t_ipsec_tunnel_ipcomp.sh revision 1.1 1 1.1 ozaki # $NetBSD: t_ipsec_tunnel_ipcomp.sh,v 1.1 2017/07/03 06:01:16 ozaki-r Exp $
2 1.1 ozaki #
3 1.1 ozaki # Copyright (c) 2017 Internet Initiative Japan Inc.
4 1.1 ozaki # All rights reserved.
5 1.1 ozaki #
6 1.1 ozaki # Redistribution and use in source and binary forms, with or without
7 1.1 ozaki # modification, are permitted provided that the following conditions
8 1.1 ozaki # are met:
9 1.1 ozaki # 1. Redistributions of source code must retain the above copyright
10 1.1 ozaki # notice, this list of conditions and the following disclaimer.
11 1.1 ozaki # 2. Redistributions in binary form must reproduce the above copyright
12 1.1 ozaki # notice, this list of conditions and the following disclaimer in the
13 1.1 ozaki # documentation and/or other materials provided with the distribution.
14 1.1 ozaki #
15 1.1 ozaki # THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
16 1.1 ozaki # ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
17 1.1 ozaki # TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
18 1.1 ozaki # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
19 1.1 ozaki # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
20 1.1 ozaki # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
21 1.1 ozaki # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
22 1.1 ozaki # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
23 1.1 ozaki # CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
24 1.1 ozaki # ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
25 1.1 ozaki # POSSIBILITY OF SUCH DAMAGE.
26 1.1 ozaki #
27 1.1 ozaki
28 1.1 ozaki SOCK_LOCAL=unix://ipsec_local
29 1.1 ozaki SOCK_TUNNEL_LOCAL=unix://ipsec_tunel_local
30 1.1 ozaki SOCK_TUNNEL_REMOTE=unix://ipsec_tunnel_remote
31 1.1 ozaki SOCK_REMOTE=unix://ipsec_remote
32 1.1 ozaki BUS_LOCAL=./bus_ipsec_local
33 1.1 ozaki BUS_TUNNEL=./bus_ipsec_tunnel
34 1.1 ozaki BUS_REMOTE=./bus_ipsec_remote
35 1.1 ozaki
36 1.1 ozaki DEBUG=${DEBUG:-false}
37 1.1 ozaki
38 1.1 ozaki setup_servers()
39 1.1 ozaki {
40 1.1 ozaki
41 1.1 ozaki # See https://www.netbsd.org/docs/network/ipsec/#sample_vpn
42 1.1 ozaki rump_server_crypto_start $SOCK_LOCAL netinet6
43 1.1 ozaki rump_server_crypto_start $SOCK_TUNNEL_LOCAL netipsec netinet6
44 1.1 ozaki rump_server_crypto_start $SOCK_TUNNEL_REMOTE netipsec netinet6
45 1.1 ozaki rump_server_crypto_start $SOCK_REMOTE netinet6
46 1.1 ozaki rump_server_add_iface $SOCK_LOCAL shmif0 $BUS_LOCAL
47 1.1 ozaki rump_server_add_iface $SOCK_TUNNEL_LOCAL shmif0 $BUS_LOCAL
48 1.1 ozaki rump_server_add_iface $SOCK_TUNNEL_LOCAL shmif1 $BUS_TUNNEL
49 1.1 ozaki rump_server_add_iface $SOCK_TUNNEL_REMOTE shmif0 $BUS_REMOTE
50 1.1 ozaki rump_server_add_iface $SOCK_TUNNEL_REMOTE shmif1 $BUS_TUNNEL
51 1.1 ozaki rump_server_add_iface $SOCK_REMOTE shmif0 $BUS_REMOTE
52 1.1 ozaki }
53 1.1 ozaki
54 1.1 ozaki check_tunnel_ipcomp_packets()
55 1.1 ozaki {
56 1.1 ozaki local outfile=$1
57 1.1 ozaki local osrc=$2
58 1.1 ozaki local odst=$3
59 1.1 ozaki local oproto=$4
60 1.1 ozaki local isrc=$5
61 1.1 ozaki local idst=$6
62 1.1 ozaki local iproto=$7
63 1.1 ozaki
64 1.1 ozaki $DEBUG && cat $outfile
