aboutsummaryrefslogtreecommitdiffstats
path: root/Source/charon/testcases/policy_test.c
diff options
context:
space:
mode:
authorMartin Willi <martin@strongswan.org>2006-04-05 12:10:50 +0000
committerMartin Willi <martin@strongswan.org>2006-04-05 12:10:50 +0000
commit6862128151fb78f63685a8da5575783c426d64a7 (patch)
tree75920a6688ed5654fb917ecccc1e0e469480fd1f /Source/charon/testcases/policy_test.c
parent3dbbbf3e16366b0da33b29bbc1a4ba9a976e43a0 (diff)
downloadstrongswan-6862128151fb78f63685a8da5575783c426d64a7.tar.bz2
strongswan-6862128151fb78f63685a8da5575783c426d64a7.tar.xz
../svn-commit.tmp
Diffstat (limited to 'Source/charon/testcases/policy_test.c')
-rw-r--r--Source/charon/testcases/policy_test.c247
1 files changed, 0 insertions, 247 deletions
diff --git a/Source/charon/testcases/policy_test.c b/Source/charon/testcases/policy_test.c
deleted file mode 100644
index d511f4ae4..000000000
--- a/Source/charon/testcases/policy_test.c
+++ /dev/null
@@ -1,247 +0,0 @@
-/**
- * @file policy_test.c
- *
- * @brief Tests for the policy_t class.
- *
- */
-
-/*
- * Copyright (C) 2005 Jan Hutter, Martin Willi
- * Hochschule fuer Technik Rapperswil
- *
- * This program is free software; you can redistribute it and/or modify it
- * under the terms of the GNU General Public License as published by the
- * Free Software Foundation; either version 2 of the License, or (at your
- * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
- *
- * This program is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
- * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
- * for more details.
- */
-
-#include "policy_test.h"
-
-#include <daemon.h>
-#include <config/policy.h>
-#include <config/traffic_selector.h>
-#include <utils/allocator.h>
-#include <utils/logger.h>
-#include <encoding/payloads/ts_payload.h>
-
-
-/**
- * Described in header.
- */
-void test_policy(protected_tester_t *tester)
-{
- policy_t *policy;
-// traffic_selector_t *ts;
-// linked_list_t *ts_stored, *ts_supplied, *ts_selected, *ts_expected;
- proposal_t *proposal1, *proposal2, *proposal3, *proposal_sel;
- linked_list_t *proposals_list;
- iterator_t *iterator;
- logger_t *logger;
- identification_t *alice, *bob;
-
- logger = charon->logger_manager->get_logger(charon->logger_manager, TESTER);
- logger->disable_level(logger, FULL);
-
- alice = identification_create_from_string(ID_IPV4_ADDR, "152.96.193.131");
- bob = identification_create_from_string(ID_IPV4_ADDR, "152.96.193.130");
- policy = policy_create(alice, bob);
-
- tester->assert_true(tester, (policy != NULL), "policy construction");
-
-
- /*
- * test proposal getting and selection
- *
- */
-
- /* esp only prop */
- proposal1 = proposal_create(1);
- proposal1->add_algorithm(proposal1, PROTO_ESP, ENCRYPTION_ALGORITHM, ENCR_AES_CBC, 16);
-
- /* ah only prop */
- proposal2 = proposal_create(2);
- proposal2->add_algorithm(proposal2, PROTO_AH, INTEGRITY_ALGORITHM, AUTH_HMAC_SHA1_96, 20);
-
- /* ah and esp prop */
- proposal3 = proposal_create(3);
- proposal3->add_algorithm(proposal3, PROTO_ESP, ENCRYPTION_ALGORITHM, ENCR_3DES, 16);
- proposal3->add_algorithm(proposal3, PROTO_AH, INTEGRITY_ALGORITHM, AUTH_HMAC_MD5_96, 20);
-
-
- policy->add_proposal(policy, proposal1);
- policy->add_proposal(policy, proposal2);
- policy->add_proposal(policy, proposal3);
-
-
- proposals_list = policy->get_proposals(policy);
- tester->assert_true(tester, (proposals_list->get_count(proposals_list) == 3), "proposal count");
-
-
- proposals_list = linked_list_create();
- proposal1 = proposal_create(1);
