mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-28 06:13:31 +01:00
Add get_interface_address[6]_list for a list of interface IP addresses
Add get_interface_address[6]_list by refactoring
get_interface_address6. Add unit tests for new and existing functions.
Preparation for ticket 17027. Patch by "teor".
Patch on 42b8fb5a15
(11 Nov 2007), released in 0.2.0.11-alpha.
This commit is contained in:
parent
a444b11323
commit
31eb486c46
5
changes/bug17027-reject-private-all-interfaces
Normal file
5
changes/bug17027-reject-private-all-interfaces
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
o Minor bug fixes (security, exit policies):
|
||||||
|
- Add get_interface_address[6]_list by refactoring
|
||||||
|
get_interface_address6. Add unit tests for new and existing functions.
|
||||||
|
Preparation for ticket 17027. Patch by "teor".
|
||||||
|
Patch on 42b8fb5a1523 (11 Nov 2007), released in 0.2.0.11-alpha.
|
@ -1503,7 +1503,7 @@ get_interface_addresses_raw(int severity)
|
|||||||
}
|
}
|
||||||
|
|
||||||
/** Return true iff <b>a</b> is a multicast address. */
|
/** Return true iff <b>a</b> is a multicast address. */
|
||||||
static int
|
STATIC int
|
||||||
tor_addr_is_multicast(const tor_addr_t *a)
|
tor_addr_is_multicast(const tor_addr_t *a)
|
||||||
{
|
{
|
||||||
sa_family_t family = tor_addr_family(a);
|
sa_family_t family = tor_addr_family(a);
|
||||||
@ -1593,27 +1593,26 @@ get_interface_address6_via_udp_socket_hack(int severity,
|
|||||||
return r;
|
return r;
|
||||||
}
|
}
|
||||||
|
|
||||||
/** Set *<b>addr</b> to the IP address (if any) of whatever interface
|
/** Set *<b>addr</b> to an arbitrary IP address (if any) of an interface that
|
||||||
* connects to the Internet. This address should only be used in checking
|
* connects to the Internet. Prefer public IP addresses to internal IP
|
||||||
* whether our address has changed. Return 0 on success, -1 on failure.
|
* addresses. This address should only be used in checking whether our
|
||||||
|
* address has changed, as it may be an internal IP address. Return 0 on
|
||||||
|
* success, -1 on failure.
|
||||||
|
* Prefer get_interface_address6_list for a list of all addresses on all
|
||||||
|
* interfaces which connect to the Internet.
|
||||||
*/
|
*/
|
||||||
MOCK_IMPL(int,
|
MOCK_IMPL(int,
|
||||||
get_interface_address6,(int severity, sa_family_t family, tor_addr_t *addr))
|
get_interface_address6,(int severity, sa_family_t family, tor_addr_t *addr))
|
||||||
{
|
{
|
||||||
/* XXX really, this function should yield a smartlist of addresses. */
|
|
||||||
smartlist_t *addrs;
|
smartlist_t *addrs;
|
||||||
tor_assert(addr);
|
tor_assert(addr);
|
||||||
|
|
||||||
/* Try to do this the smart way if possible. */
|
/* Get a list of public or internal IPs in arbitrary order */
|
||||||
if ((addrs = get_interface_addresses_raw(severity))) {
|
if ((addrs = get_interface_address6_list(severity, family, 1))) {
|
||||||
int rv = -1;
|
int rv = -1;
|
||||||
|
/* Find the first non-internal address, or the last internal address
|
||||||
|
* Ideally, we want the default route, see #12377 for details */
|
||||||
SMARTLIST_FOREACH_BEGIN(addrs, tor_addr_t *, a) {
|
SMARTLIST_FOREACH_BEGIN(addrs, tor_addr_t *, a) {
|
||||||
if (family != AF_UNSPEC && family != tor_addr_family(a))
|
|
||||||
continue;
|
|
||||||
if (tor_addr_is_loopback(a) ||
|
|
||||||
tor_addr_is_multicast(a))
|
|
||||||
continue;
|
|
||||||
|
|
||||||
tor_addr_copy(addr, a);
|
tor_addr_copy(addr, a);
|
||||||
rv = 0;
|
rv = 0;
|
||||||
|
|
||||||
@ -1623,13 +1622,78 @@ get_interface_address6,(int severity, sa_family_t family, tor_addr_t *addr))
|
|||||||
break;
|
break;
|
||||||
} SMARTLIST_FOREACH_END(a);
|
} SMARTLIST_FOREACH_END(a);
|
||||||
|
|
||||||
SMARTLIST_FOREACH(addrs, tor_addr_t *, a, tor_free(a));
|
free_interface_address6_list(addrs);
|
||||||
smartlist_free(addrs);
|
|
||||||
return rv;
|
return rv;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Free a smartlist of IP addresses returned by get_interface_address6_list.
