diff options
author | Anatole Denis <anatole@rezel.net> | 2016-11-24 15:16:21 +0100 |
---|---|---|
committer | Pablo Neira Ayuso <pablo@netfilter.org> | 2016-11-29 22:49:06 +0100 |
commit | 3883104bc3892dcc0a094804b3add83e0a08d68d (patch) | |
tree | 7e16b83e2198e2643e2d50ac258ae3b94137b27e /tests/py/inet/esp.t.payload.ip | |
parent | cc7b37d18a687d53e8724b3104b042e6767a9cef (diff) |
tests/py: Unmask negative set lookup
Many testcases were masked because of bug #888. This series of patches unmasks
them
Signed-off-by: Anatole Denis <anatole@rezel.net>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'tests/py/inet/esp.t.payload.ip')
-rw-r--r-- | tests/py/inet/esp.t.payload.ip | 40 |
1 files changed, 40 insertions, 0 deletions
diff --git a/tests/py/inet/esp.t.payload.ip b/tests/py/inet/esp.t.payload.ip index 5de41aeb..f8ef9ec8 100644 --- a/tests/py/inet/esp.t.payload.ip +++ b/tests/py/inet/esp.t.payload.ip @@ -37,6 +37,16 @@ ip test-ip4 input [ payload load 4b @ transport header + 0 => reg 1 ] [ lookup reg 1 set __set%d ] +# esp spi != { 100, 102} +__set%d test-ip4 3 +__set%d test-ip4 0 + element 64000000 : 0 [end] element 66000000 : 0 [end] +ip test-ip4 input + [ payload load 1b @ network header + 9 => reg 1 ] + [ cmp eq reg 1 0x00000032 ] + [ payload load 4b @ transport header + 0 => reg 1 ] + [ lookup reg 1 set __set%d 0x1 ] + # esp spi { 100-102} __set%d test-ip4 7 __set%d test-ip4 0 @@ -47,6 +57,16 @@ ip test-ip4 input [ payload load 4b @ transport header + 0 => reg 1 ] [ lookup reg 1 set __set%d ] +# esp spi != { 100-102} +__set%d test-ip4 7 +__set%d test-ip4 0 + element 00000000 : 1 [end] element 64000000 : 0 [end] element 67000000 : 1 [end] +ip test-ip4 input + [ payload load 1b @ network header + 9 => reg 1 ] + [ cmp eq reg 1 0x00000032 ] + [ payload load 4b @ transport header + 0 => reg 1 ] + [ lookup reg 1 set __set%d 0x1 ] + # esp sequence 22 ip test-ip4 input [ payload load 1b @ network header + 9 => reg 1 ] @@ -79,6 +99,16 @@ ip test-ip4 input [ payload load 4b @ transport header + 4 => reg 1 ] [ lookup reg 1 set __set%d ] +# esp sequence != { 22, 24} +__set%d test-ip4 3 +__set%d test-ip4 0 + element 16000000 : 0 [end] element 18000000 : 0 [end] +ip test-ip4 input + [ payload load 1b @ network header + 9 => reg 1 ] + [ cmp eq reg 1 0x00000032 ] + [ payload load 4b @ transport header + 4 => reg 1 ] + [ lookup reg 1 set __set%d 0x1 ] + # esp sequence { 22-25} __set%d test-ip4 7 __set%d test-ip4 0 @@ -89,3 +119,13 @@ ip test-ip4 input [ payload load 4b @ transport header + 4 => reg 1 ] [ lookup reg 1 set __set%d ] +# esp sequence != { 22-25} +__set%d test-ip4 7 +__set%d test-ip4 0 + element 00000000 : 1 [end] element 16000000 : 0 [end] element 1a000000 : 1 [end] +ip test-ip4 input + [ payload load 1b @ network header + 9 => reg 1 ] + [ cmp eq reg 1 0x00000032 ] + [ payload load 4b @ transport header + 4 => reg 1 ] + [ lookup reg 1 set __set%d 0x1 ] + |