tsigkey_unittest.cc 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315
  1. // Copyright (C) 2010 Internet Systems Consortium, Inc. ("ISC")
  2. //
  3. // Permission to use, copy, modify, and/or distribute this software for any
  4. // purpose with or without fee is hereby granted, provided that the above
  5. // copyright notice and this permission notice appear in all copies.
  6. //
  7. // THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
  8. // REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
  9. // AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
  10. // INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
  11. // LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
  12. // OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
  13. // PERFORMANCE OF THIS SOFTWARE.
  14. #include <string>
  15. #include <gtest/gtest.h>
  16. #include <exceptions/exceptions.h>
  17. #include <cryptolink/cryptolink.h>
  18. #include <dns/tsigkey.h>
  19. #include <dns/tests/unittest_util.h>
  20. using namespace std;
  21. using namespace isc::dns;
  22. using isc::UnitTestUtil;
  23. namespace {
  24. class TSIGKeyTest : public ::testing::Test {
  25. protected:
  26. TSIGKeyTest() : secret("someRandomData"), key_name("example.com") {}
  27. string secret;
  28. const Name key_name;
  29. };
  30. TEST_F(TSIGKeyTest, algorithmNames) {
  31. EXPECT_EQ(Name("hmac-md5.sig-alg.reg.int"), TSIGKey::HMACMD5_NAME());
  32. EXPECT_EQ(Name("hmac-sha1"), TSIGKey::HMACSHA1_NAME());
  33. EXPECT_EQ(Name("hmac-sha256"), TSIGKey::HMACSHA256_NAME());
  34. EXPECT_EQ(Name("hmac-sha224"), TSIGKey::HMACSHA224_NAME());
  35. EXPECT_EQ(Name("hmac-sha384"), TSIGKey::HMACSHA384_NAME());
  36. EXPECT_EQ(Name("hmac-sha512"), TSIGKey::HMACSHA512_NAME());
  37. // Also check conversion to cryptolink definitions
  38. EXPECT_EQ(isc::cryptolink::MD5, TSIGKey(key_name, TSIGKey::HMACMD5_NAME(),
  39. NULL, 0).getAlgorithm());
  40. EXPECT_EQ(isc::cryptolink::SHA1, TSIGKey(key_name, TSIGKey::HMACSHA1_NAME(),
  41. NULL, 0).getAlgorithm());
  42. EXPECT_EQ(isc::cryptolink::SHA256, TSIGKey(key_name,
  43. TSIGKey::HMACSHA256_NAME(),
  44. NULL, 0).getAlgorithm());
  45. EXPECT_EQ(isc::cryptolink::SHA224, TSIGKey(key_name,
  46. TSIGKey::HMACSHA224_NAME(),
  47. NULL, 0).getAlgorithm());
  48. EXPECT_EQ(isc::cryptolink::SHA384, TSIGKey(key_name,
  49. TSIGKey::HMACSHA384_NAME(),
  50. NULL, 0).getAlgorithm());
  51. EXPECT_EQ(isc::cryptolink::SHA512, TSIGKey(key_name,
  52. TSIGKey::HMACSHA512_NAME(),
  53. NULL, 0).getAlgorithm());
  54. }
  55. TEST_F(TSIGKeyTest, construct) {
  56. TSIGKey key(key_name, TSIGKey::HMACMD5_NAME(),
  57. secret.c_str(), secret.size());
  58. EXPECT_EQ(key_name, key.getKeyName());
  59. EXPECT_EQ(Name("hmac-md5.sig-alg.reg.int"), key.getAlgorithmName());
  60. EXPECT_PRED_FORMAT4(UnitTestUtil::matchWireData, secret.c_str(),
  61. secret.size(), key.getSecret(), key.getSecretLength());
  62. // "unknown" algorithm is only accepted with empty secret.
  63. EXPECT_THROW(TSIGKey(key_name, Name("unknown-alg"),
  64. secret.c_str(), secret.size()),
  65. isc::InvalidParameter);
  66. TSIGKey key2(key_name, Name("unknown-alg"), NULL, 0);
  67. EXPECT_EQ(key_name, key2.getKeyName());
  68. EXPECT_EQ(Name("unknown-alg"), key2.getAlgorithmName());
  69. // The algorithm name should be converted to the canonical form.
