t_ipsec_misc.sh revision 1.14 1 1.14 ozaki # $NetBSD: t_ipsec_misc.sh,v 1.14 2017/07/20 01:10:57 ozaki-r Exp $
2 1.1 ozaki #
3 1.1 ozaki # Copyright (c) 2017 Internet Initiative Japan Inc.
4 1.1 ozaki # All rights reserved.
5 1.1 ozaki #
6 1.1 ozaki # Redistribution and use in source and binary forms, with or without
7 1.1 ozaki # modification, are permitted provided that the following conditions
8 1.1 ozaki # are met:
9 1.1 ozaki # 1. Redistributions of source code must retain the above copyright
10 1.1 ozaki # notice, this list of conditions and the following disclaimer.
11 1.1 ozaki # 2. Redistributions in binary form must reproduce the above copyright
12 1.1 ozaki # notice, this list of conditions and the following disclaimer in the
13 1.1 ozaki # documentation and/or other materials provided with the distribution.
14 1.1 ozaki #
15 1.1 ozaki # THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
16 1.1 ozaki # ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
17 1.1 ozaki # TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
18 1.1 ozaki # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
19 1.1 ozaki # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
20 1.1 ozaki # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
21 1.1 ozaki # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
22 1.1 ozaki # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
23 1.1 ozaki # CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
24 1.1 ozaki # ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
25 1.1 ozaki # POSSIBILITY OF SUCH DAMAGE.
26 1.1 ozaki #
27 1.1 ozaki
28 1.1 ozaki SOCK_LOCAL=unix://ipsec_local
29 1.1 ozaki SOCK_PEER=unix://ipsec_peer
30 1.1 ozaki BUS=./bus_ipsec
31 1.1 ozaki
32 1.4 ozaki DEBUG=${DEBUG:-true}
33 1.1 ozaki
34 1.1 ozaki setup_sasp()
35 1.1 ozaki {
36 1.1 ozaki local proto=$1
37 1.1 ozaki local algo_args="$2"
38 1.1 ozaki local ip_local=$3
39 1.1 ozaki local ip_peer=$4
40 1.1 ozaki local lifetime=$5
41 1.8 ozaki local update=$6
42 1.1 ozaki local tmpfile=./tmp
43 1.8 ozaki local extra=
44 1.8 ozaki
45 1.8 ozaki if [ "$update" = sa ]; then
46 1.8 ozaki extra="update $ip_local $ip_peer $proto 10000 $algo_args;
47 1.8 ozaki update $ip_peer $ip_local $proto 10001 $algo_args;"
48 1.8 ozaki elif [ "$update" = sp ]; then
49 1.8 ozaki extra="spdupdate $ip_local $ip_peer any -P out ipsec $proto/transport//require;"
50 1.8 ozaki fi
51 1.1 ozaki
52 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
53 1.1 ozaki cat > $tmpfile <<-EOF
54 1.1 ozaki add $ip_local $ip_peer $proto 10000 -lh $lifetime -ls $lifetime $algo_args;
55 1.1 ozaki add $ip_peer $ip_local $proto 10001 -lh $lifetime -ls $lifetime $algo_args;
56 1.1 ozaki spdadd $ip_local $ip_peer any -P out ipsec $proto/transport//require;
57 1.8 ozaki $extra
58 1.1 ozaki EOF
59 1.1 ozaki $DEBUG && cat $tmpfile
60 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -c < $tmpfile
61 1.3 ozaki # XXX it can be expired if $lifetime is very short
62 1.3 ozaki #check_sa_entries $SOCK_LOCAL $ip_local $ip_peer
63 1.1 ozaki
64 1.8 ozaki if [ "$update" = sp ]; then
65 1.8 ozaki extra="spdupdate $ip_peer $ip_local any -P out ipsec $proto/transport//require;"
66 1.8 ozaki fi
67 1.8 ozaki
68 1.1 ozaki export RUMP_SERVER=$SOCK_PEER
69 1.1 ozaki cat > $tmpfile <<-EOF
70 1.1 ozaki add $ip_local $ip_peer $proto 10000 -lh $lifetime -ls $lifetime $algo_args;
71 1.1 ozaki add $ip_peer $ip_local $proto 10001 -lh $lifetime -ls $lifetime $algo_args;