- proposal1->add_algorithm(proposal1, PROTO_ESP, ENCRYPTION_ALGORITHM, ENCR_AES_CBC, 32);
- proposal2 = proposal_create(2);
- proposal2->add_algorithm(proposal2, PROTO_ESP, ENCRYPTION_ALGORITHM, ENCR_AES_CBC, 16);
- proposal2->add_algorithm(proposal2, PROTO_ESP, ENCRYPTION_ALGORITHM, ENCR_3DES, 16);
- proposal2->add_algorithm(proposal2, PROTO_ESP, ENCRYPTION_ALGORITHM, ENCR_BLOWFISH, 0);
- proposal2->add_algorithm(proposal2, PROTO_AH, INTEGRITY_ALGORITHM, AUTH_HMAC_SHA1_96, 20);
- proposal2->add_algorithm(proposal2, PROTO_AH, INTEGRITY_ALGORITHM, AUTH_HMAC_MD5_96, 20);
-
- proposals_list->insert_last(proposals_list, proposal1);
- proposals_list->insert_last(proposals_list, proposal2);
-
- proposal_sel = policy->select_proposal(policy, proposals_list);
- tester->assert_false(tester, proposal_sel == NULL, "proposal select");
- /* check ESP encryption algo */
- iterator = proposal_sel->create_algorithm_iterator(proposal_sel, PROTO_ESP, ENCRYPTION_ALGORITHM);
- tester->assert_false(tester, iterator == NULL, "algorithm select ESP");
- while (iterator->has_next(iterator))
- {
- algorithm_t *algo;
- iterator->current(iterator, (void**)&algo);
- tester->assert_true(tester, algo->algorithm == ENCR_3DES, "ESP encryption algo");
- tester->assert_true(tester, algo->key_size == 16, "ESP encryption keysize");
- }
- iterator->destroy(iterator);
- iterator = proposal_sel->create_algorithm_iterator(proposal_sel, PROTO_AH, INTEGRITY_ALGORITHM);
- /* check AH integrity algo */
- tester->assert_false(tester, iterator == NULL, "algorithm select AH");
- while (iterator->has_next(iterator))
- {
- algorithm_t *algo;
- iterator->current(iterator, (void**)&algo);
- tester->assert_true(tester, algo->algorithm == AUTH_HMAC_MD5_96, "ESP encryption algo");
- tester->assert_true(tester, algo->key_size == 20, "ESP encryption keysize");
- }
- iterator->destroy(iterator);
-
- proposal_sel->destroy(proposal_sel);
-
- /* cleanup */
- proposal1->destroy(proposal1);
- proposal1->destroy(proposal2);
- proposals_list->destroy(proposals_list);
-
-// /*
-// * test traffic selection getting and matching
-// *
-// */
-//
-// ts_stored = linked_list_create();
-//
-// /* allow any tcp */
-// ts = traffic_selector_create_from_string(6, TS_IPV4_ADDR_RANGE, "0.0.0.0", 0, "255.255.255.255", 65535);
-// ts_stored->insert_last(ts_stored, (void*)ts);
-// /* allow udp on port 123 to ".122" */
-// ts = traffic_selector_create_from_string(7, TS_IPV4_ADDR_RANGE, "152.96.193.122", 123, "152.96.193.122", 123);
-// ts_stored->insert_last(ts_stored, (void*)ts);
-// /* allow udp on ports > 2000 in subnet ... */
-// ts = traffic_selector_create_from_string(7, TS_IPV4_ADDR_RANGE, "152.96.193.0", 2000, "152.96.193.255", 65535);
-// ts_stored->insert_last(ts_stored, (void*)ts);
-//
-//
-//
-// /* define request and result */
-//
-// /* udp on subnet:123, should be reduced to ".122" */
-// ts = traffic_selector_create_from_string(7, TS_IPV4_ADDR_RANGE, "152.96.193.0", 123, "152.96.193.255", 123);
-// ts_supplied->insert_last(ts_supplied, (void*)ts);
-// ts_reference[0] = traffic_selector_create_from_string(7, TS_IPV4_ADDR_RANGE, "152.96.193.122", 123, "152.96.193.122", 123);
-//
-// /* should be granted. */
-// ts_request[1] = traffic_selector_create_from_string(7, TS_IPV4_ADDR_RANGE, "152.96.193.0", 2000, "152.96.193.255", 2000);
-// ts_reference[1] = traffic_selector_create_from_string(7, TS_IPV4_ADDR_RANGE, "152.96.193.0", 2000, "152.96.193.255", 2000);
-//
-// /* should be reduced to port 2000 - 3000. and range ".193.*" */
-// ts_request[2] = traffic_selector_create_from_string(7, TS_IPV4_ADDR_RANGE, "152.96.191.0", 1000, "152.96.194.255", 3000);
