KEY-----\n"
256 "MIGJAoGBAM91vLFNaM+gGhnRIdz2Cm/Kl7Xz0cOobIdVzhS3cKUJfk867hCuTipS\n"
257 "NveLBzNopvgXKruAAzEj3cACxk6Q8lv5UWOGCD1UolkgsWSE62RBjap44g+oc9J1\n"
258 "RI9968xOTZw0VaBQg9giEILNXl0djoikQ+5tQRUvLDDa67gpa5Q1AgMBAAE=\n"
259 "-----END RSA PUBLIC KEY-----\n"
260 "family @\n";
262 static void
263 test_md_cache_broken(void *data)
265 or_options_t *options;
266 char *fn=NULL;
267 microdesc_cache_t *mc = NULL;
269 (void)data;
271 options = get_options_mutable();
272 tt_assert(options);
273 tor_free(options->DataDirectory);
274 options->DataDirectory = tor_strdup(get_fname("md_datadir_test2"));
276 #ifdef _WIN32
277 tt_int_op(0, OP_EQ, mkdir(options->DataDirectory));
278 #else
279 tt_int_op(0, OP_EQ, mkdir(options->DataDirectory, 0700));
280 #endif
282 tor_asprintf(&fn, "%s"PATH_SEPARATOR"cached-microdescs",
283 options->DataDirectory);
285 write_str_to_file(fn, truncated_md, 1);
287 mc = get_microdesc_cache();
288 tt_assert(mc);
290 done:
291 if (options)
292 tor_free(options->DataDirectory);
293 tor_free(fn);
294 microdesc_free_all();
297 /* Generated by chutney. */
298 static const char test_ri[] =
299 "router test005r 127.0.0.1 5005 0 7005\n"
300 "platform Tor 0.2.5.4-alpha-dev on Linux\n"
301 "protocols Link 1 2 Circuit 1\n"
302 "published 2014-05-06 22:57:55\n"
303 "fingerprint 09DE 3BA2 48C2 1C3F 3760 6CD3 8460 43A6 D5EC F59E\n"
304 "uptime 0\n"
305 "bandwidth 1073741824 1073741824 0\n"
306 "extra-info-digest 361F9428F9FA4DD854C03DDBCC159D0D9FA996C9\n"
307 "onion-key\n"
308 "-----BEGIN RSA PUBLIC KEY-----\n"
309 "MIGJAoGBANBJz8Vldl12aFeSMPLiA4nOetLDN0oxU8bB1SDhO7Uu2zdWYVYAF5J0\n"
310 "st7WvrVy/jA9v/fsezNAPskBanecHRSkdMTpkcgRPMHE7CTGEwIy1Yp1X4bPgDlC\n"
311 "VCnbs5Pcts5HnWEYNK7qHDAUn+IlmjOO+pTUY8uyq+GQVz6H9wFlAgMBAAE=\n"
312 "-----END RSA PUBLIC KEY-----\n"
313 "signing-key\n"
314 "-----BEGIN RSA PUBLIC KEY-----\n"
315 "MIGJAoGBANbGUC4802Ke6C3nOVxN0U0HhIRrs32cQFEL4v+UUMJPgjbistHBvOax\n"
316 "CWVR/sMXM2kKJeGThJ9ZUs2p9dDG4WHPUXgkMqzTTEeeFa7pQKU0brgbmLaJq0Pi\n"
317 "mxmqC5RkTHa5bQvq6QlSFprAEoovV27cWqBM9jVdV9hyc//6kwPzAgMBAAE=\n"
318 "-----END RSA PUBLIC KEY-----\n"
319 "hidden-service-dir\n"
320 "ntor-onion-key Gg73xH7+kTfT6bi1uNVx9gwQdQas9pROIfmc4NpAdC4=\n"
321 "reject *:25\n"
322 "reject *:119\n"
323 "reject *:135-139\n"
324 "reject *:445\n"
325 "reject *:563\n"
326 "reject *:1214\n"
327 "reject *:4661-4666\n"
328 "reject *:6346-6429\n"
329 "reject *:6699\n"
330 "reject *:6881-6999\n"
331 "accept *:*\n"
332 "router-signature\n"
333 "-----BEGIN SIGNATURE-----\n"
334 "ImzX5PF2vRCrG1YzGToyjoxYhgh1vtHEDjmP+tIS/iil1DSnHZNpHSuHp0L1jE9S\n"
335 "yZyrtKaqpBE/aecAM3j4CWCn/ipnAAQkHcyRLin1bYvqBtRzyopVCRlUhF+uWrLq\n"
336 "t0xkIE39ss/EwmQr7iIgkdVH4oRIMsjYnFFJBG26nYY=\n"
337 "-----END SIGNATURE-----\n";
339 static const char test_ri2[] =
340 "router test001a 127.0.0.1 5001 0 7001\n"
341 "identity-ed25519\n"
342 "-----BEGIN ED25519 CERT-----\n"
343 "AQQABf/FAf5iDuKCZP2VxnAaQWdklilAh6kaEeFX4z8261Yx2T1/AQAgBADCp8vO\n"
