t_ipsec.sh revision 1.5 1 1.5 knakahar # $NetBSD: t_ipsec.sh,v 1.5 2018/12/25 03:28:29 knakahara Exp $
2 1.1 knakahar #
3 1.1 knakahar # Copyright (c) 2017 Internet Initiative Japan Inc.
4 1.1 knakahar # All rights reserved.
5 1.1 knakahar #
6 1.1 knakahar # Redistribution and use in source and binary forms, with or without
7 1.1 knakahar # modification, are permitted provided that the following conditions
8 1.1 knakahar # are met:
9 1.1 knakahar # 1. Redistributions of source code must retain the above copyright
10 1.1 knakahar # notice, this list of conditions and the following disclaimer.
11 1.1 knakahar # 2. Redistributions in binary form must reproduce the above copyright
12 1.1 knakahar # notice, this list of conditions and the following disclaimer in the
13 1.1 knakahar # documentation and/or other materials provided with the distribution.
14 1.1 knakahar #
15 1.1 knakahar # THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
16 1.1 knakahar # ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
17 1.1 knakahar # TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
18 1.1 knakahar # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
19 1.1 knakahar # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
20 1.1 knakahar # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
21 1.1 knakahar # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
22 1.1 knakahar # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
23 1.1 knakahar # CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
24 1.1 knakahar # ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
25 1.1 knakahar # POSSIBILITY OF SUCH DAMAGE.
26 1.1 knakahar #
27 1.1 knakahar
28 1.1 knakahar SOCK1=unix://commsock1 # for ROUTER1
29 1.1 knakahar SOCK2=unix://commsock2 # for ROUTER2
30 1.1 knakahar ROUTER1_LANIP=192.168.1.1
31 1.1 knakahar ROUTER1_LANNET=192.168.1.0/24
32 1.1 knakahar ROUTER1_WANIP=10.0.0.1
33 1.1 knakahar ROUTER1_IPSECIP=172.16.1.1
34 1.1 knakahar ROUTER1_WANIP_DUMMY=10.0.0.11
35 1.1 knakahar ROUTER1_IPSECIP_DUMMY=172.16.11.1
36 1.1 knakahar ROUTER1_IPSECIP_RECURSIVE1=172.16.101.1
37 1.1 knakahar ROUTER1_IPSECIP_RECURSIVE2=172.16.201.1
38 1.1 knakahar ROUTER2_LANIP=192.168.2.1
39 1.1 knakahar ROUTER2_LANNET=192.168.2.0/24
40 1.1 knakahar ROUTER2_WANIP=10.0.0.2
41 1.1 knakahar ROUTER2_IPSECIP=172.16.2.1
42 1.1 knakahar ROUTER2_WANIP_DUMMY=10.0.0.12
43 1.1 knakahar ROUTER2_IPSECIP_DUMMY=172.16.12.1
44 1.1 knakahar ROUTER2_IPSECIP_RECURSIVE1=172.16.102.1
45 1.1 knakahar ROUTER2_IPSECIP_RECURSIVE2=172.16.202.1
46 1.1 knakahar
47 1.1 knakahar ROUTER1_LANIP6=fc00:1::1
48 1.1 knakahar ROUTER1_LANNET6=fc00:1::/64
49 1.1 knakahar ROUTER1_WANIP6=fc00::1
50 1.1 knakahar ROUTER1_IPSECIP6=fc00:3::1
51 1.1 knakahar ROUTER1_WANIP6_DUMMY=fc00::11
52 1.1 knakahar ROUTER1_IPSECIP6_DUMMY=fc00:13::1
53 1.1 knakahar ROUTER1_IPSECIP6_RECURSIVE1=fc00:103::1
54 1.1 knakahar ROUTER1_IPSECIP6_RECURSIVE2=fc00:203::1
55 1.1 knakahar ROUTER2_LANIP6=fc00:2::1
56 1.1 knakahar ROUTER2_LANNET6=fc00:2::/64
57 1.1 knakahar ROUTER2_WANIP6=fc00::2
58 1.1 knakahar ROUTER2_IPSECIP6=fc00:4::1
59 1.1 knakahar ROUTER2_WANIP6_DUMMY=fc00::12
60 1.1 knakahar ROUTER2_IPSECIP6_DUMMY=fc00:14::1
61 1.1 knakahar ROUTER2_IPSECIP6_RECURSIVE1=fc00:104::1
62 1.1 knakahar ROUTER2_IPSECIP6_RECURSIVE2=fc00:204::1
63 1.1 knakahar
64 1.1 knakahar DEBUG=${DEBUG:-false}
65 1.1 knakahar TIMEOUT=7
66 1.1 knakahar
67 1.3 ozaki atf_test_case ipsecif_create_destroy cleanup
68 1.3 ozaki ipsecif_create_destroy_head()
69 1.3 ozaki {
70 1.3 ozaki
71 1.3 ozaki atf_set "descr" "Test creating/destroying gif interfaces"
72 1.3 ozaki atf_set "require.progs" "rump_server"
73 1.3 ozaki }
74 1.3 ozaki
75 1.3 ozaki ipsecif_create_destroy_body()
76 1.3 ozaki {
77 1.3 ozaki
78 1.3 ozaki rump_server_start $SOCK1 ipsec
79 1.3 ozaki
80 1.3 ozaki test_create_destroy_common $SOCK1 ipsec0
81 1.3 ozaki }
82 1.3 ozaki
83 1.3 ozaki ipsecif_create_destroy_cleanup()
84 1.3 ozaki {
85 1.3 ozaki
86 1.3 ozaki $DEBUG && dump
87 1.3 ozaki cleanup
88 1.3 ozaki }
89 1.3 ozaki
90 1.1 knakahar setup_router()
91 1.1 knakahar {
92 1.1 knakahar local sock=${1}
93 1.1 knakahar local lan=${2}
94 1.1 knakahar local lan_mode=${3}
95 1.1 knakahar local wan=${4}
96 1.1 knakahar local wan_mode=${5}
97 1.1 knakahar
98 1.1 knakahar rump_server_add_iface $sock shmif0 bus0
99 1.1 knakahar rump_server_add_iface $sock shmif1 bus1
100 1.1 knakahar
101 1.1 knakahar export RUMP_SERVER=${sock}
102 1.1 knakahar if [ ${lan_mode} = "ipv6" ]; then
103 1.1 knakahar atf_check -s exit:0 rump.ifconfig shmif0 inet6 ${lan}
104 1.1 knakahar else
