Make Transforms Unidirectional am: 3865a008e7 am: 41fe8097ed
am: 7b0b71c853
Change-Id: I608be255a307891ec3fe2d97cda817d75240c95c
This commit is contained in:
@@ -36,19 +36,16 @@ public class IpSecConfigTest {
|
||||
public void testDefaults() throws Exception {
|
||||
IpSecConfig c = new IpSecConfig();
|
||||
assertEquals(IpSecTransform.MODE_TRANSPORT, c.getMode());
|
||||
assertEquals("", c.getLocalAddress());
|
||||
assertEquals("", c.getRemoteAddress());
|
||||
assertEquals("", c.getSourceAddress());
|
||||
assertEquals("", c.getDestinationAddress());
|
||||
assertNull(c.getNetwork());
|
||||
assertEquals(IpSecTransform.ENCAP_NONE, c.getEncapType());
|
||||
assertEquals(IpSecManager.INVALID_RESOURCE_ID, c.getEncapSocketResourceId());
|
||||
assertEquals(0, c.getEncapRemotePort());
|
||||
assertEquals(0, c.getNattKeepaliveInterval());
|
||||
for (int direction :
|
||||
new int[] {IpSecTransform.DIRECTION_OUT, IpSecTransform.DIRECTION_IN}) {
|
||||
assertNull(c.getEncryption(direction));
|
||||
assertNull(c.getAuthentication(direction));
|
||||
assertEquals(IpSecManager.INVALID_RESOURCE_ID, c.getSpiResourceId(direction));
|
||||
}
|
||||
assertNull(c.getEncryption());
|
||||
assertNull(c.getAuthentication());
|
||||
assertEquals(IpSecManager.INVALID_RESOURCE_ID, c.getSpiResourceId());
|
||||
}
|
||||
|
||||
@Test
|
||||
@@ -57,34 +54,21 @@ public class IpSecConfigTest {
|
||||
|
||||
IpSecConfig c = new IpSecConfig();
|
||||
c.setMode(IpSecTransform.MODE_TUNNEL);
|
||||
c.setLocalAddress("0.0.0.0");
|
||||
c.setRemoteAddress("1.2.3.4");
|
||||
c.setSourceAddress("0.0.0.0");
|
||||
c.setDestinationAddress("1.2.3.4");
|
||||
c.setEncapType(android.system.OsConstants.UDP_ENCAP_ESPINUDP);
|
||||
c.setEncapSocketResourceId(7);
|
||||
c.setEncapRemotePort(22);
|
||||
c.setNattKeepaliveInterval(42);
|
||||
c.setEncryption(
|
||||
IpSecTransform.DIRECTION_OUT,
|
||||
new IpSecAlgorithm(
|
||||
IpSecAlgorithm.CRYPT_AES_CBC,
|
||||
new byte[] {0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 0xA, 0xB, 0xC, 0xD, 0xE, 0xF}));
|
||||
c.setAuthentication(
|
||||
IpSecTransform.DIRECTION_OUT,
|
||||
new IpSecAlgorithm(
|
||||
IpSecAlgorithm.AUTH_HMAC_MD5,
|
||||
new byte[] {1, 2, 3, 4, 5, 6, 7, 8, 9, 0xA, 0xB, 0xC, 0xD, 0xE, 0xF, 0}));
|
||||
c.setSpiResourceId(IpSecTransform.DIRECTION_OUT, 1984);
|
||||
c.setEncryption(
|
||||
IpSecTransform.DIRECTION_IN,
|
||||
new IpSecAlgorithm(
|
||||
IpSecAlgorithm.CRYPT_AES_CBC,
|
||||
new byte[] {2, 1, 2, 3, 4, 5, 6, 7, 8, 9, 0xA, 0xB, 0xC, 0xD, 0xE, 0xF}));
|
||||
c.setAuthentication(
|
||||
IpSecTransform.DIRECTION_IN,
|
||||
new IpSecAlgorithm(
|
||||
IpSecAlgorithm.AUTH_HMAC_MD5,
|
||||
new byte[] {1, 2, 3, 4, 5, 6, 7, 8, 9, 0xA, 0xB, 0xC, 0xD, 0xE, 0xF, 1}));
|
||||
c.setSpiResourceId(IpSecTransform.DIRECTION_IN, 99);
|
||||
c.setSpiResourceId(1984);
|
||||
assertParcelingIsLossless(c);
|
||||
}
|
||||
|
||||
|
||||
@@ -81,15 +81,13 @@ public class IpSecManagerTest {
|
||||
IpSecSpiResponse spiResp =
|
||||
new IpSecSpiResponse(IpSecManager.Status.OK, resourceId, DROID_SPI);
|
||||
when(mMockIpSecService.allocateSecurityParameterIndex(
|
||||
eq(IpSecTransform.DIRECTION_IN),
|
||||
eq(GOOGLE_DNS_4.getHostAddress()),
|
||||
eq(DROID_SPI),
|
||||
anyObject()))
|
||||
.thenReturn(spiResp);
|
||||
|
||||