344 "B8K1F9g2DzwuwvVCnPFLSK1qknVqPpNucHLH9DY7fuIYogBAdz4zHv1qC7RKaMNG\n"
345 "Jux/tMO2tzPcm62Ky5PjClMQplKUOnZNQ+RIpA3wYCIfUDy/cQnY7XWgNQ0=\n"
346 "-----END ED25519 CERT-----\n"
347 "platform Tor 0.2.6.0-alpha-dev on Darwin\n"
348 "protocols Link 1 2 Circuit 1\n"
349 "published 2014-10-08 12:58:04\n"
350 "fingerprint B7E2 7F10 4213 C36F 13E7 E982 9182 845E 4959 97A0\n"
351 "uptime 0\n"
352 "bandwidth 1073741824 1073741824 0\n"
353 "extra-info-digest 568F27331B6D8C73E7024F1EF5D097B90DFC7CDB\n"
354 "caches-extra-info\n"
355 "onion-key\n"
356 "-----BEGIN RSA PUBLIC KEY-----\n"
357 "MIGJAoGBAL2R8EfubUcahxha4u02P4VAR0llQIMwFAmrHPjzcK7apcQgDOf2ovOA\n"
358 "+YQnJFxlpBmCoCZC6ssCi+9G0mqo650lFuTMP5I90BdtjotfzESfTykHLiChyvhd\n"
359 "l0dlqclb2SU/GKem/fLRXH16aNi72CdSUu/1slKs/70ILi34QixRAgMBAAE=\n"
360 "-----END RSA PUBLIC KEY-----\n"
361 "signing-key\n"
362 "-----BEGIN RSA PUBLIC KEY-----\n"
363 "MIGJAoGBAN8+78KUVlgHXdMMkYJxcwh1Zv2y+Gb5eWUyltUaQRajhrT9ij2T5JZs\n"
364 "M0g85xTcuM3jNVVpV79+33hiTohdC6UZ+Bk4USQ7WBFzRbVFSXoVKLBJFkCOIexg\n"
365 "SMGNd5WEDtHWrXl58mizmPFu1eG6ZxHzt7RuLSol5cwBvawXPNkFAgMBAAE=\n"
366 "-----END RSA PUBLIC KEY-----\n"
367 "onion-key-crosscert\n"
368 "-----BEGIN CROSSCERT-----\n"
369 "ETFDzU49bvNfoZnKK1j6JeBP2gDirgj6bBCgWpUYs663OO9ypbZRO0JwWANssKl6\n"
370 "oaq9vKTsKGRsaNnqnz/JGMhehymakjjNtqg7crWwsahe8+7Pw9GKmW+YjFtcOkUf\n"
371 "KfOn2bmKBa1FoJb4yW3oXzHcdlLSRuCciKqPn+Hky5o=\n"
372 "-----END CROSSCERT-----\n"
373 "ntor-onion-key-crosscert 0\n"
374 "-----BEGIN ED25519 CERT-----\n"
375 "AQoABf2dAcKny84HwrUX2DYPPC7C9UKc8UtIrWqSdWo+k25wcsf0AFohutG+xI06\n"
376 "Ef21c5Zl1j8Hw6DzHDjYyJevXLFuOneaL3zcH2Ldn4sjrG3kc5UuVvRfTvV120UO\n"
377 "xk4f5s5LGwY=\n"
378 "-----END ED25519 CERT-----\n"
379 "hidden-service-dir\n"
380 "contact auth1@test.test\n"
381 "ntor-onion-key hbxdRnfVUJJY7+KcT4E3Rs7/zuClbN3hJrjSBiEGMgI=\n"
382 "reject *:*\n"
383 "router-sig-ed25519 5aQXyTif7PExIuL2di37UvktmJECKnils2OWz2vDi"
384 "hFxi+5TTAAPxYkS5clhc/Pjvw34itfjGmTKFic/8httAQ\n"
385 "router-signature\n"
386 "-----BEGIN SIGNATURE-----\n"
387 "BaUB+aFPQbb3BwtdzKsKqV3+6cRlSqJF5bI3UTmwRoJk+Z5Pz+W5NWokNI0xArHM\n"
388 "T4T5FZCCP9350jXsUCIvzyIyktU6aVRCGFt76rFlo1OETpN8GWkMnQU0w18cxvgS\n"
389 "cf34GXHv61XReJF3AlzNHFpbrPOYmowmhrTULKyMqow=\n"
390 "-----END SIGNATURE-----\n";
392 static const char test_md_8[] =
393 "onion-key\n"
394 "-----BEGIN RSA PUBLIC KEY-----\n"
395 "MIGJAoGBANBJz8Vldl12aFeSMPLiA4nOetLDN0oxU8bB1SDhO7Uu2zdWYVYAF5J0\n"
396 "st7WvrVy/jA9v/fsezNAPskBanecHRSkdMTpkcgRPMHE7CTGEwIy1Yp1X4bPgDlC\n"
397 "VCnbs5Pcts5HnWEYNK7qHDAUn+IlmjOO+pTUY8uyq+GQVz6H9wFlAgMBAAE=\n"
398 "-----END RSA PUBLIC KEY-----\n"
399 "p reject 25,119,135-139,445,563,1214,4661-4666,6346-6429,6699,6881-6999\n";
401 static const char test_md_16[] =
402 "onion-key\n"
403 "-----BEGIN RSA PUBLIC KEY-----\n"
404 "MIGJAoGBANBJz8Vldl12aFeSMPLiA4nOetLDN0oxU8bB1SDhO7Uu2zdWYVYAF5J0\n"
405 "st7WvrVy/jA9v/fsezNAPskBanecHRSkdMTpkcgRPMHE7CTGEwIy1Yp1X4bPgDlC\n"