105 1.1 knakahar atf_check -s exit:0 rump.ifconfig shmif0 inet ${lan} netmask 0xffffff00
106 1.1 knakahar fi
107 1.1 knakahar atf_check -s exit:0 rump.ifconfig shmif0 up
108 1.5 knakahar $DEBUG && rump.ifconfig shmif0
109 1.1 knakahar
110 1.1 knakahar if [ ${wan_mode} = "ipv6" ]; then
111 1.1 knakahar atf_check -s exit:0 rump.ifconfig shmif1 inet6 ${wan}
112 1.1 knakahar else
113 1.1 knakahar atf_check -s exit:0 rump.ifconfig shmif1 inet ${wan} netmask 0xff000000
114 1.1 knakahar fi
115 1.1 knakahar atf_check -s exit:0 rump.ifconfig shmif1 up
116 1.5 knakahar $DEBUG && rump.ifconfig shmif1
117 1.1 knakahar unset RUMP_SERVER
118 1.1 knakahar }
119 1.1 knakahar
120 1.1 knakahar test_router()
121 1.1 knakahar {
122 1.1 knakahar local sock=${1}
123 1.1 knakahar local lan=${2}
124 1.1 knakahar local lan_mode=${3}
125 1.1 knakahar local wan=${4}
126 1.1 knakahar local wan_mode=${5}
127 1.1 knakahar
128 1.1 knakahar export RUMP_SERVER=${sock}
129 1.1 knakahar atf_check -s exit:0 -o match:shmif0 rump.ifconfig
130 1.1 knakahar if [ ${lan_mode} = "ipv6" ]; then
131 1.1 knakahar atf_check -s exit:0 -o ignore rump.ping6 -n -c 1 -X $TIMEOUT ${lan}
132 1.1 knakahar else
133 1.1 knakahar atf_check -s exit:0 -o ignore rump.ping -n -c 1 -w $TIMEOUT ${lan}
134 1.1 knakahar fi
135 1.1 knakahar
136 1.1 knakahar atf_check -s exit:0 -o match:shmif1 rump.ifconfig
137 1.1 knakahar if [ ${wan_mode} = "ipv6" ]; then
138 1.1 knakahar atf_check -s exit:0 -o ignore rump.ping6 -n -c 1 -X $TIMEOUT ${wan}
139 1.1 knakahar else
140 1.1 knakahar atf_check -s exit:0 -o ignore rump.ping -n -c 1 -w $TIMEOUT ${wan}
141 1.1 knakahar fi
142 1.1 knakahar unset RUMP_SERVER
143 1.1 knakahar }
144 1.1 knakahar
145 1.1 knakahar setup()
146 1.1 knakahar {
147 1.1 knakahar local inner=${1}
148 1.1 knakahar local outer=${2}
149 1.1 knakahar
150 1.1 knakahar rump_server_crypto_start $SOCK1 netipsec netinet6 ipsec
151 1.1 knakahar rump_server_crypto_start $SOCK2 netipsec netinet6 ipsec
152 1.1 knakahar
153 1.1 knakahar router1_lan=""
154 1.1 knakahar router1_lan_mode=""
155 1.1 knakahar router2_lan=""
156 1.1 knakahar router2_lan_mode=""
157 1.1 knakahar if [ ${inner} = "ipv6" ]; then
158 1.1 knakahar router1_lan=$ROUTER1_LANIP6
159 1.1 knakahar router1_lan_mode="ipv6"
160 1.1 knakahar router2_lan=$ROUTER2_LANIP6
161 1.1 knakahar router2_lan_mode="ipv6"
162 1.1 knakahar else
163 1.1 knakahar router1_lan=$ROUTER1_LANIP
164 1.1 knakahar router1_lan_mode="ipv4"
165 1.1 knakahar router2_lan=$ROUTER2_LANIP
166 1.1 knakahar router2_lan_mode="ipv4"
167 1.1 knakahar fi
168 1.1 knakahar
169 1.1 knakahar if [ ${outer} = "ipv6" ]; then
170 1.1 knakahar setup_router $SOCK1 ${router1_lan} ${router1_lan_mode} \
171 1.1 knakahar $ROUTER1_WANIP6 ipv6
172 1.1 knakahar setup_router $SOCK2 ${router2_lan} ${router2_lan_mode} \
173 1.1 knakahar $ROUTER2_WANIP6 ipv6
174 1.1 knakahar else
175 1.1 knakahar setup_router $SOCK1 ${router1_lan} ${router1_lan_mode} \
176 1.1 knakahar $ROUTER1_WANIP ipv4
177 1.1 knakahar setup_router $SOCK2 ${router2_lan} ${router2_lan_mode} \
178 1.1 knakahar $ROUTER2_WANIP ipv4
179 1.1 knakahar fi
180 1.1 knakahar }
181 1.1 knakahar
182 1.1 knakahar test_setup()
183 1.1 knakahar {
184 1.1 knakahar local inner=${1}
185 1.1 knakahar local outer=${2}
186 1.1 knakahar
187 1.1 knakahar local router1_lan=""
188 1.1 knakahar local router1_lan_mode=""
189 1.1 knakahar local router2_lan=""
190 1.1 knakahar local router2_lan_mode=""
191 1.1 knakahar if [ ${inner} = "ipv6" ]; then
192 1.1 knakahar router1_lan=$ROUTER1_LANIP6
193 1.1 knakahar router1_lan_mode="ipv6"
194 1.1 knakahar router2_lan=$ROUTER2_LANIP6
195 1.1 knakahar router2_lan_mode="ipv6"
196 1.1 knakahar else
197 1.1 knakahar router1_lan=$ROUTER1_LANIP
198 1.1 knakahar router1_lan_mode="ipv4"
199 1.1 knakahar router2_lan=$ROUTER2_LANIP
200 1.1 knakahar router2_lan_mode="ipv4"
201 1.1 knakahar fi
202 1.1 knakahar if [ ${outer} = "ipv6" ]; then
203 1.1 knakahar test_router $SOCK1 ${router1_lan} ${router1_lan_mode} \
204 1.1 knakahar $ROUTER1_WANIP6 ipv6
205 1.1 knakahar test_router $SOCK2 ${router2_lan} ${router2_lan_mode} \
206 1.1 knakahar $ROUTER2_WANIP6 ipv6
207 1.1 knakahar else
208 1.1 knakahar test_router $SOCK1 ${router1_lan} ${router1_lan_mode} \
209 1.1 knakahar $ROUTER1_WANIP ipv4
210 1.1 knakahar test_router $SOCK2 ${router2_lan} ${router2_lan_mode} \
211 1.1 knakahar $ROUTER2_WANIP ipv4
212 1.1 knakahar fi
213 1.1 knakahar }
214 1.1 knakahar
215 1.1 knakahar get_if_ipsec_unique()
216 1.1 knakahar {
217 1.1 knakahar local sock=${1}
218 1.1 knakahar local src=${2}
