ipa: Move kernel-tests from ip_accelerator to techpack.
Move ip_accelerator which is a part of kernel-tests-internal from kernel to techpack. Updated up to SHA1: b8790774643dbfea5b312ed422ef86b54e4c8d7f The kernel-test-module was moved into the driver, and will be compiled as part of debug build. Change-Id: I427b9ea061401c74845d2bd0d505da747d5fe89f Acked-by: Eliad Ben Yishay <ebenyish@qti.qualcomm.com> Signed-off-by: Amir Levy <alevy@codeaurora.org> Signed-off-by: Ilia Lin <ilialin@codeaurora.org>
This commit is contained in:

committed by
Gerrit - the friendly Code Review server

parent
5faad0ab9e
commit
f1c1fb3a16
472
kernel-tests/ExceptionTests.cpp
Normal file
472
kernel-tests/ExceptionTests.cpp
Normal file
@@ -0,0 +1,472 @@
|
||||
/*
|
||||
* Copyright (c) 2017 The Linux Foundation. All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions are
|
||||
* met:
|
||||
* * Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* * Redistributions in binary form must reproduce the above
|
||||
* copyright notice, this list of conditions and the following
|
||||
* disclaimer in the documentation and/or other materials provided
|
||||
* with the distribution.
|
||||
* * Neither the name of The Linux Foundation nor the names of its
|
||||
* contributors may be used to endorse or promote products derived
|
||||
* from this software without specific prior written permission.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED
|
||||
* WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
||||
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS
|
||||
* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
||||
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
||||
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
||||
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
||||
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
||||
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
|
||||
* IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
*/
|
||||
|
||||
#include "TestsUtils.h"
|
||||
#include "RoutingDriverWrapper.h"
|
||||
#include "HeaderInsertion.h"
|
||||
#include "Filtering.h"
|
||||
#include "IPAFilteringTable.h"
|
||||
#include <string.h>
|
||||
|
||||
using namespace IPA;
|
||||
|
||||
class IPAExceptionTestFixture: public TestBase {
|
||||
public:
|
||||
|
||||
IPAExceptionTestFixture() :
|
||||
m_uBufferSize(0) {
|
||||
memset(m_aBuffer, 0, sizeof(m_aBuffer));
|
||||
m_testSuiteName.push_back("Exception");
|
||||
}
|
||||
|
||||
virtual bool AddRules() = 0;
|
||||
virtual bool ModifyPackets() = 0;
|
||||
virtual bool TestLogic() = 0;
|
||||
|
||||
bool Setup() {
|
||||
|
||||
ConfigureScenario(PHASE_SEVEN_TEST_CONFIGURATION);
|
||||
|
||||
m_producer.Open(INTERFACE0_TO_IPA_DATA_PATH,
|
||||
INTERFACE0_FROM_IPA_DATA_PATH);
|
||||
m_Consumer1.Open(INTERFACE1_TO_IPA_DATA_PATH,
|
||||
INTERFACE1_FROM_IPA_DATA_PATH);
|
||||
m_Consumer2.Open(INTERFACE2_TO_IPA_DATA_PATH,
|
||||
INTERFACE2_FROM_IPA_DATA_PATH);
|
||||
m_Consumer3.Open(INTERFACE3_TO_IPA_DATA_PATH,
|
||||