406 "VCnbs5Pcts5HnWEYNK7qHDAUn+IlmjOO+pTUY8uyq+GQVz6H9wFlAgMBAAE=\n"
407 "-----END RSA PUBLIC KEY-----\n"
408 "ntor-onion-key Gg73xH7+kTfT6bi1uNVx9gwQdQas9pROIfmc4NpAdC4=\n"
409 "p reject 25,119,135-139,445,563,1214,4661-4666,6346-6429,6699,6881-6999\n";
411 static const char test_md_18[] =
412 "onion-key\n"
413 "-----BEGIN RSA PUBLIC KEY-----\n"
414 "MIGJAoGBANBJz8Vldl12aFeSMPLiA4nOetLDN0oxU8bB1SDhO7Uu2zdWYVYAF5J0\n"
415 "st7WvrVy/jA9v/fsezNAPskBanecHRSkdMTpkcgRPMHE7CTGEwIy1Yp1X4bPgDlC\n"
416 "VCnbs5Pcts5HnWEYNK7qHDAUn+IlmjOO+pTUY8uyq+GQVz6H9wFlAgMBAAE=\n"
417 "-----END RSA PUBLIC KEY-----\n"
418 "ntor-onion-key Gg73xH7+kTfT6bi1uNVx9gwQdQas9pROIfmc4NpAdC4=\n"
419 "p reject 25,119,135-139,445,563,1214,4661-4666,6346-6429,6699,6881-6999\n"
420 "id rsa1024 Cd47okjCHD83YGzThGBDptXs9Z4\n";
422 static const char test_md2_18[] =
423 "onion-key\n"
424 "-----BEGIN RSA PUBLIC KEY-----\n"
425 "MIGJAoGBAL2R8EfubUcahxha4u02P4VAR0llQIMwFAmrHPjzcK7apcQgDOf2ovOA\n"
426 "+YQnJFxlpBmCoCZC6ssCi+9G0mqo650lFuTMP5I90BdtjotfzESfTykHLiChyvhd\n"
427 "l0dlqclb2SU/GKem/fLRXH16aNi72CdSUu/1slKs/70ILi34QixRAgMBAAE=\n"
428 "-----END RSA PUBLIC KEY-----\n"
429 "ntor-onion-key hbxdRnfVUJJY7+KcT4E3Rs7/zuClbN3hJrjSBiEGMgI=\n"
430 "id rsa1024 t+J/EEITw28T5+mCkYKEXklZl6A\n";
432 static const char test_md2_21[] =
433 "onion-key\n"
434 "-----BEGIN RSA PUBLIC KEY-----\n"
435 "MIGJAoGBAL2R8EfubUcahxha4u02P4VAR0llQIMwFAmrHPjzcK7apcQgDOf2ovOA\n"
436 "+YQnJFxlpBmCoCZC6ssCi+9G0mqo650lFuTMP5I90BdtjotfzESfTykHLiChyvhd\n"
437 "l0dlqclb2SU/GKem/fLRXH16aNi72CdSUu/1slKs/70ILi34QixRAgMBAAE=\n"
438 "-----END RSA PUBLIC KEY-----\n"
439 "ntor-onion-key hbxdRnfVUJJY7+KcT4E3Rs7/zuClbN3hJrjSBiEGMgI=\n"
440 "id ed25519 wqfLzgfCtRfYNg88LsL1QpzxS0itapJ1aj6TbnByx/Q\n";
442 static void
443 test_md_generate(void *arg)
445 routerinfo_t *ri;
446 microdesc_t *md = NULL;
447 (void)arg;
449 ri = router_parse_entry_from_string(test_ri, NULL, 0, 0, NULL, NULL);
450 tt_assert(ri);
451 md = dirvote_create_microdescriptor(ri, 8);
452 tt_str_op(md->body, OP_EQ, test_md_8);
454 /* XXXX test family lines. */
455 /* XXXX test method 14 for A lines. */
456 /* XXXX test method 15 for P6 lines. */
458 microdesc_free(md);
459 md = NULL;
460 md = dirvote_create_microdescriptor(ri, 16);
461 tt_str_op(md->body, OP_EQ, test_md_16);
463 microdesc_free(md);
464 md = NULL;
465 md = dirvote_create_microdescriptor(ri, 18);
466 tt_str_op(md->body, OP_EQ, test_md_18);
468 microdesc_free(md);
469 md = NULL;
470 md = dirvote_create_microdescriptor(ri, 21);
471 tt_str_op(md->body, ==, test_md_18);
473 routerinfo_free(ri);
474 ri = router_parse_entry_from_string(test_ri2, NULL, 0, 0, NULL, NULL);
476 microdesc_free(md);
477 md = NULL;
478 md = dirvote_create_microdescriptor(ri, 18);
479 tt_str_op(md->body, ==, test_md2_18);
481 microdesc_free(md);
482 md = NULL;
483 md = dirvote_create_microdescriptor(ri, 21);
484 tt_str_op(md->body, ==, test_md2_21);
