t_ipsec.sh revision 1.3 1 1.3 ozaki # $NetBSD: t_ipsec.sh,v 1.3 2018/02/01 05:22:01 ozaki-r Exp $
2 1.1 knakahar #
3 1.1 knakahar # Copyright (c) 2017 Internet Initiative Japan Inc.
4 1.1 knakahar # All rights reserved.
5 1.1 knakahar #
6 1.1 knakahar # Redistribution and use in source and binary forms, with or without
7 1.1 knakahar # modification, are permitted provided that the following conditions
8 1.1 knakahar # are met:
9 1.1 knakahar # 1. Redistributions of source code must retain the above copyright
10 1.1 knakahar # notice, this list of conditions and the following disclaimer.
11 1.1 knakahar # 2. Redistributions in binary form must reproduce the above copyright
12 1.1 knakahar # notice, this list of conditions and the following disclaimer in the
13 1.1 knakahar # documentation and/or other materials provided with the distribution.
14 1.1 knakahar #
15 1.1 knakahar # THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
16 1.1 knakahar # ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
17 1.1 knakahar # TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
18 1.1 knakahar # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
19 1.1 knakahar # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
20 1.1 knakahar # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
21 1.1 knakahar # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
22 1.1 knakahar # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
23 1.1 knakahar # CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
24 1.1 knakahar # ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
25 1.1 knakahar # POSSIBILITY OF SUCH DAMAGE.
26 1.1 knakahar #
27 1.1 knakahar
28 1.1 knakahar SOCK1=unix://commsock1 # for ROUTER1
29 1.1 knakahar SOCK2=unix://commsock2 # for ROUTER2
30 1.1 knakahar ROUTER1_LANIP=192.168.1.1
31 1.1 knakahar ROUTER1_LANNET=192.168.1.0/24
32 1.1 knakahar ROUTER1_WANIP=10.0.0.1
33 1.1 knakahar ROUTER1_IPSECIP=172.16.1.1
34 1.1 knakahar ROUTER1_WANIP_DUMMY=10.0.0.11
35 1.1 knakahar ROUTER1_IPSECIP_DUMMY=172.16.11.1
36 1.1 knakahar ROUTER1_IPSECIP_RECURSIVE1=172.16.101.1
37 1.1 knakahar ROUTER1_IPSECIP_RECURSIVE2=172.16.201.1
38 1.1 knakahar ROUTER2_LANIP=192.168.2.1
39 1.1 knakahar ROUTER2_LANNET=192.168.2.0/24
40 1.1 knakahar ROUTER2_WANIP=10.0.0.2
41 1.1 knakahar ROUTER2_IPSECIP=172.16.2.1
42 1.1 knakahar ROUTER2_WANIP_DUMMY=10.0.0.12
43 1.1 knakahar ROUTER2_IPSECIP_DUMMY=172.16.12.1
44 1.1 knakahar ROUTER2_IPSECIP_RECURSIVE1=172.16.102.1
45 1.1 knakahar ROUTER2_IPSECIP_RECURSIVE2=172.16.202.1
46 1.1 knakahar
47 1.1 knakahar ROUTER1_LANIP6=fc00:1::1
48 1.1 knakahar ROUTER1_LANNET6=fc00:1::/64
49 1.1 knakahar ROUTER1_WANIP6=fc00::1
50 1.1 knakahar ROUTER1_IPSECIP6=fc00:3::1
51 1.1 knakahar ROUTER1_WANIP6_DUMMY=fc00::11
52 1.1 knakahar ROUTER1_IPSECIP6_DUMMY=fc00:13::1
53 1.1 knakahar ROUTER1_IPSECIP6_RECURSIVE1=fc00:103::1
54 1.1 knakahar ROUTER1_IPSECIP6_RECURSIVE2=fc00:203::1
55 1.1 knakahar ROUTER2_LANIP6=fc00:2::1
56 1.1 knakahar ROUTER2_LANNET6=fc00:2::/64
57 1.1 knakahar ROUTER2_WANIP6=fc00::2
58 1.1 knakahar ROUTER2_IPSECIP6=fc00:4::1
59 1.1 knakahar ROUTER2_WANIP6_DUMMY=fc00::12
60 1.1 knakahar ROUTER2_IPSECIP6_DUMMY=fc00:14::1
61 1.1 knakahar ROUTER2_IPSECIP6_RECURSIVE1=fc00:104::1
62 1.1 knakahar ROUTER2_IPSECIP6_RECURSIVE2=fc00:204::1
63 1.1 knakahar
64 1.1 knakahar DEBUG=${DEBUG:-false}
65 1.1 knakahar TIMEOUT=7
66 1.1 knakahar
67 1.3 ozaki atf_test_case ipsecif_create_destroy cleanup
68 1.3 ozaki ipsecif_create_destroy_head()
69 1.3 ozaki {
70 1.3 ozaki
71 1.3 ozaki atf_set "descr" "Test creating/destroying gif interfaces"
72 1.3 ozaki atf_set "require.progs" "rump_server"
73 1.3 ozaki }
74 1.3 ozaki
75 1.3 ozaki ipsecif_create_destroy_body()
76 1.3 ozaki {
77 1.3 ozaki
78 1.3 ozaki rump_server_start $SOCK1 ipsec
79 1.3 ozaki
80 1.3 ozaki test_create_destroy_common $SOCK1 ipsec0
81 1.3 ozaki }
82 1.3 ozaki
83 1.3 ozaki ipsecif_create_destroy_cleanup()
84 1.3 ozaki {
85 1.3 ozaki
86 1.3 ozaki $DEBUG && dump
87 1.3 ozaki cleanup
88 1.3 ozaki }
89 1.3 ozaki
90 1.1 knakahar setup_router()
91 1.1 knakahar {
92 1.1 knakahar local sock=${1}
93 1.1 knakahar local lan=${2}
94 1.1 knakahar local lan_mode=${3}
95 1.1 knakahar local wan=${4}
96 1.1 knakahar local wan_mode=${5}
97 1.1 knakahar
98 1.1 knakahar rump_server_add_iface $sock shmif0 bus0
99 1.1 knakahar rump_server_add_iface $sock shmif1 bus1
100 1.1 knakahar
101 1.1 knakahar export RUMP_SERVER=${sock}
102 1.1 knakahar if [ ${lan_mode} = "ipv6" ]; then
103 1.1 knakahar atf_check -s exit:0 rump.ifconfig shmif0 inet6 ${lan}
