1 1.4 knakahar # $NetBSD: t_ipsec_tunnel_ipcomp.sh,v 1.4 2023/06/19 08:28:09 knakahara Exp $ 2 1.1 ozaki # 3 1.1 ozaki # Copyright (c) 2017 Internet Initiative Japan Inc. 4 1.1 ozaki # All rights reserved. 5 1.1 ozaki # 6 1.1 ozaki # Redistribution and use in source and binary forms, with or without 7 1.1 ozaki # modification, are permitted provided that the following conditions 8 1.1 ozaki # are met: 9 1.1 ozaki # 1. Redistributions of source code must retain the above copyright 10 1.1 ozaki # notice, this list of conditions and the following disclaimer. 11 1.1 ozaki # 2. Redistributions in binary form must reproduce the above copyright 12 1.1 ozaki # notice, this list of conditions and the following disclaimer in the 13 1.1 ozaki # documentation and/or other materials provided with the distribution. 14 1.1 ozaki # 15 1.1 ozaki # THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 16 1.1 ozaki # ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 17 1.1 ozaki # TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 18 1.1 ozaki # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 19 1.1 ozaki # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 20 1.1 ozaki # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 21 1.1 ozaki # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 22 1.1 ozaki # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 23 1.1 ozaki # CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 24 1.1 ozaki # ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 25 1.1 ozaki # POSSIBILITY OF SUCH DAMAGE. 26 1.1 ozaki # 27 1.1 ozaki 28 1.1 ozaki SOCK_LOCAL=unix://ipsec_local 29 1.1 ozaki SOCK_TUNNEL_LOCAL=unix://ipsec_tunel_local 30 1.1 ozaki SOCK_TUNNEL_REMOTE=unix://ipsec_tunnel_remote 31 1.1 ozaki SOCK_REMOTE=unix://ipsec_remote 32 1.1 ozaki BUS_LOCAL=./bus_ipsec_local 33 1.1 ozaki BUS_TUNNEL=./bus_ipsec_tunnel 34 1.1 ozaki BUS_REMOTE=./bus_ipsec_remote 35 1.1 ozaki 36 1.1 ozaki DEBUG=${DEBUG:-false} 37 1.1 ozaki 38 1.1 ozaki setup_servers() 39 1.1 ozaki { 40 1.1 ozaki 41 1.1 ozaki # See https://www.netbsd.org/docs/network/ipsec/#sample_vpn 42 1.1 ozaki rump_server_crypto_start $SOCK_LOCAL netinet6 43 1.1 ozaki rump_server_crypto_start $SOCK_TUNNEL_LOCAL netipsec netinet6 44 1.1 ozaki rump_server_crypto_start $SOCK_TUNNEL_REMOTE netipsec netinet6 45 1.1 ozaki rump_server_crypto_start $SOCK_REMOTE netinet6 46 1.1 ozaki rump_server_add_iface $SOCK_LOCAL shmif0 $BUS_LOCAL 47 1.1 ozaki rump_server_add_iface $SOCK_TUNNEL_LOCAL shmif0 $BUS_LOCAL 48 1.1 ozaki rump_server_add_iface $SOCK_TUNNEL_LOCAL shmif1 $BUS_TUNNEL 49 1.1 ozaki rump_server_add_iface $SOCK_TUNNEL_REMOTE shmif0 $BUS_REMOTE 50 1.1 ozaki rump_server_add_iface $SOCK_TUNNEL_REMOTE shmif1 $BUS_TUNNEL 51 1.1 ozaki