1 1.1 ozaki # $NetBSD: t_ipsec_sysctl.sh,v 1.1 2017/04/14 02:56:49 ozaki-r Exp $ 2 1.1 ozaki # 3 1.1 ozaki # Copyright (c) 2017 Internet Initiative Japan Inc. 4 1.1 ozaki # All rights reserved. 5 1.1 ozaki # 6 1.1 ozaki # Redistribution and use in source and binary forms, with or without 7 1.1 ozaki # modification, are permitted provided that the following conditions 8 1.1 ozaki # are met: 9 1.1 ozaki # 1. Redistributions of source code must retain the above copyright 10 1.1 ozaki # notice, this list of conditions and the following disclaimer. 11 1.1 ozaki # 2. Redistributions in binary form must reproduce the above copyright 12 1.1 ozaki # notice, this list of conditions and the following disclaimer in the 13 1.1 ozaki # documentation and/or other materials provided with the distribution. 14 1.1 ozaki # 15 1.1 ozaki # THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 16 1.1 ozaki # ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 17 1.1 ozaki # TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 18 1.1 ozaki # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 19 1.1 ozaki # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 20 1.1 ozaki # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 21 1.1 ozaki # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 22 1.1 ozaki # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 23 1.1 ozaki # CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 24 1.1 ozaki # ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 25 1.1 ozaki # POSSIBILITY OF SUCH DAMAGE. 26 1.1 ozaki # 27 1.1 ozaki 28 1.1 ozaki DEBUG=${DEBUG:-false} 29 1.1 ozaki 30 1.1 ozaki atf_test_case ipsec_sysctl0 cleanup 31 1.1 ozaki ipsec_sysctl0_head() 32 1.1 ozaki { 33 1.1 ozaki 34 1.1 ozaki atf_set "descr" "Tests of sysctl entries of IPsec without ipsec.so" 35 1.1 ozaki atf_set "require.progs" "rump_server" 36 1.1 ozaki } 37 1.1 ozaki 38 1.1 ozaki ipsec_sysctl0_body() 39 1.1 ozaki { 40 1.1 ozaki local sock=unix://ipsec_sysctl 41 1.1 ozaki 42 1.1 ozaki rump_server_crypto_start $sock 43 1.1 ozaki 44 1.1 ozaki export RUMP_SERVER=$sock 45 1.1 ozaki atf_check -s not-exit:0 -e match:'invalid' \ 46 1.1 ozaki rump.sysctl net.inet.ipsec.enabled 47 1.1 ozaki atf_check -s not-exit:0 -e match:'invalid' \ 48 1.1 ozaki rump.sysctl net.inet6.ipsec6.enabled 49 1.1 ozaki } 50 1.1 ozaki 51 1.1 ozaki ipsec_sysctl0_cleanup() 52 1.1 ozaki { 53 1.1 ozaki 54 1.1 ozaki $DEBUG && dump 55 1.1 ozaki cleanup 56 1.1 ozaki } 57 1.1 ozaki 58 1.1 ozaki atf_test_case ipsec_sysctl4 cleanup 59 1.1 ozaki ipsec_sysctl4_head() 60 1.1 ozaki { 61 1.1 ozaki 62 1.1 ozaki atf_set "descr" "Tests of sysctl entries of IPsec without netinet6.so" 63 1.1 ozaki atf_set "require.progs" "rump_server" 64 1.1 ozaki } 65 1.1 ozaki 66 1.1 ozaki ipsec_sysctl4_body() 67 1.1 ozaki { 68 1.1 ozaki local sock=unix://ipsec_sysctl 69 1.1 ozaki 70 1.1 ozaki rump_server_crypto_start $sock netipsec 71 1.1 ozaki 72 1.1 ozaki export RUMP_SERVER=$sock 73 1.1 ozaki atf_check -s exit:0 -o match:'= 1' rump.sysctl net.inet.ipsec.enabled 74 1.1 ozaki # net.inet6.ipsec6 entries exit regardless of netinet6 75 1.1 ozaki # net.inet6.ipsec6.enabled always equals net.inet.ipsec.enabled 76 1.1 ozaki atf_check -s exit:0 -o match:'= 1' rump.sysctl net.inet6.ipsec6.enabled 77 1.1 ozaki 78 1.1 ozaki atf_check -s exit:0 -o match:'= 0' rump.sysctl net.inet.ipsec.used 79 1.1 ozaki # net.inet6.ipsec6.used always equals net.inet.ipsec.used 80 1.1 ozaki atf_check -s exit:0 -o match:'= 0' rump.sysctl net.inet6.ipsec6.used 81 1.1 ozaki 82 1.1 ozaki # Add an SAD entry for IPv4 83 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -c <<-EOF 84 1.1 ozaki add 10.0.0.1 10.0.0.2 esp 9876 -E 3des-cbc "hogehogehogehogehogehoge"; 85 1.1 ozaki EOF 86 1.1 ozaki $DEBUG && $HIJACKING setkey -D 87 1.1 ozaki 88 1.1 ozaki atf_check -s exit:0 -o match:'= 0' rump.sysctl net.inet.ipsec.used 89 1.1 ozaki atf_check -s exit:0 -o match:'= 0' rump.sysctl net.inet6.ipsec6.used 90 1.1 ozaki 91 1.1 ozaki # Add an SPD entry for IPv4, which activates the IPsec function 92 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -c <<-EOF 93 1.1 ozaki spdadd 10.0.0.1 10.0.0.2 any -P out ipsec esp/transport//use; 94 1.1 ozaki EOF 95 1.1 ozaki $DEBUG && $HIJACKING setkey -D 96 1.1 ozaki 97 1.1 ozaki atf_check -s exit:0 -o match:'= 1' rump.sysctl net.inet.ipsec.used 98 1.1 ozaki atf_check -s exit:0 -o match:'= 1' rump.sysctl net.inet6.ipsec6.used 99 1.1 ozaki } 100 1.1 ozaki 101 1.1 ozaki ipsec_sysctl4_cleanup() 102 1.1 ozaki { 103 1.1 ozaki 104 1.1 ozaki $DEBUG && dump 105 1.1 ozaki cleanup 106 1.1 ozaki } 107 1.1 ozaki 108 1.1 ozaki atf_test_case ipsec_sysctl6 cleanup 109 1.1 ozaki ipsec_sysctl6_head() 110 1.1 ozaki { 111 1.1 ozaki 112 1.1 ozaki atf_set "descr" "Tests of sysctl entries of IPsec" 113 1.1 ozaki atf_set "require.progs" "rump_server" 114 1.1 ozaki } 115 1.1 ozaki 116 1.1 ozaki ipsec_sysctl6_body() 117 1.1 ozaki { 118 1.1 ozaki local sock=unix://ipsec_sysctl 119 1.1 ozaki 120 1.1 ozaki rump_server_crypto_start $sock netinet6 netipsec 121 1.1 ozaki 122 1.1 ozaki export RUMP_SERVER=$sock 123 1.1 ozaki atf_check -s exit:0 -o match:'= 1' rump.sysctl net.inet.ipsec.enabled 124 1.1 ozaki atf_check -s exit:0 -o match:'= 1' rump.sysctl net.inet6.ipsec6.enabled 125 1.1 ozaki 126 1.1 ozaki atf_check -s exit:0 -o match:'= 0' rump.sysctl net.inet.ipsec.used 127 1.1 ozaki atf_check -s exit:0 -o match:'= 0' rump.sysctl net.inet6.ipsec6.used 128 1.1 ozaki 129 1.1 ozaki # Add an SAD entry for IPv6 130 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -c <<-EOF 131 1.1 ozaki add fd00::1 fd00::2 esp 9876 -E 3des-cbc "hogehogehogehogehogehoge"; 132 1.1 ozaki EOF 133 1.1 ozaki $DEBUG && $HIJACKING setkey -D 134 1.1 ozaki 135 1.1 ozaki atf_check -s exit:0 -o match:'= 0' rump.sysctl net.inet.ipsec.used 136 1.1 ozaki atf_check -s exit:0 -o match:'= 0' rump.sysctl net.inet6.ipsec6.used 137 1.1 ozaki 138 1.1 ozaki # Add an SPD entry for IPv6, which activates the IPsec function 139 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -c <<-EOF 140 1.1 ozaki spdadd fd00::1 fd00::2 any -P out ipsec esp/transport//use; 141 1.1 ozaki EOF 142 1.1 ozaki $DEBUG && $HIJACKING setkey -D 143 1.1 ozaki 144 1.1 ozaki atf_check -s exit:0 -o match:'= 1' rump.sysctl net.inet.ipsec.used 145 1.1 ozaki atf_check -s exit:0 -o match:'= 1' rump.sysctl net.inet6.ipsec6.used 146 1.1 ozaki } 147 1.1 ozaki 148 1.1 ozaki ipsec_sysctl6_cleanup() 149 1.1 ozaki { 150 1.1 ozaki 151 1.1 ozaki $DEBUG && dump 152 1.1 ozaki cleanup 153 1.1 ozaki } 154 1.1 ozaki 155 1.1 ozaki atf_init_test_cases() 156 1.1 ozaki { 157 1.1 ozaki 158 1.1 ozaki atf_add_test_case ipsec_sysctl0 159 1.1 ozaki atf_add_test_case ipsec_sysctl4 160 1.1 ozaki atf_add_test_case ipsec_sysctl6 161 1.1 ozaki } 162