Skip to content
GitLab
Explorer
Connexion
S'inscrire
Navigation principale
Rechercher ou aller à…
Projet
P
protocol-parsers
Gestion
Activité
Membres
Labels
Programmation
Tickets
Tableaux des tickets
Jalons
Wiki
Code
Requêtes de fusion
Dépôt
Branches
Validations
Étiquettes
Graphe du dépôt
Comparer les révisions
Extraits de code
Compilation
Pipelines
Jobs
Planifications de pipeline
Artéfacts
Déploiement
Releases
Registre de paquets
Registre de conteneur
Registre de modèles
Opération
Environnements
Modules Terraform
Surveillance
Incidents
Analyse
Données d'analyse des chaînes de valeur
Analyse des contributeurs
Données d'analyse CI/CD
Données d'analyse du dépôt
Expériences du modèle
Aide
Aide
Support
Documentation de GitLab
Comparer les forfaits GitLab
Forum de la communauté
Contribuer à GitLab
Donner votre avis
Conditions générales et politique de confidentialité
Raccourcis clavier
?
Extraits de code
Groupes
Projets
Afficher davantage de fils d'Ariane
smart-home-network-security
protocol-parsers
Validations
ac24792f
Valider
ac24792f
rédigé
Il y a 10 mois
par
François De Keersmaeker
Parcourir les fichiers
Options
Téléchargements
Correctifs
Plain Diff
Updated DNS unit test
parent
3583eb1a
Aucune branche associée trouvée
Aucune étiquette associée trouvée
Aucune requête de fusion associée trouvée
Modifications
1
Masquer les modifications d'espaces
En ligne
Côte à côte
Affichage de
1 fichier modifié
test/dns.c
+60
-9
60 ajouts, 9 suppressions
test/dns.c
avec
60 ajouts
et
9 suppressions
test/dns.c
+
60
−
9
Voir le fichier @
ac24792f
/**
* @file test/dns.c
* @file test/parsers/dns.c
* @author François De Keersmaeker (francois.dekeersmaeker@uclouvain.be)
* @brief Unit tests for the DNS parser
* @date 2022-09-09
*
...
...
@@ -63,6 +64,27 @@ void compare_rrs(uint16_t count, dns_resource_record_t *actual, dns_resource_rec
}
}
/**
* @brief Unit test for the dns_convert_qname function.
*/
void
test_dns_convert_qname
()
{
// Test parameters
char
*
qname
=
"www.google.com"
;
uint8_t
qname_len
=
strlen
(
qname
);
char
*
expected
=
"
\3
www
\6
google
\3
com"
;
uint8_t
converted_len
=
qname_len
+
2
;
// Execute function
char
*
actual
=
(
char
*
)
malloc
(
converted_len
);
dns_convert_qname
(
actual
,
qname
,
qname_len
);
// Verify result
CU_ASSERT_STRING_EQUAL
(
actual
,
expected
);
// Clean up
free
(
actual
);
}
/**
* Unit test for the DNS parser.
*/
...
...
@@ -130,16 +152,16 @@ void test_dns_xiaomi() {
CU_ASSERT_TRUE
(
dns_contains_full_domain_name
(
message
.
questions
,
message
.
header
.
qdcount
,
domain_name
));
char
*
suffix
=
"api.io.mi.com"
;
CU_ASSERT_TRUE
(
dns_contains_suffix_domain_name
(
message
.
questions
,
message
.
header
.
qdcount
,
suffix
,
strlen
(
suffix
)));
domain_name
=
"
www.example
.org"
;
domain_name
=
"
swag.framinem
.org"
;
CU_ASSERT_FALSE
(
dns_contains_full_domain_name
(
message
.
questions
,
message
.
header
.
qdcount
,
domain_name
));
suffix
=
"
example.org
"
;
suffix
=
"
framinem.com
"
;
CU_ASSERT_FALSE
(
dns_contains_suffix_domain_name
(
message
.
questions
,
message
.
header
.
qdcount
,
suffix
,
strlen
(
suffix
)));
// Get question from domain name
domain_name
=
"business.smartcamera.api.io.mi.com"
;
dns_question_t
*
question_lookup
=
dns_get_question
(
message
.
questions
,
message
.
header
.
qdcount
,
domain_name
);
CU_ASSERT_PTR_NOT_NULL
(
question_lookup
);
domain_name
=
"
www.example
.org"
;
domain_name
=
"
swag.framinem
.org"
;
question_lookup
=
dns_get_question
(
message
.
questions
,
message
.
header
.
qdcount
,
domain_name
);
CU_ASSERT_PTR_NULL
(
question_lookup
);
...
...
@@ -150,7 +172,7 @@ void test_dns_xiaomi() {
CU_ASSERT_EQUAL
(
ip_list
.
ip_count
,
1
);
CU_ASSERT_STRING_EQUAL
(
ipv4_net_to_str
(
ip_list
.
ip_addresses
->
value
.
ipv4
),
ip_address
);
free
(
ip_list
.
ip_addresses
);
domain_name
=
"
www.example
.org"
;
domain_name
=
"
swag.framinem
.org"
;
ip_list
=
dns_get_ip_from_name
(
message
.
answers
,
message
.
header
.
ancount
,
domain_name
);
CU_ASSERT_EQUAL
(
ip_list
.
ip_count
,
0
);
CU_ASSERT_PTR_NULL
(
ip_list
.
ip_addresses
);
...