IpSecManager.SecurityParameterIndex droidSpi =
|
||||
mIpSecManager.allocateSecurityParameterIndex(
|
||||
IpSecTransform.DIRECTION_IN, GOOGLE_DNS_4, DROID_SPI);
|
||||
mIpSecManager.allocateSecurityParameterIndex(GOOGLE_DNS_4, DROID_SPI);
|
||||
assertEquals(DROID_SPI, droidSpi.getSpi());
|
||||
|
||||
droidSpi.close();
|
||||
@@ -103,15 +101,13 @@ public class IpSecManagerTest {
|
||||
IpSecSpiResponse spiResp =
|
||||
new IpSecSpiResponse(IpSecManager.Status.OK, resourceId, DROID_SPI);
|
||||
when(mMockIpSecService.allocateSecurityParameterIndex(
|
||||
eq(IpSecTransform.DIRECTION_OUT),
|
||||
eq(GOOGLE_DNS_4.getHostAddress()),
|
||||
eq(IpSecManager.INVALID_SECURITY_PARAMETER_INDEX),
|
||||
anyObject()))
|
||||
.thenReturn(spiResp);
|
||||
|
||||
IpSecManager.SecurityParameterIndex randomSpi =
|
||||
mIpSecManager.allocateSecurityParameterIndex(
|
||||
IpSecTransform.DIRECTION_OUT, GOOGLE_DNS_4);
|
||||
mIpSecManager.allocateSecurityParameterIndex(GOOGLE_DNS_4);
|
||||
|
||||
assertEquals(DROID_SPI, randomSpi.getSpi());
|
||||
|
||||
@@ -124,16 +120,15 @@ public class IpSecManagerTest {
|
||||
* Throws resource unavailable exception
|
||||
*/
|
||||
@Test
|
||||
public void testAllocSpiResUnavaiableExeption() throws Exception {
|
||||
public void testAllocSpiResUnavailableException() throws Exception {
|
||||
IpSecSpiResponse spiResp =
|
||||
new IpSecSpiResponse(IpSecManager.Status.RESOURCE_UNAVAILABLE, 0, 0);
|
||||
when(mMockIpSecService.allocateSecurityParameterIndex(
|
||||
anyInt(), anyString(), anyInt(), anyObject()))
|
||||
anyString(), anyInt(), anyObject()))
|
||||
.thenReturn(spiResp);
|
||||
|
||||
try {
|
||||
mIpSecManager.allocateSecurityParameterIndex(
|
||||
IpSecTransform.DIRECTION_OUT, GOOGLE_DNS_4);
|
||||
mIpSecManager.allocateSecurityParameterIndex(GOOGLE_DNS_4);
|
||||
fail("ResourceUnavailableException was not thrown");
|
||||
} catch (IpSecManager.ResourceUnavailableException e) {
|
||||
}
|
||||
@@ -143,15 +138,14 @@ public class IpSecManagerTest {
|
||||
* Throws spi unavailable exception
|
||||
*/
|
||||
@Test
|
||||
public void testAllocSpiSpiUnavaiableExeption() throws Exception {
|
||||
public void testAllocSpiSpiUnavailableException() throws Exception {
|
||||
IpSecSpiResponse spiResp = new IpSecSpiResponse(IpSecManager.Status.SPI_UNAVAILABLE, 0, 0);
|
||||
when(mMockIpSecService.allocateSecurityParameterIndex(
|
||||
anyInt(), anyString(), anyInt(), anyObject()))
|
||||
anyString(), anyInt(), anyObject()))
|
||||
.thenReturn(spiResp);
|
||||
|
||||
try {
|
||||
mIpSecManager.allocateSecurityParameterIndex(
|
||||
IpSecTransform.DIRECTION_OUT, GOOGLE_DNS_4);
|
||||
mIpSecManager.allocateSecurityParameterIndex(GOOGLE_DNS_4);
|
||||
fail("ResourceUnavailableException was not thrown");
|
||||
} catch (IpSecManager.ResourceUnavailableException e) {
|
||||
}
|
||||
@@ -163,8 +157,7 @@ public class IpSecManagerTest {
|
||||
@Test
|
||||
public void testRequestAllocInvalidSpi() throws Exception {
|
||||
try {
|
||||
mIpSecManager.allocateSecurityParameterIndex(
|
||||
IpSecTransform.DIRECTION_OUT, GOOGLE_DNS_4, 0);
|
||||
mIpSecManager.allocateSecurityParameterIndex(GOOGLE_DNS_4, 0);
|
||||
fail("Able to allocate invalid spi");
|
||||
} catch (IllegalArgumentException e) {
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user