aboutsummaryrefslogtreecommitdiff
path: root/src/test/test_hs.c
diff options
context:
space:
mode:
authorQingping Hou <dave2008713@gmail.com>2013-12-18 01:40:05 -0500
committerQingping Hou <dave2008713@gmail.com>2014-01-29 22:43:11 -0500
commit0b0d4b4ebcfe3711a8bcd27cbbdc05cd02530f38 (patch)
tree4c2a978ae24168a1dec0dff5105e88c87c37d135 /src/test/test_hs.c
parent29c18f5b71d73a03b9895fbbf97a3a5a16099a50 (diff)
downloadtor-0b0d4b4ebcfe3711a8bcd27cbbdc05cd02530f38.tar
tor-0b0d4b4ebcfe3711a8bcd27cbbdc05cd02530f38.tar.gz
add test case for hidden service async events
Diffstat (limited to 'src/test/test_hs.c')
-rw-r--r--src/test/test_hs.c115
1 files changed, 115 insertions, 0 deletions
diff --git a/src/test/test_hs.c b/src/test/test_hs.c
new file mode 100644
index 000000000..a9e664439
--- /dev/null
+++ b/src/test/test_hs.c
@@ -0,0 +1,115 @@
+/* Copyright (c) 2007-2013, The Tor Project, Inc. */
+/* See LICENSE for licensing information */
+
+/**
+ * \file test_hs.c
+ * \brief Unit tests for hidden service.
+ **/
+
+#define CONTROL_PRIVATE
+#include "or.h"
+#include "test.h"
+#include "control.h"
+
+/* Helper global variable for hidden service descriptor event test.
+ * It's used as a pointer to dynamically created message buffer in
+ * send_control_event_string_replacement function, which mocks
+ * send_control_event_string function.
+ *
+ * Always free it after use! */
+static char *received_msg = NULL;
+
+/** Mock function for send_control_event_string
+ */
+static void
+send_control_event_string_replacement(uint16_t event, event_format_t which,
+ const char *msg)
+{
+ int msg_len;
+
+ (void) event;
+ (void) which;
+ msg_len = strlen(msg);
+ received_msg = tor_malloc_zero(msg_len+1);
+ strncpy(received_msg, msg, msg_len);
+}
+
+/** Make sure each hidden service descriptor async event generation
+ *
+ * function generates the message in expected format.
+ */
+static void
+test_hs_desc_event(void *arg)
+{
+ #define STR_HS_ADDR "ajhb7kljbiru65qo"
+ #define STR_HS_DIR_LONGNAME \
+ "$AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=TestDir at 1.2.3.4"
+ #define STR_HS_ID "b3oeducbhjmbqmgw2i3jtz4fekkrinwj"
+
+ rend_data_t rend_query;
+ const char *expected_msg;
+
+ (void) arg;
+ MOCK(send_control_event_string,
+ send_control_event_string_replacement);
+
+ /* setup rend_query struct */
+ strncpy(rend_query.onion_address, STR_HS_ADDR,
+ REND_SERVICE_ID_LEN_BASE32+1);
+ rend_query.auth_type = 0;
+
+ /* test request event */
+ control_event_hs_descriptor_requested(&rend_query, STR_HS_DIR_LONGNAME,
+ STR_HS_ID);
+ expected_msg =
+ "650 HS_DESC REQUESTED "STR_HS_ADDR" NO_AUTH "STR_HS_DIR_LONGNAME\
+ " "STR_HS_ID"\r\n";
+ test_assert(received_msg);
+ test_streq(received_msg, expected_msg);
+ tor_free(received_msg);
+ received_msg = NULL;
+
+ /* test received event */
+ rend_query.auth_type = 1;
+ control_event_hs_descriptor_received(&rend_query, STR_HS_DIR_LONGNAME);
+ expected_msg =
+ "650 HS_DESC RECEIVED "STR_HS_ADDR" BASIC_AUTH "STR_HS_DIR_LONGNAME"\r\n";
+ test_assert(received_msg);
+ test_streq(received_msg, expected_msg);
+ tor_free(received_msg);
+ received_msg = NULL;
+
+ /* test failed event */
+ rend_query.auth_type = 2;
+ control_event_hs_descriptor_failed(&rend_query, STR_HS_DIR_LONGNAME);
+ expected_msg =
+ "650 HS_DESC FAILED "STR_HS_ADDR" STEALTH_AUTH "STR_HS_DIR_LONGNAME"\r\n";
+ test_assert(received_msg);
+ test_streq(received_msg, expected_msg);
+ tor_free(received_msg);
+ received_msg = NULL;
+
+ /* test invalid auth type */
+ rend_query.auth_type = 999;
+ control_event_hs_descriptor_failed(&rend_query, STR_HS_DIR_LONGNAME);
+ expected_msg =
+ "650 HS_DESC FAILED "STR_HS_ADDR" UNKNOWN "STR_HS_DIR_LONGNAME"\r\n";
+ test_assert(received_msg);
+ test_streq(received_msg, expected_msg);
+ tor_free(received_msg);
+ received_msg = NULL;
+
+ done:
+ UNMOCK(send_control_event_string);
+ if (received_msg) {
+ tor_free(received_msg);
+ received_msg = NULL;
+ }
+}
+
+struct testcase_t hs_tests[] = {
+ { "hs_desc_event", test_hs_desc_event, TT_FORK,
+ NULL, NULL },
+ END_OF_TESTCASES
+};
+