mirror of
https://github.com/solemnwarning/ipxwrapper
synced 2024-12-30 16:45:37 +01:00
148 lines
3.6 KiB
Perl
148 lines
3.6 KiB
Perl
|
# IPXWrapper test suite
|
||
|
# Copyright (C) 2014 Daniel Collins <solemnwarning@solemnwarning.net>
|
||
|
#
|
||
|
# This program is free software; you can redistribute it and/or modify it
|
||
|
# under the terms of the GNU General Public License version 2 as published by
|
||
|
# the Free Software Foundation.
|
||
|
#
|
||
|
# This program is distributed in the hope that it will be useful, but WITHOUT
|
||
|
# ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||
|
# FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
|
||
|
# more details.
|
||
|
#
|
||
|
# You should have received a copy of the GNU General Public License along with
|
||
|
# this program; if not, write to the Free Software Foundation, Inc., 51
|
||
|
# Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
||
|
|
||
|
use strict;
|
||
|
use warnings;
|
||
|
|
||
|
use Test::Spec;
|
||
|
|
||
|
use FindBin;
|
||
|
use lib "$FindBin::Bin/lib/";
|
||
|
|
||
|
use IPXWrapper::Util;
|
||
|
|
||
|
require "$FindBin::Bin/config.pm";
|
||
|
|
||
|
our ($remote_mac_a, $remote_ip_a);
|
||
|
our ($remote_mac_b, $remote_ip_b);
|
||
|
|
||
|
# NOTE: These constants are the values used on Windows, not the host.
|
||
|
use constant {
|
||
|
AF_IPX => 6,
|
||
|
SOCK_STREAM => 1,
|
||
|
SOCK_DGRAM => 2,
|
||
|
SOCK_SEQPACKET => 5,
|
||
|
NSPROTO_IPX => 1000,
|
||
|
NSPROTO_SPX => 1256,
|
||
|
NSPROTO_SPXII => 1257,
|
||
|
};
|
||
|
|
||
|
shared_examples_for "socket initialisation" => sub
|
||
|
{
|
||
|
foreach my $ptype(0, 1, 100, 255)
|
||
|
{
|
||
|
it "socket(AF_IPX, SOCK_DGRAM, NSPROTO_IPX + $ptype) creates a socket with IPX_PTYPE $ptype" => sub
|
||
|
{
|
||
|
my $output = run_remote_cmd(
|
||
|
$remote_ip_a, "Z:\\tools\\socket.exe",
|
||
|
AF_IPX, SOCK_DGRAM, NSPROTO_IPX + $ptype,
|
||
|
);
|
||
|
|
||
|
like($output, qr/^socket: \d+$/m);
|
||
|
like($output, qr/^IPX_PTYPE: \Q$ptype\E$/m);
|
||
|
};
|
||
|
}
|
||
|
|
||
|
# No SOCK_SEQPACKET support (yet), so make sure any attempts to create
|
||
|
# such a socket fail.
|
||
|
|
||
|
it "socket(AF_IPX, SOCK_SEQPACKET, NSPROTO_SPX) fails" => sub
|
||
|
{
|
||
|
my $output = run_remote_cmd(
|
||
|
$remote_ip_a, "Z:\\tools\\socket.exe",
|
||
|
AF_IPX, SOCK_SEQPACKET, NSPROTO_SPX,
|
||
|
);
|
||
|
|
||
|
like($output, qr/^socket: -1$/m);
|
||
|
};
|
||
|
|
||
|
it "socket(AF_IPX, SOCK_SEQPACKET, NSPROTO_SPXII) fails" => sub
|
||
|
{
|
||
|
my $output = run_remote_cmd(
|
||
|
$remote_ip_a, "Z:\\tools\\socket.exe",
|
||
|
AF_IPX, SOCK_SEQPACKET, NSPROTO_SPXII,
|
||
|
);
|
||
|
|
||
|
like($output, qr/^socket: -1$/m);
|
||
|
};
|
||
|
};
|
||
|
|
||
|
describe "IPXWrapper" => sub
|
||
|
{
|
||
|
describe "using IP encapsulation" => sub
|
||
|
{
|
||
|
before all => sub
|
||
|
{
|
||
|
reg_delete_key($remote_ip_a, "HKCU\\Software\\IPXWrapper");
|
||
|
};
|
||
|
|
||
|
it_should_behave_like "socket initialisation";
|
||
|
|
||
|
it "socket(AF_IPX, SOCK_STREAM, NSPROTO_SPX) succeeds" => sub
|
||
|
{
|
||
|
my $output = run_remote_cmd(
|
||
|
$remote_ip_a, "Z:\\tools\\socket.exe",
|
||
|
AF_IPX, SOCK_STREAM, NSPROTO_SPX,
|
||
|
);
|
||
|
|
||
|
like($output, qr/^socket: \d+$/m);
|
||
|
};
|
||
|
|
||
|
it "socket(AF_IPX, SOCK_STREAM, NSPROTO_SPXII) succeeds" => sub
|
||
|
{
|
||
|
my $output = run_remote_cmd(
|
||
|
$remote_ip_a, "Z:\\tools\\socket.exe",
|
||
|
AF_IPX, SOCK_STREAM, NSPROTO_SPXII,
|
||
|
);
|
||
|
|
||
|
like($output, qr/^socket: \d+$/m);
|
||
|
};
|
||
|
};
|
||
|
|
||
|
describe "using Ethernet encapsulation" => sub
|
||
|
{
|
||
|
before all => sub
|
||
|
{
|
||
|
reg_delete_key($remote_ip_a, "HKCU\\Software\\IPXWrapper");
|
||
|
reg_set_dword( $remote_ip_a, "HKCU\\Software\\IPXWrapper", "use_pcap", 1);
|
||
|
};
|
||
|
|
||
|
it_should_behave_like "socket initialisation";
|
||
|
|
||
|
it "socket(AF_IPX, SOCK_STREAM, NSPROTO_SPX) fails" => sub
|
||
|
{
|
||
|
my $output = run_remote_cmd(
|
||
|
$remote_ip_a, "Z:\\tools\\socket.exe",
|
||
|
AF_IPX, SOCK_STREAM, NSPROTO_SPX,
|
||
|
);
|
||
|
|
||
|
like($output, qr/^socket: -1$/m);
|
||
|
};
|
||
|
|
||
|
it "socket(AF_IPX, SOCK_STREAM, NSPROTO_SPXII) fails" => sub
|
||
|
{
|
||
|
my $output = run_remote_cmd(
|
||
|
$remote_ip_a, "Z:\\tools\\socket.exe",
|
||
|
AF_IPX, SOCK_STREAM, NSPROTO_SPXII,
|
||
|
);
|
||
|
|
||
|
like($output, qr/^socket: -1$/m);
|
||
|
};
|
||
|
};
|
||
|
};
|
||
|
|
||
|
runtests unless caller;
|