summaryrefslogtreecommitdiffstats
path: root/3rdparty/openpgm-svn-r1085/pgm/packet_parse_unittest.c
diff options
context:
space:
mode:
Diffstat (limited to '3rdparty/openpgm-svn-r1085/pgm/packet_parse_unittest.c')
-rw-r--r--3rdparty/openpgm-svn-r1085/pgm/packet_parse_unittest.c382
1 files changed, 382 insertions, 0 deletions
diff --git a/3rdparty/openpgm-svn-r1085/pgm/packet_parse_unittest.c b/3rdparty/openpgm-svn-r1085/pgm/packet_parse_unittest.c
new file mode 100644
index 0000000..94b06d2
--- /dev/null
+++ b/3rdparty/openpgm-svn-r1085/pgm/packet_parse_unittest.c
@@ -0,0 +1,382 @@
+/* vim:ts=8:sts=8:sw=4:noai:noexpandtab
+ *
+ * unit tests for PGM packet handling.
+ *
+ * Copyright (c) 2009-2010 Miru Limited.
+ *
+ * This library is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Lesser General Public
+ * License as published by the Free Software Foundation; either
+ * version 2.1 of the License, or (at your option) any later version.
+ *
+ * This library is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public
+ * License along with this library; if not, write to the Free Software
+ * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
+ */
+
+
+#include <signal.h>
+#include <stdbool.h>
+#include <stdlib.h>
+#include <sys/socket.h>
+#include <netinet/in.h>
+#include <arpa/inet.h>
+#include <glib.h>
+#include <check.h>
+
+
+/* mock state */
+
+#define PACKET_DEBUG
+#include "packet_parse.c"
+
+
+static
+struct pgm_sk_buff_t*
+generate_raw_pgm (void)
+{
+ const char source[] = "i am not a string";
+ const guint source_len = sizeof(source);
+ struct pgm_sk_buff_t* skb;
+ GError* err = NULL;
+
+ skb = pgm_alloc_skb (1500);
+ skb->sock = (pgm_sock_t*)0x1;
+ skb->tstamp = 0x1;
+ skb->data = skb->head;
+ skb->len = sizeof(struct pgm_ip) + sizeof(struct pgm_header) + sizeof(struct pgm_data) + source_len;
+ skb->tail = (guint8*)skb->data + skb->len;
+
+/* add IP header */
+ struct pgm_ip* iphdr = skb->data;
+ iphdr->ip_hl = sizeof(struct pgm_ip) / 4;
+ iphdr->ip_v = 4;
+ iphdr->ip_tos = 0;
+ iphdr->ip_len = g_htons (skb->len);
+ iphdr->ip_id = 0;
+ iphdr->ip_off = 0;
+ iphdr->ip_ttl = 16;
+ iphdr->ip_p = IPPROTO_PGM;
+ iphdr->ip_sum = 0;
+ iphdr->ip_src.s_addr = inet_addr ("127.0.0.1");
+ iphdr->ip_dst.s_addr = inet_addr ("127.0.0.2");
+
+/* add PGM header */
+ struct pgm_header* pgmhdr = (gpointer)(iphdr + 1);
+ pgmhdr->pgm_sport = g_htons ((guint16)1000);
+ pgmhdr->pgm_dport = g_htons ((guint16)7500);
+ pgmhdr->pgm_type = PGM_ODATA;
+ pgmhdr->pgm_options = 0;
+ pgmhdr->pgm_gsi[0] = 1;
+ pgmhdr->pgm_gsi[1] = 2;
+ pgmhdr->pgm_gsi[2] = 3;
+ pgmhdr->pgm_gsi[3] = 4;
+ pgmhdr->pgm_gsi[4] = 5;
+ pgmhdr->pgm_gsi[5] = 6;
+ pgmhdr->pgm_tsdu_length = g_htons (source_len);
+
+/* add ODATA header */
+ struct pgm_data* datahdr = (gpointer)(pgmhdr + 1);
+ datahdr->data_sqn = g_htonl ((guint32)0);
+ datahdr->data_trail = g_htonl ((guint32)-1);
+
+/* add payload */
+ gpointer data = (gpointer)(datahdr + 1);
+ memcpy (data, source, source_len);
+
+/* finally PGM checksum */
+ pgmhdr->pgm_checksum = 0;
+ pgmhdr->pgm_checksum = pgm_csum_fold (pgm_csum_partial (pgmhdr, sizeof(struct pgm_header) + sizeof(struct pgm_data) + source_len, 0));
+
+/* and IP checksum */
+ iphdr->ip_sum = pgm_inet_checksum (skb->head, skb->len, 0);