|
||||||
|
*/
|
||||||
|
void free_interface_address6_list(smartlist_t *addrs) {
|
||||||
|
SMARTLIST_FOREACH(addrs, tor_addr_t *, a, tor_free(a));
|
||||||
|
smartlist_free(addrs);
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Return a smartlist of the IP addresses of type family from all interfaces
|
||||||
|
* on the server. Excludes loopback and multicast addresses. Only includes
|
||||||
|
* internal addresses if include_internal is true. (Note that a relay behind
|
||||||
|
* NAT may use an internal address to connect to the Internet.)
|
||||||
|
* An empty smartlist means that there are no addresses of the selected type
|
||||||
|
* matching these criteria.
|
||||||
|
* Returns NULL on failure.
|
||||||
|
* Use free_interface_address6_list to free the returned list.
|
||||||
|
*/
|
||||||
|
MOCK_IMPL(smartlist_t *,get_interface_address6_list,(int severity,
|
||||||
|
sa_family_t family,
|
||||||
|
int include_internal))
|
||||||
|
{
|
||||||
|
smartlist_t *addrs;
|
||||||
|
tor_addr_t addr;
|
||||||
|
|
||||||
|
/* Try to do this the smart way if possible. */
|
||||||
|
if ((addrs = get_interface_addresses_raw(severity))) {
|
||||||
|
SMARTLIST_FOREACH_BEGIN(addrs, tor_addr_t *, a) {
|
||||||
|
if (family != AF_UNSPEC && family != tor_addr_family(a)){
|
||||||
|
SMARTLIST_DEL_CURRENT(addrs, a);
|
||||||
|
tor_free(a);
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (tor_addr_is_loopback(a) ||
|
||||||
|
tor_addr_is_multicast(a)) {
|
||||||
|
SMARTLIST_DEL_CURRENT(addrs, a);
|
||||||
|
tor_free(a);
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!include_internal && tor_addr_is_internal(a, 0)){
|
||||||
|
SMARTLIST_DEL_CURRENT(addrs, a);
|
||||||
|
tor_free(a);
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
} SMARTLIST_FOREACH_END(a);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (addrs && smartlist_len(addrs) > 0) {
|
||||||
|
return addrs;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* if we removed all entries as unsuitable */
|
||||||
|
if (addrs) {
|
||||||
|
smartlist_free(addrs);
|
||||||
|
}
|
||||||
|
|
||||||
/* Okay, the smart way is out. */
|
/* Okay, the smart way is out. */
|
||||||
return get_interface_address6_via_udp_socket_hack(severity,family,addr);
|
get_interface_address6_via_udp_socket_hack(severity,family,&addr);
|
||||||
|
if (!include_internal && tor_addr_is_internal(&addr, 0)) {
|
||||||
|
return smartlist_new();
|
||||||
|
} else {
|
||||||
|
addrs = smartlist_new();
|
||||||
|
smartlist_add(addrs, tor_dup_addr(&addr));
|
||||||
|
return addrs;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/* ======
|
/* ======
|
||||||
@ -1871,10 +1935,13 @@ tor_dup_ip(uint32_t addr)
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Set *<b>addr</b> to the host-order IPv4 address (if any) of whatever
|
* Set *<b>addr</b> to a host-order IPv4 address (if any) of an
|
||||||
* interface connects to the Internet. This address should only be used in
|
* interface that connects to the Internet. Prefer public IP addresses to
|
||||||
* checking whether our address has changed. Return 0 on success, -1 on
|
* internal IP addresses. This address should only be used in checking
|
||||||
* failure.