INTERFACE3_FROM_IPA_DATA_PATH);
|
||||
m_Exceptions.Open(INTERFACE_TO_IPA_EXCEPTION_PATH,
|
||||
INTERFACE_FROM_IPA_EXCEPTION_PATH);
|
||||
|
||||
|
||||
if (!m_Routing.DeviceNodeIsOpened()) {
|
||||
LOG_MSG_ERROR(
|
||||
"Routing block is not ready for immediate commands!\n");
|
||||
return false;
|
||||
}
|
||||
if (!m_Filtering.DeviceNodeIsOpened()) {
|
||||
LOG_MSG_ERROR(
|
||||
"Filtering block is not ready for immediate commands!\n");
|
||||
return false;
|
||||
}
|
||||
if (!m_HeaderInsertion.DeviceNodeIsOpened())
|
||||
{
|
||||
LOG_MSG_ERROR("Header Insertion block is not ready for immediate commands!\n");
|
||||
return false;
|
||||
}
|
||||
m_HeaderInsertion.Reset();
|
||||
|
||||
return true;
|
||||
} // Setup()
|
||||
|
||||
bool Run() {
|
||||
m_uBufferSize = BUFF_MAX_SIZE;
|
||||
LOG_MSG_STACK("Entering Function");
|
||||
|
||||
// Configure the system by adding Routing / Filtering / HDR
|
||||
if (!AddRules()) {
|
||||
LOG_MSG_ERROR("Failed adding Routing / Filtering / HDR.");
|
||||
return false;
|
||||
}
|
||||
// Load input data (IP packet) from file
|
||||
if (!LoadDefaultPacket(m_eIP, m_aBuffer, m_uBufferSize)) {
|
||||
LOG_MSG_ERROR("Failed default Packet");
|
||||
return false;
|
||||
}
|
||||
if (!ModifyPackets()) {
|
||||
LOG_MSG_ERROR("Failed to modify packets.");
|
||||
return false;
|
||||
}
|
||||
if (!TestLogic()) {
|
||||
LOG_MSG_ERROR("Test failed, Input and expected output mismatch.");
|
||||
return false;
|
||||
}
|
||||
LOG_MSG_STACK("Leaving Function (Returning True)");
|
||||
return true;
|
||||
} // Run()
|
||||
|
||||
bool Teardown() {
|
||||
m_producer.Close();
|
||||
m_Consumer1.Close();
|
||||
m_Consumer2.Close();
|
||||
m_Consumer3.Close();
|
||||
m_Exceptions.Close();
|
||||
return true;
|
||||
} // Teardown()
|
||||
|
||||
~IPAExceptionTestFixture() {
|
||||
}
|
||||
|
||||
static RoutingDriverWrapper m_Routing;
|
||||
static Filtering m_Filtering;
|
||||
static HeaderInsertion m_HeaderInsertion;
|
||||
InterfaceAbstraction m_producer;
|
||||
InterfaceAbstraction m_Consumer1;
|
||||
InterfaceAbstraction m_Consumer2;
|
||||
InterfaceAbstraction m_Consumer3;
|
||||
InterfaceAbstraction m_Exceptions;
|
||||
|
||||
protected:
|
||||
static const size_t BUFF_MAX_SIZE = 1024;
|
||||
static const uint8_t MAX_HEADER_SIZE = 64; // 64Bytes - Max Header Length
|
||||
enum ipa_ip_type m_eIP;
|
||||
uint8_t m_aBuffer[BUFF_MAX_SIZE]; // Input file \ IP packet
|
||||
size_t m_uBufferSize;
|
||||
|
||||
};
|
||||
RoutingDriverWrapper IPAExceptionTestFixture::m_Routing;
|
||||
Filtering IPAExceptionTestFixture::m_Filtering;
|
||||
HeaderInsertion IPAExceptionTestFixture::m_HeaderInsertion;
|
||||
|
||||
//----------------------------------------------------------------------------------------------------------------------------------------/
|
||||
// Test001: Test that when a packet with (IPVer != 4) && (IPVer Ver != 6) , an exception packet is created and received & exception_pipe /
|
||||
//----------------------------------------------------------------------------------------------------------------------------------------/