219 1.1 knakahar local proto=${3}
220 1.1 knakahar local unique=""
221 1.1 knakahar
222 1.1 knakahar export RUMP_SERVER=${sock}
223 1.1 knakahar unique=`$HIJACKING setkey -DP | grep -A2 "^${src}.*(${proto})$" | grep unique | sed 's/.*unique#//'`
224 1.1 knakahar unset RUMP_SERVER
225 1.1 knakahar
226 1.1 knakahar echo $unique
227 1.1 knakahar }
228 1.1 knakahar
229 1.1 knakahar setup_if_ipsec()
230 1.1 knakahar {
231 1.1 knakahar local sock=${1}
232 1.1 knakahar local addr=${2}
233 1.1 knakahar local remote=${3}
234 1.1 knakahar local inner=${4}
235 1.1 knakahar local src=${5}
236 1.1 knakahar local dst=${6}
237 1.1 knakahar local peernet=${7}
238 1.1 knakahar
239 1.1 knakahar export RUMP_SERVER=${sock}
240 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec0 create
241 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec0 tunnel ${src} ${dst}
242 1.1 knakahar if [ ${inner} = "ipv6" ]; then
243 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec0 inet6 ${addr}/128 ${remote}
244 1.1 knakahar atf_check -s exit:0 -o ignore rump.route add -inet6 ${peernet} ${addr}
245 1.1 knakahar else
246 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec0 inet ${addr}/32 ${remote}
247 1.1 knakahar atf_check -s exit:0 -o ignore rump.route add -inet ${peernet} ${addr}
248 1.1 knakahar fi
249 1.1 knakahar
250 1.5 knakahar $DEBUG && rump.ifconfig ipsec0
251 1.5 knakahar $DEBUG && rump.route -nL show
252 1.1 knakahar }
253 1.1 knakahar
254 1.1 knakahar setup_if_ipsec_sa()
255 1.1 knakahar {
256 1.1 knakahar local sock=${1}
257 1.1 knakahar local src=${2}
258 1.1 knakahar local dst=${3}
259 1.1 knakahar local mode=${4}
260 1.1 knakahar local proto=${5}
261 1.1 knakahar local algo=${6}
262 1.1 knakahar local dir=${7}
263 1.1 knakahar
264 1.1 knakahar local tmpfile=./tmp
265 1.1 knakahar local inunique=""
266 1.1 knakahar local outunique=""
267 1.1 knakahar local inid=""
268 1.1 knakahar local outid=""
269 1.1 knakahar local algo_args="$(generate_algo_args $proto $algo)"
270 1.1 knakahar
271 1.1 knakahar inunique=`get_if_ipsec_unique ${sock} ${dst} ${mode}`
272 1.4 knakahar atf_check -s exit:0 test "X$inunique" != "X"
273 1.1 knakahar outunique=`get_if_ipsec_unique ${sock} ${src} ${mode}`
274 1.4 knakahar atf_check -s exit:0 test "X$outunique" != "X"
275 1.1 knakahar
276 1.1 knakahar if [ ${dir} = "1to2" ] ; then
277 1.1 knakahar if [ ${mode} = "ipv6" ] ; then
278 1.1 knakahar inid="10010"
279 1.1 knakahar outid="10011"
280 1.1 knakahar else
281 1.1 knakahar inid="10000"
282 1.1 knakahar outid="10001"
283 1.1 knakahar fi
284 1.1 knakahar else
285 1.1 knakahar if [ ${mode} = "ipv6" ] ; then
286 1.1 knakahar inid="10011"
287 1.1 knakahar outid="10010"
288 1.1 knakahar else
289 1.1 knakahar inid="10001"
290 1.1 knakahar outid="10000"
291 1.1 knakahar fi
292 1.1 knakahar fi
293 1.1 knakahar
294 1.1 knakahar cat > $tmpfile <<-EOF
295 1.1 knakahar add $dst $src $proto $inid -u $inunique $algo_args;
296 1.1 knakahar add $src $dst $proto $outid -u $outunique $algo_args;
297 1.1 knakahar EOF
298 1.1 knakahar $DEBUG && cat $tmpfile
299 1.1 knakahar export RUMP_SERVER=$sock
300 1.1 knakahar atf_check -s exit:0 -o empty $HIJACKING setkey -c < $tmpfile
301 1.1 knakahar $DEBUG && $HIJACKING setkey -D
302 1.1 knakahar $DEBUG && $HIJACKING setkey -DP
303 1.1 knakahar unset RUMP_SERVER
304 1.1 knakahar }
305 1.1 knakahar
306 1.1 knakahar setup_tunnel()
307 1.1 knakahar {
308 1.1 knakahar local inner=${1}
309 1.1 knakahar local outer=${2}
310 1.1 knakahar local proto=${3}
311 1.1 knakahar local algo=${4}
312 1.1 knakahar
313 1.1 knakahar local addr=""
314 1.1 knakahar local remote=""
315 1.1 knakahar local src=""
316 1.1 knakahar local dst=""
317 1.1 knakahar local peernet=""
318 1.1 knakahar
319 1.1 knakahar if [ ${inner} = "ipv6" ]; then
320 1.1 knakahar addr=$ROUTER1_IPSECIP6
321 1.1 knakahar remote=$ROUTER2_IPSECIP6
322 1.1 knakahar peernet=$ROUTER2_LANNET6
323 1.1 knakahar else
324 1.1 knakahar addr=$ROUTER1_IPSECIP
325 1.1 knakahar remote=$ROUTER2_IPSECIP
326 1.1 knakahar peernet=$ROUTER2_LANNET
327 1.1 knakahar fi
328 1.1 knakahar if [ ${outer} = "ipv6" ]; then
329 1.1 knakahar src=$ROUTER1_WANIP6
330 1.1 knakahar dst=$ROUTER2_WANIP6
331 1.1 knakahar else
332 1.1 knakahar src=$ROUTER1_WANIP
333 1.1 knakahar dst=$ROUTER2_WANIP
334 1.1 knakahar fi
335 1.1 knakahar setup_if_ipsec $SOCK1 ${addr} ${remote} ${inner} \
336 1.1 knakahar ${src} ${dst} ${peernet}
337 1.1 knakahar
338 1.1 knakahar if [ $inner = "ipv6" -a $outer = "ipv4" ]; then
339 1.1 knakahar setup_if_ipsec_sa $SOCK1 ${src} ${dst} ${outer} ${proto} ${algo} "1to2"
340 1.1 knakahar fi
