2 * Copyright (c) 2006-2009 Bjorn Andersson <flex@kryo.se>, Erik Ekman <yarrick@kryo.se>
4 * Permission to use, copy, modify, and distribute this software for any
5 * purpose with or without fee is hereby granted, provided that the above
6 * copyright notice and this permission notice appear in all copies.
8 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
22 #include <sys/types.h>
23 #include <sys/socket.h>
24 #include <netinet/in.h>
26 #include <arpa/nameser.h>
34 static void dump_packet(char *, size_t);
36 static char query_packet[] =
37 "\x05\x39\x01\x00\x00\x01\x00\x00\x00\x00\x00\x01\x2D\x41\x6A\x62\x63"
38 "\x75\x79\x74\x63\x70\x65\x62\x30\x67\x71\x30\x6C\x74\x65\x62\x75\x78"
39 "\x67\x69\x64\x75\x6E\x62\x73\x73\x61\x33\x64\x66\x6F\x6E\x30\x63\x61"
40 "\x7A\x64\x62\x6F\x72\x71\x71\x04\x6B\x72\x79\x6F\x02\x73\x65\x00\x00"
41 "\x0A\x00\x01\x00\x00\x29\x10\x00\x00\x00\x80\x00\x00\x00";
43 static char answer_packet[] =
44 "\x05\x39\x84\x00\x00\x01\x00\x01\x00\x00\x00\x00\x05\x73\x69\x6C\x6C"
45 "\x79\x04\x68\x6F\x73\x74\x02\x6F\x66\x06\x69\x6F\x64\x69\x6E\x65\x04"
46 "\x63\x6F\x64\x65\x04\x6B\x72\x79\x6F\x02\x73\x65\x00\x00\x0A\x00\x01"
47 "\xC0\x0C\x00\x0A\x00\x01\x00\x00\x00\x00\x00\x23\x74\x68\x69\x73\x20"
48 "\x69\x73\x20\x74\x68\x65\x20\x6D\x65\x73\x73\x61\x67\x65\x20\x74\x6F"
49 "\x20\x62\x65\x20\x64\x65\x6C\x69\x76\x65\x72\x65\x64";
51 static char answer_packet_high_trans_id[] =
52 "\x85\x39\x84\x00\x00\x01\x00\x01\x00\x00\x00\x00\x05\x73\x69\x6C\x6C"
53 "\x79\x04\x68\x6F\x73\x74\x02\x6F\x66\x06\x69\x6F\x64\x69\x6E\x65\x04"
54 "\x63\x6F\x64\x65\x04\x6B\x72\x79\x6F\x02\x73\x65\x00\x00\x0A\x00\x01"
55 "\xC0\x0C\x00\x0A\x00\x01\x00\x00\x00\x00\x00\x23\x74\x68\x69\x73\x20"
56 "\x69\x73\x20\x74\x68\x65\x20\x6D\x65\x73\x73\x61\x67\x65\x20\x74\x6F"
57 "\x20\x62\x65\x20\x64\x65\x6C\x69\x76\x65\x72\x65\x64";
58 static char *msgData = "this is the message to be delivered";
59 static char *topdomain = "kryo.se";
61 static char *innerData = "HELLO this is the test data";
63 START_TEST(test_encode_query)
74 memset(&buf, 0, sizeof(buf));
75 memset(&resolv, 0, sizeof(resolv));
76 memset(&q, 0, sizeof(struct query));
80 enc = get_base32_encoder();
83 enc->encode(d, &len, innerData, strlen(innerData));
84 d = resolv + strlen(resolv);
89 ret = dns_encode(buf, len, &q, QR_QUERY, resolv, strlen(resolv));
90 len = sizeof(query_packet) - 1; /* Skip extra null character */
92 if (strncmp(query_packet, buf, sizeof(query_packet)) || ret != len) {
94 dump_packet(query_packet, len);
95 dump_packet(buf, ret);
97 fail_unless(strncmp(query_packet, buf, sizeof(query_packet)) == 0, "Did not compile expected packet");
98 fail_unless(ret == len, "Bad packet length: %d, expected %d", ret, len);
102 START_TEST(test_decode_query)
110 memset(&q, 0, sizeof(struct query));
111 memset(&buf, 0, sizeof(buf));
113 len = sizeof(query_packet) - 1;
114 enc = get_base32_encoder();
