Home | History | Annotate | Line # | Download | only in ipsec
common.sh revision 1.8
      1 #	$NetBSD: common.sh,v 1.8 2020/06/05 03:24:58 knakahara Exp $
      2 #
      3 # Copyright (c) 2017 Internet Initiative Japan Inc.
      4 # All rights reserved.
      5 #
      6 # Redistribution and use in source and binary forms, with or without
      7 # modification, are permitted provided that the following conditions
      8 # are met:
      9 # 1. Redistributions of source code must retain the above copyright
     10 #    notice, this list of conditions and the following disclaimer.
     11 # 2. Redistributions in binary form must reproduce the above copyright
     12 #    notice, this list of conditions and the following disclaimer in the
     13 #    documentation and/or other materials provided with the distribution.
     14 #
     15 # THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     16 # ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     17 # TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     18 # PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     19 # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     20 # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     21 # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     22 # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     23 # CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     24 # ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     25 # POSSIBILITY OF SUCH DAMAGE.
     26 #
     27 
     28 HIJACKING_NPF="${HIJACKING},blanket=/dev/npf"
     29 
     30 test_flush_entries()
     31 {
     32 	local sock=$1
     33 
     34 	export RUMP_SERVER=$sock
     35 
     36 	atf_check -s exit:0 -o empty $HIJACKING setkey -F
     37 	atf_check -s exit:0 -o empty $HIJACKING setkey -F -P
     38 	atf_check -s exit:0 -o match:"No SAD entries." $HIJACKING setkey -D -a
     39 	atf_check -s exit:0 -o match:"No SPD entries." $HIJACKING setkey -D -P
     40 }
     41 
     42 check_sa_entries()
     43 {
     44 	local sock=$1
     45 	local local_addr=$2
     46 	local remote_addr=$3
     47 
     48 	export RUMP_SERVER=$sock
     49 
     50 	$DEBUG && $HIJACKING setkey -D
     51 
     52 	atf_check -s exit:0 -o match:"$local_addr $remote_addr" \
     53 	    $HIJACKING setkey -D
     54 	atf_check -s exit:0 -o match:"$remote_addr $local_addr" \
     55 	    $HIJACKING setkey -D
     56 	# TODO: more detail checks
     57 }
     58 
     59 check_sp_entries()
     60 {
     61 	local sock=$1
     62 	local local_addr=$2
     63 	local remote_addr=$3
     64 
     65 	export RUMP_SERVER=$sock
     66 
     67 	$DEBUG && $HIJACKING setkey -D -P
     68 
     69 	atf_check -s exit:0 \
     70 	    -o match:"$local_addr\[any\] $remote_addr\[any\] 255\(reserved\)" \
     71 	    $HIJACKING setkey -D -P
     72 	atf_check -s exit:0 \
     73 	    -o match:"$remote_addr\[any\] $local_addr\[any\] 255\(reserved\)" \
     74 	    $HIJACKING setkey -D -P
     75 	# TODO: more detail checks
     76 }
     77 
     78 generate_pktproto()
     79 {
     80 	local proto=$1
     81 
     82 	if [ $proto = ipcomp ]; then
     83 		echo IPComp
     84 	else
     85 		echo $proto | tr 'a-z' 'A-Z'
     86 	fi
     87 }
     88 
     89 get_natt_port()
     90 {
     91 	local local_addr=$1
     92 	local remote_addr=$2
     93 	local port=""
     94 
     95 	# 10.0.1.2:4500         20.0.0.2:4500         shmif1     20.0.0.1:35574
     96 	port=$($HIJACKING_NPF npfctl list | grep $local_addr | awk -F "${remote_addr}:" '/4500/ {print $2;}')
     97 	echo $port
     98 }
     99