  70. EXPECT_EQ("hmac-sha1.",
  71. TSIGKey(key_name, Name("HMAC-sha1"),
  72. secret.c_str(),
  73. secret.size()).getAlgorithmName().toText());
  74. // Same for key name
  75. EXPECT_EQ("example.com.",
  76. TSIGKey(Name("EXAMPLE.CoM."), TSIGKey::HMACSHA256_NAME(),
  77. secret.c_str(),
  78. secret.size()).getKeyName().toText());
  79. // Invalid combinations of secret and secret_len:
  80. EXPECT_THROW(TSIGKey(key_name, TSIGKey::HMACSHA1_NAME(), secret.c_str(), 0),
  81. isc::InvalidParameter);
  82. EXPECT_THROW(TSIGKey(key_name, TSIGKey::HMACSHA256_NAME(), NULL, 16),
  83. isc::InvalidParameter);
  84. }
  85. void
  86. compareTSIGKeys(const TSIGKey& expect, const TSIGKey& actual) {
  87. EXPECT_EQ(expect.getKeyName(), actual.getKeyName());
  88. EXPECT_EQ(expect.getAlgorithmName(), actual.getAlgorithmName());
  89. EXPECT_PRED_FORMAT4(UnitTestUtil::matchWireData,
  90. expect.getSecret(), expect.getSecretLength(),
  91. actual.getSecret(), actual.getSecretLength());
  92. }
  93. TEST_F(TSIGKeyTest, copyConstruct) {
  94. const TSIGKey original(key_name, TSIGKey::HMACSHA256_NAME(),
  95. secret.c_str(), secret.size());
  96. const TSIGKey copy(original);
  97. compareTSIGKeys(original, copy);
  98. // Check the copied data is valid even after the original is deleted
  99. TSIGKey* copy2 = new TSIGKey(original);
  100. TSIGKey copy3(*copy2);
  101. delete copy2;
  102. compareTSIGKeys(original, copy3);
  103. }
  104. TEST_F(TSIGKeyTest, assignment) {
  105. const TSIGKey original(key_name, TSIGKey::HMACSHA256_NAME(),
  106. secret.c_str(), secret.size());
  107. TSIGKey copy = original;
  108. compareTSIGKeys(original, copy);
  109. // Check if the copied data is valid even after the original is deleted
  110. TSIGKey* copy2 = new TSIGKey(original);
  111. TSIGKey copy3(original);
  112. copy3 = *copy2;
  113. delete copy2;
  114. compareTSIGKeys(original, copy3);
  115. // self assignment
  116. copy = copy;
  117. compareTSIGKeys(original, copy);
  118. }
  119. class TSIGKeyRingTest : public ::testing::Test {
  120. protected:
  121. TSIGKeyRingTest() :
  122. key_name("example.com"),
  123. md5_name("hmac-md5.sig-alg.reg.int"),
  124. sha1_name("hmac-sha1"),
  125. sha256_name("hmac-sha256"),
  126. secretstring("anotherRandomData"),
  127. secret(secretstring.c_str()),
  128. secret_len(secretstring.size())
  129. {}
  130. TSIGKeyRing keyring;
  131. const Name key_name;
  132. const Name md5_name;
  133. const Name sha1_name;
  134. const Name sha256_name;
  135. private:
  136. const string secretstring;
  137. protected:
  138. const char* secret;
  139. size_t secret_len;
  140. };
  141. TEST_F(TSIGKeyRingTest, init) {
  142. EXPECT_EQ(0, keyring.size());
  143. }
  144. TEST_F(TSIGKeyRingTest, add) {
  145. EXPECT_EQ(TSIGKeyRing::SUCCESS, keyring.add(
  146. TSIGKey(key_name, TSIGKey::HMACSHA256_NAME(),
  147. secret, secret_len)));
  148. EXPECT_EQ(1, keyring.size());
  149. EXPECT_EQ(TSIGKeyRing::EXIST, keyring.add(
  150. TSIGKey(key_name, TSIGKey::HMACSHA256_NAME(),
  151. secret, secret_len)));
  152. // keys are identified by their names, the same name of key with a
  153. // different algorithm would be considered a duplicate.
  154. EXPECT_EQ(TSIGKeyRing::EXIST, keyring.add(
  155. TSIGKey(Name("example.com"), TSIGKey::HMACSHA1_NAME(),
  156. secret, secret_len)));
  157. // names are compared in a case insensitive manner.
