svn commit: r326497 - in head: etc/mtree tests/sys tests/sys/netipsec tests/sys/netipsec/tunnel

Kristof Provost kp at FreeBSD.org
Sun Dec 3 13:52:38 UTC 2017


Author: kp
Date: Sun Dec  3 13:52:35 2017
New Revision: 326497
URL: https://svnweb.freebsd.org/changeset/base/326497

Log:
  Add IPSec tests in tunnel mode
  
  Some IPSec in tunnel mode allowing to test multiple IPSec
  configurations.  These tests are reusing the jail/vnet scripts from pf
  tests for generating complex network.
  
  Submitted by:	olivier@
  Differential Revision:	https://reviews.freebsd.org/D13017

Added:
  head/tests/sys/netipsec/
  head/tests/sys/netipsec/Makefile   (contents, props changed)
  head/tests/sys/netipsec/tunnel/
  head/tests/sys/netipsec/tunnel/Makefile   (contents, props changed)
  head/tests/sys/netipsec/tunnel/aes_cbc_128_hmac_sha1.sh   (contents, props changed)
  head/tests/sys/netipsec/tunnel/aes_cbc_256_hmac_sha2_256.sh   (contents, props changed)
  head/tests/sys/netipsec/tunnel/aes_gcm_128.sh   (contents, props changed)
  head/tests/sys/netipsec/tunnel/aes_gcm_256.sh   (contents, props changed)
  head/tests/sys/netipsec/tunnel/aesni_aes_cbc_128_hmac_sha1.sh   (contents, props changed)
  head/tests/sys/netipsec/tunnel/aesni_aes_cbc_256_hmac_sha2_256.sh   (contents, props changed)
  head/tests/sys/netipsec/tunnel/aesni_aes_gcm_128.sh   (contents, props changed)
  head/tests/sys/netipsec/tunnel/aesni_aes_gcm_256.sh   (contents, props changed)
  head/tests/sys/netipsec/tunnel/empty.sh   (contents, props changed)
  head/tests/sys/netipsec/tunnel/utils.subr   (contents, props changed)
Modified:
  head/etc/mtree/BSD.tests.dist
  head/tests/sys/Makefile

Modified: head/etc/mtree/BSD.tests.dist
==============================================================================
--- head/etc/mtree/BSD.tests.dist	Sun Dec  3 12:14:34 2017	(r326496)
+++ head/etc/mtree/BSD.tests.dist	Sun Dec  3 13:52:35 2017	(r326497)
@@ -478,6 +478,10 @@
         ..
         netinet
         ..
+        netipsec
+            tunnel
+            ..
+        ..
         netpfil
             pf
             ..

Modified: head/tests/sys/Makefile
==============================================================================
--- head/tests/sys/Makefile	Sun Dec  3 12:14:34 2017	(r326496)
+++ head/tests/sys/Makefile	Sun Dec  3 13:52:35 2017	(r326497)
@@ -13,6 +13,7 @@ TESTS_SUBDIRS+=		kqueue
 TESTS_SUBDIRS+=		mac
 TESTS_SUBDIRS+=		mqueue
 TESTS_SUBDIRS+=		netinet
+TESTS_SUBDIRS+=		netipsec
 TESTS_SUBDIRS+=		netpfil
 TESTS_SUBDIRS+=		opencrypto
 TESTS_SUBDIRS+=		posixshm

Added: head/tests/sys/netipsec/Makefile
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/tests/sys/netipsec/Makefile	Sun Dec  3 13:52:35 2017	(r326497)
@@ -0,0 +1,7 @@
+# $FreeBSD$
+
+TESTSDIR=		${TESTSBASE}/sys/netipsec
+
+TESTS_SUBDIRS+=		tunnel
+
+.include <bsd.test.mk>

