1
0
mirror of https://github.com/yarrick/iodine.git synced 2024-11-30 08:56:09 +03:00
iodine/tests/dns.c

215 lines
6.4 KiB
C
Raw Normal View History

/*
2009-01-04 02:39:54 +03:00
* Copyright (c) 2006-2009 Bjorn Andersson <flex@kryo.se>, Erik Ekman <yarrick@kryo.se>
*
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
#include <check.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <ctype.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <sys/stat.h>
#include <arpa/nameser.h>
2007-02-04 18:28:24 +03:00
#include "common.h"
#include "dns.h"
#include "encoding.h"
2007-06-09 20:57:33 +04:00
#include "base32.h"
#include "test.h"
static void dump_packet(char *, size_t);
2008-07-13 00:57:30 +04:00
static char queryPacket[] =
2007-06-09 20:57:33 +04:00
"\x05\x39\x01\x00\x00\x01\x00\x00\x00\x00\x00\x01\x2D\x41\x6A\x62\x63"
"\x75\x79\x74\x63\x70\x65\x62\x30\x67\x71\x30\x6C\x74\x65\x62\x75\x78"
"\x67\x69\x64\x75\x6E\x62\x73\x73\x61\x33\x64\x66\x6F\x6E\x30\x63\x61"
"\x7A\x64\x62\x6F\x72\x71\x71\x04\x6B\x72\x79\x6F\x02\x73\x65\x00\x00"
"\x0A\x00\x01\x00\x00\x29\x10\x00\x00\x00\x80\x00\x00\x00";
2007-01-28 09:11:54 +03:00
2008-07-13 00:57:30 +04:00
static char answerPacket[] =
2007-01-28 09:11:54 +03:00
"\x05\x39\x84\x00\x00\x01\x00\x01\x00\x00\x00\x00\x05\x73\x69\x6C\x6C"
"\x79\x04\x68\x6F\x73\x74\x02\x6F\x66\x06\x69\x6F\x64\x69\x6E\x65\x04"
"\x63\x6F\x64\x65\x04\x6B\x72\x79\x6F\x02\x73\x65\x00\x00\x0A\x00\x01"
"\xC0\x0C\x00\x0A\x00\x01\x00\x00\x00\x00\x00\x23\x74\x68\x69\x73\x20"
"\x69\x73\x20\x74\x68\x65\x20\x6D\x65\x73\x73\x61\x67\x65\x20\x74\x6F"
"\x20\x62\x65\x20\x64\x65\x6C\x69\x76\x65\x72\x65\x64";
2008-07-13 00:57:30 +04:00
2009-01-03 23:13:31 +03:00
static char answerPacketHighTransId[] =
"\x85\x39\x84\x00\x00\x01\x00\x01\x00\x00\x00\x00\x05\x73\x69\x6C\x6C"
"\x79\x04\x68\x6F\x73\x74\x02\x6F\x66\x06\x69\x6F\x64\x69\x6E\x65\x04"
"\x63\x6F\x64\x65\x04\x6B\x72\x79\x6F\x02\x73\x65\x00\x00\x0A\x00\x01"
"\xC0\x0C\x00\x0A\x00\x01\x00\x00\x00\x00\x00\x23\x74\x68\x69\x73\x20"
"\x69\x73\x20\x74\x68\x65\x20\x6D\x65\x73\x73\x61\x67\x65\x20\x74\x6F"
"\x20\x62\x65\x20\x64\x65\x6C\x69\x76\x65\x72\x65\x64";
2007-01-28 09:11:54 +03:00
static char *msgData = "this is the message to be delivered";
2007-02-08 23:53:37 +03:00
static char *topdomain = "kryo.se";
2008-07-13 00:57:30 +04:00
2007-06-09 20:57:33 +04:00
static char *innerData = "HELLO this is the test data";
2007-01-28 09:11:54 +03:00
2007-01-28 08:37:13 +03:00
START_TEST(test_encode_query)
{
char buf[512];
char resolv[512];
2007-01-28 08:37:13 +03:00
struct query q;
2007-06-09 20:57:33 +04:00
struct encoder *enc;
char *d;
2007-06-09 20:57:33 +04:00
size_t len;
2007-01-28 08:37:13 +03:00
int ret;
len = sizeof(buf);
memset(&buf, 0, sizeof(buf));
memset(&resolv, 0, sizeof(resolv));
2007-01-28 08:37:13 +03:00
memset(&q, 0, sizeof(struct query));
q.type = T_NULL;
q.id = 1337;
d = resolv;
2007-06-09 20:57:33 +04:00
enc = get_base32_encoder();
2007-02-09 00:10:46 +03:00
*d++ = 'A';
2007-06-09 20:57:33 +04:00
enc->encode(d, &len, innerData, strlen(innerData));
2007-02-09 00:10:46 +03:00
d = resolv + strlen(resolv);
if (*d != '.') {
*d++ = '.';
}
2007-02-09 00:10:46 +03:00
strcpy(d, topdomain);
ret = dns_encode(buf, len, &q, QR_QUERY, resolv, strlen(resolv));
len = sizeof(queryPacket) - 1; /* Skip extra null character */
2007-01-28 08:37:13 +03:00
if (strncmp(queryPacket, buf, sizeof(queryPacket)) || ret != len) {
printf("\n");
dump_packet(queryPacket, len);
dump_packet(buf, ret);
}
2007-01-28 08:37:13 +03:00
fail_unless(strncmp(queryPacket, buf, sizeof(queryPacket)) == 0, "Did not compile expected packet");
2008-07-13 00:57:30 +04:00
