mirror of
https://github.com/zeromq/libzmq.git
synced 2024-12-26 23:01:04 +08:00
da31917f4f
Relicense permission collected from all relevant authors as tallied at: https://github.com/rlenferink/libzmq-relicense/blob/master/checklist.md The relicense grants are collected under RELICENSE/ and will be moved to the above repository in a later commit. Fixes https://github.com/zeromq/libzmq/issues/2376
129 lines
5.1 KiB
C++
129 lines
5.1 KiB
C++
/* SPDX-License-Identifier: MPL-2.0 */
|
|
|
|
#ifndef __TESTUTIL_SECURITY_HPP_INCLUDED__
|
|
#define __TESTUTIL_SECURITY_HPP_INCLUDED__
|
|
|
|
#include "testutil_unity.hpp"
|
|
#include "testutil_monitoring.hpp"
|
|
|
|
// security test utils
|
|
|
|
typedef void (socket_config_fn) (void *, void *);
|
|
|
|
// NULL specific functions
|
|
void socket_config_null_client (void *server_, void *server_secret_);
|
|
|
|
void socket_config_null_server (void *server_, void *server_secret_);
|
|
|
|
// PLAIN specific functions
|
|
void socket_config_plain_client (void *server_, void *server_secret_);
|
|
|
|
void socket_config_plain_server (void *server_, void *server_secret_);
|
|
|
|
// CURVE specific functions
|
|
|
|
// We'll generate random test keys at startup
|
|
extern char valid_client_public[41];
|
|
extern char valid_client_secret[41];
|
|
extern char valid_server_public[41];
|
|
extern char valid_server_secret[41];
|
|
|
|
void setup_testutil_security_curve ();
|
|
|
|
void socket_config_curve_server (void *server_, void *server_secret_);
|
|
|
|
struct curve_client_data_t
|
|
{
|
|
const char *server_public;
|
|
const char *client_public;
|
|
const char *client_secret;
|
|
};
|
|
|
|
void socket_config_curve_client (void *client_, void *data_);
|
|
|
|
// --------------------------------------------------------------------------
|
|
// This methods receives and validates ZAP requests (allowing or denying
|
|
// each client connection).
|
|
|
|
enum zap_protocol_t
|
|
{
|
|
zap_ok,
|
|
// ZAP-compliant non-standard cases
|
|
zap_status_temporary_failure,
|
|
zap_status_internal_error,
|
|
// ZAP protocol errors
|
|
zap_wrong_version,
|
|
zap_wrong_request_id,
|
|
zap_status_invalid,
|
|
zap_too_many_parts,
|
|
zap_disconnect,
|
|
zap_do_not_recv,
|
|
zap_do_not_send
|
|
};
|
|
|
|
extern void *zap_requests_handled;
|
|
|
|
void zap_handler_generic (zap_protocol_t zap_protocol_,
|
|
const char *expected_routing_id_ = "IDENT");
|
|
|
|
void zap_handler (void * /*unused_*/);
|
|
|
|
// Security-specific monitor event utilities
|
|
|
|
// assert_* are macros rather than functions, to allow assertion failures be
|
|
// attributed to the causing source code line
|
|
#define assert_no_more_monitor_events_with_timeout(monitor, timeout) \
|
|
{ \
|
|
int event_count = 0; \
|
|
int event, err; \
|
|
while ((event = get_monitor_event_with_timeout ((monitor), &err, NULL, \
|
|
(timeout))) \
|
|
!= -1) { \
|
|
if (event == ZMQ_EVENT_HANDSHAKE_FAILED_NO_DETAIL \
|
|
&& (err == EPIPE || err == ECONNRESET \
|
|
|| err == ECONNABORTED)) { \
|
|
fprintf (stderr, \
|
|
"Ignored event (skipping any further events): %x " \
|
|
"(err = %i == %s)\n", \
|
|
event, err, zmq_strerror (err)); \
|
|
continue; \
|
|
} \
|
|
++event_count; \
|
|
/* TODO write this into a buffer and attach to the assertion msg below */ \
|
|
print_unexpected_event_stderr (event, err, 0, 0); \
|
|
} \
|
|
TEST_ASSERT_EQUAL_INT (0, event_count); \
|
|
}
|
|
|
|
void setup_context_and_server_side (
|
|
void **zap_control_,
|
|
void **zap_thread_,
|
|
void **server_,
|
|
void **server_mon_,
|
|
char *my_endpoint_,
|
|
zmq_thread_fn zap_handler_ = &zap_handler,
|
|
socket_config_fn socket_config_ = &socket_config_curve_server,
|
|
void *socket_config_data_ = valid_server_secret,
|
|
const char *routing_id_ = "IDENT");
|
|
|
|
void shutdown_context_and_server_side (void *zap_thread_,
|
|
void *server_,
|
|
void *server_mon_,
|
|
void *zap_control_,
|
|
bool zap_handler_stopped_ = false);
|
|
|
|
void *create_and_connect_client (char *my_endpoint_,
|
|
socket_config_fn socket_config_,
|
|
void *socket_config_data_,
|
|
void **client_mon_ = NULL);
|
|
|
|
void expect_new_client_bounce_fail (char *my_endpoint_,
|
|
void *server_,
|
|
socket_config_fn socket_config_,
|
|
void *socket_config_data_,
|
|
void **client_mon_ = NULL,
|
|
int expected_client_event_ = 0,
|
|
int expected_client_value_ = 0);
|
|
|
|
#endif
|