rump_server_add_iface $SOCK_REMOTE shmif0 $BUS_REMOTE 52 1.1 ozaki } 53 1.1 ozaki 54 1.1 ozaki check_tunnel_ipcomp_packets() 55 1.1 ozaki { 56 1.1 ozaki local outfile=$1 57 1.1 ozaki local osrc=$2 58 1.1 ozaki local odst=$3 59 1.1 ozaki local oproto=$4 60 1.1 ozaki local isrc=$5 61 1.1 ozaki local idst=$6 62 1.1 ozaki local iproto=$7 63 1.1 ozaki 64 1.1 ozaki $DEBUG && cat $outfile 65 1.1 ozaki 66 1.1 ozaki if [ $oproto = ESP ]; then 67 1.1 ozaki atf_check -s exit:0 \ 68 1.1 ozaki -o match:"$osrc > $odst: $oproto" \ 69 1.1 ozaki cat $outfile 70 1.1 ozaki atf_check -s exit:0 \ 71 1.1 ozaki -o match:"$odst > $osrc: $oproto" \ 72 1.1 ozaki cat $outfile 73 1.1 ozaki # TODO check the packet lengths to check IPComp is really used 74 1.1 ozaki return 75 1.1 ozaki fi 76 1.1 ozaki 77 1.1 ozaki # AH 78 1.1 ozaki if [ $iproto = IPComp ]; then 79 1.1 ozaki atf_check -s exit:0 \ 80 1.1 ozaki -o match:"$osrc > $odst: $oproto.+: $iproto" \ 81 1.1 ozaki cat $outfile 82 1.1 ozaki atf_check -s exit:0 \ 83 1.1 ozaki -o match:"$odst > $osrc: $oproto.+: $iproto" \ 84 1.1 ozaki cat $outfile 85 1.1 ozaki else 86 1.1 ozaki atf_check -s exit:0 \ 87 1.1 ozaki -o match:"$osrc > $odst: $oproto.+ $isrc > $idst: $iproto" \ 88 1.1 ozaki cat $outfile 89 1.1 ozaki atf_check -s exit:0 \ 90 1.1 ozaki -o match:"$odst > $osrc: $oproto.+ $idst > $isrc: $iproto" \ 91 1.1 ozaki cat $outfile 92 1.1 ozaki fi 93 1.1 ozaki } 94 1.1 ozaki 95 1.1 ozaki test_ipsec4_tunnel_ipcomp() 96 1.1 ozaki { 97 1.1 ozaki local proto=$1 98 1.1 ozaki local algo=$2 99 1.1 ozaki local calgo=$3 100 1.1 ozaki local ip_local=10.0.1.2 101 1.1 ozaki local ip_gw_local=10.0.1.1 102 1.1 ozaki local ip_gw_local_tunnel=20.0.0.1 103 1.1 ozaki local ip_gw_remote_tunnel=20.0.0.2 104 1.1 ozaki local ip_gw_remote=10.0.2.1 105 1.1 ozaki local ip_remote=10.0.2.2 106 1.1 ozaki local subnet_local=10.0.1.0 107 1.1 ozaki local subnet_remote=10.0.2.0 108 1.1 ozaki local tmpfile=./tmp 109 1.1 ozaki local outfile=./out 110 1.1 ozaki local pktproto=$(generate_pktproto $proto) 111 1.1 ozaki local algo_args="$(generate_algo_args $proto $algo)" 112 1.1 ozaki 113 1.1 ozaki setup_servers 114 1.1 ozaki 115 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL 116 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.dad_count=0 117 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif0 $ip_local/24 118 1.1 ozaki atf_check -s exit:0 -o ignore \ 119 1.1 ozaki rump.route -n add -net $subnet_remote $ip_gw_local 120 1.1 ozaki 121 1.1 ozaki export RUMP_SERVER=$SOCK_TUNNEL_LOCAL 122 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.dad_count=0 123 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif0 $ip_gw_local/24 124 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif1 $ip_gw_local_tunnel/24 