tsigkey_unittest.cc 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350
  1. // Copyright (C) 2010, 2014 Internet Systems Consortium, Inc. ("ISC")
  2. //
  3. // Permission to use, copy, modify, and/or distribute this software for any
  4. // purpose with or without fee is hereby granted, provided that the above
  5. // copyright notice and this permission notice appear in all copies.
  6. //
  7. // THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
  8. // REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
  9. // AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
  10. // INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
  11. // LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
  12. // OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
  13. // PERFORMANCE OF THIS SOFTWARE.
  14. #include <string>
  15. #include <gtest/gtest.h>
  16. #include <exceptions/exceptions.h>
  17. #include <cryptolink/cryptolink.h>
  18. #include <dns/tsigkey.h>
  19. #include <dns/tests/unittest_util.h>
  20. #include <util/unittests/wiredata.h>
  21. using namespace std;
  22. using namespace isc::dns;
  23. using isc::UnitTestUtil;
  24. using isc::util::unittests::matchWireData;
  25. namespace {
  26. class TSIGKeyTest : public ::testing::Test {
  27. protected:
  28. TSIGKeyTest() : secret("someRandomData"), key_name("example.com") {}
  29. string secret;
  30. const Name key_name;
  31. };
  32. TEST_F(TSIGKeyTest, algorithmNames) {
  33. EXPECT_EQ(Name("hmac-md5.sig-alg.reg.int"), TSIGKey::HMACMD5_NAME());
  34. EXPECT_EQ(Name("hmac-md5"), TSIGKey::HMACMD5_SHORT_NAME());
  35. EXPECT_EQ(Name("hmac-sha1"), TSIGKey::HMACSHA1_NAME());
  36. EXPECT_EQ(Name("hmac-sha256"), TSIGKey::HMACSHA256_NAME());
  37. EXPECT_EQ(Name("hmac-sha224"), TSIGKey::HMACSHA224_NAME());
  38. EXPECT_EQ(Name("hmac-sha384"), TSIGKey::HMACSHA384_NAME());
  39. EXPECT_EQ(Name("hmac-sha512"), TSIGKey::HMACSHA512_NAME());
  40. // Also check conversion to cryptolink definitions
  41. EXPECT_EQ(isc::cryptolink::MD5, TSIGKey(key_name, TSIGKey::HMACMD5_NAME(),
  42. NULL, 0).getAlgorithm());
  43. EXPECT_EQ(isc::cryptolink::MD5,
  44. TSIGKey(key_name, TSIGKey::HMACMD5_SHORT_NAME(),
  45. NULL, 0).getAlgorithm());
  46. EXPECT_EQ(isc::cryptolink::SHA1, TSIGKey(key_name, TSIGKey::HMACSHA1_NAME(),
  47. NULL, 0).getAlgorithm());
  48. EXPECT_EQ(isc::cryptolink::SHA256, TSIGKey(key_name,
  49. TSIGKey::HMACSHA256_NAME(),
  50. NULL, 0).getAlgorithm());
  51. EXPECT_EQ(isc::cryptolink::SHA224, TSIGKey(key_name,
  52. TSIGKey::HMACSHA224_NAME(),
  53. NULL, 0).getAlgorithm());
  54. EXPECT_EQ(isc::cryptolink::SHA384, TSIGKey(key_name,
  55. TSIGKey::HMACSHA384_NAME(),
  56. NULL, 0).getAlgorithm());
  57. EXPECT_EQ(isc::cryptolink::SHA512, TSIGKey(key_name,
  58. TSIGKey::HMACSHA512_NAME(),
  59. NULL, 0).getAlgorithm());
  60. }
  61. TEST_F(TSIGKeyTest, construct) {
  62. TSIGKey key(key_name, TSIGKey::HMACMD5_NAME(),
  63. secret.c_str(), secret.size());
  64. EXPECT_EQ(key_name, key.getKeyName());
  65. EXPECT_EQ(Name("hmac-md5.sig-alg.reg.int"), key.getAlgorithmName());
  66. matchWireData(secret.c_str(), secret.size(),
  67. key.getSecret(), key.getSecretLength());
  68. TSIGKey key_short_md5(key_name, TSIGKey::HMACMD5_SHORT_NAME(),
  69. secret.c_str(), secret.size());
  70. EXPECT_EQ(key_name, key_short_md5.getKeyName());
  71. EXPECT_EQ(Name("hmac-md5.sig-alg.reg.int"),
  72. key_short_md5.getAlgorithmName());
  73. matchWireData(secret.c_str(), secret.size(),
  74. key_short_md5.getSecret(), key_short_md5.getSecretLength());
  75. // "unknown" algorithm is only accepted with empty secret.