72 1.1 ozaki spdadd $ip_peer $ip_local any -P out ipsec $proto/transport//require;
73 1.8 ozaki $extra
74 1.1 ozaki EOF
75 1.1 ozaki $DEBUG && cat $tmpfile
76 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -c < $tmpfile
77 1.3 ozaki # XXX it can be expired if $lifetime is very short
78 1.3 ozaki #check_sa_entries $SOCK_PEER $ip_local $ip_peer
79 1.1 ozaki }
80 1.1 ozaki
81 1.1 ozaki test_ipsec4_lifetime()
82 1.1 ozaki {
83 1.1 ozaki local proto=$1
84 1.1 ozaki local algo=$2
85 1.1 ozaki local ip_local=10.0.0.1
86 1.1 ozaki local ip_peer=10.0.0.2
87 1.1 ozaki local outfile=./out
88 1.1 ozaki local proto_cap=$(echo $proto | tr 'a-z' 'A-Z')
89 1.1 ozaki local algo_args="$(generate_algo_args $proto $algo)"
90 1.1 ozaki local lifetime=3
91 1.1 ozaki
92 1.1 ozaki rump_server_crypto_start $SOCK_LOCAL netipsec
93 1.1 ozaki rump_server_crypto_start $SOCK_PEER netipsec
94 1.1 ozaki rump_server_add_iface $SOCK_LOCAL shmif0 $BUS
95 1.1 ozaki rump_server_add_iface $SOCK_PEER shmif0 $BUS
96 1.1 ozaki
97 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
98 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.dad_count=0
99 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif0 $ip_local/24
100 1.1 ozaki #atf_check -s exit:0 -o ignore rump.sysctl -w net.key.debug=0xff
101 1.1 ozaki
102 1.1 ozaki export RUMP_SERVER=$SOCK_PEER
103 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.dad_count=0
104 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif0 $ip_peer/24
105 1.1 ozaki #atf_check -s exit:0 -o ignore rump.sysctl -w net.key.debug=0xff
106 1.1 ozaki
107 1.1 ozaki extract_new_packets $BUS > $outfile
108 1.1 ozaki
109 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
110 1.1 ozaki atf_check -s exit:0 -o ignore rump.ping -c 1 -n -w 3 $ip_peer
111 1.1 ozaki
112 1.1 ozaki extract_new_packets $BUS > $outfile
113 1.1 ozaki atf_check -s exit:0 -o match:"$ip_local > $ip_peer: ICMP echo request" \
114 1.1 ozaki cat $outfile
115 1.1 ozaki atf_check -s exit:0 -o match:"$ip_peer > $ip_local: ICMP echo reply" \
116 1.1 ozaki cat $outfile
117 1.1 ozaki
118 1.1 ozaki # Set up SAs with lifetime 1 sec.
119 1.1 ozaki setup_sasp $proto "$algo_args" $ip_local $ip_peer 1
120 1.1 ozaki
121 1.1 ozaki # Wait for the SAs to be expired
122 1.1 ozaki atf_check -s exit:0 sleep 2
123 1.1 ozaki
124 1.1 ozaki # Check the SAs have been expired
125 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
126 1.1 ozaki $DEBUG && $HIJACKING setkey -D
127 1.1 ozaki atf_check -s exit:0 -o match:'No SAD entries.' $HIJACKING setkey -D
128 1.1 ozaki export RUMP_SERVER=$SOCK_PEER
129 1.1 ozaki $DEBUG && $HIJACKING setkey -D
130 1.1 ozaki atf_check -s exit:0 -o match:'No SAD entries.' $HIJACKING setkey -D
131 1.1 ozaki
132 1.1 ozaki # Clean up SPs
133 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
134 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -F -P
135 1.1 ozaki export RUMP_SERVER=$SOCK_PEER
136 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -F -P
137 1.1 ozaki
138 1.1 ozaki # Set up SAs with lifetime with $lifetime
139 1.1 ozaki setup_sasp $proto "$algo_args" $ip_local $ip_peer $lifetime
140 1.1 ozaki
141 1.1 ozaki # Use the SAs; this will create a reference from an SP to an SA
142 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
143 1.1 ozaki atf_check -s exit:0 -o ignore rump.ping -c 1 -n -w 3 $ip_peer
144 1.1 ozaki
145 1.1 ozaki extract_new_packets $BUS > $outfile
