t_ipsec_misc.sh revision 1.12 1 1.12 ozaki # $NetBSD: t_ipsec_misc.sh,v 1.12 2017/07/19 02:06:11 ozaki-r Exp $
2 1.1 ozaki #
3 1.1 ozaki # Copyright (c) 2017 Internet Initiative Japan Inc.
4 1.1 ozaki # All rights reserved.
5 1.1 ozaki #
6 1.1 ozaki # Redistribution and use in source and binary forms, with or without
7 1.1 ozaki # modification, are permitted provided that the following conditions
8 1.1 ozaki # are met:
9 1.1 ozaki # 1. Redistributions of source code must retain the above copyright
10 1.1 ozaki # notice, this list of conditions and the following disclaimer.
11 1.1 ozaki # 2. Redistributions in binary form must reproduce the above copyright
12 1.1 ozaki # notice, this list of conditions and the following disclaimer in the
13 1.1 ozaki # documentation and/or other materials provided with the distribution.
14 1.1 ozaki #
15 1.1 ozaki # THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
16 1.1 ozaki # ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
17 1.1 ozaki # TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
18 1.1 ozaki # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
19 1.1 ozaki # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
20 1.1 ozaki # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
21 1.1 ozaki # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
22 1.1 ozaki # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
23 1.1 ozaki # CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
24 1.1 ozaki # ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
25 1.1 ozaki # POSSIBILITY OF SUCH DAMAGE.
26 1.1 ozaki #
27 1.1 ozaki
28 1.1 ozaki SOCK_LOCAL=unix://ipsec_local
29 1.1 ozaki SOCK_PEER=unix://ipsec_peer
30 1.1 ozaki BUS=./bus_ipsec
31 1.1 ozaki
32 1.4 ozaki DEBUG=${DEBUG:-true}
33 1.1 ozaki
34 1.1 ozaki setup_sasp()
35 1.1 ozaki {
36 1.1 ozaki local proto=$1
37 1.1 ozaki local algo_args="$2"
38 1.1 ozaki local ip_local=$3
39 1.1 ozaki local ip_peer=$4
40 1.1 ozaki local lifetime=$5
41 1.8 ozaki local update=$6
42 1.1 ozaki local tmpfile=./tmp
43 1.8 ozaki local extra=
44 1.8 ozaki
45 1.8 ozaki if [ "$update" = sa ]; then
46 1.8 ozaki extra="update $ip_local $ip_peer $proto 10000 $algo_args;
47 1.8 ozaki update $ip_peer $ip_local $proto 10001 $algo_args;"
48 1.8 ozaki elif [ "$update" = sp ]; then
49 1.8 ozaki extra="spdupdate $ip_local $ip_peer any -P out ipsec $proto/transport//require;"
50 1.8 ozaki fi
51 1.1 ozaki
52 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
53 1.1 ozaki cat > $tmpfile <<-EOF
54 1.1 ozaki add $ip_local $ip_peer $proto 10000 -lh $lifetime -ls $lifetime $algo_args;
55 1.1 ozaki add $ip_peer $ip_local $proto 10001 -lh $lifetime -ls $lifetime $algo_args;
56 1.1 ozaki spdadd $ip_local $ip_peer any -P out ipsec $proto/transport//require;
57 1.8 ozaki $extra
58 1.1 ozaki EOF
59 1.1 ozaki $DEBUG && cat $tmpfile
60 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -c < $tmpfile
61 1.3 ozaki # XXX it can be expired if $lifetime is very short
62 1.3 ozaki #check_sa_entries $SOCK_LOCAL $ip_local $ip_peer
63 1.1 ozaki
64 1.8 ozaki if [ "$update" = sp ]; then
65 1.8 ozaki extra="spdupdate $ip_peer $ip_local any -P out ipsec $proto/transport//require;"
66 1.8 ozaki fi
67 1.8 ozaki
68 1.1 ozaki export RUMP_SERVER=$SOCK_PEER
69 1.1 ozaki cat > $tmpfile <<-EOF
70 1.1 ozaki add $ip_local $ip_peer $proto 10000 -lh $lifetime -ls $lifetime $algo_args;