104 1.1 knakahar else
105 1.1 knakahar atf_check -s exit:0 rump.ifconfig shmif0 inet ${lan} netmask 0xffffff00
106 1.1 knakahar fi
107 1.1 knakahar atf_check -s exit:0 rump.ifconfig shmif0 up
108 1.1 knakahar rump.ifconfig shmif0
109 1.1 knakahar
110 1.1 knakahar if [ ${wan_mode} = "ipv6" ]; then
111 1.1 knakahar atf_check -s exit:0 rump.ifconfig shmif1 inet6 ${wan}
112 1.1 knakahar else
113 1.1 knakahar atf_check -s exit:0 rump.ifconfig shmif1 inet ${wan} netmask 0xff000000
114 1.1 knakahar fi
115 1.1 knakahar atf_check -s exit:0 rump.ifconfig shmif1 up
116 1.1 knakahar rump.ifconfig shmif1
117 1.1 knakahar unset RUMP_SERVER
118 1.1 knakahar }
119 1.1 knakahar
120 1.1 knakahar test_router()
121 1.1 knakahar {
122 1.1 knakahar local sock=${1}
123 1.1 knakahar local lan=${2}
124 1.1 knakahar local lan_mode=${3}
125 1.1 knakahar local wan=${4}
126 1.1 knakahar local wan_mode=${5}
127 1.1 knakahar
128 1.1 knakahar export RUMP_SERVER=${sock}
129 1.1 knakahar atf_check -s exit:0 -o match:shmif0 rump.ifconfig
130 1.1 knakahar if [ ${lan_mode} = "ipv6" ]; then
131 1.1 knakahar atf_check -s exit:0 -o ignore rump.ping6 -n -c 1 -X $TIMEOUT ${lan}
132 1.1 knakahar else
133 1.1 knakahar atf_check -s exit:0 -o ignore rump.ping -n -c 1 -w $TIMEOUT ${lan}
134 1.1 knakahar fi
135 1.1 knakahar
136 1.1 knakahar atf_check -s exit:0 -o match:shmif1 rump.ifconfig
137 1.1 knakahar if [ ${wan_mode} = "ipv6" ]; then
138 1.1 knakahar atf_check -s exit:0 -o ignore rump.ping6 -n -c 1 -X $TIMEOUT ${wan}
139 1.1 knakahar else
140 1.1 knakahar atf_check -s exit:0 -o ignore rump.ping -n -c 1 -w $TIMEOUT ${wan}
141 1.1 knakahar fi
142 1.1 knakahar unset RUMP_SERVER
143 1.1 knakahar }
144 1.1 knakahar
145 1.1 knakahar setup()
146 1.1 knakahar {
147 1.1 knakahar local inner=${1}
148 1.1 knakahar local outer=${2}
149 1.1 knakahar
150 1.1 knakahar rump_server_crypto_start $SOCK1 netipsec netinet6 ipsec
151 1.1 knakahar rump_server_crypto_start $SOCK2 netipsec netinet6 ipsec
152 1.1 knakahar
153 1.1 knakahar router1_lan=""
154 1.1 knakahar router1_lan_mode=""
155 1.1 knakahar router2_lan=""
156 1.1 knakahar router2_lan_mode=""
157 1.1 knakahar if [ ${inner} = "ipv6" ]; then
158 1.1 knakahar router1_lan=$ROUTER1_LANIP6
159 1.1 knakahar router1_lan_mode="ipv6"
160 1.1 knakahar router2_lan=$ROUTER2_LANIP6
161 1.1 knakahar router2_lan_mode="ipv6"
162 1.1 knakahar else
163 1.1 knakahar router1_lan=$ROUTER1_LANIP
164 1.1 knakahar router1_lan_mode="ipv4"
165 1.1 knakahar router2_lan=$ROUTER2_LANIP
166 1.1 knakahar router2_lan_mode="ipv4"
167 1.1 knakahar fi
168 1.1 knakahar
169 1.1 knakahar if [ ${outer} = "ipv6" ]; then
170 1.1 knakahar setup_router $SOCK1 ${router1_lan} ${router1_lan_mode} \
171 1.1 knakahar $ROUTER1_WANIP6 ipv6
172 1.1 knakahar setup_router $SOCK2 ${router2_lan} ${router2_lan_mode} \
173 1.1 knakahar $ROUTER2_WANIP6 ipv6
174 1.1 knakahar else
175 1.1 knakahar setup_router $SOCK1 ${router1_lan} ${router1_lan_mode} \
176 1.1 knakahar $ROUTER1_WANIP ipv4
177 1.1 knakahar setup_router $SOCK2 ${router2_lan} ${router2_lan_mode} \
178 1.1 knakahar $ROUTER2_WANIP ipv4
179 1.1 knakahar fi
180 1.1 knakahar }
181 1.1 knakahar
182 1.1 knakahar test_setup()
183 1.1 knakahar {
184 1.1 knakahar local inner=${1}
185 1.1 knakahar local outer=${2}
186 1.1 knakahar
187 1.1 knakahar local router1_lan=""
188 1.1 knakahar local router1_lan_mode=""
189 1.1 knakahar local router2_lan=""
190 1.1 knakahar local router2_lan_mode=""
191 1.1 knakahar if [ ${inner} = "ipv6" ]; then
192 1.1 knakahar router1_lan=$ROUTER1_LANIP6
193 1.1 knakahar router1_lan_mode="ipv6"
194 1.1 knakahar router2_lan=$ROUTER2_LANIP6
195 1.1 knakahar router2_lan_mode="ipv6"
196 1.1 knakahar else
197 1.1 knakahar router1_lan=$ROUTER1_LANIP
198 1.1 knakahar router1_lan_mode="ipv4"
199 1.1 knakahar router2_lan=$ROUTER2_LANIP
200 1.1 knakahar router2_lan_mode="ipv4"
201 1.1 knakahar fi
202 1.1 knakahar if [ ${outer} = "ipv6" ]; then
203 1.1 knakahar test_router $SOCK1 ${router1_lan} ${router1_lan_mode} \
204 1.1 knakahar $ROUTER1_WANIP6 ipv6
205 1.1 knakahar test_router $SOCK2 ${router2_lan} ${router2_lan_mode} \
206 1.1 knakahar $ROUTER2_WANIP6 ipv6
207 1.1 knakahar else
208 1.1 knakahar test_router $SOCK1 ${router1_lan} ${router1_lan_mode} \
209 1.1 knakahar $ROUTER1_WANIP ipv4
210 1.1 knakahar test_router $SOCK2 ${router2_lan} ${router2_lan_mode} \
211 1.1 knakahar $ROUTER2_WANIP ipv4
212 1.1 knakahar fi
213 1.1 knakahar }
214 1.1 knakahar
215 1.1 knakahar get_if_ipsec_unique()
216 1.1 knakahar {
