mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-11 13:43:47 +01:00
236 lines
6.5 KiB
C
236 lines
6.5 KiB
C
/* Copyright (c) 2001-2004, Roger Dingledine.
|
|
* Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
|
|
* Copyright (c) 2007-2013, The Tor Project, Inc. */
|
|
/* See LICENSE for licensing information */
|
|
|
|
#include "orconfig.h"
|
|
#define PT_PRIVATE
|
|
#define UTIL_PRIVATE
|
|
#include "or.h"
|
|
#include "transports.h"
|
|
#include "circuitbuild.h"
|
|
#include "util.h"
|
|
#include "test.h"
|
|
|
|
static void
|
|
reset_mp(managed_proxy_t *mp)
|
|
{
|
|
mp->conf_state = PT_PROTO_LAUNCHED;
|
|
SMARTLIST_FOREACH(mp->transports, transport_t *, t, transport_free(t));
|
|
smartlist_clear(mp->transports);
|
|
}
|
|
|
|
static void
|
|
test_pt_parsing(void)
|
|
{
|
|
char line[200];
|
|
transport_t *transport = NULL;
|
|
tor_addr_t test_addr;
|
|
|
|
managed_proxy_t *mp = tor_malloc(sizeof(managed_proxy_t));
|
|
mp->conf_state = PT_PROTO_INFANT;
|
|
mp->transports = smartlist_new();
|
|
|
|
/* incomplete cmethod */
|
|
strlcpy(line,"CMETHOD trebuchet",sizeof(line));
|
|
test_assert(parse_cmethod_line(line, mp) < 0);
|
|
|
|
reset_mp(mp);
|
|
|
|
/* wrong proxy type */
|
|
strlcpy(line,"CMETHOD trebuchet dog 127.0.0.1:1999",sizeof(line));
|
|
test_assert(parse_cmethod_line(line, mp) < 0);
|
|
|
|
reset_mp(mp);
|
|
|
|
/* wrong addrport */
|
|
strlcpy(line,"CMETHOD trebuchet socks4 abcd",sizeof(line));
|
|
test_assert(parse_cmethod_line(line, mp) < 0);
|
|
|
|
reset_mp(mp);
|
|
|
|
/* correct line */
|
|
strlcpy(line,"CMETHOD trebuchet socks5 127.0.0.1:1999",sizeof(line));
|
|
test_assert(parse_cmethod_line(line, mp) == 0);
|
|
test_assert(smartlist_len(mp->transports) == 1);
|
|
transport = smartlist_get(mp->transports, 0);
|
|
/* test registered address of transport */
|
|
tor_addr_parse(&test_addr, "127.0.0.1");
|
|
test_assert(tor_addr_eq(&test_addr, &transport->addr));
|
|
/* test registered port of transport */
|
|
test_assert(transport->port == 1999);
|
|
/* test registered SOCKS version of transport */
|
|
test_assert(transport->socks_version == PROXY_SOCKS5);
|
|
/* test registered name of transport */
|
|
test_streq(transport->name, "trebuchet");
|
|
|
|
reset_mp(mp);
|
|
|
|
/* incomplete smethod */
|
|
strlcpy(line,"SMETHOD trebuchet",sizeof(line));
|
|
test_assert(parse_smethod_line(line, mp) < 0);
|
|
|
|
reset_mp(mp);
|
|
|
|
/* wrong addr type */
|
|
strlcpy(line,"SMETHOD trebuchet abcd",sizeof(line));
|
|
test_assert(parse_smethod_line(line, mp) < 0);
|
|
|
|
reset_mp(mp);
|
|
|
|
/* cowwect */
|
|
strlcpy(line,"SMETHOD trebuchy 127.0.0.2:2999",sizeof(line));
|
|
test_assert(parse_smethod_line(line, mp) == 0);
|
|
test_assert(smartlist_len(mp->transports) == 1);
|
|
transport = smartlist_get(mp->transports, 0);
|
|
/* test registered address of transport */
|
|
tor_addr_parse(&test_addr, "127.0.0.2");
|
|
test_assert(tor_addr_eq(&test_addr, &transport->addr));
|
|
/* test registered port of transport */
|
|
test_assert(transport->port == 2999);
|
|
/* test registered name of transport */
|
|
test_streq(transport->name, "trebuchy");
|
|
|
|
reset_mp(mp);
|
|
|
|
/* unsupported version */
|
|
strlcpy(line,"VERSION 666",sizeof(line));
|
|
test_assert(parse_version(line, mp) < 0);
|
|
|
|
/* incomplete VERSION */
|
|
strlcpy(line,"VERSION ",sizeof(line));
|
|
test_assert(parse_version(line, mp) < 0);
|
|
|
|
/* correct VERSION */
|
|
strlcpy(line,"VERSION 1",sizeof(line));
|
|
test_assert(parse_version(line, mp) == 0);
|
|
|
|
done:
|
|
tor_free(mp);
|
|
}
|
|
|
|
static void
|
|
test_pt_protocol(void)