146 1.1 ozaki atf_check -s exit:0 -o match:"$ip_local > $ip_peer: $proto_cap" \
147 1.1 ozaki cat $outfile
148 1.1 ozaki atf_check -s exit:0 -o match:"$ip_peer > $ip_local: $proto_cap" \
149 1.1 ozaki cat $outfile
150 1.1 ozaki
151 1.1 ozaki atf_check -s exit:0 sleep $((lifetime + 1))
152 1.1 ozaki
153 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
154 1.1 ozaki $DEBUG && $HIJACKING setkey -D
155 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -D
156 1.1 ozaki # The SA on output remain because sp/isr still refers it
157 1.1 ozaki atf_check -s exit:0 -o match:"$ip_local $ip_peer" \
158 1.1 ozaki $HIJACKING setkey -D -a
159 1.1 ozaki atf_check -s exit:0 -o not-match:"$ip_peer $ip_local" \
160 1.1 ozaki $HIJACKING setkey -D -a
161 1.1 ozaki
162 1.1 ozaki export RUMP_SERVER=$SOCK_PEER
163 1.1 ozaki $DEBUG && $HIJACKING setkey -D
164 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -D
165 1.1 ozaki atf_check -s exit:0 -o not-match:"$ip_local $ip_peer" \
166 1.1 ozaki $HIJACKING setkey -D -a
167 1.1 ozaki # The SA on output remain because sp/isr still refers it
168 1.1 ozaki atf_check -s exit:0 -o match:"$ip_peer $ip_local" \
169 1.1 ozaki $HIJACKING setkey -D -a
170 1.1 ozaki
171 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
172 1.1 ozaki atf_check -s not-exit:0 -o match:'0 packets received' \
173 1.1 ozaki rump.ping -c 1 -n -w 1 $ip_peer
174 1.1 ozaki
175 1.1 ozaki test_flush_entries $SOCK_LOCAL
176 1.1 ozaki test_flush_entries $SOCK_PEER
177 1.1 ozaki }
178 1.1 ozaki
179 1.1 ozaki test_ipsec6_lifetime()
180 1.1 ozaki {
181 1.1 ozaki local proto=$1
182 1.1 ozaki local algo=$2
183 1.1 ozaki local ip_local=fd00::1
184 1.1 ozaki local ip_peer=fd00::2
185 1.1 ozaki local outfile=./out
186 1.1 ozaki local proto_cap=$(echo $proto | tr 'a-z' 'A-Z')
187 1.1 ozaki local algo_args="$(generate_algo_args $proto $algo)"
188 1.1 ozaki local lifetime=3
189 1.1 ozaki
190 1.1 ozaki rump_server_crypto_start $SOCK_LOCAL netinet6 netipsec
191 1.1 ozaki rump_server_crypto_start $SOCK_PEER netinet6 netipsec
192 1.1 ozaki rump_server_add_iface $SOCK_LOCAL shmif0 $BUS
193 1.1 ozaki rump_server_add_iface $SOCK_PEER shmif0 $BUS
194 1.1 ozaki
195 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
196 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet6.ip6.dad_count=0
197 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif0 inet6 $ip_local
198 1.1 ozaki
199 1.1 ozaki export RUMP_SERVER=$SOCK_PEER
200 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet6.ip6.dad_count=0
201 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif0 inet6 $ip_peer
202 1.1 ozaki
203 1.1 ozaki extract_new_packets $BUS > $outfile
204 1.1 ozaki
205 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
206 1.1 ozaki atf_check -s exit:0 -o ignore rump.ping6 -c 1 -n -X 3 $ip_peer
207 1.1 ozaki
208 1.1 ozaki extract_new_packets $BUS > $outfile
209 1.1 ozaki atf_check -s exit:0 -o match:"$ip_local > $ip_peer: ICMP6, echo request" \
210 1.1 ozaki cat $outfile
211 1.1 ozaki atf_check -s exit:0 -o match:"$ip_peer > $ip_local: ICMP6, echo reply" \
212 1.1 ozaki cat $outfile
213 1.1 ozaki
214 1.1 ozaki # Set up SAs with lifetime 1 sec.
215 1.1 ozaki setup_sasp $proto "$algo_args" $ip_local $ip_peer 1
216 1.1 ozaki
217 1.1 ozaki # Wait for the SAs to be expired
218 1.1 ozaki atf_check -s exit:0 sleep 2
219 1.1 ozaki
220 1.1 ozaki # Check the SAs have been expired
221 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
