1 /* $NetBSD: a_md5encrypt.c,v 1.1.1.6 2016/11/22 01:35:19 christos Exp $ */ 2 3 #include "config.h" 4 #include "unity.h" 5 6 #ifdef OPENSSL 7 # include "openssl/err.h" 8 # include "openssl/rand.h" 9 # include "openssl/evp.h" 10 #endif 11 #include "ntp.h" 12 #include "ntp_stdlib.h" 13 14 u_long current_time = 4; 15 16 17 /* 18 * Example packet with MD5 hash calculated manually. 19 */ 20 const int keytype = KEY_TYPE_MD5; 21 const u_char *key = (const u_char*)"abcdefgh"; 22 const u_short keyLength = 8; 23 const u_char *packet = (const u_char*)"ijklmnopqrstuvwx"; 24 #define packetLength 16 25 #define keyIdLength 4 26 #define digestLength 16 27 #define totalLength (packetLength + keyIdLength + digestLength) 28 union { 29 u_char u8 [totalLength]; 30 uint32_t u32[1]; 31 } expectedPacket = { 32 "ijklmnopqrstuvwx\0\0\0\0\x0c\x0e\x84\xcf\x0b\xb7\xa8\x68\x8e\x52\x38\xdb\xbc\x1c\x39\x53" 33 }; 34 union { 35 u_char u8 [totalLength]; 36 uint32_t u32[1]; 37 } invalidPacket = { 38 "ijklmnopqrstuvwx\0\0\0\0\x0c\x0e\x84\xcf\x0b\xb7\xa8\x68\x8e\x52\x38\xdb\xbc\x1c\x39\x54" 39 }; 40 41 42 void test_Encrypt(void); 43 void test_DecryptValid(void); 44 void test_DecryptInvalid(void); 45 void test_IPv4AddressToRefId(void); 46 void test_IPv6AddressToRefId(void); 47 48 49 void 50 test_Encrypt(void) { 51 u_int32 *packetPtr; 52 int length; 53 54 packetPtr = emalloc_zero(totalLength * sizeof(*packetPtr)); 55 memcpy(packetPtr, packet, packetLength); 56 57 cache_secretsize = keyLength; 58 59 length = MD5authencrypt(keytype, key, packetPtr, packetLength); 60 61 TEST_ASSERT_TRUE(MD5authdecrypt(keytype, key, packetPtr, packetLength, length)); 62 63 TEST_ASSERT_EQUAL(20, length); 64 TEST_ASSERT_EQUAL_MEMORY(expectedPacket.u8, packetPtr, totalLength); 65 66 free(packetPtr); 67 } 68 69 void 70 test_DecryptValid(void) { 71 cache_secretsize = keyLength; 72 TEST_ASSERT_TRUE(MD5authdecrypt(keytype, key, expectedPacket.u32, packetLength, 20)); 73 } 74 75 void 76 test_DecryptInvalid(void) { 77 cache_secretsize = keyLength; 78 TEST_ASSERT_FALSE(MD5authdecrypt(keytype, key, invalidPacket.u32, packetLength, 20)); 79 } 80 81 void 82 test_IPv4AddressToRefId(void) { 83 sockaddr_u addr; 84 addr.sa4.sin_family = AF_INET; 85 u_int32 address; 86 87 addr.sa4.sin_port = htons(80); 88 89 address = inet_addr("192.0.2.1"); 90 addr.sa4.sin_addr.s_addr = address; 91 92 TEST_ASSERT_EQUAL(address, addr2refid(&addr)); 93 } 94 95 void 96 test_IPv6AddressToRefId(void) { 97 const int expected = 0x75cffd52; 98 const struct in6_addr address = { { { 99 0x20, 0x01, 0x0d, 0xb8, 100 0x85, 0xa3, 0x08, 0xd3, 101 0x13, 0x19, 0x8a, 0x2e, 102 0x03, 0x70, 0x73, 0x34 103 } } }; 104 sockaddr_u addr; 105 106 addr.sa6.sin6_family = AF_INET6; 107 108 addr.sa6.sin6_addr = address; 109 110 111 #if 0 112 TEST_ASSERT_EQUAL(expected, addr2refid(&addr)); 113 #else 114 (void)expected; 115 TEST_IGNORE_MESSAGE("Skipping because of big endian problem?"); 116 #endif 117 } 118