65 1.1 ozaki
66 1.1 ozaki if [ $oproto = ESP ]; then
67 1.1 ozaki atf_check -s exit:0 \
68 1.1 ozaki -o match:"$osrc > $odst: $oproto" \
69 1.1 ozaki cat $outfile
70 1.1 ozaki atf_check -s exit:0 \
71 1.1 ozaki -o match:"$odst > $osrc: $oproto" \
72 1.1 ozaki cat $outfile
73 1.1 ozaki # TODO check the packet lengths to check IPComp is really used
74 1.1 ozaki return
75 1.1 ozaki fi
76 1.1 ozaki
77 1.1 ozaki # AH
78 1.1 ozaki if [ $iproto = IPComp ]; then
79 1.1 ozaki atf_check -s exit:0 \
80 1.1 ozaki -o match:"$osrc > $odst: $oproto.+: $iproto" \
81 1.1 ozaki cat $outfile
82 1.1 ozaki atf_check -s exit:0 \
83 1.1 ozaki -o match:"$odst > $osrc: $oproto.+: $iproto" \
84 1.1 ozaki cat $outfile
85 1.1 ozaki else
86 1.1 ozaki atf_check -s exit:0 \
87 1.1 ozaki -o match:"$osrc > $odst: $oproto.+ $isrc > $idst: $iproto" \
88 1.1 ozaki cat $outfile
89 1.1 ozaki atf_check -s exit:0 \
90 1.1 ozaki -o match:"$odst > $osrc: $oproto.+ $idst > $isrc: $iproto" \
91 1.1 ozaki cat $outfile
92 1.1 ozaki fi
93 1.1 ozaki }
94 1.1 ozaki
95 1.1 ozaki test_ipsec4_tunnel_ipcomp()
96 1.1 ozaki {
97 1.1 ozaki local proto=$1
98 1.1 ozaki local algo=$2
99 1.1 ozaki local calgo=$3
100 1.1 ozaki local ip_local=10.0.1.2
101 1.1 ozaki local ip_gw_local=10.0.1.1
102 1.1 ozaki local ip_gw_local_tunnel=20.0.0.1
103 1.1 ozaki local ip_gw_remote_tunnel=20.0.0.2
104 1.1 ozaki local ip_gw_remote=10.0.2.1
105 1.1 ozaki local ip_remote=10.0.2.2
106 1.1 ozaki local subnet_local=10.0.1.0
107 1.1 ozaki local subnet_remote=10.0.2.0
108 1.1 ozaki local tmpfile=./tmp
109 1.1 ozaki local outfile=./out
110 1.1 ozaki local pktproto=$(generate_pktproto $proto)
111 1.1 ozaki local algo_args="$(generate_algo_args $proto $algo)"
112 1.1 ozaki
113 1.1 ozaki setup_servers
114 1.1 ozaki
115 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
116 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.dad_count=0
117 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif0 $ip_local/24
118 1.1 ozaki atf_check -s exit:0 -o ignore \
119 1.1 ozaki rump.route -n add -net $subnet_remote $ip_gw_local
120 1.1 ozaki
121 1.1 ozaki export RUMP_SERVER=$SOCK_TUNNEL_LOCAL
122 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.dad_count=0
123 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif0 $ip_gw_local/24
124 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif1 $ip_gw_local_tunnel/24
125 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwarding=1
126 1.1 ozaki atf_check -s exit:0 -o ignore \
127 1.1 ozaki rump.route -n add -net $subnet_remote $ip_gw_remote_tunnel
128 1.1 ozaki rump.sysctl -a |grep ipsec
129 1.1 ozaki
130 1.1 ozaki export RUMP_SERVER=$SOCK_TUNNEL_REMOTE
131 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.dad_count=0
132 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif0 $ip_gw_remote/24
133 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif1 $ip_gw_remote_tunnel/24
134 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwarding=1
135 1.1 ozaki atf_check -s exit:0 -o ignore \
136 1.1 ozaki rump.route -n add -net $subnet_local $ip_gw_local_tunnel
137 1.1 ozaki
138 1.1 ozaki export RUMP_SERVER=$SOCK_REMOTE
