diff options
Diffstat (limited to 'sntp/tests/packetHandling.c')
-rw-r--r-- | sntp/tests/packetHandling.c | 274 |
1 files changed, 274 insertions, 0 deletions
diff --git a/sntp/tests/packetHandling.c b/sntp/tests/packetHandling.c new file mode 100644 index 0000000000000..4cb5a91c9308e --- /dev/null +++ b/sntp/tests/packetHandling.c @@ -0,0 +1,274 @@ +#include "config.h" +#include "ntp_debug.h" +#include "ntp_stdlib.h" +#include "ntp_types.h" + +#include "sntptest.h" + +#include "kod_management.h" +#include "main.h" +#include "networking.h" +#include "ntp.h" + +#include "unity.h" + + +int counter = 0; + + +// old code from google test framework, moved to SetUp() for unity +void setUp(void) +{ + init_lib(); +} + + + +int LfpEquality(const l_fp expected, const l_fp actual) { + if (L_ISEQU(&expected, &actual)) { + return TRUE; + } else { + return FALSE; + } +} + +void test_GenerateUnauthenticatedPacket(void) { + struct pkt testpkt; + + struct timeval xmt; + GETTIMEOFDAY(&xmt, NULL); + xmt.tv_sec += JAN_1970; + + TEST_ASSERT_EQUAL(LEN_PKT_NOMAC, + generate_pkt(&testpkt, &xmt, 0, NULL)); + + TEST_ASSERT_EQUAL(LEAP_NOTINSYNC, PKT_LEAP(testpkt.li_vn_mode)); + TEST_ASSERT_EQUAL(NTP_VERSION, PKT_VERSION(testpkt.li_vn_mode)); + TEST_ASSERT_EQUAL(MODE_CLIENT, PKT_MODE(testpkt.li_vn_mode)); + + TEST_ASSERT_EQUAL(STRATUM_UNSPEC, PKT_TO_STRATUM(testpkt.stratum)); + TEST_ASSERT_EQUAL(8, testpkt.ppoll); + + l_fp expected_xmt, actual_xmt; + TVTOTS(&xmt, &expected_xmt); + NTOHL_FP(&testpkt.xmt, &actual_xmt); + TEST_ASSERT_TRUE(LfpEquality(expected_xmt, actual_xmt)); +} + +void test_GenerateAuthenticatedPacket(void) { + struct key testkey; + testkey.next = NULL; + testkey.key_id = 30; + testkey.key_len = 9; + memcpy(testkey.key_seq, "123456789", testkey.key_len); + memcpy(testkey.type, "MD5", 3); + + struct pkt testpkt; + + struct timeval xmt; + GETTIMEOFDAY(&xmt, NULL); + xmt.tv_sec += JAN_1970; + + const int EXPECTED_PKTLEN = LEN_PKT_NOMAC + MAX_MD5_LEN; + + TEST_ASSERT_EQUAL(EXPECTED_PKTLEN, + generate_pkt(&testpkt, &xmt, testkey.key_id, &testkey)); + + TEST_ASSERT_EQUAL(LEAP_NOTINSYNC, PKT_LEAP(testpkt.li_vn_mode)); + TEST_ASSERT_EQUAL(NTP_VERSION, PKT_VERSION(testpkt.li_vn_mode)); + TEST_ASSERT_EQUAL(MODE_CLIENT, PKT_MODE(testpkt.li_vn_mode)); + + TEST_ASSERT_EQUAL(STRATUM_UNSPEC, PKT_TO_STRATUM(testpkt.stratum)); + TEST_ASSERT_EQUAL(8, testpkt.ppoll); + + l_fp expected_xmt, actual_xmt; + TVTOTS(&xmt, &expected_xmt); + NTOHL_FP(&testpkt.xmt, &actual_xmt); + TEST_ASSERT_TRUE(LfpEquality(expected_xmt, actual_xmt)); + + TEST_ASSERT_EQUAL(testkey.key_id, ntohl(testpkt.exten[0])); + + char expected_mac[MAX_MD5_LEN]; + TEST_ASSERT_EQUAL(MAX_MD5_LEN - 4, // Remove the key_id, only keep the mac. + make_mac((char*)&testpkt, LEN_PKT_NOMAC, MAX_MD5_LEN, &testkey, expected_mac)); + TEST_ASSERT_TRUE(memcmp(expected_mac, (char*)&testpkt.exten[1], MAX_MD5_LEN -4) == 0); +} + +void test_OffsetCalculationPositiveOffset(void) { + struct pkt rpkt; + + rpkt.precision = -16; // 0,000015259 + rpkt.rootdelay = HTONS_FP(DTOUFP(0.125)); + rpkt.rootdisp = HTONS_FP(DTOUFP(0.25)); + // Synch Distance: (0.125+0.25)/2.0 == 0.1875 + l_fp reftime; + get_systime(&reftime); + HTONL_FP(&reftime, &rpkt.reftime); + + l_fp tmp; + + // T1 - Originate timestamp + tmp.l_ui = 1000000000UL; + tmp.l_uf = 0UL; + HTONL_FP(&tmp, &rpkt.org); + + // T2 - Receive timestamp + tmp.l_ui = 1000000001UL; + tmp.l_uf = 2147483648UL; + HTONL_FP(&tmp, &rpkt.rec); + + // T3 - Transmit timestamp + tmp.l_ui = 1000000002UL; + tmp.l_uf = 0UL; + HTONL_FP(&tmp, &rpkt.xmt); + + // T4 - Destination timestamp as standard timeval + tmp.l_ui = 1000000001UL; + tmp.l_uf = 0UL; + struct timeval dst; + TSTOTV(&tmp, &dst); + dst.tv_sec -= JAN_1970; + + double offset, precision, synch_distance; + offset_calculation(&rpkt, LEN_PKT_NOMAC, &dst, &offset, &precision, &synch_distance); + + TEST_ASSERT_EQUAL_FLOAT(1.25, offset); + TEST_ASSERT_EQUAL_FLOAT(1. / ULOGTOD(16), precision); + // 1.1250150000000001 ? + TEST_ASSERT_EQUAL_FLOAT(1.125015, synch_distance); +} + +void test_OffsetCalculationNegativeOffset(void) { + struct pkt rpkt; + + rpkt.precision = -1; + rpkt.rootdelay = HTONS_FP(DTOUFP(0.5)); + rpkt.rootdisp = HTONS_FP(DTOUFP(0.5)); + // Synch Distance is (0.5+0.5)/2.0, or 0.5 + l_fp reftime; + get_systime(&reftime); + HTONL_FP(&reftime, &rpkt.reftime); + + l_fp tmp; + + // T1 - Originate timestamp + tmp.l_ui = 1000000001UL; + tmp.l_uf = 0UL; + HTONL_FP(&tmp, &rpkt.org); + + // T2 - Receive timestamp + tmp.l_ui = 1000000000UL; + tmp.l_uf = 2147483648UL; + HTONL_FP(&tmp, &rpkt.rec); + + // T3 - Transmit timestamp + tmp.l_ui = 1000000001UL; + tmp.l_uf = 2147483648UL; + HTONL_FP(&tmp, &rpkt.xmt); + + // T4 - Destination timestamp as standard timeval + tmp.l_ui = 1000000003UL; + tmp.l_uf = 0UL; + struct timeval dst; + TSTOTV(&tmp, &dst); + dst.tv_sec -= JAN_1970; + + double offset, precision, synch_distance; + offset_calculation(&rpkt, LEN_PKT_NOMAC, &dst, &offset, &precision, &synch_distance); + + TEST_ASSERT_EQUAL_FLOAT(-1, offset); + TEST_ASSERT_EQUAL_FLOAT(1. / ULOGTOD(1), precision); + TEST_ASSERT_EQUAL_FLOAT(1.3333483333333334, synch_distance); +} + +void test_HandleUnusableServer(void) { + struct pkt rpkt; + sockaddr_u host; + int rpktl; + + ZERO(rpkt); + ZERO(host); + rpktl = SERVER_UNUSEABLE; + TEST_ASSERT_EQUAL(-1, handle_pkt(rpktl, &rpkt, &host, "")); +} + +void test_HandleUnusablePacket(void) { + struct pkt rpkt; + sockaddr_u host; + int rpktl; + + ZERO(rpkt); + ZERO(host); + rpktl = PACKET_UNUSEABLE; + TEST_ASSERT_EQUAL(1, handle_pkt(rpktl, &rpkt, &host, "")); +} + +void test_HandleServerAuthenticationFailure(void) { + struct pkt rpkt; + sockaddr_u host; + int rpktl; + + ZERO(rpkt); + ZERO(host); + rpktl = SERVER_AUTH_FAIL; + TEST_ASSERT_EQUAL(1, handle_pkt(rpktl, &rpkt, &host, "")); +} + +void test_HandleKodDemobilize(void) { + const char * HOSTNAME = "192.0.2.1"; + const char * REASON = "DENY"; + struct pkt rpkt; + sockaddr_u host; + int rpktl; + struct kod_entry * entry; + + rpktl = KOD_DEMOBILIZE; + ZERO(rpkt); + memcpy(&rpkt.refid, REASON, 4); + ZERO(host); + host.sa4.sin_family = AF_INET; + host.sa4.sin_addr.s_addr = inet_addr(HOSTNAME); + + // Test that the KOD-entry is added to the database. + kod_init_kod_db("/dev/null", TRUE); + + TEST_ASSERT_EQUAL(1, handle_pkt(rpktl, &rpkt, &host, HOSTNAME)); + + TEST_ASSERT_EQUAL(1, search_entry(HOSTNAME, &entry)); + TEST_ASSERT_TRUE(memcmp(REASON, entry->type, 4) == 0); +} + +void test_HandleKodRate(void) { + struct pkt rpkt; + sockaddr_u host; + int rpktl; + + ZERO(rpkt); + ZERO(host); + rpktl = KOD_RATE; + TEST_ASSERT_EQUAL(1, handle_pkt(rpktl, &rpkt, &host, "")); +} + +void test_HandleCorrectPacket(void) { + struct pkt rpkt; + sockaddr_u host; + int rpktl; + l_fp now; + + // We don't want our testing code to actually change the system clock. + TEST_ASSERT_FALSE(ENABLED_OPT(STEP)); + TEST_ASSERT_FALSE(ENABLED_OPT(SLEW)); + + get_systime(&now); + HTONL_FP(&now, &rpkt.reftime); + HTONL_FP(&now, &rpkt.org); + HTONL_FP(&now, &rpkt.rec); + HTONL_FP(&now, &rpkt.xmt); + rpktl = LEN_PKT_NOMAC; + ZERO(host); + AF(&host) = AF_INET; + + TEST_ASSERT_EQUAL(0, handle_pkt(rpktl, &rpkt, &host, "")); +} + +/* packetHandling.c */ |