125 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwarding=1 126 1.1 ozaki atf_check -s exit:0 -o ignore \ 127 1.1 ozaki rump.route -n add -net $subnet_remote $ip_gw_remote_tunnel 128 1.1 ozaki rump.sysctl -a |grep ipsec 129 1.1 ozaki 130 1.1 ozaki export RUMP_SERVER=$SOCK_TUNNEL_REMOTE 131 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.dad_count=0 132 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif0 $ip_gw_remote/24 133 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif1 $ip_gw_remote_tunnel/24 134 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwarding=1 135 1.1 ozaki atf_check -s exit:0 -o ignore \ 136 1.1 ozaki rump.route -n add -net $subnet_local $ip_gw_local_tunnel 137 1.1 ozaki 138 1.1 ozaki export RUMP_SERVER=$SOCK_REMOTE 139 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.dad_count=0 140 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif0 $ip_remote/24 141 1.1 ozaki atf_check -s exit:0 -o ignore \ 142 1.1 ozaki rump.route -n add -net $subnet_local $ip_gw_remote 143 1.1 ozaki 144 1.1 ozaki extract_new_packets $BUS_TUNNEL > $outfile 145 1.1 ozaki 146 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL 147 1.1 ozaki atf_check -s exit:0 -o ignore rump.ping -c 1 -n -w 3 $ip_remote 148 1.1 ozaki 149 1.1 ozaki extract_new_packets $BUS_TUNNEL > $outfile 150 1.1 ozaki atf_check -s exit:0 \ 151 1.1 ozaki -o match:"$ip_local > $ip_remote: ICMP echo request" \ 152 1.1 ozaki cat $outfile 153 1.1 ozaki atf_check -s exit:0 \ 154 1.1 ozaki -o match:"$ip_remote > $ip_local: ICMP echo reply" \ 155 1.1 ozaki cat $outfile 156 1.1 ozaki 157 1.1 ozaki export RUMP_SERVER=$SOCK_TUNNEL_LOCAL 158 1.1 ozaki # from https://www.netbsd.org/docs/network/ipsec/ 159 1.1 ozaki cat > $tmpfile <<-EOF 160 1.1 ozaki add $ip_gw_local_tunnel $ip_gw_remote_tunnel $proto 10000 $algo_args; 161 1.1 ozaki add $ip_gw_remote_tunnel $ip_gw_local_tunnel $proto 10001 $algo_args; 162 1.1 ozaki add $ip_gw_local_tunnel $ip_gw_remote_tunnel ipcomp 10000 -C $calgo; 163 1.1 ozaki add $ip_gw_remote_tunnel $ip_gw_local_tunnel ipcomp 10001 -C $calgo; 164 1.1 ozaki spdadd $subnet_local/24 $subnet_remote/24 any -P out ipsec 165 1.1 ozaki ipcomp/tunnel/$ip_gw_local_tunnel-$ip_gw_remote_tunnel/require 166 1.1 ozaki $proto/transport//require; 167 1.1 ozaki spdadd $subnet_remote/24 $subnet_local/24 any -P in ipsec 168 1.1 ozaki ipcomp/tunnel/$ip_gw_remote_tunnel-$ip_gw_local_tunnel/require 169 1.1 ozaki $proto/transport//require; 170 1.1 ozaki EOF 171 1.1 ozaki $DEBUG && cat $tmpfile 172 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -c < $tmpfile 173 1.1 ozaki check_sa_entries $SOCK_TUNNEL_LOCAL $ip_gw_local_tunnel \ 174 1.1 ozaki $ip_gw_remote_tunnel 175 1.1 ozaki 176 1.1 ozaki export