217 1.1 knakahar local sock=${1}
218 1.1 knakahar local src=${2}
219 1.1 knakahar local proto=${3}
220 1.1 knakahar local unique=""
221 1.1 knakahar
222 1.1 knakahar export RUMP_SERVER=${sock}
223 1.1 knakahar unique=`$HIJACKING setkey -DP | grep -A2 "^${src}.*(${proto})$" | grep unique | sed 's/.*unique#//'`
224 1.1 knakahar unset RUMP_SERVER
225 1.1 knakahar
226 1.1 knakahar echo $unique
227 1.1 knakahar }
228 1.1 knakahar
229 1.1 knakahar setup_if_ipsec()
230 1.1 knakahar {
231 1.1 knakahar local sock=${1}
232 1.1 knakahar local addr=${2}
233 1.1 knakahar local remote=${3}
234 1.1 knakahar local inner=${4}
235 1.1 knakahar local src=${5}
236 1.1 knakahar local dst=${6}
237 1.1 knakahar local peernet=${7}
238 1.1 knakahar
239 1.1 knakahar export RUMP_SERVER=${sock}
240 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec0 create
241 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec0 tunnel ${src} ${dst}
242 1.1 knakahar if [ ${inner} = "ipv6" ]; then
243 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec0 inet6 ${addr}/128 ${remote}
244 1.1 knakahar atf_check -s exit:0 -o ignore rump.route add -inet6 ${peernet} ${addr}
245 1.1 knakahar else
246 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec0 inet ${addr}/32 ${remote}
247 1.1 knakahar atf_check -s exit:0 -o ignore rump.route add -inet ${peernet} ${addr}
248 1.1 knakahar fi
249 1.1 knakahar
250 1.1 knakahar rump.ifconfig ipsec0
251 1.1 knakahar rump.route -nL show
252 1.1 knakahar }
253 1.1 knakahar
254 1.1 knakahar setup_if_ipsec_sa()
255 1.1 knakahar {
256 1.1 knakahar local sock=${1}
257 1.1 knakahar local src=${2}
258 1.1 knakahar local dst=${3}
259 1.1 knakahar local mode=${4}
260 1.1 knakahar local proto=${5}
261 1.1 knakahar local algo=${6}
262 1.1 knakahar local dir=${7}
263 1.1 knakahar
264 1.1 knakahar local tmpfile=./tmp
265 1.1 knakahar local inunique=""
266 1.1 knakahar local outunique=""
267 1.1 knakahar local inid=""
268 1.1 knakahar local outid=""
269 1.1 knakahar local algo_args="$(generate_algo_args $proto $algo)"
270 1.1 knakahar
271 1.1 knakahar inunique=`get_if_ipsec_unique ${sock} ${dst} ${mode}`
272 1.1 knakahar outunique=`get_if_ipsec_unique ${sock} ${src} ${mode}`
273 1.1 knakahar
274 1.1 knakahar if [ ${dir} = "1to2" ] ; then
275 1.1 knakahar if [ ${mode} = "ipv6" ] ; then
276 1.1 knakahar inid="10010"
277 1.1 knakahar outid="10011"
278 1.1 knakahar else
279 1.1 knakahar inid="10000"
280 1.1 knakahar outid="10001"
281 1.1 knakahar fi
282 1.1 knakahar else
283 1.1 knakahar if [ ${mode} = "ipv6" ] ; then
284 1.1 knakahar inid="10011"
285 1.1 knakahar outid="10010"
286 1.1 knakahar else
287 1.1 knakahar inid="10001"
288 1.1 knakahar outid="10000"
289 1.1 knakahar fi
290 1.1 knakahar fi
291 1.1 knakahar
292 1.1 knakahar cat > $tmpfile <<-EOF
293 1.1 knakahar add $dst $src $proto $inid -u $inunique $algo_args;
294 1.1 knakahar add $src $dst $proto $outid -u $outunique $algo_args;
295 1.1 knakahar EOF
296 1.1 knakahar $DEBUG && cat $tmpfile
297 1.1 knakahar export RUMP_SERVER=$sock
298 1.1 knakahar atf_check -s exit:0 -o empty $HIJACKING setkey -c < $tmpfile
299 1.1 knakahar $DEBUG && $HIJACKING setkey -D
300 1.1 knakahar $DEBUG && $HIJACKING setkey -DP
301 1.1 knakahar unset RUMP_SERVER
302 1.1 knakahar }
303 1.1 knakahar
304 1.1 knakahar setup_tunnel()
305 1.1 knakahar {
306 1.1 knakahar local inner=${1}
307 1.1 knakahar local outer=${2}
308 1.1 knakahar local proto=${3}
309 1.1 knakahar local algo=${4}
310 1.1 knakahar
311 1.1 knakahar local addr=""
312 1.1 knakahar local remote=""
313 1.1 knakahar local src=""
314 1.1 knakahar local dst=""
315 1.1 knakahar local peernet=""
316 1.1 knakahar
317 1.1 knakahar if [ ${inner} = "ipv6" ]; then
318 1.1 knakahar addr=$ROUTER1_IPSECIP6
319 1.1 knakahar remote=$ROUTER2_IPSECIP6
320 1.1 knakahar peernet=$ROUTER2_LANNET6
321 1.1 knakahar else
322 1.1 knakahar addr=$ROUTER1_IPSECIP
323 1.1 knakahar remote=$ROUTER2_IPSECIP
324 1.1 knakahar peernet=$ROUTER2_LANNET
325 1.1 knakahar fi
326 1.1 knakahar if [ ${outer} = "ipv6" ]; then
327 1.1 knakahar src=$ROUTER1_WANIP6
328 1.1 knakahar dst=$ROUTER2_WANIP6
329 1.1 knakahar else
330 1.1 knakahar src=$ROUTER1_WANIP
331 1.1 knakahar dst=$ROUTER2_WANIP
332 1.1 knakahar fi
333 1.1 knakahar setup_if_ipsec $SOCK1 ${addr} ${remote} ${inner} \
334 1.1 knakahar ${src} ${dst} ${peernet}
335 1.1 knakahar
336 1.1 knakahar if [ $inner = "ipv6" -a $outer = "ipv4" ]; then
337 1.1 knakahar setup_if_ipsec_sa $SOCK1 ${src} ${dst} ${outer} ${proto} ${algo} "1to2"
338 1.1 knakahar fi