|
* whether our address has changed, as it may be an internal IPv4 address.
|
||||||
|
* Return 0 on success, -1 on failure.
|
||||||
|
* Prefer get_interface_address_list6 for a list of all IPv4 and IPv6
|
||||||
|
* addresses on all interfaces which connect to the Internet.
|
||||||
*/
|
*/
|
||||||
MOCK_IMPL(int,
|
MOCK_IMPL(int,
|
||||||
get_interface_address,(int severity, uint32_t *addr))
|
get_interface_address,(int severity, uint32_t *addr))
|
||||||
|
@ -15,6 +15,7 @@
|
|||||||
#include "orconfig.h"
|
#include "orconfig.h"
|
||||||
#include "torint.h"
|
#include "torint.h"
|
||||||
#include "compat.h"
|
#include "compat.h"
|
||||||
|
#include "container.h"
|
||||||
|
|
||||||
#ifdef ADDRESS_PRIVATE
|
#ifdef ADDRESS_PRIVATE
|
||||||
|
|
||||||
@ -43,7 +44,6 @@
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
// TODO win32 specific includes
|
// TODO win32 specific includes
|
||||||
#include "container.h"
|
|
||||||
#endif // ADDRESS_PRIVATE
|
#endif // ADDRESS_PRIVATE
|
||||||
|
|
||||||
/** The number of bits from an address to consider while doing a masked
|
/** The number of bits from an address to consider while doing a masked
|
||||||
@ -190,8 +190,13 @@ char *tor_dup_addr(const tor_addr_t *addr) ATTR_MALLOC;
|
|||||||
const char *fmt_addr_impl(const tor_addr_t *addr, int decorate);
|
const char *fmt_addr_impl(const tor_addr_t *addr, int decorate);
|
||||||
const char *fmt_addrport(const tor_addr_t *addr, uint16_t port);
|
const char *fmt_addrport(const tor_addr_t *addr, uint16_t port);
|
||||||
const char * fmt_addr32(uint32_t addr);
|
const char * fmt_addr32(uint32_t addr);
|
||||||
|
|
||||||
MOCK_DECL(int,get_interface_address6,(int severity, sa_family_t family,
|
MOCK_DECL(int,get_interface_address6,(int severity, sa_family_t family,
|
||||||
tor_addr_t *addr));
|
tor_addr_t *addr));
|
||||||
|
void free_interface_address6_list(smartlist_t * addrs);
|
||||||
|
MOCK_DECL(smartlist_t *,get_interface_address6_list,(int severity,
|
||||||
|
sa_family_t family,
|
||||||
|
int include_internal));
|
||||||
|
|
||||||
/** Flag to specify how to do a comparison between addresses. In an "exact"
|
/** Flag to specify how to do a comparison between addresses. In an "exact"
|
||||||
* comparison, addresses are equivalent only if they are in the same family
|
* comparison, addresses are equivalent only if they are in the same family
|
||||||
@ -269,11 +274,32 @@ int addr_mask_get_bits(uint32_t mask);
|
|||||||
int tor_inet_ntoa(const struct in_addr *in, char *buf, size_t buf_len);
|
int tor_inet_ntoa(const struct in_addr *in, char *buf, size_t buf_len);
|
||||||
char *tor_dup_ip(uint32_t addr) ATTR_MALLOC;
|
char *tor_dup_ip(uint32_t addr) ATTR_MALLOC;
|
||||||
MOCK_DECL(int,get_interface_address,(int severity, uint32_t *addr));
|
MOCK_DECL(int,get_interface_address,(int severity, uint32_t *addr));
|
||||||
|
/** Free a smartlist of IP addresses returned by get_interface_address_list.