71 1.1 ozaki add $ip_peer $ip_local $proto 10001 -lh $lifetime -ls $lifetime $algo_args;
72 1.1 ozaki spdadd $ip_peer $ip_local any -P out ipsec $proto/transport//require;
73 1.8 ozaki $extra
74 1.1 ozaki EOF
75 1.1 ozaki $DEBUG && cat $tmpfile
76 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -c < $tmpfile
77 1.3 ozaki # XXX it can be expired if $lifetime is very short
78 1.3 ozaki #check_sa_entries $SOCK_PEER $ip_local $ip_peer
79 1.1 ozaki }
80 1.1 ozaki
81 1.1 ozaki test_ipsec4_lifetime()
82 1.1 ozaki {
83 1.1 ozaki local proto=$1
84 1.1 ozaki local algo=$2
85 1.1 ozaki local ip_local=10.0.0.1
86 1.1 ozaki local ip_peer=10.0.0.2
87 1.1 ozaki local outfile=./out
88 1.1 ozaki local proto_cap=$(echo $proto | tr 'a-z' 'A-Z')
89 1.1 ozaki local algo_args="$(generate_algo_args $proto $algo)"
90 1.1 ozaki local lifetime=3
91 1.1 ozaki
92 1.1 ozaki rump_server_crypto_start $SOCK_LOCAL netipsec
93 1.1 ozaki rump_server_crypto_start $SOCK_PEER netipsec
94 1.1 ozaki rump_server_add_iface $SOCK_LOCAL shmif0 $BUS
95 1.1 ozaki rump_server_add_iface $SOCK_PEER shmif0 $BUS
96 1.1 ozaki
97 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
98 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.dad_count=0
99 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif0 $ip_local/24
100 1.1 ozaki #atf_check -s exit:0 -o ignore rump.sysctl -w net.key.debug=0xff
101 1.1 ozaki
102 1.1 ozaki export RUMP_SERVER=$SOCK_PEER
103 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.dad_count=0
104 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif0 $ip_peer/24
105 1.1 ozaki #atf_check -s exit:0 -o ignore rump.sysctl -w net.key.debug=0xff
106 1.1 ozaki
107 1.1 ozaki extract_new_packets $BUS > $outfile
108 1.1 ozaki
109 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
110 1.1 ozaki atf_check -s exit:0 -o ignore rump.ping -c 1 -n -w 3 $ip_peer
111 1.1 ozaki
112 1.1 ozaki extract_new_packets $BUS > $outfile
113 1.1 ozaki atf_check -s exit:0 -o match:"$ip_local > $ip_peer: ICMP echo request" \
114 1.1 ozaki cat $outfile
115 1.1 ozaki atf_check -s exit:0 -o match:"$ip_peer > $ip_local: ICMP echo reply" \
116 1.1 ozaki cat $outfile
117 1.1 ozaki
118 1.1 ozaki # Set up SAs with lifetime 1 sec.
119 1.1 ozaki setup_sasp $proto "$algo_args" $ip_local $ip_peer 1
120 1.1 ozaki
121 1.1 ozaki # Wait for the SAs to be expired
122 1.1 ozaki atf_check -s exit:0 sleep 2
123 1.1 ozaki
124 1.1 ozaki # Check the SAs have been expired
125 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
126 1.1 ozaki $DEBUG && $HIJACKING setkey -D
127 1.1 ozaki atf_check -s exit:0 -o match:'No SAD entries.' $HIJACKING setkey -D
128 1.1 ozaki export RUMP_SERVER=$SOCK_PEER
129 1.1 ozaki $DEBUG && $HIJACKING setkey -D
130 1.1 ozaki atf_check -s exit:0 -o match:'No SAD entries.' $HIJACKING setkey -D
131 1.1 ozaki
132 1.1 ozaki # Clean up SPs
133 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
134 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -F -P
135 1.1 ozaki export RUMP_SERVER=$SOCK_PEER
136 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -F -P
137 1.1 ozaki
138 1.1 ozaki # Set up SAs with lifetime with $lifetime
139 1.1 ozaki setup_sasp $proto "$algo_args" $ip_local $ip_peer $lifetime
140 1.1 ozaki
141 1.1 ozaki # Use the SAs; this will create a reference from an SP to an SA