341 1.1 knakahar setup_if_ipsec_sa $SOCK1 ${src} ${dst} ${inner} ${proto} ${algo} "1to2"
342 1.1 knakahar
343 1.1 knakahar if [ $inner = "ipv6" ]; then
344 1.1 knakahar addr=$ROUTER2_IPSECIP6
345 1.1 knakahar remote=$ROUTER1_IPSECIP6
346 1.1 knakahar peernet=$ROUTER1_LANNET6
347 1.1 knakahar else
348 1.1 knakahar addr=$ROUTER2_IPSECIP
349 1.1 knakahar remote=$ROUTER1_IPSECIP
350 1.1 knakahar peernet=$ROUTER1_LANNET
351 1.1 knakahar fi
352 1.1 knakahar if [ $outer = "ipv6" ]; then
353 1.1 knakahar src=$ROUTER2_WANIP6
354 1.1 knakahar dst=$ROUTER1_WANIP6
355 1.1 knakahar else
356 1.1 knakahar src=$ROUTER2_WANIP
357 1.1 knakahar dst=$ROUTER1_WANIP
358 1.1 knakahar fi
359 1.1 knakahar setup_if_ipsec $SOCK2 ${addr} ${remote} ${inner} \
360 1.1 knakahar ${src} ${dst} ${peernet} ${proto} ${algo}
361 1.1 knakahar if [ $inner = "ipv6" -a $outer = "ipv4" ]; then
362 1.1 knakahar setup_if_ipsec_sa $SOCK2 ${src} ${dst} ${outer} ${proto} ${algo} "2to1"
363 1.1 knakahar fi
364 1.1 knakahar setup_if_ipsec_sa $SOCK2 ${src} ${dst} ${inner} ${proto} ${algo} "2to1"
365 1.1 knakahar }
366 1.1 knakahar
367 1.1 knakahar test_setup_tunnel()
368 1.1 knakahar {
369 1.1 knakahar local mode=${1}
370 1.1 knakahar
371 1.1 knakahar local peernet=""
372 1.1 knakahar local opt=""
373 1.1 knakahar if [ ${mode} = "ipv6" ]; then
374 1.1 knakahar peernet=$ROUTER2_LANNET6
375 1.1 knakahar opt="-inet6"
376 1.1 knakahar else
377 1.1 knakahar peernet=$ROUTER2_LANNET
378 1.1 knakahar opt="-inet"
379 1.1 knakahar fi
380 1.1 knakahar export RUMP_SERVER=$SOCK1
381 1.1 knakahar atf_check -s exit:0 -o match:ipsec0 rump.ifconfig
382 1.1 knakahar atf_check -s exit:0 -o match:ipsec0 rump.route -nL get ${opt} ${peernet}
383 1.1 knakahar
384 1.1 knakahar if [ ${mode} = "ipv6" ]; then
385 1.1 knakahar peernet=$ROUTER1_LANNET6
386 1.1 knakahar opt="-inet6"
387 1.1 knakahar else
388 1.1 knakahar peernet=$ROUTER1_LANNET
389 1.1 knakahar opt="-inet"
390 1.1 knakahar fi
391 1.1 knakahar export RUMP_SERVER=$SOCK2
392 1.1 knakahar atf_check -s exit:0 -o match:ipsec0 rump.ifconfig
393 1.1 knakahar atf_check -s exit:0 -o match:ipsec0 rump.route -nL get ${opt} ${peernet}
394 1.1 knakahar }
395 1.1 knakahar
396 1.1 knakahar teardown_tunnel()
397 1.1 knakahar {
398 1.1 knakahar export RUMP_SERVER=$SOCK1
399 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec0 deletetunnel
400 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec0 destroy
401 1.1 knakahar $HIJACKING setkey -F
402 1.1 knakahar
403 1.1 knakahar export RUMP_SERVER=$SOCK2
404 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec0 deletetunnel
405 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec0 destroy
406 1.1 knakahar $HIJACKING setkey -F
407 1.1 knakahar
408 1.1 knakahar unset RUMP_SERVER
409 1.1 knakahar }
410 1.1 knakahar
411 1.1 knakahar setup_dummy_if_ipsec()
412 1.1 knakahar {
413 1.1 knakahar local sock=${1}
414 1.1 knakahar local addr=${2}
415 1.1 knakahar local remote=${3}
416 1.1 knakahar local inner=${4}
417 1.1 knakahar local src=${5}
418 1.1 knakahar local dst=${6}
419 1.1 knakahar
420 1.1 knakahar export RUMP_SERVER=${sock}
421 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec1 create
422 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec1 tunnel ${src} ${dst}
423 1.1 knakahar if [ ${inner} = "ipv6" ]; then
424 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec1 inet6 ${addr}/128 ${remote}
425 1.1 knakahar else
426 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec1 inet ${addr}/32 ${remote}
427 1.1 knakahar fi
428 1.1 knakahar
429 1.5 knakahar $DEBUG && rump.ifconfig ipsec1
430 1.1 knakahar unset RUMP_SERVER
431 1.1 knakahar }
432 1.1 knakahar
433 1.1 knakahar setup_dummy_if_ipsec_sa()
434 1.1 knakahar {
435 1.1 knakahar local sock=${1}
436 1.1 knakahar local src=${2}
437 1.1 knakahar local dst=${3}
438 1.1 knakahar local mode=${4}
439 1.1 knakahar local proto=${5}
440 1.1 knakahar local algo=${6}
441 1.1 knakahar local dir=${7}
442 1.1 knakahar
443 1.1 knakahar local tmpfile=./tmp
444 1.1 knakahar local inunique=""
445 1.1 knakahar local outunique=""
446 1.1 knakahar local inid=""
447 1.1 knakahar local outid=""
448 1.1 knakahar local algo_args="$(generate_algo_args $proto $algo)"
449 1.1 knakahar
450 1.1 knakahar inunique=`get_if_ipsec_unique ${sock} ${dst} ${mode}`
451 1.4 knakahar atf_check -s exit:0 test "X$inunique" != "X"
452 1.1 knakahar outunique=`get_if_ipsec_unique ${sock} ${src} ${mode}`
453 1.4 knakahar atf_check -s exit:0 test "X$outunique" != "X"
454 1.1 knakahar
455 1.1 knakahar if [ ${dir} = "1to2" ] ; then
456 1.1 knakahar inid="20000"