  76. EXPECT_THROW(TSIGKey(key_name, Name("unknown-alg"),
  77. secret.c_str(), secret.size()),
  78. isc::InvalidParameter);
  79. TSIGKey key2(key_name, Name("unknown-alg"), NULL, 0);
  80. EXPECT_EQ(key_name, key2.getKeyName());
  81. EXPECT_EQ(Name("unknown-alg"), key2.getAlgorithmName());
  82. // The algorithm name should be converted to the canonical form.
  83. EXPECT_EQ("hmac-sha1.",
  84. TSIGKey(key_name, Name("HMAC-sha1"),
  85. secret.c_str(),
  86. secret.size()).getAlgorithmName().toText());
  87. // Same for key name
  88. EXPECT_EQ("example.com.",
  89. TSIGKey(Name("EXAMPLE.CoM."), TSIGKey::HMACSHA256_NAME(),
  90. secret.c_str(),
  91. secret.size()).getKeyName().toText());
  92. // Check digestbits
  93. EXPECT_EQ(key.getDigestbits(), 0);
  94. TSIGKey key_trunc(key_name, TSIGKey::HMACMD5_NAME(),
  95. secret.c_str(), secret.size(), 120);
  96. EXPECT_EQ(key_trunc.getDigestbits(), 120);
  97. // Invalid combinations of secret and secret_len:
  98. EXPECT_THROW(TSIGKey(key_name, TSIGKey::HMACSHA1_NAME(), secret.c_str(), 0),
  99. isc::InvalidParameter);
  100. EXPECT_THROW(TSIGKey(key_name, TSIGKey::HMACSHA256_NAME(), NULL, 16),
  101. isc::InvalidParameter);
  102. }
  103. void
  104. compareTSIGKeys(const TSIGKey& expect, const TSIGKey& actual) {
  105. EXPECT_EQ(expect.getKeyName(), actual.getKeyName());
  106. EXPECT_EQ(expect.getAlgorithmName(), actual.getAlgorithmName());
  107. EXPECT_EQ(expect.getDigestbits(), actual.getDigestbits());
  108. matchWireData(expect.getSecret(), expect.getSecretLength(),
  109. actual.getSecret(), actual.getSecretLength());
  110. }
  111. TEST_F(TSIGKeyTest, copyConstruct) {
  112. const TSIGKey original(key_name, TSIGKey::HMACSHA256_NAME(),
  113. secret.c_str(), secret.size(), 128);
  114. const TSIGKey copy(original);
  115. compareTSIGKeys(original, copy);
  116. // Check the copied data is valid even after the original is deleted
  117. TSIGKey* copy2 = new TSIGKey(original);
  118. TSIGKey copy3(*copy2);
  119. delete copy2;
  120. compareTSIGKeys(original, copy3);
  121. }
  122. TEST_F(TSIGKeyTest, assignment) {
  123. const TSIGKey original(key_name, TSIGKey::HMACSHA256_NAME(),
  124. secret.c_str(), secret.size(), 200);
  125. TSIGKey copy = original;
  126. compareTSIGKeys(original, copy);
  127. // Check if the copied data is valid even after the original is deleted
  128. TSIGKey* copy2 = new TSIGKey(original);
  129. TSIGKey copy3(original);
  130. copy3 = *copy2;
  131. delete copy2;
  132. compareTSIGKeys(original, copy3);
  133. // self assignment
  134. copy = copy;
  135. compareTSIGKeys(original, copy);
  136. }
  137. class TSIGKeyRingTest : public ::testing::Test {
  138. protected:
  139. TSIGKeyRingTest() :
  140. key_name("example.com"),
  141. md5_name("hmac-md5.sig-alg.reg.int"),
  142. sha1_name("hmac-sha1"),
  143. sha256_name("hmac-sha256"),
  144. secretstring("anotherRandomData"),
  145. secret(secretstring.c_str()),
  146. secret_len(secretstring.size())