142 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
143 1.1 ozaki atf_check -s exit:0 -o ignore rump.ping -c 1 -n -w 3 $ip_peer
144 1.1 ozaki
145 1.1 ozaki extract_new_packets $BUS > $outfile
146 1.1 ozaki atf_check -s exit:0 -o match:"$ip_local > $ip_peer: $proto_cap" \
147 1.1 ozaki cat $outfile
148 1.1 ozaki atf_check -s exit:0 -o match:"$ip_peer > $ip_local: $proto_cap" \
149 1.1 ozaki cat $outfile
150 1.1 ozaki
151 1.1 ozaki atf_check -s exit:0 sleep $((lifetime + 1))
152 1.1 ozaki
153 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
154 1.1 ozaki $DEBUG && $HIJACKING setkey -D
155 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -D
156 1.1 ozaki # The SA on output remain because sp/isr still refers it
157 1.1 ozaki atf_check -s exit:0 -o match:"$ip_local $ip_peer" \
158 1.1 ozaki $HIJACKING setkey -D -a
159 1.1 ozaki atf_check -s exit:0 -o not-match:"$ip_peer $ip_local" \
160 1.1 ozaki $HIJACKING setkey -D -a
161 1.1 ozaki
162 1.1 ozaki export RUMP_SERVER=$SOCK_PEER
163 1.1 ozaki $DEBUG && $HIJACKING setkey -D
164 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -D
165 1.1 ozaki atf_check -s exit:0 -o not-match:"$ip_local $ip_peer" \
166 1.1 ozaki $HIJACKING setkey -D -a
167 1.1 ozaki # The SA on output remain because sp/isr still refers it
168 1.1 ozaki atf_check -s exit:0 -o match:"$ip_peer $ip_local" \
169 1.1 ozaki $HIJACKING setkey -D -a
170 1.1 ozaki
171 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
172 1.1 ozaki atf_check -s not-exit:0 -o match:'0 packets received' \
173 1.1 ozaki rump.ping -c 1 -n -w 1 $ip_peer
174 1.1 ozaki
175 1.1 ozaki test_flush_entries $SOCK_LOCAL
176 1.1 ozaki test_flush_entries $SOCK_PEER
177 1.1 ozaki }
178 1.1 ozaki
179 1.1 ozaki test_ipsec6_lifetime()
180 1.1 ozaki {
181 1.1 ozaki local proto=$1
182 1.1 ozaki local algo=$2
183 1.1 ozaki local ip_local=fd00::1
184 1.1 ozaki local ip_peer=fd00::2
185 1.1 ozaki local outfile=./out
186 1.1 ozaki local proto_cap=$(echo $proto | tr 'a-z' 'A-Z')
187 1.1 ozaki local algo_args="$(generate_algo_args $proto $algo)"
188 1.1 ozaki local lifetime=3
189 1.1 ozaki
190 1.1 ozaki rump_server_crypto_start $SOCK_LOCAL netinet6 netipsec
191 1.1 ozaki rump_server_crypto_start $SOCK_PEER netinet6 netipsec
192 1.1 ozaki rump_server_add_iface $SOCK_LOCAL shmif0 $BUS
193 1.1 ozaki rump_server_add_iface $SOCK_PEER shmif0 $BUS
194 1.1 ozaki
195 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
196 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet6.ip6.dad_count=0
197 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif0 inet6 $ip_local
198 1.1 ozaki
199 1.1 ozaki export RUMP_SERVER=$SOCK_PEER
200 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet6.ip6.dad_count=0
201 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif0 inet6 $ip_peer
202 1.1 ozaki
203 1.1 ozaki extract_new_packets $BUS > $outfile
204 1.1 ozaki
205 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
206 1.1 ozaki atf_check -s exit:0 -o ignore rump.ping6 -c 1 -n -X 3 $ip_peer
207 1.1 ozaki
208 1.1 ozaki extract_new_packets $BUS > $outfile
209 1.1 ozaki atf_check -s exit:0 -o match:"$ip_local > $ip_peer: ICMP6, echo request" \
210 1.1 ozaki cat $outfile
211 1.1 ozaki atf_check -s exit:0 -o match:"$ip_peer > $ip_local: ICMP6, echo reply" \
212 1.1 ozaki cat $outfile
213 1.1 ozaki
214 1.1 ozaki # Set up SAs with lifetime 1 sec.