457 1.1 knakahar outid="20001"
458 1.1 knakahar else
459 1.1 knakahar inid="20001"
460 1.1 knakahar outid="20000"
461 1.1 knakahar fi
462 1.1 knakahar
463 1.1 knakahar cat > $tmpfile <<-EOF
464 1.1 knakahar add $dst $src $proto $inid -u $inunique $algo_args;
465 1.1 knakahar add $src $dst $proto $outid -u $outunique $algo_args;
466 1.1 knakahar EOF
467 1.1 knakahar $DEBUG && cat $tmpfile
468 1.1 knakahar export RUMP_SERVER=$sock
469 1.1 knakahar atf_check -s exit:0 -o empty $HIJACKING setkey -c < $tmpfile
470 1.1 knakahar $DEBUG && $HIJACKING setkey -D
471 1.1 knakahar $DEBUG && $HIJACKING setkey -DP
472 1.1 knakahar unset RUMP_SERVER
473 1.1 knakahar }
474 1.1 knakahar
475 1.1 knakahar setup_dummy_tunnel()
476 1.1 knakahar {
477 1.1 knakahar local inner=${1}
478 1.1 knakahar local outer=${2}
479 1.1 knakahar local proto=${3}
480 1.1 knakahar local algo=${4}
481 1.1 knakahar
482 1.1 knakahar local addr=""
483 1.1 knakahar local remote=""
484 1.1 knakahar local src=""
485 1.1 knakahar local dst=""
486 1.1 knakahar
487 1.1 knakahar if [ ${inner} = "ipv6" ]; then
488 1.1 knakahar addr=$ROUTER1_IPSECIP6_DUMMY
489 1.1 knakahar remote=$ROUTER2_IPSECIP6_DUMMY
490 1.1 knakahar else
491 1.1 knakahar addr=$ROUTER1_IPSECIP_DUMMY
492 1.1 knakahar remote=$ROUTER2_IPSECIP_DUMMY
493 1.1 knakahar fi
494 1.1 knakahar if [ ${outer} = "ipv6" ]; then
495 1.1 knakahar src=$ROUTER1_WANIP6_DUMMY
496 1.1 knakahar dst=$ROUTER2_WANIP6_DUMMY
497 1.1 knakahar else
498 1.1 knakahar src=$ROUTER1_WANIP_DUMMY
499 1.1 knakahar dst=$ROUTER2_WANIP_DUMMY
500 1.1 knakahar fi
501 1.1 knakahar setup_dummy_if_ipsec $SOCK1 ${addr} ${remote} ${inner} \
502 1.1 knakahar ${src} ${dst} ${proto} ${algo} "1to2"
503 1.1 knakahar setup_dummy_if_ipsec_sa $SOCK1 ${src} ${dst} ${inner} ${proto} ${algo} "1to2"
504 1.1 knakahar
505 1.1 knakahar if [ $inner = "ipv6" ]; then
506 1.1 knakahar addr=$ROUTER2_IPSECIP6_DUMMY
507 1.1 knakahar remote=$ROUTER1_IPSECIP6_DUMMY
508 1.1 knakahar else
509 1.1 knakahar addr=$ROUTER2_IPSECIP_DUMMY
510 1.1 knakahar remote=$ROUTER1_IPSECIP_DUMMY
511 1.1 knakahar fi
512 1.1 knakahar if [ $outer = "ipv6" ]; then
513 1.1 knakahar src=$ROUTER2_WANIP6_DUMMY
514 1.1 knakahar dst=$ROUTER1_WANIP6_DUMMY
515 1.1 knakahar else
516 1.1 knakahar src=$ROUTER2_WANIP_DUMMY
517 1.1 knakahar dst=$ROUTER1_WANIP_DUMMY
518 1.1 knakahar fi
519 1.1 knakahar setup_dummy_if_ipsec $SOCK2 ${addr} ${remote} ${inner} \
520 1.1 knakahar ${src} ${dst} ${proto} ${algo} "2to1"
521 1.1 knakahar setup_dummy_if_ipsec_sa $SOCK2 ${src} ${dst} ${inner} ${proto} ${algo} "2to1"
522 1.1 knakahar }
523 1.1 knakahar
524 1.1 knakahar test_setup_dummy_tunnel()
525 1.1 knakahar {
526 1.1 knakahar export RUMP_SERVER=$SOCK1
527 1.1 knakahar atf_check -s exit:0 -o match:ipsec1 rump.ifconfig
528 1.1 knakahar
529 1.1 knakahar export RUMP_SERVER=$SOCK2
530 1.1 knakahar atf_check -s exit:0 -o match:ipsec1 rump.ifconfig
531 1.1 knakahar
532 1.1 knakahar unset RUMP_SERVER
533 1.1 knakahar }
534 1.1 knakahar
535 1.1 knakahar teardown_dummy_tunnel()
536 1.1 knakahar {
537 1.1 knakahar export RUMP_SERVER=$SOCK1
538 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec1 deletetunnel
539 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec1 destroy
540 1.1 knakahar
541 1.1 knakahar export RUMP_SERVER=$SOCK2
542 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec1 deletetunnel
543 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec1 destroy
544 1.1 knakahar
545 1.1 knakahar unset RUMP_SERVER
546 1.1 knakahar }
547 1.1 knakahar
548 1.1 knakahar setup_recursive_if_ipsec()
549 1.1 knakahar {
550 1.1 knakahar local sock=${1}
551 1.1 knakahar local ipsec=${2}
552 1.1 knakahar local addr=${3}
553 1.1 knakahar local remote=${4}
554 1.1 knakahar local inner=${5}
555 1.1 knakahar local src=${6}
556 1.1 knakahar local dst=${7}
557 1.1 knakahar local proto=${8}
558 1.1 knakahar local algo=${9}
559 1.1 knakahar local dir=${10}
560 1.1 knakahar
561 1.1 knakahar export RUMP_SERVER=${sock}
562 1.1 knakahar atf_check -s exit:0 rump.ifconfig ${ipsec} create
563 1.1 knakahar atf_check -s exit:0 rump.ifconfig ${ipsec} tunnel ${src} ${dst}
564 1.1 knakahar if [ ${inner} = "ipv6" ]; then
565 1.1 knakahar atf_check -s exit:0 rump.ifconfig ${ipsec} inet6 ${addr}/128 ${remote}
566 1.1 knakahar else
567 1.1 knakahar atf_check -s exit:0 rump.ifconfig ${ipsec} inet ${addr}/32 ${remote}
568 1.1 knakahar fi
569 1.1 knakahar setup_if_ipsec_sa $sock ${src} ${dst} ${inner} ${proto} ${algo} ${dir}
570 1.1 knakahar
571 1.1 knakahar export RUMP_SERVER=${sock}
572 1.5 knakahar $DEBUG && rump.ifconfig ${ipsec}