RUMP_SERVER=$SOCK_TUNNEL_REMOTE 177 1.1 ozaki cat > $tmpfile <<-EOF 178 1.1 ozaki add $ip_gw_local_tunnel $ip_gw_remote_tunnel $proto 10000 $algo_args; 179 1.1 ozaki add $ip_gw_remote_tunnel $ip_gw_local_tunnel $proto 10001 $algo_args; 180 1.1 ozaki add $ip_gw_local_tunnel $ip_gw_remote_tunnel ipcomp 10000 -C $calgo; 181 1.1 ozaki add $ip_gw_remote_tunnel $ip_gw_local_tunnel ipcomp 10001 -C $calgo; 182 1.1 ozaki spdadd $subnet_remote/24 $subnet_local/24 any -P out ipsec 183 1.1 ozaki ipcomp/tunnel/$ip_gw_remote_tunnel-$ip_gw_local_tunnel/require 184 1.1 ozaki $proto/transport//require; 185 1.1 ozaki spdadd $subnet_local/24 $subnet_remote/24 any -P in ipsec 186 1.1 ozaki ipcomp/tunnel/$ip_gw_local_tunnel-$ip_gw_remote_tunnel/require 187 1.1 ozaki $proto/transport//require; 188 1.1 ozaki EOF 189 1.1 ozaki $DEBUG && cat $tmpfile 190 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -c < $tmpfile 191 1.1 ozaki check_sa_entries $SOCK_TUNNEL_REMOTE $ip_gw_local_tunnel \ 192 1.1 ozaki $ip_gw_remote_tunnel 193 1.1 ozaki 194 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL 195 1.1 ozaki # IPComp sends a packet as-is if a compressed payload of 196 1.1 ozaki # the packet is greater than or equal to the original payload. 197 1.1 ozaki # So we have to fill a payload with 1 to let IPComp always send 198 1.1 ozaki # a compressed packet. 199 1.1 ozaki 200 1.1 ozaki # pktsize == minlen - 1 201 1.1 ozaki pktsize=$(($(get_minlen deflate) - 8 - 20 - 1)) 202 1.1 ozaki atf_check -s exit:0 -o ignore \ 203 1.1 ozaki rump.ping -c 1 -n -w 3 -s $pktsize -p ff $ip_remote 204 1.1 ozaki extract_new_packets $BUS_TUNNEL > $outfile 205 1.1 ozaki check_tunnel_ipcomp_packets $outfile \ 206 1.1 ozaki $ip_gw_local_tunnel $ip_gw_remote_tunnel $pktproto \ 207 1.1 ozaki $ip_local $ip_remote ICMP 208 1.1 ozaki 209 1.1 ozaki # pktsize == minlen 210 1.1 ozaki pktsize=$(($(get_minlen deflate) - 8 - 20)) 211 1.1 ozaki atf_check -s exit:0 -o ignore \ 212 1.1 ozaki rump.ping -c 1 -n -w 3 -s $pktsize -p ff $ip_remote 213 1.1 ozaki extract_new_packets $BUS_TUNNEL > $outfile 214 1.1 ozaki check_tunnel_ipcomp_packets $outfile \ 215 1.1 ozaki $ip_gw_local_tunnel $ip_gw_remote_tunnel $pktproto \ 216 1.1 ozaki $ip_local $ip_remote IPComp 217 1.1 ozaki 218 1.1 ozaki test_flush_entries $SOCK_TUNNEL_LOCAL 219 1.1 ozaki test_flush_entries $SOCK_TUNNEL_REMOTE 220 1.1 ozaki } 221 1.1 ozaki 222 1.1 ozaki test_ipsec6_tunnel_ipcomp() 223 1.1 ozaki { 224 1.1 ozaki local proto=$1 225 1.1 ozaki local algo=$2 226 1.1 ozaki local calgo=$3 227 1.1 ozaki local ip_local=fd00:1::2 228 1.1 ozaki local ip_gw_local=fd00:1::1 229 1.1 ozaki local ip_gw_local_tunnel=fc00::1 230 1.1 ozaki local ip_gw_remote_tunnel=fc00::2 231 1.1 ozaki local ip_gw_remote=fd00:2::1 232 1.1 ozaki