339 1.1 knakahar setup_if_ipsec_sa $SOCK1 ${src} ${dst} ${inner} ${proto} ${algo} "1to2"
340 1.1 knakahar
341 1.1 knakahar if [ $inner = "ipv6" ]; then
342 1.1 knakahar addr=$ROUTER2_IPSECIP6
343 1.1 knakahar remote=$ROUTER1_IPSECIP6
344 1.1 knakahar peernet=$ROUTER1_LANNET6
345 1.1 knakahar else
346 1.1 knakahar addr=$ROUTER2_IPSECIP
347 1.1 knakahar remote=$ROUTER1_IPSECIP
348 1.1 knakahar peernet=$ROUTER1_LANNET
349 1.1 knakahar fi
350 1.1 knakahar if [ $outer = "ipv6" ]; then
351 1.1 knakahar src=$ROUTER2_WANIP6
352 1.1 knakahar dst=$ROUTER1_WANIP6
353 1.1 knakahar else
354 1.1 knakahar src=$ROUTER2_WANIP
355 1.1 knakahar dst=$ROUTER1_WANIP
356 1.1 knakahar fi
357 1.1 knakahar setup_if_ipsec $SOCK2 ${addr} ${remote} ${inner} \
358 1.1 knakahar ${src} ${dst} ${peernet} ${proto} ${algo}
359 1.1 knakahar if [ $inner = "ipv6" -a $outer = "ipv4" ]; then
360 1.1 knakahar setup_if_ipsec_sa $SOCK2 ${src} ${dst} ${outer} ${proto} ${algo} "2to1"
361 1.1 knakahar fi
362 1.1 knakahar setup_if_ipsec_sa $SOCK2 ${src} ${dst} ${inner} ${proto} ${algo} "2to1"
363 1.1 knakahar }
364 1.1 knakahar
365 1.1 knakahar test_setup_tunnel()
366 1.1 knakahar {
367 1.1 knakahar local mode=${1}
368 1.1 knakahar
369 1.1 knakahar local peernet=""
370 1.1 knakahar local opt=""
371 1.1 knakahar if [ ${mode} = "ipv6" ]; then
372 1.1 knakahar peernet=$ROUTER2_LANNET6
373 1.1 knakahar opt="-inet6"
374 1.1 knakahar else
375 1.1 knakahar peernet=$ROUTER2_LANNET
376 1.1 knakahar opt="-inet"
377 1.1 knakahar fi
378 1.1 knakahar export RUMP_SERVER=$SOCK1
379 1.1 knakahar atf_check -s exit:0 -o match:ipsec0 rump.ifconfig
380 1.1 knakahar atf_check -s exit:0 -o match:ipsec0 rump.route -nL get ${opt} ${peernet}
381 1.1 knakahar
382 1.1 knakahar if [ ${mode} = "ipv6" ]; then
383 1.1 knakahar peernet=$ROUTER1_LANNET6
384 1.1 knakahar opt="-inet6"
385 1.1 knakahar else
386 1.1 knakahar peernet=$ROUTER1_LANNET
387 1.1 knakahar opt="-inet"
388 1.1 knakahar fi
389 1.1 knakahar export RUMP_SERVER=$SOCK2
390 1.1 knakahar atf_check -s exit:0 -o match:ipsec0 rump.ifconfig
391 1.1 knakahar atf_check -s exit:0 -o match:ipsec0 rump.route -nL get ${opt} ${peernet}
392 1.1 knakahar }
393 1.1 knakahar
394 1.1 knakahar teardown_tunnel()
395 1.1 knakahar {
396 1.1 knakahar export RUMP_SERVER=$SOCK1
397 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec0 deletetunnel
398 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec0 destroy
399 1.1 knakahar $HIJACKING setkey -F
400 1.1 knakahar
401 1.1 knakahar export RUMP_SERVER=$SOCK2
402 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec0 deletetunnel
403 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec0 destroy
404 1.1 knakahar $HIJACKING setkey -F
405 1.1 knakahar
406 1.1 knakahar unset RUMP_SERVER
407 1.1 knakahar }
408 1.1 knakahar
409 1.1 knakahar setup_dummy_if_ipsec()
410 1.1 knakahar {
411 1.1 knakahar local sock=${1}
412 1.1 knakahar local addr=${2}
413 1.1 knakahar local remote=${3}
414 1.1 knakahar local inner=${4}
415 1.1 knakahar local src=${5}
416 1.1 knakahar local dst=${6}
417 1.1 knakahar
418 1.1 knakahar export RUMP_SERVER=${sock}
419 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec1 create
420 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec1 tunnel ${src} ${dst}
421 1.1 knakahar if [ ${inner} = "ipv6" ]; then
422 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec1 inet6 ${addr}/128 ${remote}
423 1.1 knakahar else
424 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec1 inet ${addr}/32 ${remote}
425 1.1 knakahar fi
426 1.1 knakahar
427 1.1 knakahar rump.ifconfig ipsec1
428 1.1 knakahar unset RUMP_SERVER
429 1.1 knakahar }
430 1.1 knakahar
431 1.1 knakahar setup_dummy_if_ipsec_sa()
432 1.1 knakahar {
433 1.1 knakahar local sock=${1}
434 1.1 knakahar local src=${2}
435 1.1 knakahar local dst=${3}
436 1.1 knakahar local mode=${4}
437 1.1 knakahar local proto=${5}
438 1.1 knakahar local algo=${6}
439 1.1 knakahar local dir=${7}
440 1.1 knakahar
441 1.1 knakahar local tmpfile=./tmp
442 1.1 knakahar local inunique=""
443 1.1 knakahar local outunique=""
444 1.1 knakahar local inid=""
445 1.1 knakahar local outid=""
446 1.1 knakahar local algo_args="$(generate_algo_args $proto $algo)"
447 1.1 knakahar
448 1.1 knakahar inunique=`get_if_ipsec_unique ${sock} ${dst} ${mode}`
449 1.1 knakahar outunique=`get_if_ipsec_unique ${sock} ${src} ${mode}`
450 1.1 knakahar
451 1.1 knakahar if [ ${dir} = "1to2" ] ; then
452 1.1 knakahar inid="20000"
453 1.1 knakahar outid="20001"
454 1.1 knakahar else
455 1.1 knakahar inid="20001"