Added: head/tests/sys/netipsec/tunnel/Makefile
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/tests/sys/netipsec/tunnel/Makefile	Sun Dec  3 13:52:35 2017	(r326497)
@@ -0,0 +1,19 @@
+# $FreeBSD$
+
+PACKAGE=	tests
+
+TESTSDIR=       ${TESTSBASE}/sys/netipsec/tunnel
+
+ATF_TESTS_SH+=	empty \
+		aes_cbc_128_hmac_sha1 \
+		aes_cbc_256_hmac_sha2_256 \
+		aes_gcm_128 \
+		aes_gcm_256 \
+		aesni_aes_cbc_128_hmac_sha1 \
+		aesni_aes_cbc_256_hmac_sha2_256 \
+		aesni_aes_gcm_128 \
+		aesni_aes_gcm_256
+
+${PACKAGE}FILES+=	utils.subr
+
+.include <bsd.test.mk>

Added: head/tests/sys/netipsec/tunnel/aes_cbc_128_hmac_sha1.sh
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/tests/sys/netipsec/tunnel/aes_cbc_128_hmac_sha1.sh	Sun Dec  3 13:52:35 2017	(r326497)
@@ -0,0 +1,47 @@
+# $FreeBSD$
+
+. $(atf_get_srcdir)/utils.subr
+
+atf_test_case "v4" "cleanup"
+v4_head()
+{
+	atf_set descr 'IPSec inet4 tunnel using aes-cbc-128-hmac-sha1'
+	atf_set require.user root
+	# Unload AESNI module if loaded
+	kldstat -q -n aesni && kldunload aesni
+}
+
+v4_body()
+{
+	ist_test 4 rijndael-cbc "1234567890123456" hmac-sha1 "12345678901234567890"
+}
+
+v4_cleanup()
+{
+	ist_cleanup
+}
+
+atf_test_case "v6" "cleanup"
+v6_head()
+{
+	atf_set descr 'IPSec inet6 tunnel using aes-cbc-128-hmac-sha1'
+	atf_set require.user root
+	# Unload AESNI module if loaded
+	kldstat -q -n aesni && kldunload aesni
+}
+
+v6_body()
+{
+	ist_test 6 rijndael-cbc "1234567890123456" hmac-sha1 "12345678901234567890"
+}
+
+v6_cleanup()
+{
+	ist_cleanup
+}
+
+atf_init_test_cases()
+{
+	atf_add_test_case "v4"
+	atf_add_test_case "v6"
+}

Added: head/tests/sys/netipsec/tunnel/aes_cbc_256_hmac_sha2_256.sh
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/tests/sys/netipsec/tunnel/aes_cbc_256_hmac_sha2_256.sh	Sun Dec  3 13:52:35 2017	(r326497)
@@ -0,0 +1,47 @@
+# $FreeBSD$
+
+. $(atf_get_srcdir)/utils.subr
+
+atf_test_case "v4" "cleanup"
+v4_head()
+{
+	atf_set descr 'IPSec inet4 tunnel using aes-cbc-256-hmac-sha2-256'
+	atf_set require.user root
+	# load AESNI module if not already
+	kldstat -q -n aesni || kldload aesni
+}
+
+v4_body()
+{
+	ist_test 4 rijndael-cbc "12345678901234567890123456789012" hmac-sha2-256 "12345678901234567890123456789012"
+}
+
+v4_cleanup()
+{
+	ist_cleanup
+}
+
+atf_test_case "v6" "cleanup"
+v6_head()
+{
+	atf_set descr 'IPSec inet6 tunnel using aes-cbc-256-hmac-sha2-256'
+	atf_set require.user root
+	# load AESNI module if not already
+	kldstat -q -n aesni || kldload aesni
+}
+
+v6_body()
+{
+	ist_test 6 rijndael-cbc "12345678901234567890123456789012" hmac-sha2-256 "12345678901234567890123456789012"
+}
+
+v6_cleanup()
+{
+	ist_cleanup
+}
+
+atf_init_test_cases()
+{
+	atf_add_test_case "v4"
+	atf_add_test_case "v6"
+}