|
||||
class IPAExceptionPacketTest001: public IPAExceptionTestFixture {
|
||||
public:
|
||||
IPAExceptionPacketTest001() {
|
||||
m_name = "IPAExceptionPacketTest001";
|
||||
m_description = "\
|
||||
IPA Exception Test 001 - Test that when a packet with (IPVer != 4) && (IPVer Ver != 6) , an exception packet is created and received & exception_pipe \
|
||||
Test Generates send NUM_OF_EXCEPTION_PKTS packets with IP Version changing from 0 to 9.\
|
||||
First IP Version == 4, hence it is not considered as exception (same goes for IP Ver == 6) \
|
||||
";
|
||||
m_eIP = IPA_IP_v4;
|
||||
Register(*this);
|
||||
}
|
||||
|
||||
virtual bool AddRules() {
|
||||
// Clear All Rules
|
||||
bool bRetVal = true;
|
||||
LOG_MSG_STACK("Entering Function");
|
||||
|
||||
const char bypass0[20] = "Bypass0";
|
||||
struct ipa_ioc_get_rt_tbl sRoutingTable;
|
||||
IPAFilteringTable cFilterTable;
|
||||
struct ipa_flt_rule_add sFilterRuleEntry;
|
||||
uint32_t nRTTableHdl=0;
|
||||
memset(&sRoutingTable, 0, sizeof(sRoutingTable));
|
||||
|
||||
LOG_MSG_STACK("Entering Function");
|
||||
if (!CreateBypassRoutingTable(&m_Routing, m_eIP, bypass0, IPA_CLIENT_TEST2_CONS,
|
||||
0,&nRTTableHdl)) {
|
||||
LOG_MSG_ERROR("CreateBypassRoutingTable Failed\n");
|
||||
bRetVal = false;
|
||||
goto bail;
|
||||
}
|
||||
LOG_MSG_INFO("CreateBypassRoutingTable completed successfully");
|
||||
sRoutingTable.ip = m_eIP;
|
||||
strlcpy(sRoutingTable.name, bypass0, sizeof(sRoutingTable.name));
|
||||
if (!m_Routing.GetRoutingTable(&sRoutingTable)) {
|
||||
LOG_MSG_ERROR(
|
||||
"m_routing.GetRoutingTable(&sRoutingTable=0x%p) Failed.", &sRoutingTable);
|
||||
bRetVal = false;
|
||||
goto bail;
|
||||
}
|
||||
// Creating Filtering Rules
|
||||
cFilterTable.Init(m_eIP,IPA_CLIENT_TEST_PROD,true,1);
|
||||
LOG_MSG_INFO("Creation of filtering table completed successfully");
|
||||
|
||||
// Configuring Filtering Rule No.1
|
||||
cFilterTable.GeneratePresetRule(0,sFilterRuleEntry);
|
||||
sFilterRuleEntry.at_rear = true;
|
||||
sFilterRuleEntry.flt_rule_hdl = -1; // return Value
|
||||
sFilterRuleEntry.status = -1; // return value
|
||||
sFilterRuleEntry.rule.action = IPA_PASS_TO_ROUTING;
|
||||
sFilterRuleEntry.rule.rt_tbl_hdl = nRTTableHdl;
|
||||
if (
|
||||
((uint8_t)-1 == cFilterTable.AddRuleToTable(sFilterRuleEntry)) ||
|
||||
!m_Filtering.AddFilteringRule(cFilterTable.GetFilteringTable())
|
||||
)
|
||||
{
|
||||
LOG_MSG_ERROR ("Adding Rule (0) to Filtering block Failed.");
|
||||
bRetVal = false;
|
||||
goto bail;
|
||||
} else
|
||||
{
|
||||
LOG_MSG_DEBUG("flt rule hdl0=0x%x, status=0x%x\n", cFilterTable.ReadRuleFromTable(0)->flt_rule_hdl,cFilterTable.ReadRuleFromTable(0)->status);
|
||||
}
|
||||
|
||||
bail:
|
||||
LOG_MSG_STACK(
|
||||
"Leaving Function (Returning %s)", bRetVal?"True":"False");
|
||||
return bRetVal;
|
||||
} // AddRules()
|
||||
|
||||
virtual bool ModifyPackets() {
|
||||
m_eIP = IPA_IP_v6;
|
||||
|
||||
AddRules(); // Need to add Routing / Filtering rules for IPv6 as well.
