common.sh revision 1.7.6.1 1 # $NetBSD: common.sh,v 1.7.6.1 2020/11/10 11:44:22 martin Exp $
2 #
3 # Copyright (c) 2017 Internet Initiative Japan Inc.
4 # All rights reserved.
5 #
6 # Redistribution and use in source and binary forms, with or without
7 # modification, are permitted provided that the following conditions
8 # are met:
9 # 1. Redistributions of source code must retain the above copyright
10 # notice, this list of conditions and the following disclaimer.
11 # 2. Redistributions in binary form must reproduce the above copyright
12 # notice, this list of conditions and the following disclaimer in the
13 # documentation and/or other materials provided with the distribution.
14 #
15 # THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
16 # ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
17 # TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
18 # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
19 # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
20 # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
21 # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
22 # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
23 # CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
24 # ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
25 # POSSIBILITY OF SUCH DAMAGE.
26 #
27
28 HIJACKING_NPF="${HIJACKING},blanket=/dev/npf"
29
30 test_flush_entries()
31 {
32 local sock=$1
33
34 export RUMP_SERVER=$sock
35
36 atf_check -s exit:0 -o empty $HIJACKING setkey -F
37 atf_check -s exit:0 -o empty $HIJACKING setkey -F -P
38 atf_check -s exit:0 -o match:"No SAD entries." $HIJACKING setkey -D -a
39 atf_check -s exit:0 -o match:"No SPD entries." $HIJACKING setkey -D -P
40 }
41
42 check_sa_entries()
43 {
44 local sock=$1
45 local local_addr=$2
46 local remote_addr=$3
47
48 export RUMP_SERVER=$sock
49
50 $DEBUG && $HIJACKING setkey -D
51
52 atf_check -s exit:0 -o match:"$local_addr $remote_addr" \
53 $HIJACKING setkey -D
54 atf_check -s exit:0 -o match:"$remote_addr $local_addr" \
55 $HIJACKING setkey -D
56 # TODO: more detail checks
57 }
58
59 check_sp_entries()
60 {
61 local sock=$1
62 local local_addr=$2
63 local remote_addr=$3
64
65 export RUMP_SERVER=$sock
66
67 $DEBUG && $HIJACKING setkey -D -P
68
69 atf_check -s exit:0 \
70 -o match:"$local_addr\[any\] $remote_addr\[any\] 255\(reserved\)" \
71 $HIJACKING setkey -D -P
72 atf_check -s exit:0 \
73 -o match:"$remote_addr\[any\] $local_addr\[any\] 255\(reserved\)" \
74 $HIJACKING setkey -D -P
75 # TODO: more detail checks
76 }
77
78 generate_pktproto()
79 {
80 local proto=$1
81
82 if [ $proto = ipcomp ]; then
83 echo IPComp
84 else
85 echo $proto | tr 'a-z' 'A-Z'
86 fi
87 }
88
89 get_natt_port()
90 {
91 local local_addr=$1
92 local remote_addr=$2
93 local port=""
94
95 # 10.0.1.2:4500 20.0.0.2:4500 shmif1 20.0.0.1:35574
96 port=$($HIJACKING_NPF npfctl list | grep $local_addr | awk -F "${remote_addr}:" '/4500/ {print $2;}')
97 echo $port
98 }
99