139 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.dad_count=0
140 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif0 $ip_remote/24
141 1.1 ozaki atf_check -s exit:0 -o ignore \
142 1.1 ozaki rump.route -n add -net $subnet_local $ip_gw_remote
143 1.1 ozaki
144 1.1 ozaki extract_new_packets $BUS_TUNNEL > $outfile
145 1.1 ozaki
146 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
147 1.1 ozaki atf_check -s exit:0 -o ignore rump.ping -c 1 -n -w 3 $ip_remote
148 1.1 ozaki
149 1.1 ozaki extract_new_packets $BUS_TUNNEL > $outfile
150 1.1 ozaki atf_check -s exit:0 \
151 1.1 ozaki -o match:"$ip_local > $ip_remote: ICMP echo request" \
152 1.1 ozaki cat $outfile
153 1.1 ozaki atf_check -s exit:0 \
154 1.1 ozaki -o match:"$ip_remote > $ip_local: ICMP echo reply" \
155 1.1 ozaki cat $outfile
156 1.1 ozaki
157 1.1 ozaki export RUMP_SERVER=$SOCK_TUNNEL_LOCAL
158 1.1 ozaki # from https://www.netbsd.org/docs/network/ipsec/
159 1.1 ozaki cat > $tmpfile <<-EOF
160 1.1 ozaki add $ip_gw_local_tunnel $ip_gw_remote_tunnel $proto 10000 $algo_args;
161 1.1 ozaki add $ip_gw_remote_tunnel $ip_gw_local_tunnel $proto 10001 $algo_args;
162 1.1 ozaki add $ip_gw_local_tunnel $ip_gw_remote_tunnel ipcomp 10000 -C $calgo;
163 1.1 ozaki add $ip_gw_remote_tunnel $ip_gw_local_tunnel ipcomp 10001 -C $calgo;
164 1.1 ozaki spdadd $subnet_local/24 $subnet_remote/24 any -P out ipsec
165 1.1 ozaki ipcomp/tunnel/$ip_gw_local_tunnel-$ip_gw_remote_tunnel/require
166 1.1 ozaki $proto/transport//require;
167 1.1 ozaki spdadd $subnet_remote/24 $subnet_local/24 any -P in ipsec
168 1.1 ozaki ipcomp/tunnel/$ip_gw_remote_tunnel-$ip_gw_local_tunnel/require
169 1.1 ozaki $proto/transport//require;
170 1.1 ozaki EOF
171 1.1 ozaki $DEBUG && cat $tmpfile
172 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -c < $tmpfile
173 1.1 ozaki check_sa_entries $SOCK_TUNNEL_LOCAL $ip_gw_local_tunnel \
174 1.1 ozaki $ip_gw_remote_tunnel
175 1.1 ozaki
176 1.1 ozaki export RUMP_SERVER=$SOCK_TUNNEL_REMOTE
177 1.1 ozaki cat > $tmpfile <<-EOF
178 1.1 ozaki add $ip_gw_local_tunnel $ip_gw_remote_tunnel $proto 10000 $algo_args;
179 1.1 ozaki add $ip_gw_remote_tunnel $ip_gw_local_tunnel $proto 10001 $algo_args;
180 1.1 ozaki add $ip_gw_local_tunnel $ip_gw_remote_tunnel ipcomp 10000 -C $calgo;
181 1.1 ozaki add $ip_gw_remote_tunnel $ip_gw_local_tunnel ipcomp 10001 -C $calgo;
182 1.1 ozaki spdadd $subnet_remote/24 $subnet_local/24 any -P out ipsec
183 1.1 ozaki ipcomp/tunnel/$ip_gw_remote_tunnel-$ip_gw_local_tunnel/require
184 1.1 ozaki $proto/transport//require;
185 1.1 ozaki spdadd $subnet_local/24 $subnet_remote/24 any -P in ipsec
186 1.1 ozaki ipcomp/tunnel/$ip_gw_local_tunnel-$ip_gw_remote_tunnel/require
187 1.1 ozaki $proto/transport//require;
188 1.1 ozaki EOF
189 1.1 ozaki $DEBUG && cat $tmpfile
190 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -c < $tmpfile
191 1.1 ozaki check_sa_entries $SOCK_TUNNEL_REMOTE $ip_gw_local_tunnel \
192 1.1 ozaki $ip_gw_remote_tunnel
193 1.1 ozaki
194 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
195 1.1 ozaki # IPComp sends a packet as-is if a compressed payload of
196 1.1 ozaki # the packet is greater than or equal to the original payload.