485 tt_assert(ed25519_pubkey_eq(md->ed25519_identity_pkey,
486 &ri->cache_info.signing_key_cert->signing_key));
488 done:
489 microdesc_free(md);
490 routerinfo_free(ri);
493 /* Taken at random from my ~/.tor/cached-microdescs file and then
494 * hand-munged */
495 static const char MD_PARSE_TEST_DATA[] =
496 /* Good 0 */
497 "onion-key\n"
498 "-----BEGIN RSA PUBLIC KEY-----\n"
499 "MIGJAoGBANsKd1GRfOuSR1MkcwKqs6SVy4Gi/JXplt/bHDkIGm6Q96TeJ5uyVgUL\n"
500 "DBr/ij6+JqgVFeriuiMzHKREytzjdaTuKsKBFFpLwb+Ppcjr5nMIH/AR6/aHO8hW\n"
501 "T3B9lx5T6Kl7CqZ4yqXxYRHzn50EPTIZuz0y9se4J4gi9mLmL+pHAgMBAAE=\n"
502 "-----END RSA PUBLIC KEY-----\n"
503 "p accept 20-23,43,53,79-81,88,110,143,194,220,443,464,531,543-544\n"
504 "id rsa1024 GEo59/iR1GWSIWZDzXTd5QxtqnU\n"
505 /* Bad 0: I've messed with the onion-key in the second one. */
506 "onion-key\n"
507 "-----BEGIN RSA PUBLIC KEY-----\n"
508 "MIGJAoGBAMr4o/pflVwscx11vC1AKEADlKEqnhpvCIjAEzNEenMhvGQHRlA0EXLC\n"
509 "7G7O5bhnCwEHqK8Pvg8cuX/fD8v08TF1EVPhwPa0UI6ab8KnPP2F!!!!!!b92DG7EQIk3q\n"
510 "d68Uxp7E9/t3v1WWZjzDqvEe0par6ul+DKW6HMlTGebFo5Q4e8R1AgMBAAE=\n"
511 "-----END RSA PUBLIC KEY-----\n"
512 "ntor-onion-key 761Dmm27via7lXygNHM3l+oJLrYU2Nye0Uz4pkpipyY=\n"
513 "p accept 53\n"
514 "id rsa1024 3Y4fwXhtgkdGDZ5ef5mtb6TJRQQ\n"
515 /* Good 1 */
516 "onion-key\n"
517 "-----BEGIN RSA PUBLIC KEY-----\n"
518 "MIGJAoGBANsMSjVi3EX8ZHfm/dvPF6KdVR66k1tVul7Jp+dDbDajBYNhgKRzVCxy\n"
519 "Yac1CBuQjOqK89tKap9PQBnhF087eDrfaZDqYTLwB2W2sBJncVej15WEPXPRBifo\n"
520 "iFZ8337kgczkaY+IOfSuhtbOUyDOoDpRJheIKBNq0ZiTqtLbbadVAgMBAAE=\n"
521 "-----END RSA PUBLIC KEY-----\n"
522 "ntor-onion-key ncfiHJjSgdDEW/gc6q6/7idac7j+x7ejQrRm6i75pGA=\n"
523 "p accept 443,6660-6669,6697,7000-7001\n"
524 "id rsa1024 XXuLzw3mfBELEq3veXoNhdehwD4\n"
525 /* Good 2 */
526 "onion-key\n"
527 "-----BEGIN RSA PUBLIC KEY-----\n"
528 "MIGJAoGBANQfBlrHrh9F/CAOytrNFgi0ikWMW/HZxuoszF9X+AQ+MudR8bcxxOGl\n"
529 "1RFwb74s8E3uuzrCkNFvSw9Ar1L02F2DOX0gLsxEGuYC4Ave9NUteGqSqDyEJQUJ\n"
530 "KlfxCPn2qC9nvNT7wR/Dg2WRvAEKnJmkpb57N3+WSAOPLjKOFEz3AgMBAAE=\n"
531 "-----END RSA PUBLIC KEY-----\n"
532 "ntor-onion-key AppBt6CSeb1kKid/36ototmFA24ddfW5JpjWPLuoJgs=\n"
533 "id rsa1024 6y60AEI9a1PUUlRPO0YQT9WzrjI\n"
534 /* Bad 1: Here I've messed with the ntor key */
535 "onion-key\n"
536 "-----BEGIN RSA PUBLIC KEY-----\n"
537 "MIGJAoGBAPjy2HacU3jDNO5nTOFGSwNa0qKCNn4yhtrDVcAJ5alIQeBWZZGJLZ0q\n"
538 "Cqylw1vYqxu8E09g+QXXFbAgBv1U9TICaATxrIJhIJzc8TJPhqJemp1kq0DvHLDx\n"
539 "mxwlkNnCD/P5NS+JYB3EjOlU9EnSKUWNU61+Co344m2JqhEau40vAgMBAAE=\n"
540 "-----END RSA PUBLIC KEY-----\n"
541 "ntor-onion-key 4i2Fp9JHTUr1uQs0pxD5j5spl4/RG56S2P0gQxU=\n"
542 "id rsa1024 nMRmNEGysA0NmlALVaUmI7D5jLU\n"
543 /* Good 3: I've added a weird token in this one. This shouldn't prevent
544 * it parsing */
545 "onion-key\n"
546 "-----BEGIN RSA PUBLIC KEY-----\n"
547 "MIGJAoGBAKmosxudyNA/yJNz3S890VqV/ebylzoD11Sc0b/d5tyNNaNZjcYy5vRD\n"
548 "kwyxFRMbP2TLZQ1zRfNwY7IDnYjU2SbW0pxuM6M8WRtsmx/YOE3kHMVAFJNrTUqU\n"