222 1.1 ozaki $DEBUG && $HIJACKING setkey -D
223 1.1 ozaki atf_check -s exit:0 -o match:'No SAD entries.' $HIJACKING setkey -D
224 1.1 ozaki export RUMP_SERVER=$SOCK_PEER
225 1.1 ozaki $DEBUG && $HIJACKING setkey -D
226 1.1 ozaki atf_check -s exit:0 -o match:'No SAD entries.' $HIJACKING setkey -D
227 1.1 ozaki
228 1.1 ozaki # Clean up SPs
229 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
230 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -F -P
231 1.1 ozaki export RUMP_SERVER=$SOCK_PEER
232 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -F -P
233 1.1 ozaki
234 1.1 ozaki # Set up SAs with lifetime with $lifetime
235 1.1 ozaki setup_sasp $proto "$algo_args" $ip_local $ip_peer $lifetime
236 1.1 ozaki
237 1.1 ozaki # Use the SAs; this will create a reference from an SP to an SA
238 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
239 1.1 ozaki atf_check -s exit:0 -o ignore rump.ping6 -c 1 -n -X 3 $ip_peer
240 1.1 ozaki
241 1.1 ozaki extract_new_packets $BUS > $outfile
242 1.1 ozaki atf_check -s exit:0 -o match:"$ip_local > $ip_peer: $proto_cap" \
243 1.1 ozaki cat $outfile
244 1.1 ozaki atf_check -s exit:0 -o match:"$ip_peer > $ip_local: $proto_cap" \
245 1.1 ozaki cat $outfile
246 1.1 ozaki
247 1.1 ozaki atf_check -s exit:0 sleep $((lifetime + 1))
248 1.1 ozaki
249 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
250 1.1 ozaki $DEBUG && $HIJACKING setkey -D
251 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -D
252 1.1 ozaki # The SA on output remain because sp/isr still refers it
253 1.1 ozaki atf_check -s exit:0 -o match:"$ip_local $ip_peer" \
254 1.1 ozaki $HIJACKING setkey -D -a
255 1.1 ozaki atf_check -s exit:0 -o not-match:"$ip_peer $ip_local" \
256 1.1 ozaki $HIJACKING setkey -D -a
257 1.1 ozaki
258 1.1 ozaki export RUMP_SERVER=$SOCK_PEER
259 1.1 ozaki $DEBUG && $HIJACKING setkey -D
260 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -D
261 1.1 ozaki atf_check -s exit:0 -o not-match:"$ip_local $ip_peer" \
262 1.1 ozaki $HIJACKING setkey -D -a
263 1.1 ozaki # The SA on output remain because sp/isr still refers it
264 1.1 ozaki atf_check -s exit:0 -o match:"$ip_peer $ip_local" \
265 1.1 ozaki $HIJACKING setkey -D -a
266 1.1 ozaki
267 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
268 1.1 ozaki atf_check -s not-exit:0 -o match:'0 packets received' \
269 1.1 ozaki rump.ping6 -c 1 -n -X 1 $ip_peer
270 1.1 ozaki
271 1.1 ozaki test_flush_entries $SOCK_LOCAL
272 1.1 ozaki test_flush_entries $SOCK_PEER
273 1.1 ozaki }
274 1.1 ozaki
275 1.1 ozaki test_lifetime_common()
276 1.1 ozaki {
277 1.1 ozaki local ipproto=$1
278 1.1 ozaki local proto=$2
279 1.1 ozaki local algo=$3
280 1.1 ozaki
281 1.1 ozaki if [ $ipproto = ipv4 ]; then
282 1.1 ozaki test_ipsec4_lifetime $proto $algo
283 1.1 ozaki else
284 1.1 ozaki test_ipsec6_lifetime $proto $algo
285 1.1 ozaki fi
286 1.1 ozaki }
287 1.1 ozaki
288 1.1 ozaki add_test_lifetime()
289 1.1 ozaki {
290 1.1 ozaki local ipproto=$1
291 1.1 ozaki local proto=$2
292 1.1 ozaki local algo=$3
293 1.1 ozaki local _algo=$(echo $algo | sed 's/-//g')
294 1.1 ozaki local name= desc=
295 1.1 ozaki
296 1.1 ozaki name="ipsec_lifetime_${ipproto}_${proto}_${_algo}"
297 1.1 ozaki desc="Tests of lifetime of IPsec ($ipproto) with $proto ($algo)"
298 1.1 ozaki
299 1.1 ozaki atf_test_case ${name} cleanup
300 1.1 ozaki eval " \
301 1.1 ozaki ${name}_head() { \
302 1.1 ozaki atf_set \"descr\" \"$desc\"; \
303 1.1 ozaki atf_set \"require.progs\" \"rump_server\" \"setkey\"; \