local ip_remote=fd00:2::2 233 1.1 ozaki local subnet_local=fd00:1:: 234 1.1 ozaki local subnet_remote=fd00:2:: 235 1.1 ozaki local tmpfile=./tmp 236 1.1 ozaki local outfile=./out 237 1.1 ozaki local pktproto=$(generate_pktproto $proto) 238 1.1 ozaki local algo_args="$(generate_algo_args $proto $algo)" 239 1.1 ozaki 240 1.1 ozaki setup_servers 241 1.1 ozaki 242 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL 243 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet6.ip6.dad_count=0 244 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif0 inet6 $ip_local/64 245 1.1 ozaki atf_check -s exit:0 -o ignore \ 246 1.1 ozaki rump.route -n add -inet6 -net $subnet_remote/64 $ip_gw_local 247 1.1 ozaki 248 1.1 ozaki export RUMP_SERVER=$SOCK_TUNNEL_LOCAL 249 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet6.ip6.dad_count=0 250 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif0 inet6 $ip_gw_local/64 251 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif1 inet6 $ip_gw_local_tunnel/64 252 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet6.ip6.forwarding=1 253 1.1 ozaki atf_check -s exit:0 -o ignore \ 254 1.1 ozaki rump.route -n add -inet6 -net $subnet_remote/64 $ip_gw_remote_tunnel 255 1.1 ozaki 256 1.1 ozaki export RUMP_SERVER=$SOCK_TUNNEL_REMOTE 257 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet6.ip6.dad_count=0 258 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif0 inet6 $ip_gw_remote/64 259 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif1 inet6 $ip_gw_remote_tunnel/64 260 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet6.ip6.forwarding=1 261 1.1 ozaki atf_check -s exit:0 -o ignore \ 262 1.1 ozaki rump.route -n add -inet6 -net $subnet_local/64 $ip_gw_local_tunnel 263 1.1 ozaki 264 1.1 ozaki export RUMP_SERVER=$SOCK_REMOTE 265 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet6.ip6.dad_count=0 266 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif0 inet6 $ip_remote 267 1.1 ozaki atf_check -s exit:0 -o ignore \ 268 1.1 ozaki rump.route -n add -inet6 -net $subnet_local/64 $ip_gw_remote 269 1.1 ozaki 270 1.1 ozaki extract_new_packets $BUS_TUNNEL > $outfile 271 1.1 ozaki 272 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL 273 1.1 ozaki atf_check -s exit:0 -o ignore rump.ping6 -c 1 -n -X 3 $ip_remote 274 1.1 ozaki 275 1.1 ozaki extract_new_packets $BUS_TUNNEL > $outfile 276 1.1 ozaki atf_check -s exit:0 \ 277 1.1 ozaki -o match:"$ip_local > $ip_remote: ICMP6, echo request" \ 278 1.1 ozaki cat $outfile 279 1.1 ozaki atf_check -s exit:0 \ 280 1.1 ozaki -o match:"$ip_remote > $ip_local: ICMP6, echo reply" \ 281 1.1 ozaki cat $outfile 282 1.1 ozaki 283 1.1 ozaki export RUMP_SERVER=$SOCK_TUNNEL_LOCAL 284 1.1 ozaki # from