197 1.1 ozaki # So we have to fill a payload with 1 to let IPComp always send
198 1.1 ozaki # a compressed packet.
199 1.1 ozaki
200 1.1 ozaki # pktsize == minlen - 1
201 1.1 ozaki pktsize=$(($(get_minlen deflate) - 8 - 20 - 1))
202 1.1 ozaki atf_check -s exit:0 -o ignore \
203 1.1 ozaki rump.ping -c 1 -n -w 3 -s $pktsize -p ff $ip_remote
204 1.1 ozaki extract_new_packets $BUS_TUNNEL > $outfile
205 1.1 ozaki check_tunnel_ipcomp_packets $outfile \
206 1.1 ozaki $ip_gw_local_tunnel $ip_gw_remote_tunnel $pktproto \
207 1.1 ozaki $ip_local $ip_remote ICMP
208 1.1 ozaki
209 1.1 ozaki # pktsize == minlen
210 1.1 ozaki pktsize=$(($(get_minlen deflate) - 8 - 20))
211 1.1 ozaki atf_check -s exit:0 -o ignore \
212 1.1 ozaki rump.ping -c 1 -n -w 3 -s $pktsize -p ff $ip_remote
213 1.1 ozaki extract_new_packets $BUS_TUNNEL > $outfile
214 1.1 ozaki check_tunnel_ipcomp_packets $outfile \
215 1.1 ozaki $ip_gw_local_tunnel $ip_gw_remote_tunnel $pktproto \
216 1.1 ozaki $ip_local $ip_remote IPComp
217 1.1 ozaki
218 1.1 ozaki test_flush_entries $SOCK_TUNNEL_LOCAL
219 1.1 ozaki test_flush_entries $SOCK_TUNNEL_REMOTE
220 1.1 ozaki }
221 1.1 ozaki
222 1.1 ozaki test_ipsec6_tunnel_ipcomp()
223 1.1 ozaki {
224 1.1 ozaki local proto=$1
225 1.1 ozaki local algo=$2
226 1.1 ozaki local calgo=$3
227 1.1 ozaki local ip_local=fd00:1::2
228 1.1 ozaki local ip_gw_local=fd00:1::1
229 1.1 ozaki local ip_gw_local_tunnel=fc00::1
230 1.1 ozaki local ip_gw_remote_tunnel=fc00::2
231 1.1 ozaki local ip_gw_remote=fd00:2::1
232 1.1 ozaki local ip_remote=fd00:2::2
233 1.1 ozaki local subnet_local=fd00:1::
234 1.1 ozaki local subnet_remote=fd00:2::
235 1.1 ozaki local tmpfile=./tmp
236 1.1 ozaki local outfile=./out
237 1.1 ozaki local pktproto=$(generate_pktproto $proto)
238 1.1 ozaki local algo_args="$(generate_algo_args $proto $algo)"
239 1.1 ozaki
240 1.1 ozaki setup_servers
241 1.1 ozaki
242 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
243 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet6.ip6.dad_count=0
244 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif0 inet6 $ip_local/64
245 1.1 ozaki atf_check -s exit:0 -o ignore \
246 1.1 ozaki rump.route -n add -inet6 -net $subnet_remote/64 $ip_gw_local
247 1.1 ozaki
248 1.1 ozaki export RUMP_SERVER=$SOCK_TUNNEL_LOCAL
249 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet6.ip6.dad_count=0
250 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif0 inet6 $ip_gw_local/64
