1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
|
/*
* OpenVPN -- An application to securely tunnel IP networks
* over a single UDP port, with support for SSL/TLS-based
* session authentication and key exchange,
* packet encryption, packet authentication, and
* packet compression.
*
* Copyright (C) 2021-2023 Arne Schwabe <arne@rfc2549.org>
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License version 2
* as published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License along
* with this program; if not, write to the Free Software Foundation, Inc.,
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*/
#ifdef HAVE_CONFIG_H
#include "config.h"
#endif
#include "syshead.h"
#include <stdio.h>
#include <stdlib.h>
#include <stdarg.h>
#include <string.h>
#include <setjmp.h>
#include <cmocka.h>
#include "ssl_util.h"
#include "options_util.h"
#include "test_common.h"
static void
test_compat_lzo_string(void **state)
{
struct gc_arena gc = gc_new();
const char *input = "V4,dev-type tun,link-mtu 1457,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-server";
const char *output = options_string_compat_lzo(input, &gc);
assert_string_equal(output, "V4,dev-type tun,link-mtu 1458,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-server,comp-lzo");
/* This string is has a much too small link-mtu so we should fail on it" */
input = "V4,dev-type tun,link-mtu 2,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-server";
output = options_string_compat_lzo(input, &gc);
assert_string_equal(input, output);
/* not matching at all */
input = "V4,dev-type tun";
output = options_string_compat_lzo(input, &gc);
assert_string_equal(input, output);
input = "V4,dev-type tun,link-mtu 999,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-server";
output = options_string_compat_lzo(input, &gc);
/* 999 -> 1000, 3 to 4 chars */
assert_string_equal(output, "V4,dev-type tun,link-mtu 1000,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-server,comp-lzo");
gc_free(&gc);
}
static void
test_auth_fail_temp_no_flags(void **state)
{
struct options o;
const char *teststr = "TEMP:There are no flags here [really not]";
const char *msg = parse_auth_failed_temp(&o, teststr + strlen("TEMP"));
assert_string_equal(msg, "There are no flags here [really not]");
}
static void
test_auth_fail_temp_flags(void **state)
{
struct options o;
const char *teststr = "[backoff 42,advance no]";
const char *msg = parse_auth_failed_temp(&o, teststr);
assert_string_equal(msg, "");
assert_int_equal(o.server_backoff_time, 42);
assert_int_equal(o.no_advance, true);
}
static void
test_auth_fail_temp_flags_msg(void **state)
{
struct options o;
const char *teststr = "[advance remote,backoff 77]:go round and round";
const char *msg = parse_auth_failed_temp(&o, teststr);
assert_string_equal(msg, "go round and round");
assert_int_equal(o.server_backoff_time, 77);
}
const struct CMUnitTest misc_tests[] = {
cmocka_unit_test(test_compat_lzo_string),
cmocka_unit_test(test_auth_fail_temp_no_flags),
cmocka_unit_test(test_auth_fail_temp_flags),
cmocka_unit_test(test_auth_fail_temp_flags_msg),
};
int
main(void)
{
openvpn_unit_test_setup();
return cmocka_run_group_tests(misc_tests, NULL, NULL);
}
|