+
+ return skb;
+}
+
+static
+struct pgm_sk_buff_t*
+generate_udp_encap_pgm (void)
+{
+ const char source[] = "i am not a string";
+ const guint source_len = sizeof(source);
+ struct pgm_sk_buff_t* skb;
+ GError* err = NULL;
+
+ skb = pgm_alloc_skb (1500);
+ skb->sock = (pgm_sock_t*)0x1;
+ skb->tstamp = 0x1;
+ skb->data = skb->head;
+ skb->len = sizeof(struct pgm_header) + sizeof(struct pgm_data) + source_len;
+ skb->tail = (guint8*)skb->data + skb->len;
+
+/* add PGM header */
+ struct pgm_header* pgmhdr = skb->head;
+ pgmhdr->pgm_sport = g_htons ((guint16)1000);
+ pgmhdr->pgm_dport = g_htons ((guint16)7500);
+ pgmhdr->pgm_type = PGM_ODATA;
+ pgmhdr->pgm_options = 0;
+ pgmhdr->pgm_gsi[0] = 1;
+ pgmhdr->pgm_gsi[1] = 2;
+ pgmhdr->pgm_gsi[2] = 3;
+ pgmhdr->pgm_gsi[3] = 4;
+ pgmhdr->pgm_gsi[4] = 5;
+ pgmhdr->pgm_gsi[5] = 6;
+ pgmhdr->pgm_tsdu_length = g_htons (source_len);
+
+/* add ODATA header */
+ struct pgm_data* datahdr = (gpointer)(pgmhdr + 1);
+ datahdr->data_sqn = g_htonl ((guint32)0);
+ datahdr->data_trail = g_htonl ((guint32)-1);
+
+/* add payload */
+ gpointer data = (gpointer)(datahdr + 1);
+ memcpy (data, source, source_len);
+
+/* finally PGM checksum */
+ pgmhdr->pgm_checksum = 0;
+ pgmhdr->pgm_checksum = pgm_csum_fold (pgm_csum_partial (pgmhdr, sizeof(struct pgm_header) + sizeof(struct pgm_data) + source_len, 0));
+
+ return skb;
+}
+
+/* mock functions for external references */
+
+size_t
+pgm_pkt_offset (
+ const bool can_fragment,
+ const sa_family_t pgmcc_family /* 0 = disable */
+ )
+{
+ return 0;
+}
+
+
+/* target:
+ * bool
+ * pgm_parse_raw (
+ * struct pgm_sk_buff_t* const skb,
+ * struct sockaddr* const addr,
+ * pgm_error_t** error
+ * )
+ */
+
+START_TEST (test_parse_raw_pass_001)
+{
+ struct sockaddr_storage addr;
+ pgm_error_t* err = NULL;
+ struct pgm_sk_buff_t* skb = generate_raw_pgm ();
+ gboolean success = pgm_parse_raw (skb, (struct sockaddr*)&addr, &err);
+ if (!success && err) {
+ g_error ("Parsing raw packet: %s", err->message);
+ }
+ fail_unless (TRUE == success, "parse_raw failed");
+ char saddr[INET6_ADDRSTRLEN];
+ pgm_sockaddr_ntop ((struct sockaddr*)&addr, saddr, sizeof(saddr));
+ g_message ("Decoded destination NLA: %s", saddr);
+}
+END_TEST
+
+START_TEST (test_parse_raw_fail_001)
+{
+ struct sockaddr_storage addr;
+ pgm_error_t* err = NULL;
+ pgm_parse_raw (NULL, (struct sockaddr*)&addr, &err);
+ fail ("reached");
+}
+END_TEST
+
+/* target:
+ * bool
+ * pgm_parse_udp_encap (
+ * struct pgm_sk_buff_t* const skb,
+ * pgm_error_t** error
+ * )
+ */
+
+START_TEST (test_parse_udp_encap_pass_001)
+{
+ pgm_error_t* err = NULL;
+ struct pgm_sk_buff_t* skb = generate_udp_encap_pgm ();
+ gboolean success = pgm_parse_udp_encap (skb, &err);
+ if (!success && err) {
+ g_error ("Parsing UDP encapsulated packet: %s", err->message);
+ }
+ fail_unless (TRUE == success, "parse_udp_encap failed");
+}
+END_TEST
+
+START_TEST (test_parse_udp_encap_fail_001)
+{
+ pgm_error_t* err = NULL;
+ pgm_parse_udp_encap (NULL, &err);
+ fail ("reached");
+}
+END_TEST
+
+/* target:
+ * bool
+ * pgm_verify_spm (
+ * struct pgm_sk_buff_t* const skb
+ * )
+ */
+
+START_TEST (test_verify_spm_pass_001)
+{
+}
+END_TEST
+
+START_TEST (test_verify_spm_fail_001)
+{
+ pgm_verify_spm (NULL);