  147. {}
  148. TSIGKeyRing keyring;
  149. const Name key_name;
  150. const Name md5_name;
  151. const Name sha1_name;
  152. const Name sha256_name;
  153. private:
  154. const string secretstring;
  155. protected:
  156. const char* secret;
  157. size_t secret_len;
  158. };
  159. TEST_F(TSIGKeyRingTest, init) {
  160. EXPECT_EQ(0, keyring.size());
  161. }
  162. TEST_F(TSIGKeyRingTest, add) {
  163. EXPECT_EQ(TSIGKeyRing::SUCCESS, keyring.add(
  164. TSIGKey(key_name, TSIGKey::HMACSHA256_NAME(),
  165. secret, secret_len)));
  166. EXPECT_EQ(1, keyring.size());
  167. EXPECT_EQ(TSIGKeyRing::EXIST, keyring.add(
  168. TSIGKey(key_name, TSIGKey::HMACSHA256_NAME(),
  169. secret, secret_len)));
  170. // keys are identified by their names, the same name of key with a
  171. // different algorithm would be considered a duplicate.
  172. EXPECT_EQ(TSIGKeyRing::EXIST, keyring.add(
  173. TSIGKey(Name("example.com"), TSIGKey::HMACSHA1_NAME(),
  174. secret, secret_len)));
  175. // names are compared in a case insensitive manner.
  176. EXPECT_EQ(TSIGKeyRing::EXIST, keyring.add(
  177. TSIGKey(Name("EXAMPLE.COM"), TSIGKey::HMACSHA1_NAME(),
  178. secret, secret_len)));
  179. EXPECT_EQ(1, keyring.size());
  180. }
  181. TEST_F(TSIGKeyRingTest, addMore) {
  182. // essentially the same test, but try adding more than 1
  183. EXPECT_EQ(TSIGKeyRing::SUCCESS, keyring.add(
  184. TSIGKey(key_name, TSIGKey::HMACSHA256_NAME(),
  185. secret, secret_len)));
  186. EXPECT_EQ(TSIGKeyRing::SUCCESS, keyring.add(
  187. TSIGKey(Name("another.example"), TSIGKey::HMACMD5_NAME(),
  188. secret, secret_len)));
  189. EXPECT_EQ(TSIGKeyRing::SUCCESS, keyring.add(
  190. TSIGKey(Name("more.example"), TSIGKey::HMACSHA1_NAME(),
  191. secret, secret_len)));
  192. EXPECT_EQ(3, keyring.size());
  193. }
  194. TEST_F(TSIGKeyRingTest, remove) {
  195. EXPECT_EQ(TSIGKeyRing::SUCCESS, keyring.add(
  196. TSIGKey(key_name, TSIGKey::HMACSHA256_NAME(),
  197. secret, secret_len)));
  198. EXPECT_EQ(TSIGKeyRing::SUCCESS, keyring.remove(key_name));
  199. EXPECT_EQ(TSIGKeyRing::NOTFOUND, keyring.remove(key_name));
  200. }
  201. TEST_F(TSIGKeyRingTest, removeFromSome) {
  202. // essentially the same test, but try removing from a larger set
  203. EXPECT_EQ(TSIGKeyRing::SUCCESS, keyring.add(
  204. TSIGKey(key_name, TSIGKey::HMACSHA256_NAME(),
  205. secret, secret_len)));
  206. EXPECT_EQ(TSIGKeyRing::SUCCESS, keyring.add(
  207. TSIGKey(Name("another.example"), TSIGKey::HMACMD5_NAME(),
  208. secret, secret_len)));
  209. EXPECT_EQ(TSIGKeyRing::SUCCESS, keyring.add(
  210. TSIGKey(Name("more.example"), TSIGKey::HMACSHA1_NAME(),
  211. secret, secret_len)));
  212. EXPECT_EQ(TSIGKeyRing::SUCCESS, keyring.remove(Name("another.example")));
  213. EXPECT_EQ(TSIGKeyRing::NOTFOUND, keyring.remove(Name("noexist.example")));
  214. EXPECT_EQ(2, keyring.size());
  215. }
  216. TEST_F(TSIGKeyRingTest, find) {
  217. // If the keyring is empty the search should fail.