251 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif1 inet6 $ip_gw_local_tunnel/64
252 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet6.ip6.forwarding=1
253 1.1 ozaki atf_check -s exit:0 -o ignore \
254 1.1 ozaki rump.route -n add -inet6 -net $subnet_remote/64 $ip_gw_remote_tunnel
255 1.1 ozaki
256 1.1 ozaki export RUMP_SERVER=$SOCK_TUNNEL_REMOTE
257 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet6.ip6.dad_count=0
258 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif0 inet6 $ip_gw_remote/64
259 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif1 inet6 $ip_gw_remote_tunnel/64
260 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet6.ip6.forwarding=1
261 1.1 ozaki atf_check -s exit:0 -o ignore \
262 1.1 ozaki rump.route -n add -inet6 -net $subnet_local/64 $ip_gw_local_tunnel
263 1.1 ozaki
264 1.1 ozaki export RUMP_SERVER=$SOCK_REMOTE
265 1.1 ozaki atf_check -s exit:0 rump.sysctl -q -w net.inet6.ip6.dad_count=0
266 1.1 ozaki atf_check -s exit:0 rump.ifconfig shmif0 inet6 $ip_remote
267 1.1 ozaki atf_check -s exit:0 -o ignore \
268 1.1 ozaki rump.route -n add -inet6 -net $subnet_local/64 $ip_gw_remote
269 1.1 ozaki
270 1.1 ozaki extract_new_packets $BUS_TUNNEL > $outfile
271 1.1 ozaki
272 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
273 1.1 ozaki atf_check -s exit:0 -o ignore rump.ping6 -c 1 -n -X 3 $ip_remote
274 1.1 ozaki
275 1.1 ozaki extract_new_packets $BUS_TUNNEL > $outfile
276 1.1 ozaki atf_check -s exit:0 \
277 1.1 ozaki -o match:"$ip_local > $ip_remote: ICMP6, echo request" \
278 1.1 ozaki cat $outfile
279 1.1 ozaki atf_check -s exit:0 \
280 1.1 ozaki -o match:"$ip_remote > $ip_local: ICMP6, echo reply" \
281 1.1 ozaki cat $outfile
282 1.1 ozaki
283 1.1 ozaki export RUMP_SERVER=$SOCK_TUNNEL_LOCAL
284 1.1 ozaki # from https://www.netbsd.org/docs/network/ipsec/
285 1.1 ozaki cat > $tmpfile <<-EOF
286 1.1 ozaki add $ip_gw_local_tunnel $ip_gw_remote_tunnel $proto 10000 $algo_args;
287 1.1 ozaki add $ip_gw_remote_tunnel $ip_gw_local_tunnel $proto 10001 $algo_args;
288 1.1 ozaki add $ip_gw_local_tunnel $ip_gw_remote_tunnel ipcomp 10000 -C $calgo;
289 1.1 ozaki add $ip_gw_remote_tunnel $ip_gw_local_tunnel ipcomp 10001 -C $calgo;
290 1.1 ozaki spdadd $subnet_local/64 $subnet_remote/64 any -P out ipsec
291 1.1 ozaki ipcomp/tunnel/$ip_gw_local_tunnel-$ip_gw_remote_tunnel/require
292 1.1 ozaki $proto/transport//require;
293 1.1 ozaki spdadd $subnet_remote/64 $subnet_local/64 any -P in ipsec
