/
seqtest.c
89 lines (78 loc) · 3.18 KB
/
seqtest.c
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
/*
* OpenConnect (SSL + DTLS) VPN client
*
* Copyright © 2016 Intel Corporation.
*
* Author: David Woodhouse <dwmw2@infradead.org>
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public License
* version 2.1, as published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*/
#include <config.h>
#include <stdint.h>
#include <stdio.h>
#define __OPENCONNECT_INTERNAL_H__
#define vpn_progress(v, d, ...) printf(__VA_ARGS__)
#define _(x) x
struct openconnect_info {
int esp_replay_protect;
};
struct esp {
uint64_t seq_backlog;
uint64_t seq;
};
#include "../esp-seqno.c"
int main(void)
{
struct esp esptest = { 0, 0 };
struct openconnect_info vpninfo = { 1};
if ( verify_packet_seqno(&vpninfo, &esptest, 0) ||
verify_packet_seqno(&vpninfo, &esptest, 2) ||
verify_packet_seqno(&vpninfo, &esptest, 1) ||
!verify_packet_seqno(&vpninfo, &esptest, 0) ||
verify_packet_seqno(&vpninfo, &esptest, 64) ||
verify_packet_seqno(&vpninfo, &esptest, 65) ||
!verify_packet_seqno(&vpninfo, &esptest, 65) ||
verify_packet_seqno(&vpninfo, &esptest, 66) ||
verify_packet_seqno(&vpninfo, &esptest, 67) ||
verify_packet_seqno(&vpninfo, &esptest, 68) ||
!verify_packet_seqno(&vpninfo, &esptest, 68) ||
!verify_packet_seqno(&vpninfo, &esptest, 2) ||
!verify_packet_seqno(&vpninfo, &esptest, 3) ||
verify_packet_seqno(&vpninfo, &esptest, 4) ||
verify_packet_seqno(&vpninfo, &esptest, 164) ||
!verify_packet_seqno(&vpninfo, &esptest, 99) ||
verify_packet_seqno(&vpninfo, &esptest, 100) ||
verify_packet_seqno(&vpninfo, &esptest, 200) ||
verify_packet_seqno(&vpninfo, &esptest, 264) ||
!verify_packet_seqno(&vpninfo, &esptest, 199) ||
!verify_packet_seqno(&vpninfo, &esptest, 200) ||
verify_packet_seqno(&vpninfo, &esptest, 265) ||
verify_packet_seqno(&vpninfo, &esptest, 210) ||
verify_packet_seqno(&vpninfo, &esptest, 201) ||
verify_packet_seqno(&vpninfo, &esptest, 270) ||
verify_packet_seqno(&vpninfo, &esptest, 206) ||
!verify_packet_seqno(&vpninfo, &esptest, 210) ||
verify_packet_seqno(&vpninfo, &esptest, 333) ||
!verify_packet_seqno(&vpninfo, &esptest, 268) ||
verify_packet_seqno(&vpninfo, &esptest, 269) ||
!verify_packet_seqno(&vpninfo, &esptest, 270) ||
verify_packet_seqno(&vpninfo, &esptest, 0xfffffffd) ||
!verify_packet_seqno(&vpninfo, &esptest, 1) ||
verify_packet_seqno(&vpninfo, &esptest, 0xffffffc1) ||
verify_packet_seqno(&vpninfo, &esptest, 0xfffffffc) ||
verify_packet_seqno(&vpninfo, &esptest, 0xffffffff) ||
!verify_packet_seqno(&vpninfo, &esptest, 0) ||
!verify_packet_seqno(&vpninfo, &esptest, 0xffffffbe) ||
verify_packet_seqno(&vpninfo, &esptest, 0xffffffbf) ||
!verify_packet_seqno(&vpninfo, &esptest, 0xffffffc1) ||
verify_packet_seqno(&vpninfo, &esptest, 0xffffffc0))
return 1;
return 0;
}