#ifdef HAVE_CONFIG_H
#include "config.h"
-#elif defined(_MSC_VER)
-#include "config-msvc.h"
#endif
#include "syshead.h"
#include "options.h"
#include "ssl_backend.h"
-#include "mock_msg.h"
#include "mss.h"
static const char testtext[] = "Dummy text to test PEM encoding";
0xb1, 0x56, 0x7e, 0x4b, 0x4b, 0x14, 0x59, 0xe6,
0xa9, 0x04, 0xac, 0x2d, 0xda, 0xb7, 0x2d, 0x67};
-static const char* ipsumlorem = "Lorem ipsum dolor sit amet, consectetur "
+static const char *ipsumlorem = "Lorem ipsum dolor sit amet, consectetur "
"adipisici elit, sed eiusmod tempor incidunt "
"ut labore et dolore magna aliqua.";
/* common defaults */
o.ce.tun_mtu = 1400;
- o.replay = true;
o.ce.proto = PROTO_UDP;
/* No crypto at all */
linkmtu = calc_options_string_link_mtu(&o, &f);
assert_int_equal(linkmtu, 1445);
+#if defined(ENABLE_FRAGMENT)
/* secret, comp-lzo yes, cipher BF-CBC, auth SHA1, fragment 1200 */
o.ce.fragment = 1200;
linkmtu = calc_options_string_link_mtu(&o, &f);
assert_int_equal(linkmtu, 1449);
+ o.ce.fragment = 0;
+#endif
o.comp.alg = COMP_ALG_UNDEF;
- o.ce.fragment = 0;
#endif
/* TLS mode */
linkmtu = calc_options_string_link_mtu(&o, &f);
assert_int_equal(linkmtu, 1405);
- /* tls client, auth none, cipher none, no-replay */
- o.replay = false;
-
- linkmtu = calc_options_string_link_mtu(&o, &f);
- assert_int_equal(linkmtu, 1401);
-
-
- o.replay = true;
-
/* tls client, auth SHA1, cipher AES-256-GCM */
o.authname = "SHA1";
o.ciphername = "AES-256-GCM";
assert_int_equal(linkmtu, 1449);
-#if defined(USE_COMP)
+#if defined(USE_COMP) && defined(ENABLE_FRAGMENT)
o.comp.alg = COMP_ALG_LZO;
/* tls client, auth SHA1, cipher AES-256-GCM, fragment, comp-lzo yes */
/* common defaults */
o.ce.tun_mtu = 1400;
o.ce.mssfix = 1000;
- o.replay = true;
o.ce.proto = PROTO_UDP;
/* No crypto at all */
o.authname = "none";
init_key_type(&kt, o.ciphername, o.authname, false, false);
- for (int i = 990;i <= 1010;i++)
+ for (int i = 990; i <= 1010; i++)
{
/* 992 - 1008 should end up with the same mssfix value all they
* all result in the same CBC block size/padding and <= 991 and >=1008
/* Same but with compression added. Compression adds one byte extra to the
* payload so the payload should be reduced by compared to the no
* compression calculation before */
- for (int i = 990;i <= 1010;i++)
+ for (int i = 990; i <= 1010; i++)
{
/* 992 - 1008 should end up with the same mssfix value all they
* all result in the same CBC block size/padding and <= 991 and >=1008
}
}
o.comp.alg = COMP_ALG_UNDEF;
-#endif
+#endif /* ifdef USE_COMP */
/* tls client, auth SHA1, cipher AES-256-GCM */
o.authname = "SHA1";
o.use_peer_id = true;
init_key_type(&kt, o.ciphername, o.authname, true, false);
- for (int i=900;i <= 1200;i++)
+ for (int i = 900; i <= 1200; i++)
{
/* For stream ciphers, the value should not be influenced by block
* sizes or similar but always have the same difference */