t_ipsec_sysctl.sh revision 1.1.2.2 1 # $NetBSD: t_ipsec_sysctl.sh,v 1.1.2.2 2017/04/14 02:56:50 ozaki-r Exp $
2 #
3 # Copyright (c) 2017 Internet Initiative Japan Inc.
4 # All rights reserved.
5 #
6 # Redistribution and use in source and binary forms, with or without
7 # modification, are permitted provided that the following conditions
8 # are met:
9 # 1. Redistributions of source code must retain the above copyright
10 # notice, this list of conditions and the following disclaimer.
11 # 2. Redistributions in binary form must reproduce the above copyright
12 # notice, this list of conditions and the following disclaimer in the
13 # documentation and/or other materials provided with the distribution.
14 #
15 # THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
16 # ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
17 # TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
18 # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
19 # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
20 # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
21 # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
22 # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
23 # CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
24 # ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
25 # POSSIBILITY OF SUCH DAMAGE.
26 #
27
28 DEBUG=${DEBUG:-false}
29
30 atf_test_case ipsec_sysctl0 cleanup
31 ipsec_sysctl0_head()
32 {
33
34 atf_set "descr" "Tests of sysctl entries of IPsec without ipsec.so"
35 atf_set "require.progs" "rump_server"
36 }
37
38 ipsec_sysctl0_body()
39 {
40 local sock=unix://ipsec_sysctl
41
42 rump_server_crypto_start $sock
43
44 export RUMP_SERVER=$sock
45 atf_check -s not-exit:0 -e match:'invalid' \
46 rump.sysctl net.inet.ipsec.enabled
47 atf_check -s not-exit:0 -e match:'invalid' \
48 rump.sysctl net.inet6.ipsec6.enabled
49 }
50
51 ipsec_sysctl0_cleanup()
52 {
53
54 $DEBUG && dump
55 cleanup
56 }
57
58 atf_test_case ipsec_sysctl4 cleanup
59 ipsec_sysctl4_head()
60 {
61
62 atf_set "descr" "Tests of sysctl entries of IPsec without netinet6.so"
63 atf_set "require.progs" "rump_server"
64 }
65
66 ipsec_sysctl4_body()
67 {
68 local sock=unix://ipsec_sysctl
69
70 rump_server_crypto_start $sock netipsec
71
72 export RUMP_SERVER=$sock
73 atf_check -s exit:0 -o match:'= 1' rump.sysctl net.inet.ipsec.enabled
74 # net.inet6.ipsec6 entries exit regardless of netinet6
75 # net.inet6.ipsec6.enabled always equals net.inet.ipsec.enabled
76 atf_check -s exit:0 -o match:'= 1' rump.sysctl net.inet6.ipsec6.enabled
77
78 atf_check -s exit:0 -o match:'= 0' rump.sysctl net.inet.ipsec.used
79 # net.inet6.ipsec6.used always equals net.inet.ipsec.used
80 atf_check -s exit:0 -o match:'= 0' rump.sysctl net.inet6.ipsec6.used
81
82 # Add an SAD entry for IPv4
83 atf_check -s exit:0 -o empty $HIJACKING setkey -c <<-EOF
84 add 10.0.0.1 10.0.0.2 esp 9876 -E 3des-cbc "hogehogehogehogehogehoge";
85 EOF
86 $DEBUG && $HIJACKING setkey -D
87
88 atf_check -s exit:0 -o match:'= 0' rump.sysctl net.inet.ipsec.used
89 atf_check -s exit:0 -o match:'= 0' rump.sysctl net.inet6.ipsec6.used
90
91 # Add an SPD entry for IPv4, which activates the IPsec function
92 atf_check -s exit:0 -o empty $HIJACKING setkey -c <<-EOF
93 spdadd 10.0.0.1 10.0.0.2 any -P out ipsec esp/transport//use;
94 EOF
95 $DEBUG && $HIJACKING setkey -D
96
97 atf_check -s exit:0 -o match:'= 1' rump.sysctl net.inet.ipsec.used
98 atf_check -s exit:0 -o match:'= 1' rump.sysctl net.inet6.ipsec6.used
99 }
100
101 ipsec_sysctl4_cleanup()
102 {
103
104 $DEBUG && dump
105 cleanup
106 }
107
108 atf_test_case ipsec_sysctl6 cleanup
109 ipsec_sysctl6_head()
110 {
111
112 atf_set "descr" "Tests of sysctl entries of IPsec"
113 atf_set "require.progs" "rump_server"
114 }
115
116 ipsec_sysctl6_body()
117 {
118 local sock=unix://ipsec_sysctl
119
120 rump_server_crypto_start $sock netinet6 netipsec
121
122 export RUMP_SERVER=$sock
123 atf_check -s exit:0 -o match:'= 1' rump.sysctl net.inet.ipsec.enabled
124 atf_check -s exit:0 -o match:'= 1' rump.sysctl net.inet6.ipsec6.enabled
125
126 atf_check -s exit:0 -o match:'= 0' rump.sysctl net.inet.ipsec.used
127 atf_check -s exit:0 -o match:'= 0' rump.sysctl net.inet6.ipsec6.used
128
129 # Add an SAD entry for IPv6
130 atf_check -s exit:0 -o empty $HIJACKING setkey -c <<-EOF
131 add fd00::1 fd00::2 esp 9876 -E 3des-cbc "hogehogehogehogehogehoge";
132 EOF
133 $DEBUG && $HIJACKING setkey -D
134
135 atf_check -s exit:0 -o match:'= 0' rump.sysctl net.inet.ipsec.used
136 atf_check -s exit:0 -o match:'= 0' rump.sysctl net.inet6.ipsec6.used
137
138 # Add an SPD entry for IPv6, which activates the IPsec function
139 atf_check -s exit:0 -o empty $HIJACKING setkey -c <<-EOF
140 spdadd fd00::1 fd00::2 any -P out ipsec esp/transport//use;
141 EOF
142 $DEBUG && $HIJACKING setkey -D
143
144 atf_check -s exit:0 -o match:'= 1' rump.sysctl net.inet.ipsec.used
145 atf_check -s exit:0 -o match:'= 1' rump.sysctl net.inet6.ipsec6.used
146 }
147
148 ipsec_sysctl6_cleanup()
149 {
150
151 $DEBUG && dump
152 cleanup
153 }
154
155 atf_init_test_cases()
156 {
157
158 atf_add_test_case ipsec_sysctl0
159 atf_add_test_case ipsec_sysctl4
160 atf_add_test_case ipsec_sysctl6
161 }
162