File: seqtest.c

package info (click to toggle)
openconnect 9.12-3.1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 12,012 kB
  • sloc: ansic: 40,813; sh: 7,073; xml: 3,785; python: 1,791; makefile: 973; java: 475; sed: 10
file content (89 lines) | stat: -rw-r--r-- 3,260 bytes parent folder | download | duplicates (5)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
/*
 * OpenConnect (SSL + DTLS) VPN client
 *
 * Copyright © 2016 Intel Corporation.
 *
 * Author: David Woodhouse <dwmw2@infradead.org>
 *
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public License
 * version 2.1, as published by the Free Software Foundation.
 *
 * This program is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 */

#include <config.h>

#include <stdint.h>
#include <stdio.h>

#define __OPENCONNECT_INTERNAL_H__

#define vpn_progress(v, d, ...) printf(__VA_ARGS__)
#define _(x) x

struct openconnect_info {
	int esp_replay_protect;
};

struct esp {
	uint64_t seq_backlog;
	uint64_t seq;
};

#include "../esp-seqno.c"


int main(void)
{
	struct esp esptest = { 0, 0 };
	struct openconnect_info vpninfo = { 1};

	if ( verify_packet_seqno(&vpninfo, &esptest, 0) ||
	     verify_packet_seqno(&vpninfo, &esptest, 2) ||
	     verify_packet_seqno(&vpninfo, &esptest, 1) ||
	    !verify_packet_seqno(&vpninfo, &esptest, 0) ||
	     verify_packet_seqno(&vpninfo, &esptest, 64) ||
	     verify_packet_seqno(&vpninfo, &esptest, 65) ||
	    !verify_packet_seqno(&vpninfo, &esptest, 65) ||
	     verify_packet_seqno(&vpninfo, &esptest, 66) ||
	     verify_packet_seqno(&vpninfo, &esptest, 67) ||
	     verify_packet_seqno(&vpninfo, &esptest, 68) ||
	    !verify_packet_seqno(&vpninfo, &esptest, 68) ||
	    !verify_packet_seqno(&vpninfo, &esptest, 2) ||
	    !verify_packet_seqno(&vpninfo, &esptest, 3) ||
	     verify_packet_seqno(&vpninfo, &esptest, 4) ||
	     verify_packet_seqno(&vpninfo, &esptest, 164) ||
	    !verify_packet_seqno(&vpninfo, &esptest, 99) ||
	     verify_packet_seqno(&vpninfo, &esptest, 100) ||
	     verify_packet_seqno(&vpninfo, &esptest, 200) ||
	     verify_packet_seqno(&vpninfo, &esptest, 264) ||
	    !verify_packet_seqno(&vpninfo, &esptest, 199) ||
	    !verify_packet_seqno(&vpninfo, &esptest, 200) ||
	     verify_packet_seqno(&vpninfo, &esptest, 265) ||
	     verify_packet_seqno(&vpninfo, &esptest, 210) ||
	     verify_packet_seqno(&vpninfo, &esptest, 201) ||
	     verify_packet_seqno(&vpninfo, &esptest, 270) ||
	     verify_packet_seqno(&vpninfo, &esptest, 206) ||
	    !verify_packet_seqno(&vpninfo, &esptest, 210) ||
	     verify_packet_seqno(&vpninfo, &esptest, 333) ||
	    !verify_packet_seqno(&vpninfo, &esptest, 268) ||
	     verify_packet_seqno(&vpninfo, &esptest, 269) ||
	    !verify_packet_seqno(&vpninfo, &esptest, 270) ||
	     verify_packet_seqno(&vpninfo, &esptest, 0xfffffffd) ||
	    !verify_packet_seqno(&vpninfo, &esptest, 1) ||
	     verify_packet_seqno(&vpninfo, &esptest, 0xffffffc1) ||
	     verify_packet_seqno(&vpninfo, &esptest, 0xfffffffc) ||
	     verify_packet_seqno(&vpninfo, &esptest, 0xffffffff) ||
	    !verify_packet_seqno(&vpninfo, &esptest, 0) ||
	    !verify_packet_seqno(&vpninfo, &esptest, 0xffffffbe) ||
	     verify_packet_seqno(&vpninfo, &esptest, 0xffffffbf) ||
	    !verify_packet_seqno(&vpninfo, &esptest, 0xffffffc1) ||
	     verify_packet_seqno(&vpninfo, &esptest, 0xffffffc0))
		return 1;

	return 0;
}