xref: /netbsd-src/external/bsd/ntp/dist/tests/libntp/a_md5encrypt.c (revision d909946ca08dceb44d7d0f22ec9488679695d976)
1 /*	$NetBSD: a_md5encrypt.c,v 1.1.1.5 2016/01/08 21:21:33 christos Exp $	*/
2 
3 #include "config.h"
4 #include "unity.h"
5 
6 #ifdef OPENSSL
7 # include "openssl/err.h"
8 # include "openssl/rand.h"
9 # include "openssl/evp.h"
10 #endif
11 #include "ntp.h"
12 #include "ntp_stdlib.h"
13 
14 u_long current_time = 4;
15 
16 
17 /*
18  * Example packet with MD5 hash calculated manually.
19  */
20 const int keytype = KEY_TYPE_MD5;
21 const u_char *key = (const u_char*)"abcdefgh";
22 const u_short keyLength = 8;
23 const u_char *packet = (const u_char*)"ijklmnopqrstuvwx";
24 #define packetLength 16
25 #define keyIdLength  4
26 #define digestLength 16
27 #define totalLength (packetLength + keyIdLength + digestLength)
28 union {
29 	u_char		u8 [totalLength];
30 	uint32_t	u32[1];
31 } expectedPacket = {
32 	"ijklmnopqrstuvwx\0\0\0\0\x0c\x0e\x84\xcf\x0b\xb7\xa8\x68\x8e\x52\x38\xdb\xbc\x1c\x39\x53"
33 };
34 union {
35 	u_char		u8 [totalLength];
36 	uint32_t	u32[1];
37 } invalidPacket = {
38 	"ijklmnopqrstuvwx\0\0\0\0\x0c\x0e\x84\xcf\x0b\xb7\xa8\x68\x8e\x52\x38\xdb\xbc\x1c\x39\x54"
39 };
40 
41 
42 void test_Encrypt(void);
43 void test_DecryptValid(void);
44 void test_DecryptInvalid(void);
45 void test_IPv4AddressToRefId(void);
46 void test_IPv6AddressToRefId(void);
47 
48 
49 void
50 test_Encrypt(void) {
51 	u_int32 *packetPtr;
52 	int length;
53 
54 	packetPtr = emalloc(totalLength * sizeof(*packetPtr));
55 
56 	memset(packetPtr + packetLength, 0, keyIdLength);
57 	memcpy(packetPtr, packet, packetLength);
58 
59 	cache_secretsize = keyLength;
60 
61 	length = MD5authencrypt(keytype, key, packetPtr, packetLength);
62 
63 	TEST_ASSERT_TRUE(MD5authdecrypt(keytype, key, packetPtr, packetLength, length));
64 
65 	TEST_ASSERT_EQUAL(20, length);
66 	TEST_ASSERT_EQUAL_MEMORY(expectedPacket.u8, packetPtr, totalLength);
67 
68 	free(packetPtr);
69 }
70 
71 void
72 test_DecryptValid(void) {
73 	cache_secretsize = keyLength;
74 	TEST_ASSERT_TRUE(MD5authdecrypt(keytype, key, expectedPacket.u32, packetLength, 20));
75 }
76 
77 void
78 test_DecryptInvalid(void) {
79 	cache_secretsize = keyLength;
80 	TEST_ASSERT_FALSE(MD5authdecrypt(keytype, key, invalidPacket.u32, packetLength, 20));
81 }
82 
83 void
84 test_IPv4AddressToRefId(void) {
85 	sockaddr_u addr;
86 	addr.sa4.sin_family = AF_INET;
87 	u_int32 address;
88 
89 	addr.sa4.sin_port = htons(80);
90 
91 	address = inet_addr("192.0.2.1");
92 	addr.sa4.sin_addr.s_addr = address;
93 
94 	TEST_ASSERT_EQUAL(address, addr2refid(&addr));
95 }
96 
97 void
98 test_IPv6AddressToRefId(void) {
99 	const int expected = 0x75cffd52;
100 	const struct in6_addr address = { { {
101 		0x20, 0x01, 0x0d, 0xb8,
102 		0x85, 0xa3, 0x08, 0xd3,
103 		0x13, 0x19, 0x8a, 0x2e,
104 		0x03, 0x70, 0x73, 0x34
105 	} } };
106 	sockaddr_u addr;
107 
108 	addr.sa6.sin6_family = AF_INET6;
109 
110 	addr.sa6.sin6_addr = address;
111 
112 
113 #if 0
114 	TEST_ASSERT_EQUAL(expected, addr2refid(&addr));
115 #else
116 	(void)expected;
117 	TEST_IGNORE_MESSAGE("Skipping because of big endian problem?");
118 #endif
119 }
120