549 "6D1zB3IiRDS5q5+NoRxwqo+hYUck60O3WTwEoqb+l3lvXeu7z9rFAgMBAAE=\n"
550 "-----END RSA PUBLIC KEY-----\n"
551 "flux-capacitor 1.21 GW\n"
552 "ntor-onion-key MWBoEkl+RlBiGX44XKIvTSqbznTNZStOmUYtcYRQQyY=\n"
553 "id rsa1024 R+A5O9qRvRac4FT3C4L2QnFyxsc\n"
554 /* Good 4: Here I've made the 'id rsa' token odd. It should still parse
555 * just fine. */
556 "onion-key\n"
557 "-----BEGIN RSA PUBLIC KEY-----\n"
558 "MIGJAoGBAOh+WMkdNe/Pkjb8UjQyfLOlFgpuVFrxAIGnJsmWWx0yBE97DQxGyh2n\n"
559 "h8G5OJZHRarJQyCIf7vpZQAi0oP0OkGGaCaDQsM+D8TnqhnU++RWGnMqY/cXxPrL\n"
560 "MEq+n6aGiLmzkO7ah8yorZpoREk4GqLUIN89/tHHGOhJL3c4CPGjAgMBAAE=\n"
561 "-----END RSA PUBLIC KEY-----\n"
562 "p reject 25,119,135-139,445,563,1214,4661-4666,6346-6429,6699,6881-6999\n"
563 "id rsa1234 jlqAKFD2E7uMKv+8TmKSeo7NBho\n"
564 /* Good 5: Extra id type. */
565 "onion-key\n"
566 "-----BEGIN RSA PUBLIC KEY-----\n"
567 "MIGJAoGBAMdgPPc5uaw4y/q+SUTN/I8Y+Gvdx9kKgWV4dmDGJ0mxsVZmo1v6+v3F\n"
568 "12M2f9m99G3WB8F8now29C+9XyEv8MBHj1lHRdUFHSQes3YTFvDNlgj+FjLqO5TJ\n"
569 "adOOmfu4DCUUtUEDyQKbNVL4EkMTXY73omTVsjcH3xxFjTx5wixhAgMBAAE=\n"
570 "-----END RSA PUBLIC KEY-----\n"
571 "ntor-onion-key AAVnWZcnDbxasdZwKqb4fL6O9sZV+XsRNHTpNd1YMz8=\n"
572 "id rsa1024 72EfBL11QuwX2vU8y+p9ExGfGEg\n"
573 "id expolding hedgehog 0+A5O9qRvRac4FT3C4L2QnFyxsc\n"
574 /* Good 6: I've given this a bogus policy. It should parse. */
575 "onion-key\n"
576 "-----BEGIN RSA PUBLIC KEY-----\n"
577 "MIGJAoGBALNuufwhPMF8BooxYMNvhYJMPqUB8hQDt8wGmPKphJcD1sVD1i4gAZM2\n"
578 "HIo+zUBlljDrRWL5NzVzd1yxUJAiQxvXS5dRRFY3B70M7wTVpXw53xe0/BM5t1AX\n"
579 "n0MFk7Jl6XIKMlzRalZvmMvE/odtyWXkP4Nd1MyZ1QcIwrQ2iwyrAgMBAAE=\n"
580 "-----END RSA PUBLIC KEY-----\n"
581 "p condone 1-10\n"
582 "ntor-onion-key 2/nMJ+L4dd/2GpMyTYjz3zC59MvQy4MIzJZhdzKHekg=\n"
583 "id rsa1024 FHyh10glEMA6MCmBb5R9Y+X/MhQ\n"
584 /* Good 7: I've given this one another sort of odd policy. Should parse. */
585 "onion-key\n"
586 "-----BEGIN RSA PUBLIC KEY-----\n"
587 "MIGJAoGBAKcd3FmQ8iAADghyvX8eca0ePqtJ2w1IDdUdTlf5Y/8+OMdp//sD01yC\n"
588 "YmiX45LK5ge1O3AzcakYCO6fb3pyIqvXdvm24OjyYZELQ40cmKSLjdhcSf4Fr/N9\n"
589 "uR/CkknR9cEePu1wZ5WBIGmGdXI6s7t3LB+e7XFyBYAx6wMGlnX7AgMBAAE=\n"
590 "-----END RSA PUBLIC KEY-----\n"
591 "p accept frogs-mice\n"
592 "ntor-onion-key AMxvhaQ1Qg7jBJFoyHuPRgETvLbFmJ194hExV24FuAI=\n"
593 "family $D8CFEA0D996F5D1473D2063C041B7910DB23981E\n"
594 "id rsa1024 d0VVZC/cHh1P3y4MMbfKlQHFycc\n"
595 /* Good 8: This one has the ntor-onion-key without terminating =. That's
596 * allowed. */
597 "onion-key\n"
598 "-----BEGIN RSA PUBLIC KEY-----\n"
599 "MIGJAoGBAL438YfjrJE2SPqkkXeQwICygu8KNO54Juj6sjqk5hgsiazIWMOBgbaX\n"
600 "LIRqPNGaiSq01xSqwjwCBCfwZYT/nSdDBqj1h9aoR8rnjxZjyQ+m3rWpdDqeCDMx\n"
601 "I3NgZ5w4bNX4poRb42lrV6NmQiFdjzpqszVbv5Lpn2CSKu32CwKVAgMBAAE=\n"
602 "-----END RSA PUBLIC KEY-----\n"
603 "ntor-onion-key UKL6Dnj2KwYsFlkCvOkXVatxvOPB4MaxqwPQQgZMTwI\n"
604 "id rsa1024 FPIXc6k++JnKCtSKWUxaR6oXEKs\n"