573 1.1 knakahar unset RUMP_SERVER
574 1.1 knakahar }
575 1.1 knakahar
576 1.1 knakahar # test in ROUTER1 only
577 1.1 knakahar setup_recursive_tunnels()
578 1.1 knakahar {
579 1.1 knakahar local mode=${1}
580 1.1 knakahar local proto=${2}
581 1.1 knakahar local algo=${3}
582 1.1 knakahar
583 1.1 knakahar local addr=""
584 1.1 knakahar local remote=""
585 1.1 knakahar local src=""
586 1.1 knakahar local dst=""
587 1.1 knakahar
588 1.1 knakahar if [ ${mode} = "ipv6" ]; then
589 1.1 knakahar addr=$ROUTER1_IPSECIP6_RECURSIVE1
590 1.1 knakahar remote=$ROUTER2_IPSECIP6_RECURSIVE1
591 1.1 knakahar src=$ROUTER1_IPSECIP6
592 1.1 knakahar dst=$ROUTER2_IPSECIP6
593 1.1 knakahar else
594 1.1 knakahar addr=$ROUTER1_IPSECIP_RECURSIVE1
595 1.1 knakahar remote=$ROUTER2_IPSECIP_RECURSIVE1
596 1.1 knakahar src=$ROUTER1_IPSECIP
597 1.1 knakahar dst=$ROUTER2_IPSECIP
598 1.1 knakahar fi
599 1.1 knakahar setup_recursive_if_ipsec $SOCK1 ipsec1 ${addr} ${remote} ${mode} \
600 1.1 knakahar ${src} ${dst} ${proto} ${algo} "1to2"
601 1.1 knakahar
602 1.1 knakahar if [ ${mode} = "ipv6" ]; then
603 1.1 knakahar addr=$ROUTER1_IPSECIP6_RECURSIVE2
604 1.1 knakahar remote=$ROUTER2_IPSECIP6_RECURSIVE2
605 1.1 knakahar src=$ROUTER1_IPSECIP6_RECURSIVE1
606 1.1 knakahar dst=$ROUTER2_IPSECIP6_RECURSIVE1
607 1.1 knakahar else
608 1.1 knakahar addr=$ROUTER1_IPSECIP_RECURSIVE2
609 1.1 knakahar remote=$ROUTER2_IPSECIP_RECURSIVE2
610 1.1 knakahar src=$ROUTER1_IPSECIP_RECURSIVE1
611 1.1 knakahar dst=$ROUTER2_IPSECIP_RECURSIVE1
612 1.1 knakahar fi
613 1.1 knakahar setup_recursive_if_ipsec $SOCK1 ipsec2 ${addr} ${remote} ${mode} \
614 1.1 knakahar ${src} ${dst} ${proto} ${algo} "1to2"
615 1.1 knakahar }
616 1.1 knakahar
617 1.1 knakahar # test in router1 only
618 1.1 knakahar test_recursive_check()
619 1.1 knakahar {
620 1.1 knakahar local mode=$1
621 1.1 knakahar
622 1.1 knakahar export RUMP_SERVER=$SOCK1
623 1.1 knakahar if [ ${mode} = "ipv6" ]; then
624 1.1 knakahar atf_check -s not-exit:0 -o ignore -e ignore \
625 1.1 knakahar rump.ping6 -n -X $TIMEOUT -c 1 $ROUTER2_IPSECIP6_RECURSIVE2
626 1.1 knakahar else
627 1.1 knakahar atf_check -s not-exit:0 -o ignore -e ignore \
628 1.1 knakahar rump.ping -n -w $TIMEOUT -c 1 $ROUTER2_IPSECIP_RECURSIVE2
629 1.1 knakahar fi
630 1.1 knakahar
631 1.1 knakahar atf_check -o match:'ipsec0: recursively called too many times' \
632 1.1 knakahar -x "$HIJACKING dmesg"
633 1.1 knakahar
634 1.1 knakahar $HIJACKING dmesg
635 1.1 knakahar
636 1.1 knakahar unset RUMP_SERVER
637 1.1 knakahar }
638 1.1 knakahar
639 1.1 knakahar teardown_recursive_tunnels()
640 1.1 knakahar {
641 1.1 knakahar export RUMP_SERVER=$SOCK1
642 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec1 deletetunnel
643 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec1 destroy
644 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec2 deletetunnel
645 1.1 knakahar atf_check -s exit:0 rump.ifconfig ipsec2 destroy
646 1.1 knakahar unset RUMP_SERVER
647 1.1 knakahar }
648 1.1 knakahar
649 1.1 knakahar test_ping_failure()
650 1.1 knakahar {
651 1.1 knakahar local mode=$1
652 1.1 knakahar
653 1.1 knakahar export RUMP_SERVER=$SOCK1
654 1.1 knakahar if [ ${mode} = "ipv6" ]; then
655 1.1 knakahar atf_check -s not-exit:0 -o ignore -e ignore \
656 1.1 knakahar rump.ping6 -n -X $TIMEOUT -c 1 -S $ROUTER1_LANIP6 \
657 1.1 knakahar $ROUTER2_LANIP6
658 1.1 knakahar else
659 1.1 knakahar atf_check -s not-exit:0 -o ignore -e ignore \
660 1.1 knakahar rump.ping -n -w $TIMEOUT -c 1 -I $ROUTER1_LANIP \
661 1.1 knakahar $ROUTER2_LANIP
662 1.1 knakahar fi
663 1.1 knakahar
664 1.1 knakahar export RUMP_SERVER=$SOCK2
665 1.1 knakahar if [ ${mode} = "ipv6" ]; then
666 1.1 knakahar atf_check -s not-exit:0 -o ignore -e ignore \
667 1.1 knakahar rump.ping6 -n -X $TIMEOUT -c 1 -S $ROUTER2_LANIP6 \
668 1.1 knakahar $ROUTER1_LANIP6
669 1.1 knakahar else
670 1.1 knakahar atf_check -s not-exit:0 -o ignore -e ignore \
671 1.1 knakahar rump.ping -n -w $TIMEOUT -c 1 -I $ROUTER1_LANIP \
672 1.1 knakahar $ROUTER2_LANIP
673 1.1 knakahar fi
674 1.1 knakahar
675 1.1 knakahar unset RUMP_SERVER
676 1.1 knakahar }
677 1.1 knakahar
678 1.1 knakahar test_ping_success()
679 1.1 knakahar {
680 1.1 knakahar mode=$1
681 1.1 knakahar
682 1.1 knakahar export RUMP_SERVER=$SOCK1
683 1.5 knakahar $DEBUG && rump.ifconfig -v ipsec0
684 1.1 knakahar if [ ${mode} = "ipv6" ]; then
685 1.1 knakahar # XXX
686 1.1 knakahar # rump.ping6 rarely fails with the message that
687 1.1 knakahar # "failed to get receiving hop limit".
688 1.1 knakahar # This is a known issue being analyzed.