  158. EXPECT_EQ(TSIGKeyRing::EXIST, keyring.add(
  159. TSIGKey(Name("EXAMPLE.COM"), TSIGKey::HMACSHA1_NAME(),
  160. secret, secret_len)));
  161. EXPECT_EQ(1, keyring.size());
  162. }
  163. TEST_F(TSIGKeyRingTest, addMore) {
  164. // essentially the same test, but try adding more than 1
  165. EXPECT_EQ(TSIGKeyRing::SUCCESS, keyring.add(
  166. TSIGKey(key_name, TSIGKey::HMACSHA256_NAME(),
  167. secret, secret_len)));
  168. EXPECT_EQ(TSIGKeyRing::SUCCESS, keyring.add(
  169. TSIGKey(Name("another.example"), TSIGKey::HMACMD5_NAME(),
  170. secret, secret_len)));
  171. EXPECT_EQ(TSIGKeyRing::SUCCESS, keyring.add(
  172. TSIGKey(Name("more.example"), TSIGKey::HMACSHA1_NAME(),
  173. secret, secret_len)));
  174. EXPECT_EQ(3, keyring.size());
  175. }
  176. TEST_F(TSIGKeyRingTest, remove) {
  177. EXPECT_EQ(TSIGKeyRing::SUCCESS, keyring.add(
  178. TSIGKey(key_name, TSIGKey::HMACSHA256_NAME(),
  179. secret, secret_len)));
  180. EXPECT_EQ(TSIGKeyRing::SUCCESS, keyring.remove(key_name));
  181. EXPECT_EQ(TSIGKeyRing::NOTFOUND, keyring.remove(key_name));
  182. }
  183. TEST_F(TSIGKeyRingTest, removeFromSome) {
  184. // essentially the same test, but try removing from a larger set
  185. EXPECT_EQ(TSIGKeyRing::SUCCESS, keyring.add(
  186. TSIGKey(key_name, TSIGKey::HMACSHA256_NAME(),
  187. secret, secret_len)));
  188. EXPECT_EQ(TSIGKeyRing::SUCCESS, keyring.add(
  189. TSIGKey(Name("another.example"), TSIGKey::HMACMD5_NAME(),
  190. secret, secret_len)));
  191. EXPECT_EQ(TSIGKeyRing::SUCCESS, keyring.add(
  192. TSIGKey(Name("more.example"), TSIGKey::HMACSHA1_NAME(),
  193. secret, secret_len)));
  194. EXPECT_EQ(TSIGKeyRing::SUCCESS, keyring.remove(Name("another.example")));
  195. EXPECT_EQ(TSIGKeyRing::NOTFOUND, keyring.remove(Name("noexist.example")));
  196. EXPECT_EQ(2, keyring.size());
  197. }
  198. TEST_F(TSIGKeyRingTest, find) {
  199. // If the keyring is empty the search should fail.
  200. EXPECT_EQ(TSIGKeyRing::NOTFOUND, keyring.find(key_name, md5_name).code);
  201. EXPECT_EQ(static_cast<const TSIGKey*>(NULL),
  202. keyring.find(key_name, md5_name).key);
  203. // Add a key and try to find it. Should succeed.
  204. EXPECT_EQ(TSIGKeyRing::SUCCESS, keyring.add(TSIGKey(key_name, sha256_name,
  205. secret, secret_len)));
  206. const TSIGKeyRing::FindResult result1(keyring.find(key_name, sha256_name));
  207. EXPECT_EQ(TSIGKeyRing::SUCCESS, result1.code);
  208. EXPECT_EQ(key_name, result1.key->getKeyName());
  209. EXPECT_EQ(TSIGKey::HMACSHA256_NAME(), result1.key->getAlgorithmName());
  210. EXPECT_PRED_FORMAT4(UnitTestUtil::matchWireData, secret, secret_len,
  211. result1.key->getSecret(),
  212. result1.key->getSecretLength());
  213. // If either key name or algorithm doesn't match, search should fail.