|
||||
return true;
|
||||
} // ModifyPacktes ()
|
||||
|
||||
virtual bool TestLogic() {
|
||||
int i = 0, nIPVer = 0;;
|
||||
memset(m_aExpectedBuffer, 0, sizeof(m_aExpectedBuffer));
|
||||
m_aExpectedBuffer[2] = 0x0b;
|
||||
m_aExpectedBuffer[3] = 0x80;
|
||||
|
||||
memcpy(m_aExpectedBuffer+8, m_aBuffer, m_uBufferSize);
|
||||
m_aExpectedBufSize = m_uBufferSize+8;
|
||||
|
||||
for (i=0;i<NUM_OF_EXCEPTION_PKTS;i++)
|
||||
{
|
||||
LOG_MSG_INFO("Packet %d\n",i);
|
||||
nIPVer = i+4 % 10;
|
||||
m_aBuffer[0] = (m_aBuffer[0] & 0x0F)+0x10*nIPVer;// Change to Invalid IP version
|
||||
m_aExpectedBuffer[8] = (m_aExpectedBuffer[8] & 0x0F)+0x10*nIPVer;
|
||||
if (4 == nIPVer || 6 == nIPVer)
|
||||
{
|
||||
if (!SendReceiveAndCompare(&m_producer, m_aBuffer, m_uBufferSize,
|
||||
&m_Consumer1, m_aExpectedBuffer+8, m_aExpectedBufSize-8))
|
||||
{
|
||||
LOG_MSG_ERROR("SendReceiveAndCompare failed. IPVer = %d",nIPVer);
|
||||
return false;
|
||||
}
|
||||
} else
|
||||
{
|
||||
if (!SendReceiveAndCompare(&m_producer, m_aBuffer, m_uBufferSize,
|
||||
&m_Exceptions, m_aExpectedBuffer, m_aExpectedBufSize))
|
||||
{
|
||||
LOG_MSG_ERROR("SendReceiveAndCompare failed. IPVer = %d",nIPVer);
|
||||
return false;
|
||||
}
|
||||
}
|
||||
}
|
||||
return true;
|
||||
}
|
||||
private:
|
||||
static const int NUM_OF_EXCEPTION_PKTS = 9;
|
||||
uint8_t m_aExpectedBuffer[BUFF_MAX_SIZE];
|
||||
size_t m_aExpectedBufSize;
|
||||
};
|
||||
|
||||
//------------------------------------------------------------------------------------------------------------------------------------------/
|
||||
// Test003: Test that when Filtering Routes the Packet to the Exception Pipe, an exception packet is created and received & exception_pipe /
|
||||
//------------------------------------------------------------------------------------------------------------------------------------------/
|
||||
class IPAExceptionPacketTest003: public IPAExceptionTestFixture {
|
||||
public:
|
||||
IPAExceptionPacketTest003() {
|
||||
m_name = "IPAExceptionPacketTest003";
|
||||
m_description = "\
|
||||
IPA Exception Test 003 - Test that when Filtering Routes the Packet to the Exception Pipe, an exception packet is created and received & exception_pipe \
|
||||
Test Generates a Filtering Table that routes all packets to the Exception Pipe. \
|
||||
and verify that the packet is recieved @ the Exception Pipe. \
|
||||
";
|
||||
m_eIP = IPA_IP_v4;
|
||||
Register(*this);
|
||||
}
|
||||
|
||||
virtual bool AddRules() {
|
||||
// Clear All Rules
|
||||
bool bRetVal = true;
|
||||
LOG_MSG_STACK("Entering Function");
|
||||
|
||||
const char bypass0[20] = "Bypass0";
|
||||
struct ipa_ioc_get_rt_tbl sRoutingTable;
|
||||
IPAFilteringTable cFilterTable;
|
||||
struct ipa_flt_rule_add sFilterRuleEntry;
|
||||
uint32_t nRTTableHdl=0;
|
||||
memset(&sRoutingTable, 0, sizeof(sRoutingTable));
|
||||
|
||||
LOG_MSG_STACK("Entering Function");
|
||||
if (!CreateBypassRoutingTable(&m_Routing, m_eIP, bypass0, IPA_CLIENT_TEST2_CONS,
|
||||
0,&nRTTableHdl)) {
|
||||
LOG_MSG_ERROR("CreateBypassRoutingTable Failed\n");
|
||||
bRetVal = false;
|
||||
goto bail;
|
||||
}
|
||||
LOG_MSG_INFO("CreateBypassRoutingTable completed successfully");
|
||||
sRoutingTable.ip = m_eIP;
|
||||