|
|
{
|
|
char line[200];
|
|
|
|
managed_proxy_t *mp = tor_malloc_zero(sizeof(managed_proxy_t));
|
|
mp->conf_state = PT_PROTO_LAUNCHED;
|
|
mp->transports = smartlist_new();
|
|
mp->argv = tor_malloc_zero(sizeof(char*)*2);
|
|
mp->argv[0] = tor_strdup("<testcase>");
|
|
|
|
/* various wrong protocol runs: */
|
|
|
|
strlcpy(line,"VERSION 1",sizeof(line));
|
|
handle_proxy_line(line, mp);
|
|
test_assert(mp->conf_state == PT_PROTO_ACCEPTING_METHODS);
|
|
|
|
strlcpy(line,"VERSION 1",sizeof(line));
|
|
handle_proxy_line(line, mp);
|
|
test_assert(mp->conf_state == PT_PROTO_BROKEN);
|
|
|
|
reset_mp(mp);
|
|
|
|
strlcpy(line,"CMETHOD trebuchet socks5 127.0.0.1:1999",sizeof(line));
|
|
handle_proxy_line(line, mp);
|
|
test_assert(mp->conf_state == PT_PROTO_BROKEN);
|
|
|
|
reset_mp(mp);
|
|
|
|
/* correct protocol run: */
|
|
strlcpy(line,"VERSION 1",sizeof(line));
|
|
handle_proxy_line(line, mp);
|
|
test_assert(mp->conf_state == PT_PROTO_ACCEPTING_METHODS);
|
|
|
|
strlcpy(line,"CMETHOD trebuchet socks5 127.0.0.1:1999",sizeof(line));
|
|
handle_proxy_line(line, mp);
|
|
test_assert(mp->conf_state == PT_PROTO_ACCEPTING_METHODS);
|
|
|
|
strlcpy(line,"CMETHODS DONE",sizeof(line));
|
|
handle_proxy_line(line, mp);
|
|
test_assert(mp->conf_state == PT_PROTO_CONFIGURED);
|
|
|
|
done:
|
|
tor_free(mp);
|
|
}
|
|
|
|
#ifdef _WIN32
|
|
static smartlist_t *
|
|
tor_get_lines_from_handle_replacement(HANDLE *handle,
|
|
enum stream_status *stream_status_out)
|
|
#else
|
|
static smartlist_t *
|
|
tor_get_lines_from_handle_replacement(FILE *handle,
|
|
enum stream_status *stream_status_out)
|
|
#endif
|
|
{
|
|
(void) handle;
|
|
(void) stream_status_out;
|
|
static int times_called = 0;
|
|
|
|
smartlist_t *retval_sl = smartlist_new();
|
|
|
|
/* Generate some dummy CMETHOD lines the first 5 times. The 6th
|
|
time, send 'CMETHODS DONE' to finish configuring the proxy. */
|
|
if (times_called++ != 5) {
|
|
smartlist_add_asprintf(retval_sl, "CMETHOD mock%d socks5 127.0.0.1:555%d",
|
|
times_called, times_called);
|
|
} else {
|
|
smartlist_add(retval_sl, tor_strdup("CMETHODS DONE"));
|
|
}
|
|
|
|
return retval_sl;
|
|
}
|
|
|
|
/* NOP mock */
|
|
static void
|
|
tor_process_handle_destroy_replacement(process_handle_t *process_handle,
|
|
int also_terminate_process)
|
|
{
|
|
return;
|
|
}
|
|
|
|
/* Test the configure_proxy() function. */
|
|
static void
|
|
test_pt_configure_proxy(void *arg)
|
|
{
|
|
(void) arg;
|
|
int i;
|
|
managed_proxy_t *mp = NULL;
|
|
|
|
MOCK(tor_get_lines_from_handle,
|
|
tor_get_lines_from_handle_replacement);
|
|
MOCK(tor_process_handle_destroy,
|
|
tor_process_handle_destroy_replacement);
|
|
|
|
mp = tor_malloc(sizeof(managed_proxy_t));
|
|
mp->conf_state = PT_PROTO_ACCEPTING_METHODS;
|
|
mp->transports = smartlist_new();
|
|
mp->transports_to_launch = smartlist_new();
|
|
mp->process_handle = tor_malloc_zero(sizeof(process_handle_t));
|
|
|
|
/* Test the return value of configure_proxy() by calling it some
|
|
times while it is uninitialized and then finally finalizing its
|
|
configuration. */
|
|
for (i = 0 ; i < 5 ; i++) {
|
|
test_assert(configure_proxy(mp) == 0);
|
|
}
|
|
test_assert(configure_proxy(mp) == 1);
|
|
|
|
done:
|
|
UNMOCK(tor_get_lines_from_handle);
|
|
UNMOCK(tor_process_handle_destroy);
|
|
}
|
|
#define PT_LEGACY(name) \
|
|
{ #name, legacy_test_helper, 0, &legacy_setup, test_pt_ ## name }
|
|
|
|
struct testcase_t pt_tests[] = {
|
|
PT_LEGACY(parsing),
|
|
PT_LEGACY(protocol),
|
|
{ "configure_proxy",test_pt_configure_proxy, TT_FORK,
|
|
NULL, NULL },
|
|
END_OF_TESTCASES
|
|
};
|
|
|