294 1.1 ozaki ipcomp/tunnel/$ip_gw_remote_tunnel-$ip_gw_local_tunnel/require
295 1.1 ozaki $proto/transport//require;
296 1.1 ozaki EOF
297 1.1 ozaki $DEBUG && cat $tmpfile
298 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -c < $tmpfile
299 1.1 ozaki check_sa_entries $SOCK_TUNNEL_LOCAL $ip_gw_local_tunnel \
300 1.1 ozaki $ip_gw_remote_tunnel
301 1.1 ozaki
302 1.1 ozaki export RUMP_SERVER=$SOCK_TUNNEL_REMOTE
303 1.1 ozaki cat > $tmpfile <<-EOF
304 1.1 ozaki add $ip_gw_local_tunnel $ip_gw_remote_tunnel $proto 10000 $algo_args;
305 1.1 ozaki add $ip_gw_remote_tunnel $ip_gw_local_tunnel $proto 10001 $algo_args;
306 1.1 ozaki add $ip_gw_local_tunnel $ip_gw_remote_tunnel ipcomp 10000 -C $calgo;
307 1.1 ozaki add $ip_gw_remote_tunnel $ip_gw_local_tunnel ipcomp 10001 -C $calgo;
308 1.1 ozaki spdadd $subnet_remote/64 $subnet_local/64 any -P out ipsec
309 1.1 ozaki ipcomp/tunnel/$ip_gw_remote_tunnel-$ip_gw_local_tunnel/require
310 1.1 ozaki $proto/transport//require;
311 1.1 ozaki spdadd $subnet_local/64 $subnet_remote/64 any -P in ipsec
312 1.1 ozaki ipcomp/tunnel/$ip_gw_local_tunnel-$ip_gw_remote_tunnel/require
313 1.1 ozaki $proto/transport//require;
314 1.1 ozaki EOF
315 1.1 ozaki $DEBUG && cat $tmpfile
316 1.1 ozaki atf_check -s exit:0 -o empty $HIJACKING setkey -c < $tmpfile
317 1.1 ozaki check_sa_entries $SOCK_TUNNEL_REMOTE $ip_gw_local_tunnel \
318 1.1 ozaki $ip_gw_remote_tunnel
319 1.1 ozaki
320 1.1 ozaki export RUMP_SERVER=$SOCK_LOCAL
321 1.1 ozaki
322 1.1 ozaki # IPComp sends a packet as-is if a compressed payload of
323 1.1 ozaki # the packet is greater than or equal to the original payload.
324 1.1 ozaki # So we have to fill a payload with 1 to let IPComp always send
325 1.1 ozaki # a compressed packet.
326 1.1 ozaki
327 1.1 ozaki # pktsize == minlen - 1
328 1.1 ozaki
329 1.1 ozaki pktsize=$(($(get_minlen deflate) - 8 - 40 - 1))
330 1.1 ozaki atf_check -s exit:0 -o ignore \
331 1.1 ozaki rump.ping6 -c 1 -n -X 3 -s $pktsize -p ff $ip_remote
332 1.1 ozaki extract_new_packets $BUS_TUNNEL > $outfile
333 1.1 ozaki check_tunnel_ipcomp_packets $outfile \
334 1.1 ozaki $ip_gw_local_tunnel $ip_gw_remote_tunnel $pktproto \
335 1.1 ozaki $ip_local $ip_remote ICMP6
336 1.1 ozaki
337 1.1 ozaki # pktsize == minlen
338 1.1 ozaki pktsize=$(($(get_minlen deflate) - 8 - 40))
339 1.1 ozaki atf_check -s exit:0 -o ignore \
340 1.1 ozaki rump.ping6 -c 1 -n -X 3 -s $pktsize -p ff $ip_remote