|
||||||
|
*/
|
||||||
|
static INLINE void
|
||||||
|
free_interface_address_list(smartlist_t *addrs)
|
||||||
|
{
|
||||||
|
free_interface_address6_list(addrs);
|
||||||
|
}
|
||||||
|
/** Return a smartlist of the IPv4 addresses of all interfaces on the server.
|
||||||
|
* Excludes loopback and multicast addresses. Only includes internal addresses
|
||||||
|
* if include_internal is true. (Note that a relay behind NAT may use an
|
||||||
|
* internal address to connect to the Internet.)
|
||||||
|
* An empty smartlist means that there are no IPv4 addresses.
|
||||||
|
* Returns NULL on failure.
|
||||||
|
* Use free_interface_address_list to free the returned list.
|
||||||
|
*/
|
||||||
|
static INLINE smartlist_t *
|
||||||
|
get_interface_address_list(int severity, int include_internal)
|
||||||
|
{
|
||||||
|
return get_interface_address6_list(severity, AF_INET, include_internal);
|
||||||
|
}
|
||||||
|
|
||||||
tor_addr_port_t *tor_addr_port_new(const tor_addr_t *addr, uint16_t port);
|
tor_addr_port_t *tor_addr_port_new(const tor_addr_t *addr, uint16_t port);
|
||||||
|
|
||||||
#ifdef ADDRESS_PRIVATE
|
#ifdef ADDRESS_PRIVATE
|
||||||
STATIC smartlist_t *get_interface_addresses_raw(int severity);
|
STATIC smartlist_t *get_interface_addresses_raw(int severity);
|
||||||
|
STATIC int tor_addr_is_multicast(const tor_addr_t *a);
|
||||||
STATIC int get_interface_address6_via_udp_socket_hack(int severity,
|
STATIC int get_interface_address6_via_udp_socket_hack(int severity,
|
||||||
sa_family_t family,
|
sa_family_t family,
|
||||||
tor_addr_t *addr);
|
tor_addr_t *addr);
|
||||||
|
@ -74,37 +74,82 @@ sockaddr_in_from_string(const char *ip_str, struct sockaddr_in *out)
|
|||||||
}
|
}
|
||||||
|
|
||||||
/** Return 1 iff <b>smartlist</b> contains a tor_addr_t structure
|
/** Return 1 iff <b>smartlist</b> contains a tor_addr_t structure
|
||||||
* that points to 127.0.0.1. Otherwise, return 0.
|
* that is an IPv4 or IPv6 localhost address. Otherwise, return 0.
|
||||||
*/
|
*/
|
||||||
static int
|
static int
|
||||||
smartlist_contains_localhost_tor_addr(smartlist_t *smartlist)
|
smartlist_contains_localhost_tor_addr(smartlist_t *smartlist)
|
||||||
{
|
{
|
||||||
int found_localhost = 0;
|
|
||||||
|
|
||||||
struct sockaddr_in *sockaddr_localhost;
|
|
||||||
struct sockaddr_storage *sockaddr_to_check;
|
|
||||||
|
|
||||||
sockaddr_localhost = sockaddr_in_from_string("127.0.0.1",NULL);
|
|
||||||
|
|
||||||
sockaddr_to_check = tor_malloc(sizeof(struct sockaddr_in));
|
|
||||||
|
|
||||||
SMARTLIST_FOREACH_BEGIN(smartlist, tor_addr_t *, tor_addr) {
|
SMARTLIST_FOREACH_BEGIN(smartlist, tor_addr_t *, tor_addr) {
|
||||||
tor_addr_to_sockaddr(tor_addr,0,(struct sockaddr *)sockaddr_to_check,
|
if (tor_addr_is_loopback(tor_addr)) {
|
||||||
sizeof(struct sockaddr_in));
|
return 1;
|
||||||
|
|
||||||
if (sockaddr_in_are_equal((struct sockaddr_in *)sockaddr_to_check,
|
|
||||||
sockaddr_localhost)) {
|
|
||||||
found_localhost = 1;
|
|
||||||
break;
|
|
||||||
}
|
}
|
||||||
} SMARTLIST_FOREACH_END(tor_addr);
|
} SMARTLIST_FOREACH_END(tor_addr);
|
||||||
|
|
||||||
tor_free(sockaddr_localhost);
|
return 0;
|
||||||
tor_free(sockaddr_to_check);
|
|
||||||
|
|
||||||
return found_localhost;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/** Return 1 iff <b>smartlist</b> contains a tor_addr_t structure
|
||||||
|
* that is an IPv4 or IPv6 multicast address. Otherwise, return 0.