605 /* Good 9: Another totally normal one.*/
606 "onion-key\n"
607 "-----BEGIN RSA PUBLIC KEY-----\n"
608 "MIGJAoGBANNGIKRd8PFNXkJ2JPV1ohDMFNbJwKbwybeieaQFjtU9KWedHCbr+QD4\n"
609 "B6zNY5ysguNjHNnlq2f6D09+uhnfDBON8tAz0mPQH/6JqnOXm+EiUn+8bN0E8Nke\n"
610 "/i3GEgDeaxJJMNQcpsJvmmSmKFOlYy9Fy7ejAjTGqtAnqOte7BnTAgMBAAE=\n"
611 "-----END RSA PUBLIC KEY-----\n"
612 "ntor-onion-key gUsq3e5iYgsQQvyxINtLzBpHxmIt5rtuFlEbKfI4gFk=\n"
613 "id rsa1024 jv+LdatDzsMfEW6pLBeL/5uzwCc\n"
614 /* Bad 2: RSA key has bad exponent of 3. */
615 "onion-key\n"
616 "-----BEGIN RSA PUBLIC KEY-----\n"
617 "MIGHAoGBAMMTWtvPxYnUNJ5Y7B+XENcpxzPoGstrdiUszCBS+/42xvluLJ+JDSdR\n"
618 "qJaMD6ax8vKAeLS5C6O17MNdG2VldlPRbtgl41MXsOoUqEJ+nY9e3WG9Snjp47xC\n"
619 "zmWIfeduXSavIsb3a43/MLIz/9qO0TkgAAiuQr79JlwKhLdzCqTLAgED\n"
620 "-----END RSA PUBLIC KEY-----\n"
621 "ntor-onion-key NkRB4wTUFogiVp5jYmjGORe2ffb/y5Kk8Itw8jdzMjA=\n"
622 "p reject 25,119,135-139,445,563,1214,4661-4666,6346-6429,6699,6881-6999\n"
623 "id rsa1024 fKvYjP7TAjCC1FzYee5bYAwYkoDg\n"
624 /* Bad 3: Bogus annotation */
625 "@last-listed with strange aeons\n"
626 "onion-key\n"
627 "-----BEGIN RSA PUBLIC KEY-----\n"
628 "MIGJAoGBALcRBFNCZtpd2TFJysU77/fJMFzKisRQEBOtDGtTZ2Bg4aEGosssa0Id\n"
629 "YtUagRLYle08QVGvGB+EHBI5qf6Ah2yPH7k5QiN2a3Sq+nyh85dXKPazBGBBbM+C\n"
630 "DOfDauV02CAnADNMLJEf1voY3oBVvYyIsmHxn5i1R19ZYIiR8NX5AgMBAAE=\n"
631 "-----END RSA PUBLIC KEY-----\n"
632 "ntor-onion-key m4xcFXMWMjCvZDXq8FT3XmS0EHYseGOeu+fV+6FYDlk=\n"
633 "p accept 20-23,43,53,79-81,88,110,143,194,220,389,443,464,531,543-544\n"
634 "id rsa1024 SSbfNE9vmaiwRKH+eqNAkiKQhds\n"
635 /* Good 10: Normal, with added ipv6 address and added other address */
636 "onion-key\n"
637 "-----BEGIN RSA PUBLIC KEY-----\n"
638 "MIGJAoGBAM7uUtq5F6h63QNYIvC+4NcWaD0DjtnrOORZMkdpJhinXUOwce3cD5Dj\n"
639 "sgdN1wJpWpTQMXJ2DssfSgmOVXETP7qJuZyRprxalQhaEATMDNJA/66Ml1jSO9mZ\n"
640 "+8Xb7m/4q778lNtkSbsvMaYD2Dq6k2QQ3kMhr9z8oUtX0XA23+pfAgMBAAE=\n"
641 "-----END RSA PUBLIC KEY-----\n"
642 "a [::1:2:3:4]:9090\n"
643 "a 18.0.0.1:9999\n"
644 "ntor-onion-key k2yFqTU2vzMCQDEiE/j9UcEHxKrXMLpB3IL0or09sik=\n"
645 "id rsa1024 2A8wYpHxnkKJ92orocvIQBzeHlE\n"
646 "p6 allow 80\n"
649 /** More tests for parsing different kinds of microdescriptors, and getting
650 * invalid digests trackd from them. */
651 static void
652 test_md_parse(void *arg)
654 (void) arg;
655 char *mem_op_hex_tmp = NULL;
656 smartlist_t *invalid = smartlist_new();
658 smartlist_t *mds = microdescs_parse_from_string(MD_PARSE_TEST_DATA,
659 NULL, 1, SAVED_NOWHERE,
660 invalid);
661 tt_int_op(smartlist_len(mds), OP_EQ, 11);
662 tt_int_op(smartlist_len(invalid), OP_EQ, 4);
664 test_memeq_hex(smartlist_get(invalid,0),
665 "5d76bf1c6614e885614a1e0ad074e1ab"
666 "4ea14655ebeefb1736a71b5ed8a15a51");
667 test_memeq_hex(smartlist_get(invalid,1),
668 "2fde0ee3343669c2444cd9d53cbd39c6"
669 "a7d1fc0513513e840ca7f6e68864b36c");
670 test_memeq_hex(smartlist_get(invalid,2),