  218. EXPECT_EQ(TSIGKeyRing::NOTFOUND, keyring.find(key_name, md5_name).code);
  219. EXPECT_EQ(static_cast<const TSIGKey*>(NULL),
  220. keyring.find(key_name, md5_name).key);
  221. // Add a key and try to find it. Should succeed.
  222. EXPECT_EQ(TSIGKeyRing::SUCCESS, keyring.add(TSIGKey(key_name, sha256_name,
  223. secret, secret_len)));
  224. const TSIGKeyRing::FindResult result1(keyring.find(key_name, sha256_name));
  225. EXPECT_EQ(TSIGKeyRing::SUCCESS, result1.code);
  226. EXPECT_EQ(key_name, result1.key->getKeyName());
  227. EXPECT_EQ(TSIGKey::HMACSHA256_NAME(), result1.key->getAlgorithmName());
  228. matchWireData(secret, secret_len,
  229. result1.key->getSecret(), result1.key->getSecretLength());
  230. // If either key name or algorithm doesn't match, search should fail.
  231. const TSIGKeyRing::FindResult result2 =
  232. keyring.find(Name("different-key.example"), sha256_name);
  233. EXPECT_EQ(TSIGKeyRing::NOTFOUND, result2.code);
  234. EXPECT_EQ(static_cast<const TSIGKey*>(NULL), result2.key);
  235. const TSIGKeyRing::FindResult result3 = keyring.find(key_name, md5_name);
  236. EXPECT_EQ(TSIGKeyRing::NOTFOUND, result3.code);
  237. EXPECT_EQ(static_cast<const TSIGKey*>(NULL), result3.key);
  238. // But with just the name it should work
  239. const TSIGKeyRing::FindResult result4(keyring.find(key_name));
  240. EXPECT_EQ(TSIGKeyRing::SUCCESS, result4.code);
  241. EXPECT_EQ(key_name, result4.key->getKeyName());
  242. EXPECT_EQ(TSIGKey::HMACSHA256_NAME(), result4.key->getAlgorithmName());
  243. matchWireData(secret, secret_len,
  244. result4.key->getSecret(), result4.key->getSecretLength());
  245. }
  246. TEST_F(TSIGKeyRingTest, findFromSome) {
  247. // essentially the same test, but search a larger set
  248. EXPECT_EQ(TSIGKeyRing::SUCCESS, keyring.add(TSIGKey(key_name, sha256_name,
  249. secret, secret_len)));
  250. EXPECT_EQ(TSIGKeyRing::SUCCESS, keyring.add(TSIGKey(Name("another.example"),
  251. md5_name,
  252. secret, secret_len)));
  253. EXPECT_EQ(TSIGKeyRing::SUCCESS, keyring.add(TSIGKey(Name("more.example"),
  254. sha1_name,
  255. secret, secret_len)));
  256. const TSIGKeyRing::FindResult result(
  257. keyring.find(Name("another.example"), md5_name));
  258. EXPECT_EQ(TSIGKeyRing::SUCCESS, result.code);
  259. EXPECT_EQ(Name("another.example"), result.key->getKeyName());
  260. EXPECT_EQ(TSIGKey::HMACMD5_NAME(), result.key->getAlgorithmName());