|
||||||
|
*/
|
||||||
|
static int
|
||||||
|
smartlist_contains_multicast_tor_addr(smartlist_t *smartlist)
|
||||||
|
{
|
||||||
|
SMARTLIST_FOREACH_BEGIN(smartlist, tor_addr_t *, tor_addr) {
|
||||||
|
if (tor_addr_is_multicast(tor_addr)) {
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
} SMARTLIST_FOREACH_END(tor_addr);
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Return 1 iff <b>smartlist</b> contains a tor_addr_t structure
|
||||||
|
* that is an IPv4 or IPv6 internal address. Otherwise, return 0.
|
||||||
|
*/
|
||||||
|
static int
|
||||||
|
smartlist_contains_internal_tor_addr(smartlist_t *smartlist)
|
||||||
|
{
|
||||||
|
SMARTLIST_FOREACH_BEGIN(smartlist, tor_addr_t *, tor_addr) {
|
||||||
|
if (tor_addr_is_internal(tor_addr, 0)) {
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
} SMARTLIST_FOREACH_END(tor_addr);
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Return 1 iff <b>smartlist</b> contains a tor_addr_t structure
|
||||||
|
* that is an IPv4 address. Otherwise, return 0.
|
||||||
|
*/
|
||||||
|
static int
|
||||||
|
smartlist_contains_ipv4_tor_addr(smartlist_t *smartlist)
|
||||||
|
{
|
||||||
|
SMARTLIST_FOREACH_BEGIN(smartlist, tor_addr_t *, tor_addr) {
|
||||||
|
if (tor_addr_is_v4(tor_addr)) {
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
} SMARTLIST_FOREACH_END(tor_addr);
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Return 1 iff <b>smartlist</b> contains a tor_addr_t structure
|
||||||
|
* that is an IPv6 address. Otherwise, return 0.
|
||||||
|
*/
|
||||||
|
static int
|
||||||
|
smartlist_contains_ipv6_tor_addr(smartlist_t *smartlist)
|
||||||
|
{
|
||||||
|
SMARTLIST_FOREACH_BEGIN(smartlist, tor_addr_t *, tor_addr) {
|
||||||
|
/* Since there's no tor_addr_is_v6, assume all non-v4s are v6 */
|
||||||
|
if (!tor_addr_is_v4(tor_addr)) {
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
} SMARTLIST_FOREACH_END(tor_addr);
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
#ifdef HAVE_IFADDRS_TO_SMARTLIST
|
#ifdef HAVE_IFADDRS_TO_SMARTLIST
|
||||||
static void
|
static void
|
||||||
test_address_ifaddrs_to_smartlist(void *arg)
|
test_address_ifaddrs_to_smartlist(void *arg)
|
||||||
@ -634,12 +679,168 @@ test_address_udp_socket_trick_blackbox(void *arg)
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static void
|
||||||
|
test_address_get_if_addrs_list_internal(void *arg)
|
||||||
|
{
|
||||||
|
smartlist_t *results = NULL;
|
||||||
|
|
||||||
|
(void)arg;
|
||||||
|
|
||||||
|
results = get_interface_address_list(LOG_ERR, 1);
|
||||||
|
|
||||||
|
tt_assert(results != NULL);
|
||||||
|
/* Assume every system has at least 1 non-local non-multicast IPv4
|
||||||
|
* interface, even if it is an internal one */
|
||||||
|
tt_int_op(smartlist_len(results),>=,1);
|
||||||
|
|
||||||
|
tt_assert(!smartlist_contains_localhost_tor_addr(results));