689 1.1 knakahar atf_check -s exit:0 -o ignore \
690 1.1 knakahar rump.ping6 -n -X $TIMEOUT -c 1 -S $ROUTER1_LANIP6 \
691 1.1 knakahar $ROUTER2_LANIP6
692 1.1 knakahar else
693 1.1 knakahar atf_check -s exit:0 -o ignore \
694 1.1 knakahar rump.ping -n -w $TIMEOUT -c 1 -I $ROUTER1_LANIP \
695 1.1 knakahar $ROUTER2_LANIP
696 1.1 knakahar fi
697 1.5 knakahar $DEBUG && rump.ifconfig -v ipsec0
698 1.1 knakahar
699 1.1 knakahar export RUMP_SERVER=$SOCK2
700 1.5 knakahar $DEBUG && rump.ifconfig -v ipsec0
701 1.1 knakahar if [ ${mode} = "ipv6" ]; then
702 1.1 knakahar atf_check -s exit:0 -o ignore \
703 1.1 knakahar rump.ping6 -n -X $TIMEOUT -c 1 -S $ROUTER2_LANIP6 \
704 1.1 knakahar $ROUTER1_LANIP6
705 1.1 knakahar else
706 1.1 knakahar atf_check -s exit:0 -o ignore \
707 1.1 knakahar rump.ping -n -w $TIMEOUT -c 1 -I $ROUTER2_LANIP \
708 1.1 knakahar $ROUTER1_LANIP
709 1.1 knakahar fi
710 1.5 knakahar $DEBUG && rump.ifconfig -v ipsec0
711 1.1 knakahar
712 1.1 knakahar unset RUMP_SERVER
713 1.1 knakahar }
714 1.1 knakahar
715 1.1 knakahar test_change_tunnel_duplicate()
716 1.1 knakahar {
717 1.1 knakahar local mode=$1
718 1.1 knakahar
719 1.1 knakahar local newsrc=""
720 1.1 knakahar local newdst=""
721 1.1 knakahar if [ ${mode} = "ipv6" ]; then
722 1.1 knakahar newsrc=$ROUTER1_WANIP6_DUMMY
723 1.1 knakahar newdst=$ROUTER2_WANIP6_DUMMY
724 1.1 knakahar else
725 1.1 knakahar newsrc=$ROUTER1_WANIP_DUMMY
726 1.1 knakahar newdst=$ROUTER2_WANIP_DUMMY
727 1.1 knakahar fi
728 1.1 knakahar export RUMP_SERVER=$SOCK1
729 1.5 knakahar $DEBUG && rump.ifconfig -v ipsec0
730 1.5 knakahar $DEBUG && rump.ifconfig -v ipsec1
731 1.1 knakahar atf_check -s exit:0 -e match:SIOCSLIFPHYADDR \
732 1.1 knakahar rump.ifconfig ipsec0 tunnel ${newsrc} ${newdst}
733 1.5 knakahar $DEBUG && rump.ifconfig -v ipsec0
734 1.5 knakahar $DEBUG && rump.ifconfig -v ipsec1
735 1.1 knakahar
736 1.1 knakahar if [ ${mode} = "ipv6" ]; then
737 1.1 knakahar newsrc=$ROUTER2_WANIP6_DUMMY
738 1.1 knakahar newdst=$ROUTER1_WANIP6_DUMMY
739 1.1 knakahar else
740 1.1 knakahar newsrc=$ROUTER2_WANIP_DUMMY
741 1.1 knakahar newdst=$ROUTER1_WANIP_DUMMY
742 1.1 knakahar fi
743 1.1 knakahar export RUMP_SERVER=$SOCK2
744 1.5 knakahar $DEBUG && rump.ifconfig -v ipsec0
745 1.5 knakahar $DEBUG && rump.ifconfig -v ipsec1
746 1.1 knakahar atf_check -s exit:0 -e match:SIOCSLIFPHYADDR \
747 1.1 knakahar rump.ifconfig ipsec0 tunnel ${newsrc} ${newdst}
748 1.5 knakahar $DEBUG && rump.ifconfig -v ipsec0
749 1.5 knakahar $DEBUG && rump.ifconfig -v ipsec1
750 1.1 knakahar
751 1.1 knakahar unset RUMP_SERVER
752 1.1 knakahar }
753 1.1 knakahar
754 1.1 knakahar test_change_tunnel_success()
755 1.1 knakahar {
756 1.1 knakahar local mode=$1
757 1.1 knakahar
758 1.1 knakahar local newsrc=""
759 1.1 knakahar local newdst=""
760 1.1 knakahar if [ ${mode} = "ipv6" ]; then
761 1.1 knakahar newsrc=$ROUTER1_WANIP6_DUMMY
762 1.1 knakahar newdst=$ROUTER2_WANIP6_DUMMY
763 1.1 knakahar else
764 1.1 knakahar newsrc=$ROUTER1_WANIP_DUMMY
765 1.1 knakahar newdst=$ROUTER2_WANIP_DUMMY
766 1.1 knakahar fi
767 1.1 knakahar export RUMP_SERVER=$SOCK1
768 1.5 knakahar $DEBUG && rump.ifconfig -v ipsec0
769 1.1 knakahar atf_check -s exit:0 \
770 1.1 knakahar rump.ifconfig ipsec0 tunnel ${newsrc} ${newdst}
771 1.5 knakahar $DEBUG && rump.ifconfig -v ipsec0
772 1.1 knakahar
773 1.1 knakahar if [ ${mode} = "ipv6" ]; then
774 1.1 knakahar newsrc=$ROUTER2_WANIP6_DUMMY
775 1.1 knakahar newdst=$ROUTER1_WANIP6_DUMMY
776 1.1 knakahar else
777 1.1 knakahar newsrc=$ROUTER2_WANIP_DUMMY
778 1.1 knakahar newdst=$ROUTER1_WANIP_DUMMY
779 1.1 knakahar fi
780 1.1 knakahar export RUMP_SERVER=$SOCK2
781 1.5 knakahar $DEBUG && rump.ifconfig -v ipsec0
782 1.1 knakahar atf_check -s exit:0 \
783 1.1 knakahar rump.ifconfig ipsec0 tunnel ${newsrc} ${newdst}
784 1.5 knakahar $DEBUG && rump.ifconfig -v ipsec0
785 1.1 knakahar
786 1.1 knakahar unset RUMP_SERVER
787 1.1 knakahar }
788 1.1 knakahar
789 1.1 knakahar basic_setup()
790 1.1 knakahar {
791 1.1 knakahar local inner=$1
792 1.1 knakahar local outer=$2
793 1.1 knakahar local proto=$3
794 1.1 knakahar local algo=$4
795 1.1 knakahar
796 1.1 knakahar setup ${inner} ${outer}
797 1.1 knakahar test_setup ${inner} ${outer}
798 1.1 knakahar
799 1.1 knakahar # Enable once PR kern/49219 is fixed
800 1.1 knakahar #test_ping_failure
801 1.1 knakahar
802 1.1 knakahar setup_tunnel ${inner} ${outer} ${proto} ${algo}
803 1.1 knakahar sleep 1
804 1.1 knakahar test_setup_tunnel ${inner}
805 1.1 knakahar }
806 1.1 knakahar
807 1.1 knakahar basic_test()
808 1.1 knakahar {
809 1.1 knakahar local inner=$1
810 1.1 knakahar local outer=$2 # not use
811 1.1 knakahar
812 1.1 knakahar test_ping_success ${inner}
813 1.1 knakahar }
814 1.1 knakahar
815 1.1 knakahar basic_teardown()