+ fail ("reached");
+}
+END_TEST
+
+/* target:
+ * bool
+ * pgm_verify_spmr (
+ * struct pgm_sk_buff_t* const skb
+ * )
+ */
+
+START_TEST (test_verify_spmr_pass_001)
+{
+}
+END_TEST
+
+START_TEST (test_verify_spmr_fail_001)
+{
+ pgm_verify_spmr (NULL);
+ fail ("reached");
+}
+END_TEST
+
+/* target:
+ * bool
+ * pgm_verify_nak (
+ * struct pgm_sk_buff_t* const skb
+ * )
+ */
+
+START_TEST (test_verify_nak_pass_001)
+{
+}
+END_TEST
+
+START_TEST (test_verify_nak_fail_001)
+{
+ pgm_verify_nak (NULL);
+ fail ("reached");
+}
+END_TEST
+
+/* target:
+ * bool
+ * pgm_verify_nnak (
+ * struct pgm_sk_buff_t* const skb
+ * )
+ */
+
+START_TEST (test_verify_nnak_pass_001)
+{
+}
+END_TEST
+
+START_TEST (test_verify_nnak_fail_001)
+{
+ pgm_verify_nnak (NULL);
+ fail ("reached");
+}
+END_TEST
+
+/* target:
+ * bool
+ * pgm_verify_ncf (
+ * struct pgm_sk_buff_t* const skb
+ * )
+ */
+
+START_TEST (test_verify_ncf_pass_001)
+{
+}
+END_TEST
+
+START_TEST (test_verify_ncf_fail_001)
+{
+ pgm_verify_ncf (NULL);
+ fail ("reached");
+}
+END_TEST
+
+
+static
+Suite*
+make_test_suite (void)
+{
+ Suite* s;
+
+ s = suite_create (__FILE__);
+
+ TCase* tc_parse_raw = tcase_create ("parse-raw");
+ suite_add_tcase (s, tc_parse_raw);
+ tcase_add_test (tc_parse_raw, test_parse_raw_pass_001);
+ tcase_add_test_raise_signal (tc_parse_raw, test_parse_raw_fail_001, SIGABRT);
+
+ TCase* tc_parse_udp_encap = tcase_create ("parse-udp-encap");
+ suite_add_tcase (s, tc_parse_udp_encap);
+ tcase_add_test (tc_parse_udp_encap, test_parse_udp_encap_pass_001);
+ tcase_add_test_raise_signal (tc_parse_udp_encap, test_parse_udp_encap_fail_001, SIGABRT);
+
+ TCase* tc_verify_spm = tcase_create ("verify-spm");
+ suite_add_tcase (s, tc_verify_spm);
+ tcase_add_test (tc_verify_spm, test_verify_spm_pass_001);
+ tcase_add_test_raise_signal (tc_verify_spm, test_verify_spm_fail_001, SIGABRT);
+
+ TCase* tc_verify_spmr = tcase_create ("verify-spmr");
+ suite_add_tcase (s, tc_verify_spmr);
+ tcase_add_test (tc_verify_spmr, test_verify_spmr_pass_001);
+ tcase_add_test_raise_signal (tc_verify_spmr, test_verify_spmr_fail_001, SIGABRT);
+
+ TCase* tc_verify_nak = tcase_create ("verify-nak");
+ suite_add_tcase (s, tc_verify_nak);
+ tcase_add_test (tc_verify_nak, test_verify_nak_pass_001);
+ tcase_add_test_raise_signal (tc_verify_nak, test_verify_nak_fail_001, SIGABRT);
+
+ TCase* tc_verify_nnak = tcase_create ("verify-nnak");
+ suite_add_tcase (s, tc_verify_nnak);
+ tcase_add_test (tc_verify_nnak, test_verify_nnak_pass_001);
+ tcase_add_test_raise_signal (tc_verify_nnak, test_verify_nnak_fail_001, SIGABRT);
+
+ TCase* tc_verify_ncf = tcase_create ("verify-ncf");
+ suite_add_tcase (s, tc_verify_ncf);
+ tcase_add_test (tc_verify_ncf, test_verify_ncf_pass_001);
+ tcase_add_test_raise_signal (tc_verify_ncf, test_verify_ncf_fail_001, SIGABRT);
+ return s;
+}
+
+static
+Suite*
+make_master_suite (void)
+{
+ Suite* s = suite_create ("Master");
+ return s;
+}
+
+int
+main (void)
+{
+ SRunner* sr = srunner_create (make_master_suite ());
+ srunner_add_suite (sr, make_test_suite ());
+ srunner_run_all (sr, CK_ENV);
+ int number_failed = srunner_ntests_failed (sr);
+ srunner_free (sr);
+ return (number_failed == 0) ? EXIT_SUCCESS : EXIT_FAILURE;
+}
+
+/* eof */