|
||||||
|
tt_assert(!smartlist_contains_multicast_tor_addr(results));
|
||||||
|
/* The list may or may not contain internal addresses */
|
||||||
|
|
||||||
|
tt_assert(smartlist_contains_ipv4_tor_addr(results));
|
||||||
|
tt_assert(!smartlist_contains_ipv6_tor_addr(results));
|
||||||
|
|
||||||
|
done:
|
||||||
|
free_interface_address_list(results);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void
|
||||||
|
test_address_get_if_addrs_list_no_internal(void *arg)
|
||||||
|
{
|
||||||
|
smartlist_t *results = NULL;
|
||||||
|
|
||||||
|
(void)arg;
|
||||||
|
|
||||||
|
results = get_interface_address_list(LOG_ERR, 0);
|
||||||
|
|
||||||
|
tt_assert(results != NULL);
|
||||||
|
/* Work even on systems with only internal IPv4 addresses */
|
||||||
|
tt_int_op(smartlist_len(results),>=,0);
|
||||||
|
|
||||||
|
tt_assert(!smartlist_contains_localhost_tor_addr(results));
|
||||||
|
tt_assert(!smartlist_contains_multicast_tor_addr(results));
|
||||||
|
tt_assert(!smartlist_contains_internal_tor_addr(results));
|
||||||
|
|
||||||
|
/* The list may or may not contain IPv4 addresses */
|
||||||
|
tt_assert(!smartlist_contains_ipv6_tor_addr(results));
|
||||||
|
|
||||||
|
done:
|
||||||
|
free_interface_address_list(results);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void
|
||||||
|
test_address_get_if_addrs6_list_internal(void *arg)
|
||||||
|
{
|
||||||
|
smartlist_t *results = NULL;
|
||||||
|
|
||||||
|
(void)arg;
|
||||||
|
|
||||||
|
results = get_interface_address6_list(LOG_ERR, AF_INET6, 1);
|
||||||
|
|
||||||
|
tt_assert(results != NULL);
|
||||||
|
/* Work even on systems without IPv6 interfaces */
|
||||||
|
tt_int_op(smartlist_len(results),>=,0);
|
||||||
|
|
||||||
|
tt_assert(!smartlist_contains_localhost_tor_addr(results));
|
||||||
|
tt_assert(!smartlist_contains_multicast_tor_addr(results));
|
||||||
|
/* The list may or may not contain internal addresses */
|
||||||
|
|
||||||
|
tt_assert(!smartlist_contains_ipv4_tor_addr(results));
|
||||||
|
/* The list may or may not contain IPv6 addresses */
|
||||||
|
|
||||||
|
done:
|
||||||
|
free_interface_address6_list(results);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void
|
||||||
|
test_address_get_if_addrs6_list_no_internal(void *arg)
|
||||||
|
{
|
||||||
|
smartlist_t *results = NULL;
|
||||||
|
|
||||||
|
(void)arg;
|
||||||
|
|
||||||
|
results = get_interface_address6_list(LOG_ERR, AF_INET6, 0);
|
||||||
|
|
||||||
|
tt_assert(results != NULL);
|
||||||
|
/* Work even on systems without IPv6 interfaces */
|
||||||
|
tt_int_op(smartlist_len(results),>=,0);
|
||||||
|
|
||||||
|
tt_assert(!smartlist_contains_localhost_tor_addr(results));
|
||||||
|
tt_assert(!smartlist_contains_multicast_tor_addr(results));
|
||||||
|
tt_assert(!smartlist_contains_internal_tor_addr(results));
|
||||||
|
|
||||||
|
