diff options
Diffstat (limited to 'tests/libntp/a_md5encrypt.c')
-rw-r--r-- | tests/libntp/a_md5encrypt.c | 99 |
1 files changed, 99 insertions, 0 deletions
diff --git a/tests/libntp/a_md5encrypt.c b/tests/libntp/a_md5encrypt.c new file mode 100644 index 000000000000..1738200d314f --- /dev/null +++ b/tests/libntp/a_md5encrypt.c @@ -0,0 +1,99 @@ +#include "config.h" +#include "unity.h" + +#ifdef OPENSSL +# include "openssl/err.h" +# include "openssl/rand.h" +# include "openssl/evp.h" +#endif +#include "ntp.h" +#include "ntp_stdlib.h" + +u_long current_time = 4; + + +void setUp(void) +{ +} + +void tearDown(void) +{ +} + +/* + * Example packet with MD5 hash calculated manually. + */ +const int keytype = KEY_TYPE_MD5; +const char *key = "abcdefgh"; +const u_short keyLength = 8; +const char *packet = "ijklmnopqrstuvwx"; +#define packetLength 16 //const int packetLength = 16; +#define keyIdLength 4 //const int keyIdLength = 4; +#define digestLength 16 //const int digestLength = 16; +const int totalLength = packetLength + keyIdLength + digestLength; +const char *expectedPacket = "ijklmnopqrstuvwx\0\0\0\0\x0c\x0e\x84\xcf\x0b\xb7\xa8\x68\x8e\x52\x38\xdb\xbc\x1c\x39\x53"; + +void test_Encrypt() { + char *packetPtr = malloc(totalLength*sizeof(*packetPtr)); //new char[totalLength]; + + memset(packetPtr+packetLength, 0, keyIdLength); + memcpy(packetPtr, packet, packetLength); + + cache_secretsize = keyLength; + + int length = MD5authencrypt(keytype, (u_char*)key, (u_int32*)packetPtr, packetLength); + + TEST_ASSERT_TRUE(MD5authdecrypt(keytype, (u_char*)key, (u_int32*)packetPtr, packetLength, length)); + + TEST_ASSERT_EQUAL(20, length); + TEST_ASSERT_TRUE(memcmp(expectedPacket, packetPtr, totalLength) == 0); + + free(packetPtr); //delete[] packetPtr; +} + +void test_DecryptValid() { + cache_secretsize = keyLength; + + TEST_ASSERT_TRUE(MD5authdecrypt(keytype, (u_char*)key, (u_int32*)expectedPacket, packetLength, 20)); +} + +void test_DecryptInvalid() { + cache_secretsize = keyLength; + + const char *invalidPacket = "ijklmnopqrstuvwx\0\0\0\0\x0c\x0e\x84\xcf\x0b\xb7\xa8\x68\x8e\x52\x38\xdb\xbc\x1c\x39\x54"; + + TEST_ASSERT_FALSE(MD5authdecrypt(keytype, (u_char*)key, (u_int32*)invalidPacket, packetLength, 20)); +} + +void test_IPv4AddressToRefId() { + sockaddr_u addr; + addr.sa4.sin_family = AF_INET; + addr.sa4.sin_port = htons(80); + + u_int32 address = inet_addr("192.0.2.1"); + addr.sa4.sin_addr.s_addr = address; + + TEST_ASSERT_EQUAL(address, addr2refid(&addr)); +} + +void test_IPv6AddressToRefId() { + const struct in6_addr address = { + 0x20, 0x01, 0x0d, 0xb8, + 0x85, 0xa3, 0x08, 0xd3, + 0x13, 0x19, 0x8a, 0x2e, + 0x03, 0x70, 0x73, 0x34 + }; + sockaddr_u addr; + + addr.sa6.sin6_family = AF_INET6; + + addr.sa6.sin6_addr = address; + + const int expected = 0x75cffd52; + +#if 0 + TEST_ASSERT_EQUAL(expected, addr2refid(&addr)); +#else + TEST_IGNORE_MESSAGE("Skipping because of big endian problem?"); +#endif +} |