456 1.1 knakahar outid="20000"
457 1.1 knakahar fi
458 1.1 knakahar
459 1.1 knakahar cat > $tmpfile <<-EOF
460 1.1 knakahar add $dst $src $proto $inid -u $inunique $algo_args;
461 1.1 knakahar add $src $dst $proto $outid -u $outunique $algo_args;
462 1.1 knakahar EOF
463 1.1 knakahar $DEBUG && cat $tmpfile
464 1.1 knakahar export RUMP_SERVER=$sock
465 1.1 knakahar atf_check -s exit:0 -o empty $HIJACKING setkey -c < $tmpfile
466 1.1 knakahar $DEBUG && $HIJACKING setkey -D
467 1.1 knakahar $DEBUG && $HIJACKING setkey -DP
468 1.1 knakahar unset RUMP_SERVER
469 1.1 knakahar }
470 1.1 knakahar
471 1.1 knakahar setup_dummy_tunnel()
472 1.1 knakahar {
473 1.1 knakahar local inner=${1}
474 1.1 knakahar local outer=${2}
475 1.1 knakahar local proto=${3}
476 1.1 knakahar local algo=${4}
477 1.1 knakahar
478 1.1 knakahar local addr=""
479 1.1 knakahar local remote=""
480 1.1 knakahar local src=""
481 1.1 knakahar local dst=""
482 1.1 knakahar
483 1.1 knakahar if [ ${inner} = "ipv6" ]; then
484 1.1 knakahar addr=$ROUTER1_IPSECIP6_DUMMY
485 1.1 knakahar remote=$ROUTER2_IPSECIP6_DUMMY
486 1.1 knakahar else
487 1.1 knakahar addr=$ROUTER1_IPSECIP_DUMMY
488 1.1 knakahar remote=$ROUTER2_IPSECIP_DUMMY
489 1.1 knakahar fi
490 1.1 knakahar if [ ${outer} = "ipv6" ]; then
491 1.1 knakahar src=$ROUTER1_WANIP6_DUMMY
492 1.1 knakahar dst=$ROUTER2_WANIP6_DUMMY
493 1.1 knakahar else
494 1.1 knakahar src=$ROUTER1_WANIP_DUMMY
495 1.1 knakahar dst=$ROUTER2_WANIP_DUMMY
496 1.1 knakahar fi
497 1.1 knakahar setup_dummy_if_ipsec $SOCK1 ${addr} ${remote} ${inner} \
498 1.1 knakahar ${src} ${dst} ${proto} ${algo} "1to2"
499 1.1 knakahar setup_dummy_if_ipsec_sa $SOCK1 ${src} ${dst} ${inner} ${proto} ${algo} "1to2"
500 1.1 knakahar
501 1.1 knakahar if [ $inner = "ipv6" ]; then
502 1.1 knakahar addr=$ROUTER2_IPSECIP6_DUMMY
503 1.1 knakahar remote=$ROUTER1_IPSECIP6_DUMMY
504 1.1 knakahar else
505 1.1 knakahar addr=$ROUTER2_IPSECIP_DUMMY
506 1.1 knakahar remote=$ROUTER1_IPSECIP_DUMMY
507 1.1 knakahar fi
508 1.1 knakahar if [ $outer = "ipv6" ]; then
509 1.1 knakahar src=$ROUTER2_WANIP6_DUMMY
510 1.1 knakahar dst=$ROUTER1_WANIP6_DUMMY
511 1.1 knakahar else
512 1.1 knakahar src=$ROUTER2_WANIP_DUMMY
513 1.1 knakahar dst=$ROUTER1_WANIP_DUMMY
514 1.1 knakahar fi
515 1.1 knakahar setup_dummy_if_ipsec $SOCK2 ${addr} ${remote} ${inner} \
516 1.1 knakahar ${src} ${dst} ${proto} ${algo} "2to1"
517 1.1 knakahar setup_dummy_if_ipsec_sa $SOCK2 ${src} ${dst} ${inner} ${proto} ${algo} "2to1"
518 1.1 knakahar }
519 1.1 knakahar
520 1.1 knakahar test_setup_dummy_tunnel()
521 1.1 knakahar {
522 1.1 knakahar export RUMP_SERVER=$SOCK1
523 1.1 knakahar atf_check -s exit:0 -o match:ipsec1 rump.ifconfig
524 1.1 knakahar
525 1.1 knakahar export RUMP_SERVER=$SOCK2
526 1.1 knakahar atf_check -s exit:0 -o match:ipsec1 rump.ifconfig
527 1.1 knakahar
528 1.1 knakahar unset RUMP_SERVER
529 1.1 knakahar }
530 1.1 knakahar
531 1.1 knakahar teardown_dummy_tunnel()
532 1.1 knakahar {
533 1.1 knakahar export RUMP_SERVER=$SOCK1
534 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec1 deletetunnel
535 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec1 destroy
536 1.1 knakahar
537 1.1 knakahar export RUMP_SERVER=$SOCK2
538 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec1 deletetunnel
539 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec1 destroy
540 1.1 knakahar
541 1.1 knakahar unset RUMP_SERVER
542 1.1 knakahar }
543 1.1 knakahar
544 1.1 knakahar setup_recursive_if_ipsec()
545 1.1 knakahar {
546 1.1 knakahar local sock=${1}
547 1.1 knakahar local ipsec=${2}
548 1.1 knakahar local addr=${3}
549 1.1 knakahar local remote=${4}
550 1.1 knakahar local inner=${5}
551 1.1 knakahar local src=${6}
552 1.1 knakahar local dst=${7}
553 1.1 knakahar local proto=${8}
554 1.1 knakahar local algo=${9}
555 1.1 knakahar local dir=${10}
556 1.1 knakahar
557 1.1 knakahar export RUMP_SERVER=${sock}
558 1.1 knakahar atf_check -s exit:0 rump.ifconfig ${ipsec} create
559 1.1 knakahar atf_check -s exit:0 rump.ifconfig ${ipsec} tunnel ${src} ${dst}
560 1.1 knakahar if [ ${inner} = "ipv6" ]; then
561 1.1 knakahar atf_check -s exit:0 rump.ifconfig ${ipsec} inet6 ${addr}/128 ${remote}
562 1.1 knakahar else
563 1.1 knakahar atf_check -s exit:0 rump.ifconfig ${ipsec} inet ${addr}/32 ${remote}
564 1.1 knakahar fi
565 1.1 knakahar setup_if_ipsec_sa $sock ${src} ${dst} ${inner} ${proto} ${algo} ${dir}
566 1.1 knakahar
567 1.1 knakahar export RUMP_SERVER=${sock}
568 1.1 knakahar rump.ifconfig ${ipsec}
569 1.1 knakahar unset RUMP_SERVER