816 1.1 knakahar {
817 1.1 knakahar local inner=$1
818 1.1 knakahar local outer=$2 # not use
819 1.1 knakahar
820 1.1 knakahar teardown_tunnel
821 1.1 knakahar test_ping_failure ${inner}
822 1.1 knakahar }
823 1.1 knakahar
824 1.1 knakahar ioctl_setup()
825 1.1 knakahar {
826 1.1 knakahar local inner=$1
827 1.1 knakahar local outer=$2
828 1.1 knakahar local proto=$3
829 1.1 knakahar local algo=$4
830 1.1 knakahar
831 1.1 knakahar setup ${inner} ${outer}
832 1.1 knakahar test_setup ${inner} ${outer}
833 1.1 knakahar
834 1.1 knakahar # Enable once PR kern/49219 is fixed
835 1.1 knakahar #test_ping_failure
836 1.1 knakahar
837 1.1 knakahar setup_tunnel ${inner} ${outer} ${proto} ${algo}
838 1.1 knakahar setup_dummy_tunnel ${inner} ${outer} ${proto} ${algo}
839 1.1 knakahar sleep 1
840 1.1 knakahar test_setup_tunnel ${inner}
841 1.1 knakahar }
842 1.1 knakahar
843 1.1 knakahar ioctl_test()
844 1.1 knakahar {
845 1.1 knakahar local inner=$1
846 1.1 knakahar local outer=$2
847 1.1 knakahar
848 1.1 knakahar test_ping_success ${inner}
849 1.1 knakahar
850 1.1 knakahar test_change_tunnel_duplicate ${outer}
851 1.1 knakahar
852 1.1 knakahar teardown_dummy_tunnel
853 1.1 knakahar test_change_tunnel_success ${outer}
854 1.1 knakahar }
855 1.1 knakahar
856 1.1 knakahar ioctl_teardown()
857 1.1 knakahar {
858 1.1 knakahar local inner=$1
859 1.1 knakahar local outer=$2 # not use
860 1.1 knakahar
861 1.1 knakahar teardown_tunnel
862 1.1 knakahar test_ping_failure ${inner}
863 1.1 knakahar }
864 1.1 knakahar
865 1.1 knakahar recursive_setup()
866 1.1 knakahar {
867 1.1 knakahar local inner=$1
868 1.1 knakahar local outer=$2
869 1.1 knakahar local proto=$3
870 1.1 knakahar local algo=$4
871 1.1 knakahar
872 1.1 knakahar setup ${inner} ${outer}
873 1.1 knakahar test_setup ${inner} ${outer}
874 1.1 knakahar
875 1.1 knakahar # Enable once PR kern/49219 is fixed
876 1.1 knakahar #test_ping_failure
877 1.1 knakahar
878 1.1 knakahar setup_tunnel ${inner} ${outer} ${proto} ${algo}
879 1.1 knakahar setup_recursive_tunnels ${inner} ${proto} ${algo}
880 1.1 knakahar sleep 1
881 1.1 knakahar test_setup_tunnel ${inner}
882 1.1 knakahar }
883 1.1 knakahar
884 1.1 knakahar recursive_test()
885 1.1 knakahar {
886 1.1 knakahar local inner=$1
887 1.1 knakahar local outer=$2 # not use
888 1.1 knakahar
889 1.1 knakahar test_recursive_check ${inner}
890 1.1 knakahar }
891 1.1 knakahar
892 1.1 knakahar recursive_teardown()
893 1.1 knakahar {
894 1.1 knakahar local inner=$1 # not use
895 1.1 knakahar local outer=$2 # not use
896 1.1 knakahar
897 1.1 knakahar teardown_recursive_tunnels
898 1.1 knakahar teardown_tunnel
899 1.1 knakahar }
900 1.1 knakahar
901 1.1 knakahar add_test()
902 1.1 knakahar {
903 1.1 knakahar local category=$1
904 1.1 knakahar local desc=$2
905 1.1 knakahar local inner=$3
906 1.1 knakahar local outer=$4
907 1.1 knakahar local proto=$5
908 1.1 knakahar local algo=$6
909 1.1 knakahar local _algo=$(echo $algo | sed 's/-//g')
910 1.1 knakahar
911 1.2 ozaki name="ipsecif_${category}_${inner}over${outer}_${proto}_${_algo}"
912 1.1 knakahar fulldesc="Does ${inner} over ${outer} if_ipsec ${desc}"
913 1.1 knakahar
914 1.1 knakahar atf_test_case ${name} cleanup
915 1.1 knakahar eval "${name}_head() {
916 1.1 knakahar atf_set descr \"${fulldesc}\"
917 1.1 knakahar atf_set require.progs rump_server setkey
918 1.1 knakahar }
919 1.1 knakahar ${name}_body() {
920 1.1 knakahar ${category}_setup ${inner} ${outer} ${proto} ${algo}
921 1.1 knakahar ${category}_test ${inner} ${outer}
922 1.1 knakahar ${category}_teardown ${inner} ${outer}
923 1.1 knakahar rump_server_destroy_ifaces
924 1.1 knakahar }
925 1.1 knakahar ${name}_cleanup() {
926 1.1 knakahar \$DEBUG && dump
927 1.1 knakahar cleanup
928 1.1 knakahar }"
929 1.1 knakahar atf_add_test_case ${name}
930 1.1 knakahar }
931 1.1 knakahar
932 1.1 knakahar add_test_allproto()
933 1.1 knakahar {
934 1.1 knakahar local category=$1
935 1.1 knakahar local desc=$2
936 1.1 knakahar
937 1.1 knakahar for algo in $ESP_ENCRYPTION_ALGORITHMS_MINIMUM; do
938 1.1 knakahar add_test ${category} "${desc}" ipv4 ipv4 esp $algo
939 1.1 knakahar add_test ${category} "${desc}" ipv4 ipv6 esp $algo
940 1.1 knakahar add_test ${category} "${desc}" ipv6 ipv4 esp $algo
941 1.1 knakahar add_test ${category} "${desc}" ipv6 ipv6 esp $algo
942 1.1 knakahar done
943 1.1 knakahar
944 1.1 knakahar # ah does not support yet
945 1.1 knakahar }
946 1.1 knakahar
947 1.1 knakahar atf_init_test_cases()
948 1.1 knakahar {
949 1.3 ozaki
950 1.3 ozaki atf_add_test_case ipsecif_create_destroy
951 1.3 ozaki
952 1.1 knakahar add_test_allproto basic "basic tests"
953 1.1 knakahar add_test_allproto ioctl "ioctl tests"
954 1.1 knakahar add_test_allproto recursive "recursive check tests"
955 1.1 knakahar }
956