Home | History | Annotate | Line # | Download | only in ipsec
      1 #	$NetBSD: t_ipsec_sysctl.sh,v 1.1 2017/04/14 02:56:49 ozaki-r Exp $
      2 #
      3 # Copyright (c) 2017 Internet Initiative Japan Inc.
      4 # All rights reserved.
      5 #
      6 # Redistribution and use in source and binary forms, with or without
      7 # modification, are permitted provided that the following conditions
      8 # are met:
      9 # 1. Redistributions of source code must retain the above copyright
     10 #    notice, this list of conditions and the following disclaimer.
     11 # 2. Redistributions in binary form must reproduce the above copyright
     12 #    notice, this list of conditions and the following disclaimer in the
     13 #    documentation and/or other materials provided with the distribution.
     14 #
     15 # THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     16 # ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     17 # TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     18 # PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     19 # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     20 # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     21 # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     22 # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     23 # CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     24 # ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     25 # POSSIBILITY OF SUCH DAMAGE.
     26 #
     27 
     28 DEBUG=${DEBUG:-false}
     29 
     30 atf_test_case ipsec_sysctl0 cleanup
     31 ipsec_sysctl0_head()
     32 {
     33 
     34 	atf_set "descr" "Tests of sysctl entries of IPsec without ipsec.so"
     35 	atf_set "require.progs" "rump_server"
     36 }
     37 
     38 ipsec_sysctl0_body()
     39 {
     40 	local sock=unix://ipsec_sysctl
     41 
     42 	rump_server_crypto_start $sock
     43 
     44 	export RUMP_SERVER=$sock
     45 	atf_check -s not-exit:0 -e match:'invalid' \
     46 	    rump.sysctl net.inet.ipsec.enabled
     47 	atf_check -s not-exit:0 -e match:'invalid' \
     48 	    rump.sysctl net.inet6.ipsec6.enabled
     49 }
     50 
     51 ipsec_sysctl0_cleanup()
     52 {
     53 
     54 	$DEBUG && dump
     55 	cleanup
     56 }
     57 
     58 atf_test_case ipsec_sysctl4 cleanup
     59 ipsec_sysctl4_head()
     60 {
     61 
     62 	atf_set "descr" "Tests of sysctl entries of IPsec without netinet6.so"
     63 	atf_set "require.progs" "rump_server"
     64 }
     65 
     66 ipsec_sysctl4_body()
     67 {
     68 	local sock=unix://ipsec_sysctl
     69 
     70 	rump_server_crypto_start $sock netipsec
     71 
     72 	export RUMP_SERVER=$sock
     73 	atf_check -s exit:0 -o match:'= 1' rump.sysctl net.inet.ipsec.enabled
     74 	# net.inet6.ipsec6 entries exit regardless of netinet6
     75 	# net.inet6.ipsec6.enabled always equals net.inet.ipsec.enabled
     76 	atf_check -s exit:0 -o match:'= 1' rump.sysctl net.inet6.ipsec6.enabled
     77 
     78 	atf_check -s exit:0 -o match:'= 0' rump.sysctl net.inet.ipsec.used
     79 	# net.inet6.ipsec6.used always equals net.inet.ipsec.used
     80 	atf_check -s exit:0 -o match:'= 0' rump.sysctl net.inet6.ipsec6.used
     81 
     82 	# Add an SAD entry for IPv4
     83 	atf_check -s exit:0 -o empty $HIJACKING setkey -c <<-EOF
     84 	add 10.0.0.1 10.0.0.2 esp 9876 -E 3des-cbc "hogehogehogehogehogehoge";
     85 	EOF
     86 	$DEBUG && $HIJACKING setkey -D
     87 
     88 	atf_check -s exit:0 -o match:'= 0' rump.sysctl net.inet.ipsec.used
     89 	atf_check -s exit:0 -o match:'= 0' rump.sysctl net.inet6.ipsec6.used
     90 
     91 	# Add an SPD entry for IPv4, which activates the IPsec function
     92 	atf_check -s exit:0 -o empty $HIJACKING setkey -c <<-EOF
     93 	spdadd 10.0.0.1 10.0.0.2 any -P out ipsec esp/transport//use;
     94 	EOF
     95 	$DEBUG && $HIJACKING setkey -D
     96 
     97 	atf_check -s exit:0 -o match:'= 1' rump.sysctl net.inet.ipsec.used
     98 	atf_check -s exit:0 -o match:'= 1' rump.sysctl net.inet6.ipsec6.used
     99 }
    100 
    101 ipsec_sysctl4_cleanup()
    102 {
    103 
    104 	$DEBUG && dump
    105 	cleanup
    106 }
    107 
    108 atf_test_case ipsec_sysctl6 cleanup
    109 ipsec_sysctl6_head()
    110 {
    111 
    112 	atf_set "descr" "Tests of sysctl entries of IPsec"
    113 	atf_set "require.progs" "rump_server"
    114 }
    115 
    116 ipsec_sysctl6_body()
    117 {
    118 	local sock=unix://ipsec_sysctl
    119 
    120 	rump_server_crypto_start $sock netinet6 netipsec
    121 
    122 	export RUMP_SERVER=$sock
    123 	atf_check -s exit:0 -o match:'= 1' rump.sysctl net.inet.ipsec.enabled
    124 	atf_check -s exit:0 -o match:'= 1' rump.sysctl net.inet6.ipsec6.enabled
    125 
    126 	atf_check -s exit:0 -o match:'= 0' rump.sysctl net.inet.ipsec.used
    127 	atf_check -s exit:0 -o match:'= 0' rump.sysctl net.inet6.ipsec6.used
    128 
    129 	# Add an SAD entry for IPv6
    130 	atf_check -s exit:0 -o empty $HIJACKING setkey -c <<-EOF
    131 	add fd00::1 fd00::2 esp 9876 -E 3des-cbc "hogehogehogehogehogehoge";
    132 	EOF
    133 	$DEBUG && $HIJACKING setkey -D
    134 
    135 	atf_check -s exit:0 -o match:'= 0' rump.sysctl net.inet.ipsec.used
    136 	atf_check -s exit:0 -o match:'= 0' rump.sysctl net.inet6.ipsec6.used
    137 
    138 	# Add an SPD entry for IPv6, which activates the IPsec function
    139 	atf_check -s exit:0 -o empty $HIJACKING setkey -c <<-EOF
    140 	spdadd fd00::1 fd00::2 any -P out ipsec esp/transport//use;
    141 	EOF
    142 	$DEBUG && $HIJACKING setkey -D
    143 
    144 	atf_check -s exit:0 -o match:'= 1' rump.sysctl net.inet.ipsec.used
    145 	atf_check -s exit:0 -o match:'= 1' rump.sysctl net.inet6.ipsec6.used
    146 }
    147 
    148 ipsec_sysctl6_cleanup()
    149 {
    150 
    151 	$DEBUG && dump
    152 	cleanup
    153 }
    154 
    155 atf_init_test_cases()
    156 {
    157 
    158 	atf_add_test_case ipsec_sysctl0
    159 	atf_add_test_case ipsec_sysctl4
    160 	atf_add_test_case ipsec_sysctl6
    161 }
    162