  261. EXPECT_EQ(TSIGKeyRing::NOTFOUND,
  262. keyring.find(Name("noexist.example"), sha1_name).code);
  263. EXPECT_EQ(static_cast<const TSIGKey*>(NULL),
  264. keyring.find(Name("noexist.example"), sha256_name).key);
  265. EXPECT_EQ(TSIGKeyRing::NOTFOUND,
  266. keyring.find(Name("another.example"), sha1_name).code);
  267. EXPECT_EQ(static_cast<const TSIGKey*>(NULL),
  268. keyring.find(Name("another.example"), sha256_name).key);
  269. }
  270. TEST(TSIGStringTest, TSIGKeyFromToString) {
  271. TSIGKey k1 = TSIGKey("test.example:MSG6Ng==:hmac-md5.sig-alg.reg.int");
  272. TSIGKey k2 = TSIGKey("test.example.:MSG6Ng==:hmac-md5.sig-alg.reg.int.");
  273. TSIGKey k3 = TSIGKey("test.example:MSG6Ng==");
  274. TSIGKey k4 = TSIGKey("test.example.:MSG6Ng==:hmac-md5.sig-alg.reg.int.:120");
  275. TSIGKey k5 = TSIGKey(Name("test.example."), Name("hmac-sha1."), NULL, 0);
  276. // "Unknown" key with empty secret is okay
  277. TSIGKey k6 = TSIGKey("test.example.::unknown");
  278. EXPECT_EQ("test.example.:MSG6Ng==:hmac-md5.sig-alg.reg.int.",
  279. k1.toText());
  280. EXPECT_EQ("test.example.:MSG6Ng==:hmac-md5.sig-alg.reg.int.",
  281. k2.toText());
  282. EXPECT_EQ("test.example.:MSG6Ng==:hmac-md5.sig-alg.reg.int.",
  283. k3.toText());
  284. EXPECT_EQ("test.example.:MSG6Ng==:hmac-md5.sig-alg.reg.int.:120",
  285. k4.toText());
  286. EXPECT_EQ(120, k4.getDigestbits());
  287. EXPECT_EQ("test.example.::hmac-sha1.", k5.toText());
  288. EXPECT_EQ(Name("test.example."), k6.getKeyName());
  289. EXPECT_EQ(Name("unknown"), k6.getAlgorithmName());
  290. EXPECT_THROW(TSIGKey(""), isc::InvalidParameter);
  291. EXPECT_THROW(TSIGKey(":"), isc::InvalidParameter);
  292. EXPECT_THROW(TSIGKey("::"), isc::InvalidParameter);
  293. EXPECT_THROW(TSIGKey("..:aa:"), isc::InvalidParameter);
  294. EXPECT_THROW(TSIGKey("test.example:xxxx:"), isc::InvalidParameter);
  295. EXPECT_THROW(TSIGKey("test.example.::"), isc::InvalidParameter);
  296. EXPECT_THROW(TSIGKey("test.example.:"), isc::InvalidParameter);
  297. EXPECT_THROW(TSIGKey("test.example.:MSG6Ng==:"), isc::InvalidParameter);
  298. EXPECT_THROW(TSIGKey("test.example.:MSG6Ng==:unknown"), isc::InvalidParameter);
  299. EXPECT_THROW(TSIGKey("test.example.:MSG6Ng==:hmac-md5.sig-alg.reg.int.:"),
  300. isc::InvalidParameter);
  301. EXPECT_THROW(TSIGKey("test.example.:MSG6Ng==:hmac-md5.sig-alg.reg.int.:xxx"),
  302. isc::InvalidParameter);
  303. }
  304. } // end namespace