fail_unless(ret == len, "Bad packet length: %d, expected %d", ret, len);
2007-01-28 08:37:13 +03:00
}
END_TEST
START_TEST(test_decode_query)
{
char buf[512];
2007-02-08 23:53:37 +03:00
char *domain;
struct query q;
2007-06-09 20:57:33 +04:00
struct encoder *enc;
size_t len;
memset(&q, 0, sizeof(struct query));
memset(&buf, 0, sizeof(buf));
q.id = 0;
len = sizeof(queryPacket) - 1;
2007-06-09 20:57:33 +04:00
enc = get_base32_encoder();
2007-02-08 23:53:37 +03:00
dns_decode(buf, sizeof(buf), &q, QR_QUERY, queryPacket, len);
domain = strstr(q.name, topdomain);
2007-06-09 20:57:33 +04:00
len = sizeof(buf);
unpack_data(buf, len, &(q.name[1]), (int) (domain - q.name) - 1, enc);
2007-06-09 20:57:33 +04:00
fail_unless(strncmp(buf, innerData, strlen(innerData)) == 0, "Did not extract expected host: '%s'", buf);
2008-07-13 00:57:30 +04:00
fail_unless(strlen(buf) == strlen(innerData), "Bad host length: %d, expected %d: '%s'", strlen(buf), strlen(innerData), buf);
}
END_TEST
2007-01-28 08:57:44 +03:00
START_TEST(test_encode_response)
{
char buf[512];
char *host = "silly.host.of.iodine.code.kryo.se";
struct query q;
int len;
int ret;
len = sizeof(buf);
memset(&buf, 0, sizeof(buf));
2007-01-28 08:57:44 +03:00
memset(&q, 0, sizeof(struct query));
strncpy(q.name, host, strlen(host));
q.type = T_NULL;
q.id = 1337;
2007-01-28 09:11:54 +03:00
ret = dns_encode(buf, len, &q, QR_ANSWER, msgData, strlen(msgData));
len = sizeof(answerPacket) - 1; /* Skip extra null character */
2007-01-28 08:57:44 +03:00
fail_unless(strncmp(answerPacket, buf, sizeof(answerPacket)) == 0, "Did not compile expected packet");
2008-07-13 00:57:30 +04:00
fail_unless(ret == len, "Bad packet length: %d, expected %d", ret, len);
2007-01-28 08:57:44 +03:00
}
END_TEST
2007-01-28 09:11:54 +03:00
START_TEST(test_decode_response)
{
char buf[512];
2009-01-03 23:13:31 +03:00
struct query q;
2007-01-28 09:11:54 +03:00
int len;
int ret;
len = sizeof(buf);
memset(&buf, 0, sizeof(buf));
2007-01-28 09:11:54 +03:00
2009-01-03 23:13:31 +03:00
ret = dns_decode(buf, len, &q, QR_ANSWER, answerPacket, sizeof(answerPacket)-1);
2007-01-28 09:11:54 +03:00
fail_unless(strncmp(msgData, buf, sizeof(msgData)) == 0, "Did not extract expected data");
2008-07-13 00:57:30 +04:00
fail_unless(ret == strlen(msgData), "Bad data length: %d, expected %d", ret, strlen(msgData));
2009-01-03 23:13:31 +03:00
fail_unless(q.id == 0x0539);
2007-01-28 09:11:54 +03:00
}
END_TEST
2009-01-03 23:13:31 +03:00
START_TEST(test_decode_response_with_high_trans_id)
{
char buf[512];
struct query q;
int len;
int ret;
len = sizeof(buf);
memset(&buf, 0, sizeof(buf));
ret = dns_decode(buf, len, &q, QR_ANSWER, answerPacketHighTransId, sizeof(answerPacketHighTransId)-1);
fail_unless(strncmp(msgData, buf, sizeof(msgData)) == 0, "Did not extract expected data");
fail_unless(ret == strlen(msgData), "Bad data length: %d, expected %d", ret, strlen(msgData));
fail_unless(q.id == 0x8539, "q.id was %08X instead of %08X!", q.id, 0x8539);
}
END_TEST
static void
dump_packet(char *buf, size_t len)
{
int pos;
for (pos = 0; pos < len; pos++) {
printf("\\x%02X", (unsigned char) buf[pos]);
}
printf("\n");
for (pos = 0; pos < len; pos++) {
if (isalnum((unsigned char) buf[pos])) {
printf(" %c ", (unsigned char) buf[pos]);
} else {
printf(" ");
}
}
printf("\n");
}
TCase *
test_dns_create_tests()
{
TCase *tc;
tc = tcase_create("Dns");
2007-01-28 08:37:13 +03:00
tcase_add_test(tc, test_encode_query);
tcase_add_test(tc, test_decode_query);
2007-01-28 08:57:44 +03:00
tcase_add_test(tc, test_encode_response);
2007-01-28 09:11:54 +03:00
tcase_add_test(tc, test_decode_response);
2009-01-03 23:13:31 +03:00
tcase_add_test(tc, test_decode_response_with_high_trans_id);
return tc;
}