304 1.1 ozaki }; \
305 1.1 ozaki ${name}_body() { \
306 1.1 ozaki test_lifetime_common $ipproto $proto $algo; \
307 1.1 ozaki rump_server_destroy_ifaces; \
308 1.1 ozaki }; \
309 1.1 ozaki ${name}_cleanup() { \
310 1.1 ozaki $DEBUG && dump; \
311 1.1 ozaki cleanup; \
312 1.1 ozaki } \
313 1.1 ozaki "
314 1.1 ozaki atf_add_test_case ${name}
315 1.1 ozaki }
316 1.1 ozaki
317 1.8 ozaki test_update()
318 1.8 ozaki {
319 1.8 ozaki local proto=$1
320 1.8 ozaki local algo=$2
321 1.8 ozaki local update=$3
322 1.8 ozaki local ip_local=10.0.0.1
323 1.8 ozaki local ip_peer=10.0.0.2
324 1.8 ozaki local algo_args="$(generate_algo_args $proto $algo)"
325 1.8 ozaki local proto_cap=$(echo $proto | tr 'a-z' 'A-Z')
326 1.8 ozaki local outfile=./out
327 1.8 ozaki
328 1.8 ozaki rump_server_crypto_start $SOCK_LOCAL netipsec
329 1.8 ozaki rump_server_crypto_start $SOCK_PEER netipsec
330 1.8 ozaki rump_server_add_iface $SOCK_LOCAL shmif0 $BUS
331 1.8 ozaki rump_server_add_iface $SOCK_PEER shmif0 $BUS
332 1.8 ozaki
333 1.8 ozaki export RUMP_SERVER=$SOCK_LOCAL
334 1.8 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.dad_count=0
335 1.8 ozaki atf_check -s exit:0 rump.ifconfig shmif0 $ip_local/24
336 1.8 ozaki
337 1.8 ozaki export RUMP_SERVER=$SOCK_PEER
338 1.8 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.dad_count=0
339 1.8 ozaki atf_check -s exit:0 rump.ifconfig shmif0 $ip_peer/24
340 1.8 ozaki
341 1.8 ozaki setup_sasp $proto "$algo_args" $ip_local $ip_peer 100 $update
342 1.8 ozaki
343 1.8 ozaki extract_new_packets $BUS > $outfile
344 1.8 ozaki
345 1.8 ozaki export RUMP_SERVER=$SOCK_LOCAL
346 1.8 ozaki atf_check -s exit:0 -o ignore rump.ping -c 1 -n -w 3 $ip_peer
347 1.8 ozaki
348 1.8 ozaki extract_new_packets $BUS > $outfile
349 1.8 ozaki atf_check -s exit:0 -o match:"$ip_local > $ip_peer: $proto_cap" \
350 1.8 ozaki cat $outfile
351 1.8 ozaki atf_check -s exit:0 -o match:"$ip_peer > $ip_local: $proto_cap" \
352 1.8 ozaki cat $outfile
353 1.8 ozaki }
354 1.8 ozaki
355 1.8 ozaki add_test_update()
356 1.8 ozaki {
357 1.8 ozaki local proto=$1
358 1.8 ozaki local algo=$2
359 1.8 ozaki local update=$3
360 1.8 ozaki local _update=$(echo $update |tr 'a-z' 'A-Z')
361 1.8 ozaki local _algo=$(echo $algo | sed 's/-//g')
362 1.8 ozaki local name= desc=
363 1.8 ozaki
364 1.8 ozaki desc="Tests trying to udpate $_update of $proto ($algo)"
365 1.8 ozaki name="ipsec_update_${update}_${proto}_${_algo}"
366 1.8 ozaki
367 1.8 ozaki atf_test_case ${name} cleanup
368 1.8 ozaki eval " \
369 1.8 ozaki ${name}_head() { \
370 1.8 ozaki atf_set \"descr\" \"$desc\"; \
371 1.8 ozaki atf_set \"require.progs\" \"rump_server\" \"setkey\"; \
372 1.8 ozaki }; \
373 1.8 ozaki ${name}_body() { \
374 1.8 ozaki test_update $proto $algo $update; \
375 1.8 ozaki rump_server_destroy_ifaces; \
376 1.8 ozaki }; \
377 1.8 ozaki ${name}_cleanup() { \
378 1.8 ozaki $DEBUG && dump; \
379 1.8 ozaki cleanup; \
380 1.8 ozaki } \
381 1.8 ozaki "
382 1.8 ozaki atf_add_test_case ${name}
383 1.8 ozaki }
384 1.8 ozaki
385 1.9 ozaki add_sa()
386 1.9 ozaki {
387 1.9 ozaki local proto=$1
388 1.9 ozaki local algo_args="$2"
389 1.9 ozaki local ip_local=$3
390 1.9 ozaki local ip_peer=$4
391 1.9 ozaki local lifetime=$5
392 1.9 ozaki local spi=$6
393 1.9 ozaki local tmpfile=./tmp
394 1.9 ozaki local extra=
395 1.9 ozaki
396 1.9 ozaki export RUMP_SERVER=$SOCK_LOCAL
397 1.9 ozaki cat > $tmpfile <<-EOF
398 1.9 ozaki add $ip_local $ip_peer $proto $((spi)) -lh $lifetime -ls $lifetime $algo_args;