215 1.1 ozaki setup_sasp $proto "$algo_args" $ip_local $ip_peer 1
216 1.1 ozaki
217 1.1 ozaki # Wait for the SAs to be expired
218 1.1 ozaki atf_check -s exit:0 sleep 2
219 1.1 ozaki
220 1.1 ozaki # Check the SAs have been expired
221 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
222 1.1 ozaki $DEBUG && $HIJACKING setkey -D
223 1.1 ozaki atf_check -s exit:0 -o match:'No SAD entries.' $HIJACKING setkey -D
224 1.1 ozaki export RUMP_SERVER=$SOCK_PEER
225 1.1 ozaki $DEBUG && $HIJACKING setkey -D
226 1.1 ozaki atf_check -s exit:0 -o match:'No SAD entries.' $HIJACKING setkey -D
227 1.1 ozaki
228 1.1 ozaki # Clean up SPs
229 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
230 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -F -P
231 1.1 ozaki export RUMP_SERVER=$SOCK_PEER
232 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -F -P
233 1.1 ozaki
234 1.1 ozaki # Set up SAs with lifetime with $lifetime
235 1.1 ozaki setup_sasp $proto "$algo_args" $ip_local $ip_peer $lifetime
236 1.1 ozaki
237 1.1 ozaki # Use the SAs; this will create a reference from an SP to an SA
238 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
239 1.1 ozaki atf_check -s exit:0 -o ignore rump.ping6 -c 1 -n -X 3 $ip_peer
240 1.1 ozaki
241 1.1 ozaki extract_new_packets $BUS > $outfile
242 1.1 ozaki atf_check -s exit:0 -o match:"$ip_local > $ip_peer: $proto_cap" \
243 1.1 ozaki cat $outfile
244 1.1 ozaki atf_check -s exit:0 -o match:"$ip_peer > $ip_local: $proto_cap" \
245 1.1 ozaki cat $outfile
246 1.1 ozaki
247 1.1 ozaki atf_check -s exit:0 sleep $((lifetime + 1))
248 1.1 ozaki
249 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
250 1.1 ozaki $DEBUG && $HIJACKING setkey -D
251 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -D
252 1.1 ozaki # The SA on output remain because sp/isr still refers it
253 1.1 ozaki atf_check -s exit:0 -o match:"$ip_local $ip_peer" \
254 1.1 ozaki $HIJACKING setkey -D -a
255 1.1 ozaki atf_check -s exit:0 -o not-match:"$ip_peer $ip_local" \
256 1.1 ozaki $HIJACKING setkey -D -a
257 1.1 ozaki
258 1.1 ozaki export RUMP_SERVER=$SOCK_PEER
259 1.1 ozaki $DEBUG && $HIJACKING setkey -D
260 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -D
261 1.1 ozaki atf_check -s exit:0 -o not-match:"$ip_local $ip_peer" \
262 1.1 ozaki $HIJACKING setkey -D -a
263 1.1 ozaki # The SA on output remain because sp/isr still refers it
264 1.1 ozaki atf_check -s exit:0 -o match:"$ip_peer $ip_local" \
265 1.1 ozaki $HIJACKING setkey -D -a
266 1.1 ozaki
267 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
268 1.1 ozaki atf_check -s not-exit:0 -o match:'0 packets received' \
269 1.1 ozaki rump.ping6 -c 1 -n -X 1 $ip_peer
270 1.1 ozaki
271 1.1 ozaki test_flush_entries $SOCK_LOCAL
272 1.1 ozaki test_flush_entries $SOCK_PEER
273 1.1 ozaki }
274 1.1 ozaki
275 1.1 ozaki test_lifetime_common()
276 1.1 ozaki {
277 1.1 ozaki local ipproto=$1
278 1.1 ozaki local proto=$2
279 1.1 ozaki local algo=$3
280 1.1 ozaki
281 1.1 ozaki if [ $ipproto = ipv4 ]; then
282 1.1 ozaki test_ipsec4_lifetime $proto $algo
283 1.1 ozaki else
284 1.1 ozaki test_ipsec6_lifetime $proto $algo
285 1.1 ozaki fi