570 1.1 knakahar }
571 1.1 knakahar
572 1.1 knakahar # test in ROUTER1 only
573 1.1 knakahar setup_recursive_tunnels()
574 1.1 knakahar {
575 1.1 knakahar local mode=${1}
576 1.1 knakahar local proto=${2}
577 1.1 knakahar local algo=${3}
578 1.1 knakahar
579 1.1 knakahar local addr=""
580 1.1 knakahar local remote=""
581 1.1 knakahar local src=""
582 1.1 knakahar local dst=""
583 1.1 knakahar
584 1.1 knakahar if [ ${mode} = "ipv6" ]; then
585 1.1 knakahar addr=$ROUTER1_IPSECIP6_RECURSIVE1
586 1.1 knakahar remote=$ROUTER2_IPSECIP6_RECURSIVE1
587 1.1 knakahar src=$ROUTER1_IPSECIP6
588 1.1 knakahar dst=$ROUTER2_IPSECIP6
589 1.1 knakahar else
590 1.1 knakahar addr=$ROUTER1_IPSECIP_RECURSIVE1
591 1.1 knakahar remote=$ROUTER2_IPSECIP_RECURSIVE1
592 1.1 knakahar src=$ROUTER1_IPSECIP
593 1.1 knakahar dst=$ROUTER2_IPSECIP
594 1.1 knakahar fi
595 1.1 knakahar setup_recursive_if_ipsec $SOCK1 ipsec1 ${addr} ${remote} ${mode} \
596 1.1 knakahar ${src} ${dst} ${proto} ${algo} "1to2"
597 1.1 knakahar
598 1.1 knakahar if [ ${mode} = "ipv6" ]; then
599 1.1 knakahar addr=$ROUTER1_IPSECIP6_RECURSIVE2
600 1.1 knakahar remote=$ROUTER2_IPSECIP6_RECURSIVE2
601 1.1 knakahar src=$ROUTER1_IPSECIP6_RECURSIVE1
602 1.1 knakahar dst=$ROUTER2_IPSECIP6_RECURSIVE1
603 1.1 knakahar else
604 1.1 knakahar addr=$ROUTER1_IPSECIP_RECURSIVE2
605 1.1 knakahar remote=$ROUTER2_IPSECIP_RECURSIVE2
606 1.1 knakahar src=$ROUTER1_IPSECIP_RECURSIVE1
607 1.1 knakahar dst=$ROUTER2_IPSECIP_RECURSIVE1
608 1.1 knakahar fi
609 1.1 knakahar setup_recursive_if_ipsec $SOCK1 ipsec2 ${addr} ${remote} ${mode} \
610 1.1 knakahar ${src} ${dst} ${proto} ${algo} "1to2"
611 1.1 knakahar }
612 1.1 knakahar
613 1.1 knakahar # test in router1 only
614 1.1 knakahar test_recursive_check()
615 1.1 knakahar {
616 1.1 knakahar local mode=$1
617 1.1 knakahar
618 1.1 knakahar export RUMP_SERVER=$SOCK1
619 1.1 knakahar if [ ${mode} = "ipv6" ]; then
620 1.1 knakahar atf_check -s not-exit:0 -o ignore -e ignore \
621 1.1 knakahar rump.ping6 -n -X $TIMEOUT -c 1 $ROUTER2_IPSECIP6_RECURSIVE2
622 1.1 knakahar else
623 1.1 knakahar atf_check -s not-exit:0 -o ignore -e ignore \
624 1.1 knakahar rump.ping -n -w $TIMEOUT -c 1 $ROUTER2_IPSECIP_RECURSIVE2
625 1.1 knakahar fi
626 1.1 knakahar
627 1.1 knakahar atf_check -o match:'ipsec0: recursively called too many times' \
628 1.1 knakahar -x "$HIJACKING dmesg"
629 1.1 knakahar
630 1.1 knakahar $HIJACKING dmesg
631 1.1 knakahar
632 1.1 knakahar unset RUMP_SERVER
633 1.1 knakahar }
634 1.1 knakahar
635 1.1 knakahar teardown_recursive_tunnels()
636 1.1 knakahar {
637 1.1 knakahar export RUMP_SERVER=$SOCK1
638 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec1 deletetunnel
639 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec1 destroy
640 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec2 deletetunnel
641 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec2 destroy
642 1.1 knakahar unset RUMP_SERVER
643 1.1 knakahar }
644 1.1 knakahar
645 1.1 knakahar test_ping_failure()
646 1.1 knakahar {
647 1.1 knakahar local mode=$1
648 1.1 knakahar
649 1.1 knakahar export RUMP_SERVER=$SOCK1
650 1.1 knakahar if [ ${mode} = "ipv6" ]; then
651 1.1 knakahar atf_check -s not-exit:0 -o ignore -e ignore \
652 1.1 knakahar rump.ping6 -n -X $TIMEOUT -c 1 -S $ROUTER1_LANIP6 \
653 1.1 knakahar $ROUTER2_LANIP6
654 1.1 knakahar else
655 1.1 knakahar atf_check -s not-exit:0 -o ignore -e ignore \
656 1.1 knakahar rump.ping -n -w $TIMEOUT -c 1 -I $ROUTER1_LANIP \
657 1.1 knakahar $ROUTER2_LANIP
658 1.1 knakahar fi
659 1.1 knakahar
660 1.1 knakahar export RUMP_SERVER=$SOCK2
661 1.1 knakahar if [ ${mode} = "ipv6" ]; then
662 1.1 knakahar atf_check -s not-exit:0 -o ignore -e ignore \
663 1.1 knakahar rump.ping6 -n -X $TIMEOUT -c 1 -S $ROUTER2_LANIP6 \
664 1.1 knakahar $ROUTER1_LANIP6
665 1.1 knakahar else
666 1.1 knakahar atf_check -s not-exit:0 -o ignore -e ignore \
667 1.1 knakahar rump.ping -n -w $TIMEOUT -c 1 -I $ROUTER1_LANIP \
668 1.1 knakahar $ROUTER2_LANIP
669 1.1 knakahar fi
670 1.1 knakahar
671 1.1 knakahar unset RUMP_SERVER
672 1.1 knakahar }
673 1.1 knakahar
674 1.1 knakahar test_ping_success()
675 1.1 knakahar {
676 1.1 knakahar mode=$1
677 1.1 knakahar
678 1.1 knakahar export RUMP_SERVER=$SOCK1
679 1.1 knakahar rump.ifconfig -v ipsec0
680 1.1 knakahar if [ ${mode} = "ipv6" ]; then
681 1.1 knakahar # XXX
682 1.1 knakahar # rump.ping6 rarely fails with the message that
683 1.1 knakahar # "failed to get receiving hop limit".
684 1.1 knakahar # This is a known issue being analyzed.