-// ts_reference[2] = traffic_selector_create_from_string(7, TS_IPV4_ADDR_RANGE, "152.96.193.0", 2000, "152.96.193.255", 3000);
-//
-// /* icmp request, should be discarded */
-// ts_request[3] = traffic_selector_create_from_string(1, TS_IPV4_ADDR_RANGE, "0.0.0.0", 0, "255.255.255.255", 65535);
-//
-// policy->add_my_traffic_selector(policy, ts_policy[0]);
-// policy->add_my_traffic_selector(policy, ts_policy[1]);
-// policy->add_my_traffic_selector(policy, ts_policy[2]);
-//
-// count = policy->get_my_traffic_selectors(policy, &ts_result);
-// tester->assert_true(tester, (count == 3), "ts get count");
-// ts_result[0]->destroy(ts_result[0]);
-// ts_result[0]->destroy(ts_result[1]);
-// ts_result[0]->destroy(ts_result[2]);
-// allocator_free(ts_result);
-//
-// count = policy->select_my_traffic_selectors(policy, &ts_request[0], 4, &ts_result);
-// tester->assert_true(tester, (count == 3), "ts select count");
-//
-//
-// /* store and restore into ts payload, tricky tricky */
-// ts_payload = ts_payload_create_from_traffic_selectors(TRUE, ts_result, count);
-//
-// /* destroy */
-// ts_result[0]->destroy(ts_result[0]);
-// ts_result[0]->destroy(ts_result[1]);
-// ts_result[0]->destroy(ts_result[2]);
-// allocator_free(ts_result);
-//
-// /* get them again out of the payload */
-// count = ts_payload->get_traffic_selectors(ts_payload, &ts_result);
-// ts_payload->destroy(ts_payload);
-//
-//
-//
-// int i;
-// for (i = 0; i<count; i++)
-// {
-// chunk_t fa_res = ts_result[i]->get_from_address(ts_result[i]);
-// chunk_t fa_ref = ts_reference[i]->get_from_address(ts_reference[i]);
-// chunk_t ta_res = ts_result[i]->get_to_address(ts_result[i]);
-// chunk_t ta_ref = ts_reference[i]->get_to_address(ts_reference[i]);
-// u_int16_t fp_res = ts_result[i]->get_from_port(ts_result[i]);
-// u_int16_t fp_ref = ts_reference[i]->get_from_port(ts_reference[i]);
-// u_int16_t tp_res = ts_result[i]->get_to_port(ts_result[i]);
-// u_int16_t tp_ref = ts_reference[i]->get_to_port(ts_reference[i]);
-//
-//
-// logger->log_chunk(logger, RAW, "from address result", fa_res);
-// logger->log_chunk(logger, RAW, "from address reference", fa_ref);
-// logger->log_chunk(logger, RAW, "to address result", ta_res);
-// logger->log_chunk(logger, RAW, "to address reference", ta_ref);
-// tester->assert_true(tester, fa_res.len == fa_ref.len, "from address len");
-// tester->assert_false(tester, memcmp(fa_res.ptr, fa_ref.ptr,fa_res.len), "from address value");
-// tester->assert_true(tester, ta_res.len == ta_ref.len, "to address len");
-// tester->assert_false(tester, memcmp(ta_res.ptr, ta_ref.ptr,ta_res.len), "to address value");
-//
-// tester->assert_true(tester, fp_res == fp_ref, "from port");
-// tester->assert_true(tester, tp_res == tp_ref, "to port");
-//
-// allocator_free(fa_res.ptr);
-// allocator_free(fa_ref.ptr);
-// allocator_free(ta_res.ptr);
-// allocator_free(ta_ref.ptr);
-// }
-//
-//
-// /* destroy */
-// ts_result[0]->destroy(ts_result[0]);
-// ts_result[0]->destroy(ts_result[1]);
-// ts_result[0]->destroy(ts_result[2]);
-// allocator_free(ts_result);
-//
-// ts_policy[0]->destroy(ts_policy[0]);
-// ts_policy[1]->destroy(ts_policy[1]);
-// ts_policy[2]->destroy(ts_policy[2]);
-// ts_request[0]->destroy(ts_request[0]);
-// ts_reference[0]->destroy(ts_reference[0]);
-// ts_request[1]->destroy(ts_request[1]);
-// ts_reference[1]->destroy(ts_reference[1]);
-// ts_request[2]->destroy(ts_request[2]);
-// ts_reference[2]->destroy(ts_reference[2]);
-// ts_request[3]->destroy(ts_request[3]);
-
- policy->destroy(policy);
-}