399 1.9 ozaki add $ip_peer $ip_local $proto $((spi + 1)) -lh $lifetime -ls $lifetime $algo_args;
400 1.9 ozaki $extra
401 1.9 ozaki EOF
402 1.9 ozaki $DEBUG && cat $tmpfile
403 1.9 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -c < $tmpfile
404 1.9 ozaki $DEBUG && $HIJACKING setkey -D
405 1.9 ozaki # XXX it can be expired if $lifetime is very short
406 1.9 ozaki #check_sa_entries $SOCK_LOCAL $ip_local $ip_peer
407 1.9 ozaki
408 1.9 ozaki export RUMP_SERVER=$SOCK_PEER
409 1.9 ozaki cat > $tmpfile <<-EOF
410 1.9 ozaki add $ip_local $ip_peer $proto $((spi)) -lh $lifetime -ls $lifetime $algo_args;
411 1.9 ozaki add $ip_peer $ip_local $proto $((spi + 1)) -lh $lifetime -ls $lifetime $algo_args;
412 1.9 ozaki $extra
413 1.9 ozaki EOF
414 1.9 ozaki $DEBUG && cat $tmpfile
415 1.9 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -c < $tmpfile
416 1.9 ozaki $DEBUG && $HIJACKING setkey -D
417 1.9 ozaki # XXX it can be expired if $lifetime is very short
418 1.9 ozaki #check_sa_entries $SOCK_PEER $ip_local $ip_peer
419 1.9 ozaki }
420 1.9 ozaki
421 1.13 ozaki delete_sa()
422 1.13 ozaki {
423 1.13 ozaki local proto=$1
424 1.13 ozaki local ip_local=$2
425 1.13 ozaki local ip_peer=$3
426 1.13 ozaki local spi=$4
427 1.13 ozaki local tmpfile=./tmp
428 1.13 ozaki local extra=
429 1.13 ozaki
430 1.13 ozaki export RUMP_SERVER=$SOCK_LOCAL
431 1.13 ozaki cat > $tmpfile <<-EOF
432 1.13 ozaki delete $ip_local $ip_peer $proto $((spi));
433 1.13 ozaki delete $ip_peer $ip_local $proto $((spi + 1));
434 1.13 ozaki EOF
435 1.13 ozaki $DEBUG && cat $tmpfile
436 1.13 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -c < $tmpfile
437 1.13 ozaki $DEBUG && $HIJACKING setkey -D
438 1.13 ozaki
439 1.13 ozaki export RUMP_SERVER=$SOCK_PEER
440 1.13 ozaki cat > $tmpfile <<-EOF
441 1.13 ozaki delete $ip_local $ip_peer $proto $((spi));
442 1.13 ozaki delete $ip_peer $ip_local $proto $((spi + 1));
443 1.13 ozaki EOF
444 1.13 ozaki $DEBUG && cat $tmpfile
445 1.13 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -c < $tmpfile
446 1.13 ozaki $DEBUG && $HIJACKING setkey -D
447 1.13 ozaki }
448 1.13 ozaki
449 1.9 ozaki check_packet_spi()
450 1.9 ozaki {
451 1.9 ozaki local outfile=$1
452 1.9 ozaki local ip_local=$2
453 1.9 ozaki local ip_peer=$3
454 1.9 ozaki local proto=$4
455 1.9 ozaki local spi=$5
456 1.9 ozaki local spistr=
457 1.9 ozaki
458 1.9 ozaki $DEBUG && cat $outfile
459 1.9 ozaki spistr=$(printf "%08x" $spi)
460 1.9 ozaki atf_check -s exit:0 \
461 1.9 ozaki -o match:"$ip_local > $ip_peer: $proto_cap\(spi=0x$spistr," \
462 1.9 ozaki cat $outfile
463 1.9 ozaki spistr=$(printf "%08x" $((spi + 1)))
464 1.9 ozaki atf_check -s exit:0 \
465 1.9 ozaki -o match:"$ip_peer > $ip_local: $proto_cap\(spi=0x$spistr," \
466 1.9 ozaki cat $outfile
467 1.9 ozaki }
468 1.9 ozaki
469 1.12 ozaki wait_sa_disappeared()
470 1.12 ozaki {
471 1.12 ozaki local spi=$1
472 1.12 ozaki local i=
473 1.12 ozaki
474 1.12 ozaki export RUMP_SERVER=$SOCK_LOCAL
475 1.12 ozaki for i in $(seq 1 10); do
476 1.12 ozaki $HIJACKING setkey -D |grep -q "spi=$spi"
477 1.12 ozaki [ $? != 0 ] && break
478 1.12 ozaki sleep 1
479 1.12 ozaki done
480 1.12 ozaki if [ $i -eq 10 ]; then
481 1.12 ozaki atf_fail "SA (spi=$spi) didn't disappear in 10s"
482 1.12 ozaki fi
483 1.12 ozaki export RUMP_SERVER=$SOCK_PEER
484 1.12 ozaki for i in $(seq 1 10); do
485 1.12 ozaki $HIJACKING setkey -D |grep -q "spi=$spi"
