]> CyberLeo.Net >> Repos - FreeBSD/releng/10.2.git/blob - contrib/ntp/tests/libntp/g_a_md5encrypt.cpp
Fix a regression with SA-15:24 patch that prevented NIS from
[FreeBSD/releng/10.2.git] / contrib / ntp / tests / libntp / g_a_md5encrypt.cpp
1 #include "g_libntptest.h"
2
3 extern "C" {
4 #ifdef OPENSSL
5 # include "openssl/err.h"
6 # include "openssl/rand.h"
7 # include "openssl/evp.h"
8 #endif
9 #include "ntp.h"
10 #include "ntp_stdlib.h"
11 };
12
13 class a_md5encryptTest : public libntptest {
14 protected:
15 };
16
17 /*
18  * Example packet with MD5 hash calculated manually.
19  */
20 const int keytype = KEY_TYPE_MD5;
21 const char *key = "abcdefgh";
22 const u_short keyLength = 8;
23 const char *packet = "ijklmnopqrstuvwx";
24 const int packetLength = 16;
25 const int keyIdLength = 4;
26 const int digestLength = 16;
27 const int totalLength = packetLength + keyIdLength + digestLength;
28 const char *expectedPacket = "ijklmnopqrstuvwx\0\0\0\0\x0c\x0e\x84\xcf\x0b\xb7\xa8\x68\x8e\x52\x38\xdb\xbc\x1c\x39\x53";
29
30 TEST_F(a_md5encryptTest, Encrypt) {
31         char *packetPtr = new char[totalLength];
32         memset(packetPtr+packetLength, 0, keyIdLength);
33         memcpy(packetPtr, packet, packetLength);
34
35         cache_secretsize = keyLength;
36
37         int length =  MD5authencrypt(keytype, (u_char*)key, (u_int32*)packetPtr, packetLength);
38
39         EXPECT_TRUE(MD5authdecrypt(keytype, (u_char*)key, (u_int32*)packetPtr, packetLength, length));
40         
41         EXPECT_EQ(20, length);
42         EXPECT_TRUE(memcmp(expectedPacket, packetPtr, totalLength) == 0);
43
44         delete[] packetPtr;
45 }
46
47 TEST_F(a_md5encryptTest, DecryptValid) {
48         cache_secretsize = keyLength;
49
50         EXPECT_TRUE(MD5authdecrypt(keytype, (u_char*)key, (u_int32*)expectedPacket, packetLength, 20));
51 }
52
53 TEST_F(a_md5encryptTest, DecryptInvalid) {
54         cache_secretsize = keyLength;
55
56         const char *invalidPacket = "ijklmnopqrstuvwx\0\0\0\0\x0c\x0e\x84\xcf\x0b\xb7\xa8\x68\x8e\x52\x38\xdb\xbc\x1c\x39\x54";
57         
58         EXPECT_FALSE(MD5authdecrypt(keytype, (u_char*)key, (u_int32*)invalidPacket, packetLength, 20));
59 }
60
61 TEST_F(a_md5encryptTest, IPv4AddressToRefId) {
62         sockaddr_u addr;
63         addr.sa4.sin_family = AF_INET;
64         addr.sa4.sin_port = htons(80);
65
66         u_int32 address = inet_addr("192.0.2.1");
67         addr.sa4.sin_addr.s_addr = address;
68
69         EXPECT_EQ(address, addr2refid(&addr));
70 }
71
72 TEST_F(a_md5encryptTest, IPv6AddressToRefId) {
73         const struct in6_addr address = {
74                 0x20, 0x01, 0x0d, 0xb8,
75         0x85, 0xa3, 0x08, 0xd3, 
76         0x13, 0x19, 0x8a, 0x2e,
77         0x03, 0x70, 0x73, 0x34
78         };
79
80
81         sockaddr_u addr;
82         addr.sa6.sin6_family = AF_INET6;
83         
84         addr.sa6.sin6_addr = address;
85
86         const int expected = 0x75cffd52;
87
88         EXPECT_EQ(expected, addr2refid(&addr));
89 }