116 dns_decode(buf, sizeof(buf), &q, QR_QUERY, query_packet, len);
117 domain = strstr(q.name, topdomain);
119 unpack_data(buf, len, &(q.name[1]), (int) (domain - q.name) - 1, enc);
121 fail_unless(strncmp(buf, innerData, strlen(innerData)) == 0, "Did not extract expected host: '%s'", buf);
122 fail_unless(strlen(buf) == strlen(innerData), "Bad host length: %d, expected %d: '%s'", strlen(buf), strlen(innerData), buf);
126 START_TEST(test_encode_response)
129 char *host = "silly.host.of.iodine.code.kryo.se";
135 memset(&buf, 0, sizeof(buf));
136 memset(&q, 0, sizeof(struct query));
137 strncpy(q.name, host, strlen(host));
141 ret = dns_encode(buf, len, &q, QR_ANSWER, msgData, strlen(msgData));
142 len = sizeof(answer_packet) - 1; /* Skip extra null character */
144 fail_unless(strncmp(answer_packet, buf, sizeof(answer_packet)) == 0, "Did not compile expected packet");
145 fail_unless(ret == len, "Bad packet length: %d, expected %d", ret, len);
149 START_TEST(test_decode_response)
157 memset(&buf, 0, sizeof(buf));
159 ret = dns_decode(buf, len, &q, QR_ANSWER, answer_packet, sizeof(answer_packet)-1);
160 fail_unless(strncmp(msgData, buf, sizeof(msgData)) == 0, "Did not extract expected data");
161 fail_unless(ret == strlen(msgData), "Bad data length: %d, expected %d", ret, strlen(msgData));
162 fail_unless(q.id == 0x0539);
166 START_TEST(test_decode_response_with_high_trans_id)
174 memset(&buf, 0, sizeof(buf));
176 ret = dns_decode(buf, len, &q, QR_ANSWER, answer_packet_high_trans_id, sizeof(answer_packet_high_trans_id)-1);
177 fail_unless(strncmp(msgData, buf, sizeof(msgData)) == 0, "Did not extract expected data");
178 fail_unless(ret == strlen(msgData), "Bad data length: %d, expected %d", ret, strlen(msgData));
179 fail_unless(q.id == 0x8539, "q.id was %08X instead of %08X!", q.id, 0x8539);
183 START_TEST(test_get_id_short_packet)
190 memset(&buf, 5, sizeof(buf));
192 id = dns_get_id(buf, len);
193 fail_unless(id == 0);
197 START_TEST(test_get_id_low)
201 id = dns_get_id(answer_packet, sizeof(answer_packet));
202 fail_unless(id == 1337);
206 START_TEST(test_get_id_high)
210 id = dns_get_id(answer_packet_high_trans_id, sizeof(answer_packet_high_trans_id));
211 fail_unless(id == 0x8539);
216 dump_packet(char *buf, size_t len)
220 for (pos = 0; pos < len; pos++) {
221 printf("\\x%02X", (unsigned char) buf[pos]);
224 for (pos = 0; pos < len; pos++) {
225 if (isalnum((unsigned char) buf[pos])) {
226 printf(" %c ", (unsigned char) buf[pos]);
235 test_dns_create_tests()
239 tc = tcase_create("Dns");
240 tcase_add_test(tc, test_encode_query);
241 tcase_add_test(tc, test_decode_query);
242 tcase_add_test(tc, test_encode_response);
243 tcase_add_test(tc, test_decode_response);
244 tcase_add_test(tc, test_decode_response_with_high_trans_id);
245 tcase_add_test(tc, test_get_id_short_packet);
246 tcase_add_test(tc, test_get_id_low);
247 tcase_add_test(tc, test_get_id_high);