...
@@ -278,16 +300,16 @@ void test_dns_office() {
CU_ASSERT_TRUE
(
dns_contains_full_domain_name
(
message
.
questions
,
message
.
header
.
qdcount
,
domain_name
));
char
*
suffix
=
"office.com"
;
CU_ASSERT_TRUE
(
dns_contains_suffix_domain_name
(
message
.
questions
,
message
.
header
.
qdcount
,
suffix
,
strlen
(
suffix
)));
domain_name
=
"
www.example
.org"
;
domain_name
=
"
swag.framinem
.org"
;
CU_ASSERT_FALSE
(
dns_contains_full_domain_name
(
message
.
questions
,
message
.
header
.
qdcount
,
domain_name
));
suffix
=
"
example
.org"
;
suffix
=
"
framinem
.org"
;
CU_ASSERT_FALSE
(
dns_contains_suffix_domain_name
(
message
.
questions
,
message
.
header
.
qdcount
,
suffix
,
strlen
(
suffix
)));
// Get question from domain name
domain_name
=
"outlook.office.com"
;
dns_question_t
*
question_lookup
=
dns_get_question
(
message
.
questions
,
message
.
header
.
qdcount
,
domain_name
);
CU_ASSERT_PTR_NOT_NULL
(
question_lookup
);
domain_name
=
"
www.example
.org"
;
domain_name
=
"
swag.framinem
.org"
;
question_lookup
=
dns_get_question
(
message
.
questions
,
message
.
header
.
qdcount
,
domain_name
);
CU_ASSERT_PTR_NULL
(
question_lookup
);
...
...
@@ -305,7 +327,7 @@ void test_dns_office() {
CU_ASSERT_STRING_EQUAL
(
ipv4_net_to_str
((
ip_list
.
ip_addresses
+
i
)
->
value
.
ipv4
),
ip_addresses
[
i
]);
}
free
(
ip_list
.
ip_addresses
);
domain_name
=
"
www.example
.org"
;
domain_name
=
"
swag.framinem
.org"
;
ip_list
=
dns_get_ip_from_name
(
message
.
answers
,
message
.
header
.
ancount
,
domain_name
);
CU_ASSERT_EQUAL
(
ip_list
.
ip_count
,
0
);
CU_ASSERT_PTR_NULL
(
ip_list
.
ip_addresses
);
...
...
@@ -314,6 +336,33 @@ void test_dns_office() {
dns_free_message
(
message
);
}
/**
* @brief Test the `dns_send_query` and `dns_receive_response` functions.
*/
void
test_dns_send_receive
()
{
/* Initialize */
char
*
domain_name
=
"www.google.com"
;
// Open socket
int
sockfd
=
socket
(
AF_INET
,
SOCK_DGRAM
,
IPPROTO_UDP
);
CU_ASSERT_TRUE
(
sockfd
>
0
);
// Server address: network gateway
struct
sockaddr_in
server_addr
;
memset
(
&
server_addr
,
0
,
sizeof
(
server_addr
));
server_addr
.
sin_family
=
AF_INET
;
server_addr
.
sin_port
=
htons
(
53
);
server_addr
.
sin_addr
.
s_addr
=
inet_addr
(
"8.8.8.8"
);
// Send query for dummy domain name
dns_send_query
(
domain_name
,
sockfd
,
&
server_addr
);
dns_message_t
dns_message
=
dns_receive_response
(
sockfd
,
&
server_addr
);
// Verify DNS response's domain name
CU_ASSERT_STRING_EQUAL
(
dns_message
.
questions
->
qname
,
domain_name
);
// Free memory
dns_free_message
(
dns_message
);
}
/**
* Main function for the unit tests.
*/
...
...
@@ -325,8 +374,10 @@ int main(int argc, char const *argv[])
printf
(
"Test suite: dns
\n
"
);
CU_pSuite
suite
=
CU_add_suite
(
"dns"
,
NULL
,
NULL
);
// Run tests
CU_add_test
(
suite
,
"dns-convert-qname"
,
test_dns_convert_qname
);
CU_add_test
(
suite
,
"dns-xiaomi"
,
test_dns_xiaomi
);
CU_add_test
(
suite
,
"dns-office"
,
test_dns_office
);
CU_add_test
(
suite
,
"dns-send-receive"
,
test_dns_send_receive
);
CU_basic_run_tests
();
CU_cleanup_registry
();
return
0
;
...
...
Ce diff est replié.
Cliquez pour l'agrandir.
Aperçu
0%
Chargement en cours
Veuillez réessayer
ou
joindre un nouveau fichier
.
Annuler
You are about to add
0
people
to the discussion. Proceed with caution.
Terminez d'abord l'édition de ce message.
Enregistrer le commentaire
Annuler
Veuillez vous
inscrire
ou vous
se connecter
pour commenter