tt_assert(!smartlist_contains_ipv4_tor_addr(results));
|
||||||
|
/* The list may or may not contain IPv6 addresses */
|
||||||
|
|
||||||
|
done:
|
||||||
|
free_interface_address6_list(results);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void
|
||||||
|
test_address_get_if_addrs(void *arg)
|
||||||
|
{
|
||||||
|
int rv;
|
||||||
|
uint32_t addr_h = 0;
|
||||||
|
tor_addr_t tor_addr;
|
||||||
|
|
||||||
|
(void)arg;
|
||||||
|
|
||||||
|
rv = get_interface_address(LOG_ERR, &addr_h);
|
||||||
|
|
||||||
|
/* Assume every system has at least 1 non-local non-multicast IPv4
|
||||||
|
* interface, even if it is an internal one */
|
||||||
|
tt_assert(rv == 0);
|
||||||
|
tor_addr_from_ipv4h(&tor_addr, addr_h);
|
||||||
|
|
||||||
|
tt_assert(!tor_addr_is_loopback(&tor_addr));
|
||||||
|
tt_assert(!tor_addr_is_multicast(&tor_addr));
|
||||||
|
/* The address may or may not be an internal address */
|
||||||
|
|
||||||
|
tt_assert(tor_addr_is_v4(&tor_addr));
|
||||||
|
|
||||||
|
done:
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void
|
||||||
|
test_address_get_if_addrs6(void *arg)
|
||||||
|
{
|
||||||
|
int rv;
|
||||||
|
tor_addr_t tor_addr;
|
||||||
|
|
||||||
|
(void)arg;
|
||||||
|
|
||||||
|
rv = get_interface_address6(LOG_ERR, AF_INET6, &tor_addr);
|
||||||
|
|
||||||
|
/* Work even on systems without IPv6 interfaces */
|
||||||
|
if (rv == 0) {
|
||||||
|
tt_assert(!tor_addr_is_loopback(&tor_addr));
|
||||||
|
tt_assert(!tor_addr_is_multicast(&tor_addr));
|
||||||
|
/* The address may or may not be an internal address */
|
||||||
|
|
||||||
|
tt_assert(!tor_addr_is_v4(&tor_addr));
|
||||||
|
}
|
||||||
|
|
||||||
|
done:
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
#define ADDRESS_TEST(name, flags) \
|
#define ADDRESS_TEST(name, flags) \
|
||||||
{ #name, test_address_ ## name, flags, NULL, NULL }
|
{ #name, test_address_ ## name, flags, NULL, NULL }
|
||||||
|
|
||||||
struct testcase_t address_tests[] = {
|
struct testcase_t address_tests[] = {
|
||||||
ADDRESS_TEST(udp_socket_trick_whitebox, TT_FORK),
|
ADDRESS_TEST(udp_socket_trick_whitebox, TT_FORK),
|
||||||
ADDRESS_TEST(udp_socket_trick_blackbox, TT_FORK),
|
ADDRESS_TEST(udp_socket_trick_blackbox, TT_FORK),
|
||||||
|
ADDRESS_TEST(get_if_addrs_list_internal, 0),
|
||||||
|
ADDRESS_TEST(get_if_addrs_list_no_internal, 0),
|
||||||
|
ADDRESS_TEST(get_if_addrs6_list_internal, 0),
|
||||||
|
ADDRESS_TEST(get_if_addrs6_list_no_internal, 0),
|
||||||
|
ADDRESS_TEST(get_if_addrs, 0),
|
||||||
|
ADDRESS_TEST(get_if_addrs6, 0),
|
||||||
#ifdef HAVE_IFADDRS_TO_SMARTLIST
|
#ifdef HAVE_IFADDRS_TO_SMARTLIST
|
||||||
ADDRESS_TEST(get_if_addrs_ifaddrs, TT_FORK),
|
ADDRESS_TEST(get_if_addrs_ifaddrs, TT_FORK),
|
||||||
ADDRESS_TEST(ifaddrs_to_smartlist, 0),
|
ADDRESS_TEST(ifaddrs_to_smartlist, 0),
|
||||||
|
Loading…
Reference in New Issue
Block a user