strlcpy(sRoutingTable.name, bypass0, sizeof(sRoutingTable.name));
|
||||
if (!m_Routing.GetRoutingTable(&sRoutingTable)) {
|
||||
LOG_MSG_ERROR(
|
||||
"m_routing.GetRoutingTable(&sRoutingTable=0x%p) Failed.", &sRoutingTable);
|
||||
bRetVal = false;
|
||||
goto bail;
|
||||
}
|
||||
// Creating Filtering Rules
|
||||
cFilterTable.Init(m_eIP,IPA_CLIENT_TEST_PROD,true,1);
|
||||
LOG_MSG_INFO("Creation of filtering table completed successfully");
|
||||
|
||||
// Configuring Filtering Rule No.1
|
||||
cFilterTable.GeneratePresetRule(0,sFilterRuleEntry);
|
||||
sFilterRuleEntry.at_rear = true;
|
||||
sFilterRuleEntry.flt_rule_hdl = -1; // return Value
|
||||
sFilterRuleEntry.status = -1; // return value
|
||||
sFilterRuleEntry.rule.action = IPA_PASS_TO_EXCEPTION;
|
||||
sFilterRuleEntry.rule.rt_tbl_hdl = nRTTableHdl;
|
||||
if (
|
||||
((uint8_t)-1 == cFilterTable.AddRuleToTable(sFilterRuleEntry)) ||
|
||||
!m_Filtering.AddFilteringRule(cFilterTable.GetFilteringTable())
|
||||
)
|
||||
{
|
||||
LOG_MSG_ERROR ("Adding Rule (0) to Filtering block Failed.");
|
||||
bRetVal = false;
|
||||
goto bail;
|
||||
} else
|
||||
{
|
||||
LOG_MSG_DEBUG("flt rule hdl0=0x%x, status=0x%x\n", cFilterTable.ReadRuleFromTable(0)->flt_rule_hdl,cFilterTable.ReadRuleFromTable(0)->status);
|
||||
}
|
||||
|
||||
bail:
|
||||
LOG_MSG_STACK(
|
||||
"Leaving Function (Returning %s)", bRetVal?"True":"False");
|
||||
return bRetVal;
|
||||
} // AddRules()
|
||||
|
||||
virtual bool ModifyPackets() {
|
||||
return true;
|
||||
} // ModifyPacktes ()
|
||||
|
||||
virtual bool TestLogic() {
|
||||
memset(m_aExpectedBuffer, 0, sizeof(m_aExpectedBuffer));
|
||||
m_aExpectedBuffer[2] = 0x0b;
|
||||
m_aExpectedBuffer[3] = 0x20;
|
||||
|
||||
memcpy(m_aExpectedBuffer+8, m_aBuffer, m_uBufferSize);
|
||||
m_aExpectedBufSize = m_uBufferSize+8;
|
||||
|
||||
if (!SendReceiveAndCompare(&m_producer, m_aBuffer, m_uBufferSize,
|
||||
&m_Exceptions, m_aExpectedBuffer, m_aExpectedBufSize))
|
||||
{
|
||||
LOG_MSG_ERROR("SendReceiveAndCompare failed.");
|
||||
return false;
|
||||
}
|
||||
return true;
|
||||
}
|
||||
private:
|
||||
uint8_t m_aExpectedBuffer[BUFF_MAX_SIZE];
|
||||
size_t m_aExpectedBufSize;
|
||||
};
|
||||
|
||||
//-----------------------------------------------------------------------------------------------------------------------------------------/
|
||||
// Test006: Test that when a packet with Internet Header Length < 5 Arrives, an exception packet is created and received & exception_pipe /
|
||||
//-----------------------------------------------------------------------------------------------------------------------------------------/
|
||||
class IPAExceptionPacketTest006: public IPAExceptionTestFixture {
|
||||
public:
|
||||
IPAExceptionPacketTest006() {
|
||||
m_name = "IPAExceptionPacketTest006"
|
||||
m_description = "\
|
||||
IPA Exception Test 006 - Test that when a packet with Internet Header Length < 5 Arrives, an exception packet is created and received & exception_pipe \
|
||||
Test Generates a Packet with Internet Header Length (IHL == 4). \
|
||||
and verifies that the packet is recieved @ the Exception Pipe. \
|
||||
";
|
||||
m_eIP = IPA_IP_v4;
|
||||
Register(*this);
|
||||
}
|
||||
|
||||
virtual bool AddRules() {
|
||||
// Clear All Rules
|
||||
bool bRetVal = true;
|
