]> CyberLeo.Net >> Repos - FreeBSD/releng/10.2.git/blob - contrib/ntp/tests/libntp/a_md5encrypt.c
- Copy stable/10@285827 to releng/10.2 in preparation for 10.2-RC1
[FreeBSD/releng/10.2.git] / contrib / ntp / tests / libntp / a_md5encrypt.c
1 #include "config.h"
2 #include "unity.h"
3
4 #ifdef OPENSSL
5 # include "openssl/err.h"
6 # include "openssl/rand.h"
7 # include "openssl/evp.h"
8 #endif
9 #include "ntp.h"
10 #include "ntp_stdlib.h"
11
12 u_long current_time = 4;
13
14
15 void setUp(void)
16 {
17 }
18
19 void tearDown(void)
20 {
21 }
22
23 /*
24  * Example packet with MD5 hash calculated manually.
25  */
26 const int keytype = KEY_TYPE_MD5;
27 const char *key = "abcdefgh";
28 const u_short keyLength = 8;
29 const char *packet = "ijklmnopqrstuvwx";
30 #define packetLength 16         //const int packetLength = 16;
31 #define keyIdLength  4          //const int keyIdLength = 4;
32 #define digestLength 16         //const int digestLength = 16;
33 const int totalLength = packetLength + keyIdLength + digestLength;
34 const char *expectedPacket = "ijklmnopqrstuvwx\0\0\0\0\x0c\x0e\x84\xcf\x0b\xb7\xa8\x68\x8e\x52\x38\xdb\xbc\x1c\x39\x53";
35
36 void test_Encrypt() {
37         char *packetPtr = malloc(totalLength*sizeof(*packetPtr)); //new char[totalLength];
38
39         memset(packetPtr+packetLength, 0, keyIdLength);
40         memcpy(packetPtr, packet, packetLength);
41
42         cache_secretsize = keyLength;
43
44         int length = MD5authencrypt(keytype, (u_char*)key, (u_int32*)packetPtr, packetLength);
45
46         TEST_ASSERT_TRUE(MD5authdecrypt(keytype, (u_char*)key, (u_int32*)packetPtr, packetLength, length));
47
48         TEST_ASSERT_EQUAL(20, length);
49         TEST_ASSERT_TRUE(memcmp(expectedPacket, packetPtr, totalLength) == 0);
50
51         free(packetPtr); //delete[] packetPtr;
52 }
53
54 void test_DecryptValid() {
55         cache_secretsize = keyLength;
56
57         TEST_ASSERT_TRUE(MD5authdecrypt(keytype, (u_char*)key, (u_int32*)expectedPacket, packetLength, 20));
58 }
59
60 void test_DecryptInvalid() {
61         cache_secretsize = keyLength;
62
63         const char *invalidPacket = "ijklmnopqrstuvwx\0\0\0\0\x0c\x0e\x84\xcf\x0b\xb7\xa8\x68\x8e\x52\x38\xdb\xbc\x1c\x39\x54";
64
65         TEST_ASSERT_FALSE(MD5authdecrypt(keytype, (u_char*)key, (u_int32*)invalidPacket, packetLength, 20));
66 }
67
68 void test_IPv4AddressToRefId() {
69         sockaddr_u addr;
70         addr.sa4.sin_family = AF_INET;
71         addr.sa4.sin_port = htons(80);
72
73         u_int32 address = inet_addr("192.0.2.1");
74         addr.sa4.sin_addr.s_addr = address;
75
76         TEST_ASSERT_EQUAL(address, addr2refid(&addr));
77 }
78
79 void test_IPv6AddressToRefId() {
80         const struct in6_addr address = {
81                 0x20, 0x01, 0x0d, 0xb8,
82                 0x85, 0xa3, 0x08, 0xd3,
83                 0x13, 0x19, 0x8a, 0x2e,
84                 0x03, 0x70, 0x73, 0x34
85         };
86         sockaddr_u addr;
87
88         addr.sa6.sin6_family = AF_INET6;
89
90         addr.sa6.sin6_addr = address;
91
92         const int expected = 0x75cffd52;
93
94 #if 0
95         TEST_ASSERT_EQUAL(expected, addr2refid(&addr));
96 #else
97         TEST_IGNORE_MESSAGE("Skipping because of big endian problem?");
98 #endif
99 }