486 1.12 ozaki [ $? != 0 ] && break
487 1.12 ozaki sleep 1
488 1.12 ozaki done
489 1.12 ozaki if [ $i -eq 10 ]; then
490 1.12 ozaki atf_fail "SA (spi=$spi) didn't disappear in 10s"
491 1.12 ozaki fi
492 1.12 ozaki }
493 1.12 ozaki
494 1.9 ozaki test_spi()
495 1.9 ozaki {
496 1.9 ozaki local proto=$1
497 1.9 ozaki local algo=$2
498 1.10 ozaki local preferred=$3
499 1.13 ozaki local method=$4
500 1.9 ozaki local ip_local=10.0.0.1
501 1.9 ozaki local ip_peer=10.0.0.2
502 1.9 ozaki local algo_args="$(generate_algo_args $proto $algo)"
503 1.9 ozaki local proto_cap=$(echo $proto | tr 'a-z' 'A-Z')
504 1.9 ozaki local outfile=./out
505 1.9 ozaki local spistr=
506 1.14 ozaki local longtime= shorttime=
507 1.14 ozaki
508 1.14 ozaki if [ $method = delete ]; then
509 1.14 ozaki shorttime=100
510 1.14 ozaki longtime=100
511 1.14 ozaki else
512 1.14 ozaki shorttime=3
513 1.14 ozaki longtime=6
514 1.14 ozaki fi
515 1.9 ozaki
516 1.9 ozaki rump_server_crypto_start $SOCK_LOCAL netipsec
517 1.9 ozaki rump_server_crypto_start $SOCK_PEER netipsec
518 1.9 ozaki rump_server_add_iface $SOCK_LOCAL shmif0 $BUS
519 1.9 ozaki rump_server_add_iface $SOCK_PEER shmif0 $BUS
520 1.9 ozaki
521 1.9 ozaki export RUMP_SERVER=$SOCK_LOCAL
522 1.9 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.dad_count=0
523 1.9 ozaki atf_check -s exit:0 rump.ifconfig shmif0 $ip_local/24
524 1.9 ozaki if [ $preferred = old ]; then
525 1.9 ozaki atf_check -s exit:0 rump.sysctl -q -w net.key.prefered_oldsa=1
526 1.9 ozaki fi
527 1.9 ozaki
528 1.9 ozaki export RUMP_SERVER=$SOCK_PEER
529 1.9 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.dad_count=0
530 1.9 ozaki atf_check -s exit:0 rump.ifconfig shmif0 $ip_peer/24
531 1.9 ozaki if [ $preferred = old ]; then
532 1.9 ozaki atf_check -s exit:0 rump.sysctl -q -w net.key.prefered_oldsa=1
533 1.9 ozaki fi
534 1.9 ozaki
535 1.9 ozaki setup_sasp $proto "$algo_args" $ip_local $ip_peer 100
536 1.9 ozaki
537 1.9 ozaki extract_new_packets $BUS > $outfile
538 1.9 ozaki
539 1.9 ozaki export RUMP_SERVER=$SOCK_LOCAL
540 1.9 ozaki atf_check -s exit:0 -o ignore rump.ping -c 1 -n -w 3 $ip_peer
541 1.9 ozaki extract_new_packets $BUS > $outfile
542 1.9 ozaki check_packet_spi $outfile $ip_local $ip_peer $proto_cap 10000
543 1.9 ozaki
544 1.9 ozaki # Add a new SA with a different SPI
545 1.14 ozaki add_sa $proto "$algo_args" $ip_local $ip_peer $longtime 10010
546 1.9 ozaki
547 1.9 ozaki export RUMP_SERVER=$SOCK_LOCAL
548 1.9 ozaki atf_check -s exit:0 -o ignore rump.ping -c 1 -n -w 3 $ip_peer
549 1.9 ozaki extract_new_packets $BUS > $outfile
550 1.9 ozaki if [ $preferred = old ]; then
551 1.9 ozaki check_packet_spi $outfile $ip_local $ip_peer $proto_cap 10000
552 1.9 ozaki else
553 1.9 ozaki # The new SA is preferred
554 1.9 ozaki check_packet_spi $outfile $ip_local $ip_peer $proto_cap 10010
555 1.9 ozaki fi
556 1.9 ozaki
557 1.9 ozaki # Add another SA with a different SPI
558 1.14 ozaki add_sa $proto "$algo_args" $ip_local $ip_peer $shorttime 10020
559 1.9 ozaki
560 1.9 ozaki export RUMP_SERVER=$SOCK_LOCAL
561 1.9 ozaki atf_check -s exit:0 -o ignore rump.ping -c 1 -n -w 3 $ip_peer
562 1.9 ozaki extract_new_packets $BUS > $outfile
563 1.9 ozaki if [ $preferred = old ]; then
564 1.9 ozaki check_packet_spi $outfile $ip_local $ip_peer $proto_cap 10000
565 1.9 ozaki else
566 1.9 ozaki # The newest SA is preferred
567 1.9 ozaki check_packet_spi $outfile $ip_local $ip_peer $proto_cap 10020
568 1.9 ozaki fi
569 1.9 ozaki