||||
LOG_MSG_STACK("Entering Function");
|
||||
|
||||
const char bypass0[20] = "Bypass0";
|
||||
struct ipa_ioc_get_rt_tbl sRoutingTable;
|
||||
IPAFilteringTable cFilterTable;
|
||||
struct ipa_flt_rule_add sFilterRuleEntry;
|
||||
uint32_t nRTTableHdl=0;
|
||||
memset(&sRoutingTable, 0, sizeof(sRoutingTable));
|
||||
|
||||
LOG_MSG_STACK("Entering Function");
|
||||
if (!CreateBypassRoutingTable(&m_Routing, m_eIP, bypass0, IPA_CLIENT_TEST2_CONS,
|
||||
0,&nRTTableHdl)) {
|
||||
LOG_MSG_ERROR("CreateBypassRoutingTable Failed\n");
|
||||
bRetVal = false;
|
||||
goto bail;
|
||||
}
|
||||
LOG_MSG_INFO("CreateBypassRoutingTable completed successfully");
|
||||
sRoutingTable.ip = m_eIP;
|
||||
strlcpy(sRoutingTable.name, bypass0, sizeof(sRoutingTable.name));
|
||||
if (!m_Routing.GetRoutingTable(&sRoutingTable)) {
|
||||
LOG_MSG_ERROR(
|
||||
"m_routing.GetRoutingTable(&sRoutingTable=0x%p) Failed.", &sRoutingTable);
|
||||
bRetVal = false;
|
||||
goto bail;
|
||||
}
|
||||
// Creating Filtering Rules
|
||||
cFilterTable.Init(m_eIP,IPA_CLIENT_TEST_PROD,true,1);
|
||||
LOG_MSG_INFO("Creation of filtering table completed successfully");
|
||||
|
||||
// Configuring Filtering Rule No.1
|
||||
cFilterTable.GeneratePresetRule(0,sFilterRuleEntry);
|
||||
sFilterRuleEntry.at_rear = true;
|
||||
sFilterRuleEntry.flt_rule_hdl = -1; // return Value
|
||||
sFilterRuleEntry.status = -1; // return value
|
||||
sFilterRuleEntry.rule.action = IPA_PASS_TO_ROUTING;
|
||||
sFilterRuleEntry.rule.rt_tbl_hdl = nRTTableHdl;
|
||||
if (
|
||||
((uint8_t)-1 == cFilterTable.AddRuleToTable(sFilterRuleEntry)) ||
|
||||
!m_Filtering.AddFilteringRule(cFilterTable.GetFilteringTable())
|
||||
)
|
||||
{
|
||||
LOG_MSG_ERROR ("Adding Rule (0) to Filtering block Failed.");
|
||||
bRetVal = false;
|
||||
goto bail;
|
||||
} else
|
||||
{
|
||||
LOG_MSG_DEBUG("flt rule hdl0=0x%x, status=0x%x\n", cFilterTable.ReadRuleFromTable(0)->flt_rule_hdl,cFilterTable.ReadRuleFromTable(0)->status);
|
||||
}
|
||||
|
||||
bail:
|
||||
LOG_MSG_STACK(
|
||||
"Leaving Function (Returning %s)", bRetVal?"True":"False");
|
||||
return bRetVal;
|
||||
} // AddRules()
|
||||
|
||||
virtual bool ModifyPackets() {
|
||||
m_aBuffer[0] =(m_aBuffer[0] & 0xF0)+0x04;// Change the IHL to 4
|
||||
return true;
|
||||
} // ModifyPacktes ()
|
||||
|
||||
virtual bool TestLogic() {
|
||||
memset(m_aExpectedBuffer, 0, sizeof(m_aExpectedBuffer));
|
||||
m_aExpectedBuffer[2] = 0x0b;
|
||||
m_aExpectedBuffer[3] = 0x04;
|
||||
|
||||
memcpy(m_aExpectedBuffer+8, m_aBuffer, m_uBufferSize);
|
||||
m_aExpectedBufSize = m_uBufferSize+8;
|
||||
|
||||
if (!SendReceiveAndCompare(&m_producer, m_aBuffer, m_uBufferSize,
|
||||
&m_Exceptions, m_aExpectedBuffer, m_aExpectedBufSize))
|
||||
{
|
||||
LOG_MSG_ERROR("SendReceiveAndCompare failed.");
|
||||
return false;
|
||||
}
|
||||
return true;
|
||||
}
|
||||
private:
|
||||
uint8_t m_aExpectedBuffer[BUFF_MAX_SIZE];
|
||||
size_t m_aExpectedBufSize;
|
||||
};
|
||||
|
||||
static IPAExceptionPacketTest001 ipaExceptionPacketTest001;
|
||||
static IPAExceptionPacketTest002 ipaExceptionPacketTest002;
|
||||
static IPAExceptionPacketTest003 ipaExceptionPacketTest003;
|
||||
static IPAExceptionPacketTest006 ipaExceptionPacketTest006;
|
||||
|
Reference in New Issue
Block a user