341 1.1 ozaki extract_new_packets $BUS_TUNNEL > $outfile
342 1.1 ozaki check_tunnel_ipcomp_packets $outfile \
343 1.1 ozaki $ip_gw_local_tunnel $ip_gw_remote_tunnel $pktproto \
344 1.1 ozaki $ip_local $ip_remote IPComp
345 1.1 ozaki
346 1.1 ozaki test_flush_entries $SOCK_TUNNEL_LOCAL
347 1.1 ozaki test_flush_entries $SOCK_TUNNEL_REMOTE
348 1.1 ozaki }
349 1.1 ozaki
350 1.1 ozaki test_tunnel_ipcomp_common()
351 1.1 ozaki {
352 1.1 ozaki local ipproto=$1
353 1.1 ozaki local proto=$2
354 1.1 ozaki local algo=$3
355 1.1 ozaki local calgo=$4
356 1.1 ozaki
357 1.1 ozaki if [ $ipproto = ipv4 ]; then
358 1.1 ozaki test_ipsec4_tunnel_ipcomp $proto $algo $calgo
359 1.1 ozaki else
360 1.1 ozaki test_ipsec6_tunnel_ipcomp $proto $algo $calgo
361 1.1 ozaki fi
362 1.1 ozaki }
363 1.1 ozaki
364 1.1 ozaki add_test_tunnel_mode()
365 1.1 ozaki {
366 1.1 ozaki local ipproto=$1
367 1.1 ozaki local proto=$2
368 1.1 ozaki local algo=$3
369 1.1 ozaki local calgo=$4
370 1.1 ozaki local _algo=$(echo $algo | sed 's/-//g')
371 1.1 ozaki local name= desc=
372 1.1 ozaki
373 1.1 ozaki name="ipsec_tunnel_ipcomp_${calgo}_${ipproto}_${proto}_${_algo}"
374 1.1 ozaki desc="Tests of IPsec ($ipproto) tunnel mode with $proto ($algo) and ipcomp ($calgo)"
375 1.1 ozaki
376 1.1 ozaki atf_test_case ${name} cleanup
377 1.1 ozaki eval " \
378 1.1 ozaki ${name}_head() { \
379 1.1 ozaki atf_set \"descr\" \"$desc\"; \
380 1.1 ozaki atf_set \"require.progs\" \"rump_server\" \"setkey\"; \
381 1.1 ozaki }; \
382 1.1 ozaki ${name}_body() { \
383 1.1 ozaki test_tunnel_ipcomp_common $ipproto $proto $algo $calgo; \
384 1.1 ozaki rump_server_destroy_ifaces; \
385 1.1 ozaki }; \
386 1.1 ozaki ${name}_cleanup() { \
387 1.1 ozaki $DEBUG && dump; \
388 1.1 ozaki cleanup; \
389 1.1 ozaki } \
390 1.1 ozaki "
391 1.1 ozaki atf_add_test_case ${name}
392 1.1 ozaki }
393 1.1 ozaki
394 1.1 ozaki atf_init_test_cases()
395 1.1 ozaki {
396 1.1 ozaki local calgo= algo=
397 1.1 ozaki
398 1.1 ozaki for calgo in $IPCOMP_COMPRESSION_ALGORITHMS; do
399 1.1 ozaki for algo in $ESP_ENCRYPTION_ALGORITHMS_MINIMUM; do
400 1.1 ozaki add_test_tunnel_mode ipv4 esp $algo $calgo
401 1.1 ozaki add_test_tunnel_mode ipv6 esp $algo $calgo
402 1.1 ozaki done
403 1.1 ozaki
404 1.1 ozaki for algo in $AH_AUTHENTICATION_ALGORITHMS_MINIMUM; do
405 1.1 ozaki add_test_tunnel_mode ipv4 ah $algo $calgo
406 1.1 ozaki add_test_tunnel_mode ipv6 ah $algo $calgo
407 1.1 ozaki done
408 1.1 ozaki done
409 1.1 ozaki }
410