286 1.1 ozaki }
287 1.1 ozaki
288 1.1 ozaki add_test_lifetime()
289 1.1 ozaki {
290 1.1 ozaki local ipproto=$1
291 1.1 ozaki local proto=$2
292 1.1 ozaki local algo=$3
293 1.1 ozaki local _algo=$(echo $algo | sed 's/-//g')
294 1.1 ozaki local name= desc=
295 1.1 ozaki
296 1.1 ozaki name="ipsec_lifetime_${ipproto}_${proto}_${_algo}"
297 1.1 ozaki desc="Tests of lifetime of IPsec ($ipproto) with $proto ($algo)"
298 1.1 ozaki
299 1.1 ozaki atf_test_case ${name} cleanup
300 1.1 ozaki eval " \
301 1.1 ozaki ${name}_head() { \
302 1.1 ozaki atf_set \"descr\" \"$desc\"; \
303 1.1 ozaki atf_set \"require.progs\" \"rump_server\" \"setkey\"; \
304 1.1 ozaki }; \
305 1.1 ozaki ${name}_body() { \
306 1.1 ozaki test_lifetime_common $ipproto $proto $algo; \
307 1.1 ozaki rump_server_destroy_ifaces; \
308 1.1 ozaki }; \
309 1.1 ozaki ${name}_cleanup() { \
310 1.1 ozaki $DEBUG && dump; \
311 1.1 ozaki cleanup; \
312 1.1 ozaki } \
313 1.1 ozaki "
314 1.1 ozaki atf_add_test_case ${name}
315 1.1 ozaki }
316 1.1 ozaki
317 1.8 ozaki test_update()
318 1.8 ozaki {
319 1.8 ozaki local proto=$1
320 1.8 ozaki local algo=$2
321 1.8 ozaki local update=$3
322 1.8 ozaki local ip_local=10.0.0.1
323 1.8 ozaki local ip_peer=10.0.0.2
324 1.8 ozaki local algo_args="$(generate_algo_args $proto $algo)"
325 1.8 ozaki local proto_cap=$(echo $proto | tr 'a-z' 'A-Z')
326 1.8 ozaki local outfile=./out
327 1.8 ozaki
328 1.8 ozaki rump_server_crypto_start $SOCK_LOCAL netipsec
329 1.8 ozaki rump_server_crypto_start $SOCK_PEER netipsec
330 1.8 ozaki rump_server_add_iface $SOCK_LOCAL shmif0 $BUS
331 1.8 ozaki rump_server_add_iface $SOCK_PEER shmif0 $BUS
332 1.8 ozaki
333 1.8 ozaki export RUMP_SERVER=$SOCK_LOCAL
334 1.8 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.dad_count=0
335 1.8 ozaki atf_check -s exit:0 rump.ifconfig shmif0 $ip_local/24
336 1.8 ozaki
337 1.8 ozaki export RUMP_SERVER=$SOCK_PEER
338 1.8 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.dad_count=0
339 1.8 ozaki atf_check -s exit:0 rump.ifconfig shmif0 $ip_peer/24
340 1.8 ozaki
341 1.8 ozaki setup_sasp $proto "$algo_args" $ip_local $ip_peer 100 $update
342 1.8 ozaki
343 1.8 ozaki extract_new_packets $BUS > $outfile
344 1.8 ozaki
345 1.8 ozaki export RUMP_SERVER=$SOCK_LOCAL
346 1.8 ozaki atf_check -s exit:0 -o ignore rump.ping -c 1 -n -w 3 $ip_peer
347 1.8 ozaki
348 1.8 ozaki extract_new_packets $BUS > $outfile
349 1.8 ozaki atf_check -s exit:0 -o match:"$ip_local > $ip_peer: $proto_cap" \
350 1.8 ozaki cat $outfile
351 1.8 ozaki atf_check -s exit:0 -o match:"$ip_peer > $ip_local: $proto_cap" \
352 1.8 ozaki cat $outfile
353 1.8 ozaki }
354 1.8 ozaki
355 1.8 ozaki add_test_update()
356 1.8 ozaki {
357 1.8 ozaki local proto=$1
358 1.8 ozaki local algo=$2
359 1.8 ozaki local update=$3
360 1.8 ozaki local _update=$(echo $update |tr 'a-z' 'A-Z')
361 1.8 ozaki local _algo=$(echo $algo | sed 's/-//g')
362 1.8 ozaki local name= desc=
363 1.8 ozaki
364 1.8 ozaki desc="Tests trying to udpate $_update of $proto ($algo)"
365 1.8 ozaki name="ipsec_update_${update}_${proto}_${_algo}"
366 1.8 ozaki
367 1.8 ozaki atf_test_case ${name} cleanup
