f391d6bc1d
ntp 4.2.8p9. Approved by: so
116 lines
2.5 KiB
C
116 lines
2.5 KiB
C
#include "config.h"
|
|
#include "unity.h"
|
|
|
|
#ifdef OPENSSL
|
|
# include "openssl/err.h"
|
|
# include "openssl/rand.h"
|
|
# include "openssl/evp.h"
|
|
#endif
|
|
#include "ntp.h"
|
|
#include "ntp_stdlib.h"
|
|
|
|
u_long current_time = 4;
|
|
|
|
|
|
/*
|
|
* Example packet with MD5 hash calculated manually.
|
|
*/
|
|
const int keytype = KEY_TYPE_MD5;
|
|
const u_char *key = (const u_char*)"abcdefgh";
|
|
const u_short keyLength = 8;
|
|
const u_char *packet = (const u_char*)"ijklmnopqrstuvwx";
|
|
#define packetLength 16
|
|
#define keyIdLength 4
|
|
#define digestLength 16
|
|
#define totalLength (packetLength + keyIdLength + digestLength)
|
|
union {
|
|
u_char u8 [totalLength];
|
|
uint32_t u32[1];
|
|
} expectedPacket = {
|
|
"ijklmnopqrstuvwx\0\0\0\0\x0c\x0e\x84\xcf\x0b\xb7\xa8\x68\x8e\x52\x38\xdb\xbc\x1c\x39\x53"
|
|
};
|
|
union {
|
|
u_char u8 [totalLength];
|
|
uint32_t u32[1];
|
|
} invalidPacket = {
|
|
"ijklmnopqrstuvwx\0\0\0\0\x0c\x0e\x84\xcf\x0b\xb7\xa8\x68\x8e\x52\x38\xdb\xbc\x1c\x39\x54"
|
|
};
|
|
|
|
|
|
void test_Encrypt(void);
|
|
void test_DecryptValid(void);
|
|
void test_DecryptInvalid(void);
|
|
void test_IPv4AddressToRefId(void);
|
|
void test_IPv6AddressToRefId(void);
|
|
|
|
|
|
void
|
|
test_Encrypt(void) {
|
|
u_int32 *packetPtr;
|
|
int length;
|
|
|
|
packetPtr = emalloc_zero(totalLength * sizeof(*packetPtr));
|
|
memcpy(packetPtr, packet, packetLength);
|
|
|
|
cache_secretsize = keyLength;
|
|
|
|
length = MD5authencrypt(keytype, key, packetPtr, packetLength);
|
|
|
|
TEST_ASSERT_TRUE(MD5authdecrypt(keytype, key, packetPtr, packetLength, length));
|
|
|
|
TEST_ASSERT_EQUAL(20, length);
|
|
TEST_ASSERT_EQUAL_MEMORY(expectedPacket.u8, packetPtr, totalLength);
|
|
|
|
free(packetPtr);
|
|
}
|
|
|
|
void
|
|
test_DecryptValid(void) {
|
|
cache_secretsize = keyLength;
|
|
TEST_ASSERT_TRUE(MD5authdecrypt(keytype, key, expectedPacket.u32, packetLength, 20));
|
|
}
|
|
|
|
void
|
|
test_DecryptInvalid(void) {
|
|
cache_secretsize = keyLength;
|
|
TEST_ASSERT_FALSE(MD5authdecrypt(keytype, key, invalidPacket.u32, packetLength, 20));
|
|
}
|
|
|
|
void
|
|
test_IPv4AddressToRefId(void) {
|
|
sockaddr_u addr;
|
|
addr.sa4.sin_family = AF_INET;
|
|
u_int32 address;
|
|
|
|
addr.sa4.sin_port = htons(80);
|
|
|
|
address = inet_addr("192.0.2.1");
|
|
addr.sa4.sin_addr.s_addr = address;
|
|
|
|
TEST_ASSERT_EQUAL(address, addr2refid(&addr));
|
|
}
|
|
|
|
void
|
|
test_IPv6AddressToRefId(void) {
|
|
const int expected = 0x75cffd52;
|
|
const struct in6_addr address = { { {
|
|
0x20, 0x01, 0x0d, 0xb8,
|
|
0x85, 0xa3, 0x08, 0xd3,
|
|
0x13, 0x19, 0x8a, 0x2e,
|
|
0x03, 0x70, 0x73, 0x34
|
|
} } };
|
|
sockaddr_u addr;
|
|
|
|
addr.sa6.sin6_family = AF_INET6;
|
|
|
|
addr.sa6.sin6_addr = address;
|
|
|
|
|
|
#if 0
|
|
TEST_ASSERT_EQUAL(expected, addr2refid(&addr));
|
|
#else
|
|
(void)expected;
|
|
TEST_IGNORE_MESSAGE("Skipping because of big endian problem?");
|
|
#endif
|
|
}
|