685 1.1 knakahar atf_check -s exit:0 -o ignore \
686 1.1 knakahar rump.ping6 -n -X $TIMEOUT -c 1 -S $ROUTER1_LANIP6 \
687 1.1 knakahar $ROUTER2_LANIP6
688 1.1 knakahar else
689 1.1 knakahar atf_check -s exit:0 -o ignore \
690 1.1 knakahar rump.ping -n -w $TIMEOUT -c 1 -I $ROUTER1_LANIP \
691 1.1 knakahar $ROUTER2_LANIP
692 1.1 knakahar fi
693 1.1 knakahar rump.ifconfig -v ipsec0
694 1.1 knakahar
695 1.1 knakahar export RUMP_SERVER=$SOCK2
696 1.1 knakahar rump.ifconfig -v ipsec0
697 1.1 knakahar if [ ${mode} = "ipv6" ]; then
698 1.1 knakahar atf_check -s exit:0 -o ignore \
699 1.1 knakahar rump.ping6 -n -X $TIMEOUT -c 1 -S $ROUTER2_LANIP6 \
700 1.1 knakahar $ROUTER1_LANIP6
701 1.1 knakahar else
702 1.1 knakahar atf_check -s exit:0 -o ignore \
703 1.1 knakahar rump.ping -n -w $TIMEOUT -c 1 -I $ROUTER2_LANIP \
704 1.1 knakahar $ROUTER1_LANIP
705 1.1 knakahar fi
706 1.1 knakahar rump.ifconfig -v ipsec0
707 1.1 knakahar
708 1.1 knakahar unset RUMP_SERVER
709 1.1 knakahar }
710 1.1 knakahar
711 1.1 knakahar test_change_tunnel_duplicate()
712 1.1 knakahar {
713 1.1 knakahar local mode=$1
714 1.1 knakahar
715 1.1 knakahar local newsrc=""
716 1.1 knakahar local newdst=""
717 1.1 knakahar if [ ${mode} = "ipv6" ]; then
718 1.1 knakahar newsrc=$ROUTER1_WANIP6_DUMMY
719 1.1 knakahar newdst=$ROUTER2_WANIP6_DUMMY
720 1.1 knakahar else
721 1.1 knakahar newsrc=$ROUTER1_WANIP_DUMMY
722 1.1 knakahar newdst=$ROUTER2_WANIP_DUMMY
723 1.1 knakahar fi
724 1.1 knakahar export RUMP_SERVER=$SOCK1
725 1.1 knakahar rump.ifconfig -v ipsec0
726 1.1 knakahar rump.ifconfig -v ipsec1
727 1.1 knakahar atf_check -s exit:0 -e match:SIOCSLIFPHYADDR \
728 1.1 knakahar rump.ifconfig ipsec0 tunnel ${newsrc} ${newdst}
729 1.1 knakahar rump.ifconfig -v ipsec0
730 1.1 knakahar rump.ifconfig -v ipsec1
731 1.1 knakahar
732 1.1 knakahar if [ ${mode} = "ipv6" ]; then
733 1.1 knakahar newsrc=$ROUTER2_WANIP6_DUMMY
734 1.1 knakahar newdst=$ROUTER1_WANIP6_DUMMY
735 1.1 knakahar else
736 1.1 knakahar newsrc=$ROUTER2_WANIP_DUMMY
737 1.1 knakahar newdst=$ROUTER1_WANIP_DUMMY
738 1.1 knakahar fi
739 1.1 knakahar export RUMP_SERVER=$SOCK2
740 1.1 knakahar rump.ifconfig -v ipsec0
741 1.1 knakahar rump.ifconfig -v ipsec1
742 1.1 knakahar atf_check -s exit:0 -e match:SIOCSLIFPHYADDR \
743 1.1 knakahar rump.ifconfig ipsec0 tunnel ${newsrc} ${newdst}
744 1.1 knakahar rump.ifconfig -v ipsec0
745 1.1 knakahar rump.ifconfig -v ipsec1
746 1.1 knakahar
747 1.1 knakahar unset RUMP_SERVER
748 1.1 knakahar }
749 1.1 knakahar
750 1.1 knakahar test_change_tunnel_success()
751 1.1 knakahar {
752 1.1 knakahar local mode=$1
753 1.1 knakahar
754 1.1 knakahar local newsrc=""
755 1.1 knakahar local newdst=""
756 1.1 knakahar if [ ${mode} = "ipv6" ]; then
757 1.1 knakahar newsrc=$ROUTER1_WANIP6_DUMMY
758 1.1 knakahar newdst=$ROUTER2_WANIP6_DUMMY
759 1.1 knakahar else
760 1.1 knakahar newsrc=$ROUTER1_WANIP_DUMMY
761 1.1 knakahar newdst=$ROUTER2_WANIP_DUMMY
762 1.1 knakahar fi
763 1.1 knakahar export RUMP_SERVER=$SOCK1
764 1.1 knakahar rump.ifconfig -v ipsec0
765 1.1 knakahar atf_check -s exit:0 \
766 1.1 knakahar rump.ifconfig ipsec0 tunnel ${newsrc} ${newdst}
767 1.1 knakahar rump.ifconfig -v ipsec0
768 1.1 knakahar
769 1.1 knakahar if [ ${mode} = "ipv6" ]; then
770 1.1 knakahar newsrc=$ROUTER2_WANIP6_DUMMY
771 1.1 knakahar newdst=$ROUTER1_WANIP6_DUMMY
772 1.1 knakahar else
773 1.1 knakahar newsrc=$ROUTER2_WANIP_DUMMY
774 1.1 knakahar newdst=$ROUTER1_WANIP_DUMMY
775 1.1 knakahar fi
776 1.1 knakahar export RUMP_SERVER=$SOCK2
777 1.1 knakahar rump.ifconfig -v ipsec0
778 1.1 knakahar atf_check -s exit:0 \
779 1.1 knakahar rump.ifconfig ipsec0 tunnel ${newsrc} ${newdst}
780 1.1 knakahar rump.ifconfig -v ipsec0
781 1.1 knakahar
782 1.1 knakahar unset RUMP_SERVER
783 1.1 knakahar }
784 1.1 knakahar
785 1.1 knakahar basic_setup()
786 1.1 knakahar {
787 1.1 knakahar local inner=$1
788 1.1 knakahar local outer=$2
789 1.1 knakahar local proto=$3
790 1.1 knakahar local algo=$4
791 1.1 knakahar
792 1.1 knakahar setup ${inner} ${outer}
793 1.1 knakahar test_setup ${inner} ${outer}
794 1.1 knakahar
795 1.1 knakahar # Enable once PR kern/49219 is fixed
796 1.1 knakahar #test_ping_failure
797 1.1 knakahar
798 1.1 knakahar setup_tunnel ${inner} ${outer} ${proto} ${algo}
799 1.1 knakahar sleep 1
800 1.1 knakahar test_setup_tunnel ${inner}
801 1.1 knakahar }
802 1.1 knakahar
803 1.1 knakahar basic_test()
804 1.1 knakahar {
805 1.1 knakahar local inner=$1
806 1.1 knakahar local outer=$2 # not use
807 1.1 knakahar
808 1.1 knakahar test_ping_success ${inner}
809 1.1 knakahar }
810 1.1 knakahar
811 1.1 knakahar basic_teardown()
812 1.1 knakahar {
813 1.1 knakahar local inner=$1
814 1.1 knakahar local outer=$2 # not use