368 1.8 ozaki eval " \
369 1.8 ozaki ${name}_head() { \
370 1.8 ozaki atf_set \"descr\" \"$desc\"; \
371 1.8 ozaki atf_set \"require.progs\" \"rump_server\" \"setkey\"; \
372 1.8 ozaki }; \
373 1.8 ozaki ${name}_body() { \
374 1.8 ozaki test_update $proto $algo $update; \
375 1.8 ozaki rump_server_destroy_ifaces; \
376 1.8 ozaki }; \
377 1.8 ozaki ${name}_cleanup() { \
378 1.8 ozaki $DEBUG && dump; \
379 1.8 ozaki cleanup; \
380 1.8 ozaki } \
381 1.8 ozaki "
382 1.8 ozaki atf_add_test_case ${name}
383 1.8 ozaki }
384 1.8 ozaki
385 1.9 ozaki add_sa()
386 1.9 ozaki {
387 1.9 ozaki local proto=$1
388 1.9 ozaki local algo_args="$2"
389 1.9 ozaki local ip_local=$3
390 1.9 ozaki local ip_peer=$4
391 1.9 ozaki local lifetime=$5
392 1.9 ozaki local spi=$6
393 1.9 ozaki local tmpfile=./tmp
394 1.9 ozaki local extra=
395 1.9 ozaki
396 1.9 ozaki export RUMP_SERVER=$SOCK_LOCAL
397 1.9 ozaki cat > $tmpfile <<-EOF
398 1.9 ozaki add $ip_local $ip_peer $proto $((spi)) -lh $lifetime -ls $lifetime $algo_args;
399 1.9 ozaki add $ip_peer $ip_local $proto $((spi + 1)) -lh $lifetime -ls $lifetime $algo_args;
400 1.9 ozaki $extra
401 1.9 ozaki EOF
402 1.9 ozaki $DEBUG && cat $tmpfile
403 1.9 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -c < $tmpfile
404 1.9 ozaki $DEBUG && $HIJACKING setkey -D
405 1.9 ozaki # XXX it can be expired if $lifetime is very short
406 1.9 ozaki #check_sa_entries $SOCK_LOCAL $ip_local $ip_peer
407 1.9 ozaki
408 1.9 ozaki export RUMP_SERVER=$SOCK_PEER
409 1.9 ozaki cat > $tmpfile <<-EOF
410 1.9 ozaki add $ip_local $ip_peer $proto $((spi)) -lh $lifetime -ls $lifetime $algo_args;
411 1.9 ozaki add $ip_peer $ip_local $proto $((spi + 1)) -lh $lifetime -ls $lifetime $algo_args;
412 1.9 ozaki $extra
413 1.9 ozaki EOF
414 1.9 ozaki $DEBUG && cat $tmpfile
415 1.9 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -c < $tmpfile
416 1.9 ozaki $DEBUG && $HIJACKING setkey -D
417 1.9 ozaki # XXX it can be expired if $lifetime is very short
418 1.9 ozaki #check_sa_entries $SOCK_PEER $ip_local $ip_peer
419 1.9 ozaki }
420 1.9 ozaki
421 1.9 ozaki check_packet_spi()
422 1.9 ozaki {
423 1.9 ozaki local outfile=$1
424 1.9 ozaki local ip_local=$2
425 1.9 ozaki local ip_peer=$3
426 1.9 ozaki local proto=$4
427 1.9 ozaki local spi=$5
428 1.9 ozaki local spistr=
429 1.9 ozaki
430 1.9 ozaki $DEBUG && cat $outfile
431 1.9 ozaki spistr=$(printf "%08x" $spi)
432 1.9 ozaki atf_check -s exit:0 \
433 1.9 ozaki -o match:"$ip_local > $ip_peer: $proto_cap\(spi=0x$spistr," \
434 1.9 ozaki cat $outfile
435 1.9 ozaki spistr=$(printf "%08x" $((spi + 1)))
436 1.9 ozaki atf_check -s exit:0 \
437 1.9 ozaki -o match:"$ip_peer > $ip_local: $proto_cap\(spi=0x$spistr," \
438 1.9 ozaki cat $outfile
439 1.9 ozaki }
440 1.9 ozaki
441 1.12 ozaki wait_sa_disappeared()
442 1.12 ozaki {
443 1.12 ozaki local spi=$1
444 1.12 ozaki local i=
445 1.12 ozaki
446 1.12 ozaki export RUMP_SERVER=$SOCK_LOCAL
447 1.12 ozaki for i in $(seq 1 10); do
448 1.12 ozaki $HIJACKING setkey -D |grep -q "spi=$spi"
449 1.12 ozaki [ $? != 0 ] && break
450 1.12 ozaki sleep 1
451 1.12 ozaki done
452 1.12 ozaki if [ $i -eq 10 ]; then