671 "20d1576c5ab11bbcff0dedb1db4a3cfc"
672 "c8bc8dd839d8cbfef92d00a1a7d7b294");
673 test_memeq_hex(smartlist_get(invalid,3),
674 "074770f394c73dbde7b44412e9692add"
675 "691a478d4727f9804b77646c95420a96");
677 /* Spot-check the valid ones. */
678 const microdesc_t *md = smartlist_get(mds, 5);
679 test_memeq_hex(md->digest,
680 "54bb6d733ddeb375d2456c79ae103961"
681 "da0cae29620375ac4cf13d54da4d92b3");
682 tt_int_op(md->last_listed, OP_EQ, 0);
683 tt_int_op(md->saved_location, OP_EQ, SAVED_NOWHERE);
684 tt_int_op(md->no_save, OP_EQ, 0);
685 tt_uint_op(md->held_in_map, OP_EQ, 0);
686 tt_uint_op(md->held_by_nodes, OP_EQ, 0);
687 tt_assert(md->onion_curve25519_pkey);
689 md = smartlist_get(mds, 6);
690 test_memeq_hex(md->digest,
691 "53f740bd222ab37f19f604b1d3759aa6"
692 "5eff1fbce9ac254bd0fa50d4af9b1bae");
693 tt_assert(! md->exit_policy);
695 md = smartlist_get(mds, 8);
696 test_memeq_hex(md->digest,
697 "a0a155562d8093d8fd0feb7b93b7226e"
698 "17f056c2142aab7a4ea8c5867a0376d5");
699 tt_assert(md->onion_curve25519_pkey);
701 md = smartlist_get(mds, 10);
702 test_memeq_hex(md->digest,
703 "409ebd87d23925a2732bd467a92813c9"
704 "21ca378fcb9ca193d354c51550b6d5e9");
705 tt_assert(tor_addr_family(&md->ipv6_addr) == AF_INET6);
706 tt_int_op(md->ipv6_orport, OP_EQ, 9090);
708 done:
709 SMARTLIST_FOREACH(mds, microdesc_t *, md, microdesc_free(md));
710 smartlist_free(mds);
711 SMARTLIST_FOREACH(invalid, char *, cp, tor_free(cp));
712 smartlist_free(invalid);
713 tor_free(mem_op_hex_tmp);
716 static int mock_rgsbd_called = 0;
717 static routerstatus_t *mock_rgsbd_val_a = NULL;
718 static routerstatus_t *mock_rgsbd_val_b = NULL;
719 static routerstatus_t *
720 mock_router_get_status_by_digest(networkstatus_t *c, const char *d)
722 (void) c;
723 ++mock_rgsbd_called;
725 if (fast_memeq(d, "\x5d\x76", 2)) {
726 memcpy(mock_rgsbd_val_a->descriptor_digest, d, 32);
727 return mock_rgsbd_val_a;
728 } else if (fast_memeq(d, "\x20\xd1", 2)) {
729 memcpy(mock_rgsbd_val_b->descriptor_digest, d, 32);
730 return mock_rgsbd_val_b;
731 } else {
732 return NULL;
736 static networkstatus_t *mock_ns_val = NULL;
737 static networkstatus_t *
738 mock_ns_get_by_flavor(consensus_flavor_t f)
740 (void)f;
741 return mock_ns_val;
744 static void
745 test_md_reject_cache(void *arg)
747 (void) arg;
748 microdesc_cache_t *mc = NULL ;
749 smartlist_t *added = NULL, *wanted = smartlist_new();
750 or_options_t *options = get_options_mutable();
751 char buf[DIGEST256_LEN];
753 tor_free(options->DataDirectory);
754 options->DataDirectory = tor_strdup(get_fname("md_datadir_test_rej"));
755 mock_rgsbd_val_a = tor_malloc_zero(sizeof(routerstatus_t));
756 mock_rgsbd_val_b = tor_malloc_zero(sizeof(routerstatus_t));
757 mock_ns_val = tor_malloc_zero(sizeof(networkstatus_t));
759 mock_ns_val->valid_after = time(NULL) - 86400;
760 mock_ns_val->valid_until = time(NULL) + 86400;
761 mock_ns_val->flavor = FLAV_MICRODESC;
763 #ifdef _WIN32