815 1.1 knakahar
816 1.1 knakahar teardown_tunnel
817 1.1 knakahar test_ping_failure ${inner}
818 1.1 knakahar }
819 1.1 knakahar
820 1.1 knakahar ioctl_setup()
821 1.1 knakahar {
822 1.1 knakahar local inner=$1
823 1.1 knakahar local outer=$2
824 1.1 knakahar local proto=$3
825 1.1 knakahar local algo=$4
826 1.1 knakahar
827 1.1 knakahar setup ${inner} ${outer}
828 1.1 knakahar test_setup ${inner} ${outer}
829 1.1 knakahar
830 1.1 knakahar # Enable once PR kern/49219 is fixed
831 1.1 knakahar #test_ping_failure
832 1.1 knakahar
833 1.1 knakahar setup_tunnel ${inner} ${outer} ${proto} ${algo}
834 1.1 knakahar setup_dummy_tunnel ${inner} ${outer} ${proto} ${algo}
835 1.1 knakahar sleep 1
836 1.1 knakahar test_setup_tunnel ${inner}
837 1.1 knakahar }
838 1.1 knakahar
839 1.1 knakahar ioctl_test()
840 1.1 knakahar {
841 1.1 knakahar local inner=$1
842 1.1 knakahar local outer=$2
843 1.1 knakahar
844 1.1 knakahar test_ping_success ${inner}
845 1.1 knakahar
846 1.1 knakahar test_change_tunnel_duplicate ${outer}
847 1.1 knakahar
848 1.1 knakahar teardown_dummy_tunnel
849 1.1 knakahar test_change_tunnel_success ${outer}
850 1.1 knakahar }
851 1.1 knakahar
852 1.1 knakahar ioctl_teardown()
853 1.1 knakahar {
854 1.1 knakahar local inner=$1
855 1.1 knakahar local outer=$2 # not use
856 1.1 knakahar
857 1.1 knakahar teardown_tunnel
858 1.1 knakahar test_ping_failure ${inner}
859 1.1 knakahar }
860 1.1 knakahar
861 1.1 knakahar recursive_setup()
862 1.1 knakahar {
863 1.1 knakahar local inner=$1
864 1.1 knakahar local outer=$2
865 1.1 knakahar local proto=$3
866 1.1 knakahar local algo=$4
867 1.1 knakahar
868 1.1 knakahar setup ${inner} ${outer}
869 1.1 knakahar test_setup ${inner} ${outer}
870 1.1 knakahar
871 1.1 knakahar # Enable once PR kern/49219 is fixed
872 1.1 knakahar #test_ping_failure
873 1.1 knakahar
874 1.1 knakahar setup_tunnel ${inner} ${outer} ${proto} ${algo}
875 1.1 knakahar setup_recursive_tunnels ${inner} ${proto} ${algo}
876 1.1 knakahar sleep 1
877 1.1 knakahar test_setup_tunnel ${inner}
878 1.1 knakahar }
879 1.1 knakahar
880 1.1 knakahar recursive_test()
881 1.1 knakahar {
882 1.1 knakahar local inner=$1
883 1.1 knakahar local outer=$2 # not use
884 1.1 knakahar
885 1.1 knakahar test_recursive_check ${inner}
886 1.1 knakahar }
887 1.1 knakahar
888 1.1 knakahar recursive_teardown()
889 1.1 knakahar {
890 1.1 knakahar local inner=$1 # not use
891 1.1 knakahar local outer=$2 # not use
892 1.1 knakahar
893 1.1 knakahar teardown_recursive_tunnels
894 1.1 knakahar teardown_tunnel
895 1.1 knakahar }
896 1.1 knakahar
897 1.1 knakahar add_test()
898 1.1 knakahar {
899 1.1 knakahar local category=$1
900 1.1 knakahar local desc=$2
901 1.1 knakahar local inner=$3
902 1.1 knakahar local outer=$4
903 1.1 knakahar local proto=$5
904 1.1 knakahar local algo=$6
905 1.1 knakahar local _algo=$(echo $algo | sed 's/-//g')
906 1.1 knakahar
907 1.2 ozaki name="ipsecif_${category}_${inner}over${outer}_${proto}_${_algo}"
908 1.1 knakahar fulldesc="Does ${inner} over ${outer} if_ipsec ${desc}"
909 1.1 knakahar
910 1.1 knakahar atf_test_case ${name} cleanup
911 1.1 knakahar eval "${name}_head() {
912 1.1 knakahar atf_set descr \"${fulldesc}\"
913 1.1 knakahar atf_set require.progs rump_server setkey
914 1.1 knakahar }
915 1.1 knakahar ${name}_body() {
916 1.1 knakahar ${category}_setup ${inner} ${outer} ${proto} ${algo}
917 1.1 knakahar ${category}_test ${inner} ${outer}
918 1.1 knakahar ${category}_teardown ${inner} ${outer}
919 1.1 knakahar rump_server_destroy_ifaces
920 1.1 knakahar }
921 1.1 knakahar ${name}_cleanup() {
922 1.1 knakahar \$DEBUG && dump
923 1.1 knakahar cleanup
924 1.1 knakahar }"
925 1.1 knakahar atf_add_test_case ${name}
926 1.1 knakahar }
927 1.1 knakahar
928 1.1 knakahar add_test_allproto()
929 1.1 knakahar {
930 1.1 knakahar local category=$1
931 1.1 knakahar local desc=$2
932 1.1 knakahar
933 1.1 knakahar for algo in $ESP_ENCRYPTION_ALGORITHMS_MINIMUM; do
934 1.1 knakahar add_test ${category} "${desc}" ipv4 ipv4 esp $algo
935 1.1 knakahar add_test ${category} "${desc}" ipv4 ipv6 esp $algo
936 1.1 knakahar add_test ${category} "${desc}" ipv6 ipv4 esp $algo
937 1.1 knakahar add_test ${category} "${desc}" ipv6 ipv6 esp $algo
938 1.1 knakahar done
939 1.1 knakahar
940 1.1 knakahar # ah does not support yet
941 1.1 knakahar }
942 1.1 knakahar
943 1.1 knakahar atf_init_test_cases()
944 1.1 knakahar {
945 1.3 ozaki
946 1.3 ozaki atf_add_test_case ipsecif_create_destroy
947 1.3 ozaki
948 1.1 knakahar add_test_allproto basic "basic tests"
949 1.1 knakahar add_test_allproto ioctl "ioctl tests"
950 1.1 knakahar add_test_allproto recursive "recursive check tests"
951 1.1 knakahar }
952