test_ok
err = bpf_map_lookup_elem(bpf_map__fd(skel->maps.bss), &zero, test_ok);
CHECK_FAIL(!test_ok[0] || !test_ok[1]);
bool test_ok[2];
test_ok("%-20s\t%zu keys: min=%" PRIu64 "ms max=%" PRIu64 "ms mean=%gms stddev=%g",
test_ok("%s: connect() was prevented", tst_name);
test_ok("%s", tst_name);
test_ok("%s: refused to connect", tst_name);
test_ok("%s: connected", tst_name);
test_ok("%s: counter %s increased %" PRIu64 " => %" PRIu64,
test_ok("connect TCPAOGood %" PRIu64 "/%" PRIu64 "/%" PRIu64 " => %" PRIu64 "/%" PRIu64 "/%" PRIu64 ", sent %zu",
# define test_icmps_fail test_ok
# define test_icmps_ok test_ok
test_ok("%s delivered %" PRIu64,
# define test_icmps_fail test_ok
# define test_icmps_ok test_ok
test_ok("%s delivered %" PRIu64,
test_ok("Can't add a key with non-matching VRF for established sk");
test_ok("%s: key deletion was prevented", tst_name);
test_ok("%s: the key was deleted", tst_name);
test_ok("%s", tst_name);
test_ok("%s", tst_name);
test_ok("%s: the socket has no current/rnext keys", tst_msg);
test_ok("listen socket, getsockopt(TCP_AO_REPAIR) is restricted");
test_ok("listen socket, setsockopt(TCP_AO_REPAIR) is restricted");
test_ok("listen socket, setting current key not allowed");
test_ok("listen socket, setting rnext key not allowed");
test_ok("%s: current key %u as expected",
test_ok("%s: rnext key %u as expected", tst, ao_info.rnext);
test_ok("%s: passed counters checks", tst_name);
test_ok("%s: The socket keys are consistent with the expectations",
test_ok("%s: server alive", tst_name);
test_ok("Can't add a key with non-matching ip-address for established sk");
test_ok("Trace events matched expectations: %zu %s",
test_ok("No unexpected trace events during the test run");
test_ok("%s: post-migrate connection is broken", tst_name);
test_ok("%s: post-migrate connection is alive", tst_name);
test_ok("%s: counter %s increased %" PRIu64 " => %" PRIu64,
test_ok("%s: server couldn't serve", tst_name);
test_ok("%s: server alive", tst_name);
test_ok("%s(server): counter %s increased %" PRIu64 " => %" PRIu64,
test_ok("servered %zd bytes", bytes);
test_ok("MKT counters are good on server");
test_ok("Verified established tcp connection");
test_ok("sk[%d] = %d%s", i, sk[i],
test_ok("Verified established tcp connection");
test_ok("client sock was passively reset post-seq-adjust");
test_ok("No segments without AO sign (%s)", msg);
test_ok("Signed AO segments (%s): %" PRIu64 " => %" PRIu64,
test_ok("No segments with bad AO sign (%s)", msg);
test_ok("%s: connect TCPAOGood %" PRIu64 " => %" PRIu64,
test_ok("%s: connect TCPAOGood %" PRIu64 " => %" PRIu64,
test_ok("server alive");
test_ok("TCPAOGood counter increased %" PRIu64 " => %" PRIu64,
test_ok("TCPAOBad counter didn't increase");
test_ok("SEQ extension incremented: %u/%u",
test_ok("post-migrate connection alive");
test_ok("TCPAOGood counter increased %" PRIu64 " => %" PRIu64,
test_ok("TCPAOBad counter didn't increase");
test_ok("optmem limit was hit on adding %zu key", i);
test_ok("AO info get: %s", tst);
test_ok("%s%s", tst ?: "", tst2 ?: "");
test_ok("%s%s", tst ?: "", tst2 ?: "");
test_ok("filter keys: %s", tst);
test_ok("filter keys: correct nkeys when in.nkeys < matches");
test_ok("%s: no counter checks", tst_name);
test_ok("%s: counter %s increased %" PRIu64 " => %" PRIu64,
test_ok("%s: connect() was prevented", tst_name);
test_ok("%s", tst_name);
test_ok("%s: refused to connect", tst_name);
test_ok("%s: connected", tst_name);
test_ok("%s: prefailed as expected: %m", tst_name);
test_ok("%s", tst_name);
test_ok("%s: postfailed as expected", tst_name);
test_ok("%s: postfailed as expected", tst_name);