summaryrefslogtreecommitdiff
path: root/common/test/test_cmsg.cpp
blob: dde3da42a553f22f4eb7107972eaf84cbe00dec4 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79


#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <arpa/inet.h>
#include "tfe_types.h"
#include "tfe_utils.h"
#include "tfe_cmsg.h"

int main()
{
	///////////////////////////////////////////////////////////////////////////
	// Set CMSG (If the current tlv has been set, the previous value will be overwritten)
	///////////////////////////////////////////////////////////////////////////

	struct tfe_cmsg *cmsg_encode = tfe_cmsg_init();

	// set TFE_CMSG_TCP_RESTORE_SEQ
	uint32_t set_number_value = 0x12345678;
	uint16_t set_number_length = 4;
	int ret = tfe_cmsg_set(cmsg_encode, TFE_CMSG_TCP_RESTORE_SEQ, (const unsigned char *)(&set_number_value), set_number_length);
	assert(ret == 0);

	// set TFE_CMSG_SSL_PASSTHROUGH_REASON
	char set_string_value_tcp[] = "TCP Passthrough";
	char set_string_value_ct[] = "Certificate Transparency";
	char set_string_value_ev[] = "EV Certificate";
	ret = tfe_cmsg_set(cmsg_encode, TFE_CMSG_SSL_PASSTHROUGH_REASON, (const unsigned char *)&set_string_value_tcp, strlen(set_string_value_tcp));
	assert(ret == 0);
	ret = tfe_cmsg_set(cmsg_encode, TFE_CMSG_SSL_PASSTHROUGH_REASON, (const unsigned char *)&set_string_value_ct, strlen(set_string_value_ct));
	assert(ret == 0);
	ret = tfe_cmsg_set(cmsg_encode, TFE_CMSG_SSL_PASSTHROUGH_REASON, (const unsigned char *)&set_string_value_ev, strlen(set_string_value_ev));
	assert(ret == 0);

	// Get buff size
	uint16_t buff_size = tfe_cmsg_serialize_size_get(cmsg_encode);
	printf("cmsg_encode: buff_size %d\n", buff_size);

	// Serialize
	unsigned char *temp_buff = ALLOC(unsigned char, buff_size);
	uint16_t serialize_len = -1;
	ret = tfe_cmsg_serialize(cmsg_encode, temp_buff, buff_size, &serialize_len);
	assert(ret == 0);
	printf("cmsg_encode after serialize, len: %d data: ", serialize_len);
	for (int i = 0; i < serialize_len; i++)
	{
		printf("%02x ", temp_buff[i]);
	}
	printf("\n");

	tfe_cmsg_destroy(cmsg_encode);

	///////////////////////////////////////////////////////////////////////////
	// Get CMSG
	///////////////////////////////////////////////////////////////////////////

	struct tfe_cmsg *cmsg_decode = NULL;
	ret = tfe_cmsg_deserialize(temp_buff, serialize_len, &cmsg_decode);
	assert(ret == 0);

	// get TCP_RESTORE_INFO_TLV_SEQ
	uint32_t get_number_value = 0;
	uint16_t get_number_length = 0;
	ret = tfe_cmsg_get_value(cmsg_decode, TFE_CMSG_TCP_RESTORE_SEQ, (unsigned char *)&get_number_value, sizeof(get_number_value), &get_number_length);
	assert(ret == 0);
	printf("cmsg_decode: TCP_RESTORE_INFO_TLV_SEQ, value is 0x%02x, size is %d\n", get_number_value, get_number_length);

	// get TFE_CMSG_SSL_PASSTHROUGH_REASON
	unsigned char get_string_value[32] = {0};
	uint16_t get_string_len = 0;
	ret = tfe_cmsg_get_value(cmsg_decode, TFE_CMSG_SSL_PASSTHROUGH_REASON, (unsigned char *)&get_string_value, sizeof(get_string_value), &get_string_len);
	assert(ret == 0);
	printf("cmsg_decode: TFE_CMSG_SSL_PASSTHROUGH_REASON, value is %s, size is %d\n", get_string_value, get_string_len);

	tfe_cmsg_destroy(cmsg_decode);

	return 0;
}