  214. const TSIGKeyRing::FindResult result2 =
  215. keyring.find(Name("different-key.example"), sha256_name);
  216. EXPECT_EQ(TSIGKeyRing::NOTFOUND, result2.code);
  217. EXPECT_EQ(static_cast<const TSIGKey*>(NULL), result2.key);
  218. const TSIGKeyRing::FindResult result3 = keyring.find(key_name, md5_name);
  219. EXPECT_EQ(TSIGKeyRing::NOTFOUND, result3.code);
  220. EXPECT_EQ(static_cast<const TSIGKey*>(NULL), result3.key);
  221. }
  222. TEST_F(TSIGKeyRingTest, findFromSome) {
  223. // essentially the same test, but search a larger set
  224. EXPECT_EQ(TSIGKeyRing::SUCCESS, keyring.add(TSIGKey(key_name, sha256_name,
  225. secret, secret_len)));
  226. EXPECT_EQ(TSIGKeyRing::SUCCESS, keyring.add(TSIGKey(Name("another.example"),
  227. md5_name,
  228. secret, secret_len)));
  229. EXPECT_EQ(TSIGKeyRing::SUCCESS, keyring.add(TSIGKey(Name("more.example"),
  230. sha1_name,
  231. secret, secret_len)));
  232. const TSIGKeyRing::FindResult result(
  233. keyring.find(Name("another.example"), md5_name));
  234. EXPECT_EQ(TSIGKeyRing::SUCCESS, result.code);
  235. EXPECT_EQ(Name("another.example"), result.key->getKeyName());
  236. EXPECT_EQ(TSIGKey::HMACMD5_NAME(), result.key->getAlgorithmName());
  237. EXPECT_EQ(TSIGKeyRing::NOTFOUND,
  238. keyring.find(Name("noexist.example"), sha1_name).code);
  239. EXPECT_EQ(static_cast<const TSIGKey*>(NULL),
  240. keyring.find(Name("noexist.example"), sha256_name).key);
  241. EXPECT_EQ(TSIGKeyRing::NOTFOUND,
  242. keyring.find(Name("another.example"), sha1_name).code);
  243. EXPECT_EQ(static_cast<const TSIGKey*>(NULL),
  244. keyring.find(Name("another.example"), sha256_name).key);
  245. }
  246. TEST(TSIGStringTest, TSIGKeyFromToString) {
  247. TSIGKey k1 = TSIGKey("test.example:MSG6Ng==:hmac-md5.sig-alg.reg.int");
  248. TSIGKey k2 = TSIGKey("test.example.:MSG6Ng==:hmac-md5.sig-alg.reg.int.");
  249. TSIGKey k3 = TSIGKey("test.example:MSG6Ng==");
  250. TSIGKey k4 = TSIGKey(Name("test.example."), Name("hmac-sha1."), NULL, 0);
  251. // "Unknown" key with empty secret is okay
  252. TSIGKey k5 = TSIGKey("test.example.::unknown");
  253. EXPECT_EQ("test.example.:MSG6Ng==:hmac-md5.sig-alg.reg.int.",
  254. k1.toText());
  255. EXPECT_EQ("test.example.:MSG6Ng==:hmac-md5.sig-alg.reg.int.",
  256. k2.toText());
  257. EXPECT_EQ("test.example.:MSG6Ng==:hmac-md5.sig-alg.reg.int.",
  258. k3.toText());
  259. EXPECT_EQ("test.example.::hmac-sha1.", k4.toText());
  260. EXPECT_EQ(Name("test.example."), k5.getKeyName());
  261. EXPECT_EQ(Name("unknown"), k5.getAlgorithmName());
  262. EXPECT_THROW(TSIGKey(""), isc::InvalidParameter);
  263. EXPECT_THROW(TSIGKey(":"), isc::InvalidParameter);
  264. EXPECT_THROW(TSIGKey("::"), isc::InvalidParameter);
  265. EXPECT_THROW(TSIGKey("..:aa:"), isc::InvalidParameter);
  266. EXPECT_THROW(TSIGKey("test.example:xxxx:"), isc::InvalidParameter);
  267. EXPECT_THROW(TSIGKey("test.example.::"), isc::InvalidParameter);
  268. EXPECT_THROW(TSIGKey("test.example.:"), isc::InvalidParameter);
  269. EXPECT_THROW(TSIGKey("test.example.:MSG6Ng==:"), isc::InvalidParameter);
  270. EXPECT_THROW(TSIGKey("test.example.:MSG6Ng==:unknown"), isc::InvalidParameter);
  271. }
  272. } // end namespace