764 tt_int_op(0, OP_EQ, mkdir(options->DataDirectory));
765 #else
766 tt_int_op(0, OP_EQ, mkdir(options->DataDirectory, 0700));
767 #endif
769 MOCK(router_get_mutable_consensus_status_by_descriptor_digest,
770 mock_router_get_status_by_digest);
771 MOCK(networkstatus_get_latest_consensus_by_flavor, mock_ns_get_by_flavor);
773 mc = get_microdesc_cache();
774 #define ADD(hex) \
775 do { \
776 tt_int_op(0,OP_EQ,base16_decode(buf,sizeof(buf),hex,strlen(hex))); \
777 smartlist_add(wanted, tor_memdup(buf, DIGEST256_LEN)); \
778 } while (0)
780 /* invalid,0 */
781 ADD("5d76bf1c6614e885614a1e0ad074e1ab4ea14655ebeefb1736a71b5ed8a15a51");
782 /* invalid,2 */
783 ADD("20d1576c5ab11bbcff0dedb1db4a3cfcc8bc8dd839d8cbfef92d00a1a7d7b294");
784 /* valid, 6 */
785 ADD("53f740bd222ab37f19f604b1d3759aa65eff1fbce9ac254bd0fa50d4af9b1bae");
786 /* valid, 8 */
787 ADD("a0a155562d8093d8fd0feb7b93b7226e17f056c2142aab7a4ea8c5867a0376d5");
789 added = microdescs_add_to_cache(mc, MD_PARSE_TEST_DATA, NULL,
790 SAVED_NOWHERE, 0, time(NULL), wanted);
792 tt_int_op(smartlist_len(added), OP_EQ, 2);
793 tt_int_op(mock_rgsbd_called, OP_EQ, 2);
794 tt_int_op(mock_rgsbd_val_a->dl_status.n_download_failures, OP_EQ, 255);
795 tt_int_op(mock_rgsbd_val_b->dl_status.n_download_failures, OP_EQ, 255);
797 done:
798 UNMOCK(networkstatus_get_latest_consensus_by_flavor);
799 UNMOCK(router_get_mutable_consensus_status_by_descriptor_digest);
800 tor_free(options->DataDirectory);
801 microdesc_free_all();
802 smartlist_free(added);
803 SMARTLIST_FOREACH(wanted, char *, cp, tor_free(cp));
804 smartlist_free(wanted);
805 tor_free(mock_rgsbd_val_a);
806 tor_free(mock_rgsbd_val_b);
807 tor_free(mock_ns_val);
810 static void
811 test_md_corrupt_desc(void *arg)
813 char *cp = NULL;
814 smartlist_t *sl = NULL;
815 (void) arg;
817 sl = microdescs_add_to_cache(get_microdesc_cache(),
818 "@last-listed 2015-06-22 10:00:00\n"
819 "onion-k\n",
820 NULL, SAVED_IN_JOURNAL, 0, time(NULL), NULL);
821 tt_int_op(smartlist_len(sl), ==, 0);
822 smartlist_free(sl);
824 sl = microdescs_add_to_cache(get_microdesc_cache(),
825 "@last-listed 2015-06-22 10:00:00\n"
826 "wiggly\n",
827 NULL, SAVED_IN_JOURNAL, 0, time(NULL), NULL);
828 tt_int_op(smartlist_len(sl), ==, 0);
829 smartlist_free(sl);
831 tor_asprintf(&cp, "%s\n%s", test_md1, "@foobar\nonion-wobble\n");
833 sl = microdescs_add_to_cache(get_microdesc_cache(),
834 cp, cp+strlen(cp),
835 SAVED_IN_JOURNAL, 0, time(NULL), NULL);
836 tt_int_op(smartlist_len(sl), ==, 0);
838 done:
839 tor_free(cp);
840 smartlist_free(sl);
843 struct testcase_t microdesc_tests[] = {
844 { "cache", test_md_cache, TT_FORK, NULL, NULL },
845 { "broken_cache", test_md_cache_broken, TT_FORK, NULL, NULL },
846 { "generate", test_md_generate, 0, NULL, NULL },
847 { "parse", test_md_parse, 0, NULL, NULL },
848 { "reject_cache", test_md_reject_cache, TT_FORK, NULL, NULL },
849 { "corrupt_desc", test_md_corrupt_desc, TT_FORK, NULL, NULL },
850 END_OF_TESTCASES