https://www.netbsd.org/docs/network/ipsec/ 285 1.1 ozaki cat > $tmpfile <<-EOF 286 1.1 ozaki add $ip_gw_local_tunnel $ip_gw_remote_tunnel $proto 10000 $algo_args; 287 1.1 ozaki add $ip_gw_remote_tunnel $ip_gw_local_tunnel $proto 10001 $algo_args; 288 1.1 ozaki add $ip_gw_local_tunnel $ip_gw_remote_tunnel ipcomp 10000 -C $calgo; 289 1.1 ozaki add $ip_gw_remote_tunnel $ip_gw_local_tunnel ipcomp 10001 -C $calgo; 290 1.1 ozaki spdadd $subnet_local/64 $subnet_remote/64 any -P out ipsec 291 1.1 ozaki ipcomp/tunnel/$ip_gw_local_tunnel-$ip_gw_remote_tunnel/require 292 1.1 ozaki $proto/transport//require; 293 1.1 ozaki spdadd $subnet_remote/64 $subnet_local/64 any -P in ipsec 294 1.1 ozaki ipcomp/tunnel/$ip_gw_remote_tunnel-$ip_gw_local_tunnel/require 295 1.1 ozaki $proto/transport//require; 296 1.1 ozaki EOF 297 1.1 ozaki $DEBUG && cat $tmpfile 298 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -c < $tmpfile 299 1.1 ozaki check_sa_entries $SOCK_TUNNEL_LOCAL $ip_gw_local_tunnel \ 300 1.1 ozaki $ip_gw_remote_tunnel 301 1.1 ozaki 302 1.1 ozaki export RUMP_SERVER=$SOCK_TUNNEL_REMOTE 303 1.1 ozaki cat > $tmpfile <<-EOF 304 1.1 ozaki add $ip_gw_local_tunnel $ip_gw_remote_tunnel $proto 10000 $algo_args; 305 1.1 ozaki add $ip_gw_remote_tunnel $ip_gw_local_tunnel $proto 10001 $algo_args; 306 1.1 ozaki add $ip_gw_local_tunnel $ip_gw_remote_tunnel ipcomp 10000 -C $calgo; 307 1.1 ozaki add $ip_gw_remote_tunnel $ip_gw_local_tunnel ipcomp 10001 -C $calgo; 308 1.1 ozaki spdadd $subnet_remote/64 $subnet_local/64 any -P out ipsec 309 1.1 ozaki ipcomp/tunnel/$ip_gw_remote_tunnel-$ip_gw_local_tunnel/require 310 1.1 ozaki $proto/transport//require; 311 1.1 ozaki spdadd $subnet_local/64 $subnet_remote/64 any -P in ipsec 312 1.1 ozaki ipcomp/tunnel/$ip_gw_local_tunnel-$ip_gw_remote_tunnel/require 313 1.1 ozaki $proto/transport//require; 314 1.1 ozaki EOF 315 1.1 ozaki $DEBUG && cat $tmpfile 316 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -c < $tmpfile 317 1.1 ozaki check_sa_entries $SOCK_TUNNEL_REMOTE $ip_gw_local_tunnel \ 318 1.1 ozaki $ip_gw_remote_tunnel 319 1.1 ozaki 320 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL 321 1.1 ozaki 322 1.1 ozaki # IPComp sends a packet as-is if a compressed payload of 323 1.1 ozaki # the packet is greater than or equal to the original payload. 324 1.1 ozaki # So we have to fill a payload with 1 to let IPComp always send 325 1.1 ozaki # a compressed packet. 