570 1.13 ozaki if [ $method = delete ]; then
571 1.13 ozaki delete_sa $proto $ip_local $ip_peer 10020
572 1.13 ozaki else
573 1.13 ozaki wait_sa_disappeared 10020
574 1.13 ozaki fi
575 1.9 ozaki
576 1.9 ozaki export RUMP_SERVER=$SOCK_LOCAL
577 1.9 ozaki atf_check -s exit:0 -o ignore rump.ping -c 1 -n -w 3 $ip_peer
578 1.9 ozaki extract_new_packets $BUS > $outfile
579 1.9 ozaki if [ $preferred = old ]; then
580 1.9 ozaki check_packet_spi $outfile $ip_local $ip_peer $proto_cap 10000
581 1.9 ozaki else
582 1.9 ozaki # The newest one is removed and the second one is used
583 1.9 ozaki check_packet_spi $outfile $ip_local $ip_peer $proto_cap 10010
584 1.9 ozaki fi
585 1.9 ozaki
586 1.13 ozaki if [ $method = delete ]; then
587 1.13 ozaki delete_sa $proto $ip_local $ip_peer 10010
588 1.13 ozaki else
589 1.13 ozaki wait_sa_disappeared 10010
590 1.13 ozaki fi
591 1.9 ozaki
592 1.9 ozaki export RUMP_SERVER=$SOCK_LOCAL
593 1.9 ozaki atf_check -s exit:0 -o ignore rump.ping -c 1 -n -w 3 $ip_peer
594 1.9 ozaki extract_new_packets $BUS > $outfile
595 1.9 ozaki if [ $preferred = old ]; then
596 1.9 ozaki check_packet_spi $outfile $ip_local $ip_peer $proto_cap 10000
597 1.9 ozaki else
598 1.9 ozaki # The second one is removed and the original one is used
599 1.9 ozaki check_packet_spi $outfile $ip_local $ip_peer $proto_cap 10000
600 1.9 ozaki fi
601 1.9 ozaki }
602 1.9 ozaki
603 1.9 ozaki add_test_spi()
604 1.9 ozaki {
605 1.9 ozaki local proto=$1
606 1.9 ozaki local algo=$2
607 1.9 ozaki local preferred=$3
608 1.13 ozaki local method=$4
609 1.9 ozaki local _algo=$(echo $algo | sed 's/-//g')
610 1.9 ozaki local name= desc=
611 1.9 ozaki
612 1.13 ozaki desc="Tests SAs with different SPIs of $proto ($algo) ($preferred SA preferred) ($method)"
613 1.13 ozaki name="ipsec_spi_${proto}_${_algo}_preferred_${preferred}_${method}"
614 1.9 ozaki
615 1.9 ozaki atf_test_case ${name} cleanup
616 1.9 ozaki eval " \
617 1.9 ozaki ${name}_head() { \
618 1.9 ozaki atf_set \"descr\" \"$desc\"; \
619 1.9 ozaki atf_set \"require.progs\" \"rump_server\" \"setkey\"; \
620 1.9 ozaki }; \
621 1.9 ozaki ${name}_body() { \
622 1.13 ozaki test_spi $proto $algo $preferred $method; \
623 1.9 ozaki rump_server_destroy_ifaces; \
624 1.9 ozaki }; \
625 1.9 ozaki ${name}_cleanup() { \
626 1.9 ozaki $DEBUG && dump; \
627 1.9 ozaki cleanup; \
628 1.9 ozaki } \
629 1.9 ozaki "
630 1.9 ozaki atf_add_test_case ${name}
631 1.9 ozaki }
632 1.9 ozaki
633 1.1 ozaki atf_init_test_cases()
634 1.1 ozaki {
635 1.1 ozaki local algo=
636 1.1 ozaki
637 1.1 ozaki for algo in $ESP_ENCRYPTION_ALGORITHMS_MINIMUM; do
638 1.1 ozaki add_test_lifetime ipv4 esp $algo
639 1.1 ozaki add_test_lifetime ipv6 esp $algo
640 1.8 ozaki add_test_update esp $algo sa
641 1.8 ozaki add_test_update esp $algo sp
642 1.13 ozaki add_test_spi esp $algo new delete
643 1.13 ozaki add_test_spi esp $algo old delete
644 1.13 ozaki add_test_spi esp $algo new timeout
645 1.13 ozaki add_test_spi esp $algo old timeout
646 1.1 ozaki done
647 1.1 ozaki for algo in $AH_AUTHENTICATION_ALGORITHMS_MINIMUM; do
648 1.1 ozaki add_test_lifetime ipv4 ah $algo
649 1.1 ozaki add_test_lifetime ipv6 ah $algo
650 1.8 ozaki add_test_update ah $algo sa
651 1.8 ozaki add_test_update ah $algo sp
652 1.13 ozaki add_test_spi ah $algo new delete
653 1.13 ozaki add_test_spi ah $algo old delete
654 1.13 ozaki add_test_spi ah $algo new timeout
655 1.13 ozaki add_test_spi ah $algo old timeout
656 1.1 ozaki done
657 1.1 ozaki }
658