rdata_nsec_unittest.cc 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132
  1. // Copyright (C) 2010 Internet Systems Consortium, Inc. ("ISC")
  2. //
  3. // Permission to use, copy, modify, and/or distribute this software for any
  4. // purpose with or without fee is hereby granted, provided that the above
  5. // copyright notice and this permission notice appear in all copies.
  6. //
  7. // THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
  8. // REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
  9. // AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
  10. // INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
  11. // LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
  12. // OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
  13. // PERFORMANCE OF THIS SOFTWARE.
  14. // $Id$
  15. #include <string>
  16. #include <dns/buffer.h>
  17. #include <dns/exceptions.h>
  18. #include <dns/messagerenderer.h>
  19. #include <dns/rdata.h>
  20. #include <dns/rdataclass.h>
  21. #include <dns/rrclass.h>
  22. #include <dns/rrtype.h>
  23. #include <gtest/gtest.h>
  24. #include <dns/tests/unittest_util.h>
  25. #include <dns/tests/rdata_unittest.h>
  26. using isc::UnitTestUtil;
  27. using namespace std;
  28. using namespace isc::dns;
  29. using namespace isc::dns::rdata;
  30. namespace {
  31. class Rdata_NSEC_Test : public RdataTest {
  32. // there's nothing to specialize
  33. };
  34. string nsec_txt("www2.isc.org. CNAME RRSIG NSEC");
  35. TEST_F(Rdata_NSEC_Test, toText_NSEC) {
  36. const generic::NSEC rdata_nsec(nsec_txt);
  37. EXPECT_EQ(nsec_txt, rdata_nsec.toText());
  38. }
  39. TEST_F(Rdata_NSEC_Test, badText_NSEC) {
  40. EXPECT_THROW(generic::NSEC rdata_nsec("www.isc.org. BIFF POW SPOON"),
  41. InvalidRdataText);
  42. EXPECT_THROW(generic::NSEC rdata_nsec("www.isc.org."),
  43. InvalidRdataText);
  44. }
  45. TEST_F(Rdata_NSEC_Test, createFromWire_NSEC) {
  46. const generic::NSEC rdata_nsec(nsec_txt);
  47. EXPECT_EQ(0, rdata_nsec.compare(
  48. *rdataFactoryFromFile(RRType::NSEC(), RRClass::IN(),
  49. "rdata_nsec_fromWire1")));
  50. // Too short RDLENGTH
  51. EXPECT_THROW(rdataFactoryFromFile(RRType::NSEC(), RRClass::IN(),
  52. "rdata_nsec_fromWire2"),
  53. DNSMessageFORMERR);
  54. EXPECT_THROW(rdataFactoryFromFile(RRType::NSEC(), RRClass::IN(),
  55. "rdata_nsec_fromWire3"),
  56. DNSMessageFORMERR);
  57. // A malformed NSEC bitmap length field that could cause overflow.
  58. EXPECT_THROW(rdataFactoryFromFile(RRType::NSEC(), RRClass::IN(),
  59. "rdata_nsec_fromWire4.wire"),
  60. DNSMessageFORMERR);
  61. // The bitmap field is incomplete (only the first byte is included)
  62. EXPECT_THROW(rdataFactoryFromFile(RRType::NSEC(), RRClass::IN(),
  63. "rdata_nsec_fromWire5.wire"),
  64. DNSMessageFORMERR);
  65. // Bitmap length is 0, which is invalid.
  66. EXPECT_THROW(rdataFactoryFromFile(RRType::NSEC(), RRClass::IN(),
  67. "rdata_nsec_fromWire6.wire"),
  68. DNSMessageFORMERR);
  69. // A boundary case: longest possible bitmaps (32 maps). This should be
  70. // accepted.
  71. EXPECT_NO_THROW(rdataFactoryFromFile(RRType::NSEC(), RRClass::IN(),
  72. "rdata_nsec_fromWire7.wire"));
  73. // Another boundary condition: 33 bitmaps, which should be rejected.
  74. EXPECT_THROW(rdataFactoryFromFile(RRType::NSEC(), RRClass::IN(),
  75. "rdata_nsec_fromWire8.wire"),
  76. DNSMessageFORMERR);
  77. // Disordered bitmap window blocks.
  78. EXPECT_THROW(rdataFactoryFromFile(RRType::NSEC(), RRClass::IN(),
  79. "rdata_nsec_fromWire9.wire"),
  80. DNSMessageFORMERR);
  81. // Bitmap ending with all-zero bytes. Not necessarily harmful except
  82. // the additional overhead of parsing, but invalid according to the
  83. // spec anyway.
  84. EXPECT_THROW(rdataFactoryFromFile(RRType::NSEC(), RRClass::IN(),
  85. "rdata_nsec_fromWire10.wire"),
  86. DNSMessageFORMERR);
  87. }
  88. TEST_F(Rdata_NSEC_Test, toWireRenderer_NSEC) {
  89. renderer.skip(2);
  90. const generic::NSEC rdata_nsec(nsec_txt);
  91. rdata_nsec.toWire(renderer);
  92. vector<unsigned char> data;
  93. UnitTestUtil::readWireData("rdata_nsec_fromWire1", data);
  94. EXPECT_PRED_FORMAT4(UnitTestUtil::matchWireData,
  95. static_cast<const uint8_t *>(obuffer.getData()) + 2,
  96. obuffer.getLength() - 2, &data[2], data.size() - 2);
  97. }
  98. TEST_F(Rdata_NSEC_Test, toWireBuffer_NSEC) {
  99. const generic::NSEC rdata_nsec(nsec_txt);
  100. rdata_nsec.toWire(obuffer);
  101. }
  102. TEST_F(Rdata_NSEC_Test, assign) {
  103. generic::NSEC rdata_nsec(nsec_txt);
  104. generic::NSEC rdata_nsec2 = rdata_nsec;
  105. EXPECT_EQ(0, rdata_nsec.compare(rdata_nsec2));
  106. }
  107. }