453 1.12 ozaki atf_fail "SA (spi=$spi) didn't disappear in 10s"
454 1.12 ozaki fi
455 1.12 ozaki export RUMP_SERVER=$SOCK_PEER
456 1.12 ozaki for i in $(seq 1 10); do
457 1.12 ozaki $HIJACKING setkey -D |grep -q "spi=$spi"
458 1.12 ozaki [ $? != 0 ] && break
459 1.12 ozaki sleep 1
460 1.12 ozaki done
461 1.12 ozaki if [ $i -eq 10 ]; then
462 1.12 ozaki atf_fail "SA (spi=$spi) didn't disappear in 10s"
463 1.12 ozaki fi
464 1.12 ozaki }
465 1.12 ozaki
466 1.9 ozaki test_spi()
467 1.9 ozaki {
468 1.9 ozaki local proto=$1
469 1.9 ozaki local algo=$2
470 1.10 ozaki local preferred=$3
471 1.9 ozaki local ip_local=10.0.0.1
472 1.9 ozaki local ip_peer=10.0.0.2
473 1.9 ozaki local algo_args="$(generate_algo_args $proto $algo)"
474 1.9 ozaki local proto_cap=$(echo $proto | tr 'a-z' 'A-Z')
475 1.9 ozaki local outfile=./out
476 1.9 ozaki local spistr=
477 1.9 ozaki
478 1.9 ozaki rump_server_crypto_start $SOCK_LOCAL netipsec
479 1.9 ozaki rump_server_crypto_start $SOCK_PEER netipsec
480 1.9 ozaki rump_server_add_iface $SOCK_LOCAL shmif0 $BUS
481 1.9 ozaki rump_server_add_iface $SOCK_PEER shmif0 $BUS
482 1.9 ozaki
483 1.9 ozaki export RUMP_SERVER=$SOCK_LOCAL
484 1.9 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.dad_count=0
485 1.9 ozaki atf_check -s exit:0 rump.ifconfig shmif0 $ip_local/24
486 1.9 ozaki if [ $preferred = old ]; then
487 1.9 ozaki atf_check -s exit:0 rump.sysctl -q -w net.key.prefered_oldsa=1
488 1.9 ozaki fi
489 1.9 ozaki
490 1.9 ozaki export RUMP_SERVER=$SOCK_PEER
491 1.9 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.dad_count=0
492 1.9 ozaki atf_check -s exit:0 rump.ifconfig shmif0 $ip_peer/24
493 1.9 ozaki if [ $preferred = old ]; then
494 1.9 ozaki atf_check -s exit:0 rump.sysctl -q -w net.key.prefered_oldsa=1
495 1.9 ozaki fi
496 1.9 ozaki
497 1.9 ozaki setup_sasp $proto "$algo_args" $ip_local $ip_peer 100
498 1.9 ozaki
499 1.9 ozaki extract_new_packets $BUS > $outfile
500 1.9 ozaki
501 1.9 ozaki export RUMP_SERVER=$SOCK_LOCAL
502 1.9 ozaki atf_check -s exit:0 -o ignore rump.ping -c 1 -n -w 3 $ip_peer
503 1.9 ozaki extract_new_packets $BUS > $outfile
504 1.9 ozaki check_packet_spi $outfile $ip_local $ip_peer $proto_cap 10000
505 1.9 ozaki
506 1.9 ozaki # Add a new SA with a different SPI
507 1.9 ozaki add_sa $proto "$algo_args" $ip_local $ip_peer 6 10010
508 1.9 ozaki
509 1.9 ozaki export RUMP_SERVER=$SOCK_LOCAL
510 1.9 ozaki atf_check -s exit:0 -o ignore rump.ping -c 1 -n -w 3 $ip_peer
511 1.9 ozaki extract_new_packets $BUS > $outfile
512 1.9 ozaki if [ $preferred = old ]; then
513 1.9 ozaki check_packet_spi $outfile $ip_local $ip_peer $proto_cap 10000
514 1.9 ozaki else
515 1.9 ozaki # The new SA is preferred
516 1.9 ozaki check_packet_spi $outfile $ip_local $ip_peer $proto_cap 10010
517 1.9 ozaki fi
518 1.9 ozaki
519 1.9 ozaki # Add another SA with a different SPI
520 1.9 ozaki add_sa $proto "$algo_args" $ip_local $ip_peer 3 10020
521 1.9 ozaki
522 1.9 ozaki export RUMP_SERVER=$SOCK_LOCAL
523 1.9 ozaki atf_check -s exit:0 -o ignore rump.ping -c 1 -n -w 3 $ip_peer
524 1.9 ozaki extract_new_packets $BUS > $outfile
525 1.9 ozaki if [ $preferred = old ]; then