326 1.1 ozaki 327 1.1 ozaki # pktsize == minlen - 1 328 1.1 ozaki 329 1.1 ozaki pktsize=$(($(get_minlen deflate) - 8 - 40 - 1)) 330 1.1 ozaki atf_check -s exit:0 -o ignore \ 331 1.1 ozaki rump.ping6 -c 1 -n -X 3 -s $pktsize -p ff $ip_remote 332 1.1 ozaki extract_new_packets $BUS_TUNNEL > $outfile 333 1.1 ozaki check_tunnel_ipcomp_packets $outfile \ 334 1.1 ozaki $ip_gw_local_tunnel $ip_gw_remote_tunnel $pktproto \ 335 1.1 ozaki $ip_local $ip_remote ICMP6 336 1.1 ozaki 337 1.1 ozaki # pktsize == minlen 338 1.1 ozaki pktsize=$(($(get_minlen deflate) - 8 - 40)) 339 1.1 ozaki atf_check -s exit:0 -o ignore \ 340 1.1 ozaki rump.ping6 -c 1 -n -X 3 -s $pktsize -p ff $ip_remote 341 1.1 ozaki extract_new_packets $BUS_TUNNEL > $outfile 342 1.1 ozaki check_tunnel_ipcomp_packets $outfile \ 343 1.1 ozaki $ip_gw_local_tunnel $ip_gw_remote_tunnel $pktproto \ 344 1.1 ozaki $ip_local $ip_remote IPComp 345 1.1 ozaki 346 1.1 ozaki test_flush_entries $SOCK_TUNNEL_LOCAL 347 1.1 ozaki test_flush_entries $SOCK_TUNNEL_REMOTE 348 1.1 ozaki } 349 1.1 ozaki 350 1.1 ozaki test_tunnel_ipcomp_common() 351 1.1 ozaki { 352 1.1 ozaki local ipproto=$1 353 1.1 ozaki local proto=$2 354 1.1 ozaki local algo=$3 355 1.1 ozaki local calgo=$4 356 1.1 ozaki 357 1.1 ozaki if [ $ipproto = ipv4 ]; then 358 1.1 ozaki test_ipsec4_tunnel_ipcomp $proto $algo $calgo 359 1.1 ozaki else 360 1.1 ozaki test_ipsec6_tunnel_ipcomp $proto $algo $calgo 361 1.1 ozaki fi 362 1.1 ozaki } 363 1.1 ozaki 364 1.1 ozaki add_test_tunnel_mode() 365 1.1 ozaki { 366 1.1 ozaki local ipproto=$1 367 1.1 ozaki local proto=$2 368 1.1 ozaki local algo=$3 369 1.1 ozaki local calgo=$4 370 1.1 ozaki local _algo=$(echo $algo | sed 's/-//g') 371 1.1 ozaki local name= desc= 372 1.1 ozaki 373 1.1 ozaki name="ipsec_tunnel_ipcomp_${calgo}_${ipproto}_${proto}_${_algo}" 374 1.1 ozaki desc="Tests of IPsec ($ipproto) tunnel mode with $proto ($algo) and ipcomp ($calgo)" 375 1.1 ozaki 376 1.1 ozaki atf_test_case ${name} cleanup 377 1.2 ozaki eval " 378 1.2 ozaki ${name}_head() { 379 1.2 ozaki atf_set descr \"$desc\" 380 1.2 ozaki atf_set require.progs rump_server setkey 381 1.2 ozaki } 382 1.2 ozaki ${name}_body() { 383 1.2 ozaki test_tunnel_ipcomp_common $ipproto $proto $algo $calgo 384 1.2 ozaki rump_server_destroy_ifaces 385 1.2 ozaki } 386 1.2 ozaki ${name}_cleanup() { 387 1.2 ozaki \$DEBUG && dump 388 1.2 ozaki cleanup 389 1.2 ozaki } 390 1.1 ozaki " 391 1.1 ozaki atf_add_test_case ${name} 392 1.1 ozaki } 393 1.1 ozaki 394 1.1 ozaki atf_init_test_cases() 395 1.1 ozaki { 396 1.1 ozaki local calgo= algo= 397 1.1 ozaki 398 1.4 knakahar for calgo in $IPCOMP_COMPRESSION_ALGORITHMS; do 399 1.1 ozaki for algo in $ESP_ENCRYPTION_ALGORITHMS_MINIMUM; do 400 1.1 ozaki add_test_tunnel_mode ipv4 esp $algo $calgo 401 1.1 ozaki add_test_tunnel_mode ipv6 esp $algo $calgo 402 1.1 ozaki done 403 1.1 ozaki 404 1.1 ozaki for algo in $AH_AUTHENTICATION_ALGORITHMS_MINIMUM; do 405 1.1 ozaki add_test_tunnel_mode ipv4 ah $algo $calgo 406 1.1 ozaki add_test_tunnel_mode ipv6 ah $algo $calgo 407 1.1 ozaki done 408 1.1 ozaki done 409 1.1 ozaki } 410