526 1.9 ozaki check_packet_spi $outfile $ip_local $ip_peer $proto_cap 10000
527 1.9 ozaki else
528 1.9 ozaki # The newest SA is preferred
529 1.9 ozaki check_packet_spi $outfile $ip_local $ip_peer $proto_cap 10020
530 1.9 ozaki fi
531 1.9 ozaki
532 1.12 ozaki wait_sa_disappeared 10020
533 1.9 ozaki
534 1.9 ozaki export RUMP_SERVER=$SOCK_LOCAL
535 1.9 ozaki atf_check -s exit:0 -o ignore rump.ping -c 1 -n -w 3 $ip_peer
536 1.9 ozaki extract_new_packets $BUS > $outfile
537 1.9 ozaki if [ $preferred = old ]; then
538 1.9 ozaki check_packet_spi $outfile $ip_local $ip_peer $proto_cap 10000
539 1.9 ozaki else
540 1.9 ozaki # The newest one is removed and the second one is used
541 1.9 ozaki check_packet_spi $outfile $ip_local $ip_peer $proto_cap 10010
542 1.9 ozaki fi
543 1.9 ozaki
544 1.12 ozaki wait_sa_disappeared 10010
545 1.9 ozaki
546 1.9 ozaki export RUMP_SERVER=$SOCK_LOCAL
547 1.9 ozaki atf_check -s exit:0 -o ignore rump.ping -c 1 -n -w 3 $ip_peer
548 1.9 ozaki extract_new_packets $BUS > $outfile
549 1.9 ozaki if [ $preferred = old ]; then
550 1.9 ozaki check_packet_spi $outfile $ip_local $ip_peer $proto_cap 10000
551 1.9 ozaki else
552 1.9 ozaki # The second one is removed and the original one is used
553 1.9 ozaki check_packet_spi $outfile $ip_local $ip_peer $proto_cap 10000
554 1.9 ozaki fi
555 1.9 ozaki }
556 1.9 ozaki
557 1.9 ozaki add_test_spi()
558 1.9 ozaki {
559 1.9 ozaki local proto=$1
560 1.9 ozaki local algo=$2
561 1.9 ozaki local preferred=$3
562 1.9 ozaki local _algo=$(echo $algo | sed 's/-//g')
563 1.9 ozaki local name= desc=
564 1.9 ozaki
565 1.9 ozaki desc="Tests SAs with different SPIs of $proto ($algo) ($preferred SA preferred)"
566 1.9 ozaki name="ipsec_spi_${proto}_${_algo}_preferred_${preferred}"
567 1.9 ozaki
568 1.9 ozaki atf_test_case ${name} cleanup
569 1.9 ozaki eval " \
570 1.9 ozaki ${name}_head() { \
571 1.9 ozaki atf_set \"descr\" \"$desc\"; \
572 1.9 ozaki atf_set \"require.progs\" \"rump_server\" \"setkey\"; \
573 1.9 ozaki }; \
574 1.9 ozaki ${name}_body() { \
575 1.9 ozaki test_spi $proto $algo $preferred; \
576 1.9 ozaki rump_server_destroy_ifaces; \
577 1.9 ozaki }; \
578 1.9 ozaki ${name}_cleanup() { \
579 1.9 ozaki $DEBUG && dump; \
580 1.9 ozaki cleanup; \
581 1.9 ozaki } \
582 1.9 ozaki "
583 1.9 ozaki atf_add_test_case ${name}
584 1.9 ozaki }
585 1.9 ozaki
586 1.1 ozaki atf_init_test_cases()
587 1.1 ozaki {
588 1.1 ozaki local algo=
589 1.1 ozaki
590 1.1 ozaki for algo in $ESP_ENCRYPTION_ALGORITHMS_MINIMUM; do
591 1.1 ozaki add_test_lifetime ipv4 esp $algo
592 1.1 ozaki add_test_lifetime ipv6 esp $algo
593 1.8 ozaki add_test_update esp $algo sa
594 1.8 ozaki add_test_update esp $algo sp
595 1.9 ozaki add_test_spi esp $algo new
596 1.9 ozaki add_test_spi esp $algo old
597 1.1 ozaki done
598 1.1 ozaki for algo in $AH_AUTHENTICATION_ALGORITHMS_MINIMUM; do
599 1.1 ozaki add_test_lifetime ipv4 ah $algo
600 1.1 ozaki add_test_lifetime ipv6 ah $algo
601 1.8 ozaki add_test_update ah $algo sa
602 1.8 ozaki add_test_update ah $algo sp
603 1.9 ozaki add_test_spi ah $algo new
604 1.9 ozaki add_test_spi ah $algo old
605 1.1 ozaki done
606 1.1 ozaki }
607