Added: head/tests/sys/netipsec/tunnel/aes_gcm_128.sh
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/tests/sys/netipsec/tunnel/aes_gcm_128.sh	Sun Dec  3 13:52:35 2017	(r326497)
@@ -0,0 +1,47 @@
+# $FreeBSD$
+
+. $(atf_get_srcdir)/utils.subr
+
+atf_test_case "v4" "cleanup"
+v4_head()
+{
+	atf_set descr 'IPSec inet4 tunnel using aes-gcm-128'
+	atf_set require.user root
+	# Unload AESNI module if loaded
+	kldstat -q -n aesni && kldunload aesni
+}
+
+v4_body()
+{
+	ist_test 4 aes-gcm-16 "12345678901234567890"
+}
+
+v4_cleanup()
+{
+	ist_cleanup
+}
+
+atf_test_case "v6" "cleanup"
+v6_head()
+{
+	atf_set descr 'IPSec inet6 tunnel using aes-gcm-128'
+	atf_set require.user root
+	# Unload AESNI module if loaded
+	kldstat -q -n aesni && kldunload aesni
+}
+
+v6_body()
+{
+	ist_test 6 aes-gcm-16 "12345678901234567890"
+}
+
+v6_cleanup()
+{
+	ist_cleanup
+}
+
+atf_init_test_cases()
+{
+	atf_add_test_case "v4"
+	atf_add_test_case "v6"
+}

Added: head/tests/sys/netipsec/tunnel/aes_gcm_256.sh
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/tests/sys/netipsec/tunnel/aes_gcm_256.sh	Sun Dec  3 13:52:35 2017	(r326497)
@@ -0,0 +1,47 @@
+# $FreeBSD$
+
+. $(atf_get_srcdir)/utils.subr
+
+atf_test_case "v4" "cleanup"
+v4_head()
+{
+	atf_set descr 'IPSec inet4 tunnel using aes-gcm-256'
+	atf_set require.user root
+	# Unload AESNI module if loaded
+	kldstat -q -n aesni && kldunload aesni
+}
+
+v4_body()
+{
+	ist_test 4 aes-gcm-16 "123456789012345678901234567890123456"
+}
+
+v4_cleanup()
+{
+	ist_cleanup
+}
+
+atf_test_case "v6" "cleanup"
+v6_head()
+{
+	atf_set descr 'IPSec inet6 tunnel using aes-gcm-256'
+	atf_set require.user root
+	# Unload AESNI module if loaded
+	kldstat -q -n aesni && kldunload aesni
+}
+
+v6_body()
+{
+	ist_test 6 aes-gcm-16 "123456789012345678901234567890123456"
+}
+
+v6_cleanup()
+{
+	ist_cleanup
+}
+
+atf_init_test_cases()
+{
+	atf_add_test_case "v4"
+	atf_add_test_case "v6"
+}

Added: head/tests/sys/netipsec/tunnel/aesni_aes_cbc_128_hmac_sha1.sh
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/tests/sys/netipsec/tunnel/aesni_aes_cbc_128_hmac_sha1.sh	Sun Dec  3 13:52:35 2017	(r326497)
@@ -0,0 +1,47 @@
+# $FreeBSD$
+
+. $(atf_get_srcdir)/utils.subr
+
+atf_test_case "v4" "cleanup"
+v4_head()
+{
+	atf_set descr 'IPSec inet4 tunnel using aes-cbc-128-hmac-sha1 and AESNI'
+	atf_set require.user root
+	# load AESNI module if not already
+	kldstat -q -n aesni || kldload aesni
+}
+
+v4_body()
+{
+	ist_test 4 rijndael-cbc "1234567890123456" hmac-sha1 "12345678901234567890"
+}
+
+v4_cleanup()
+{
+	ist_cleanup
+}
+
+atf_test_case "v6" "cleanup"
+v6_head()
+{
+	atf_set descr 'IPSec inet6 tunnel using aes-cbc-128-hmac-sha1 and AESNI'
+	atf_set require.user root
+	# load AESNI module if not already
+	kldstat -q -n aesni || kldload aesni
+}
+
+v6_body()
+{
+	ist_test 6 rijndael-cbc "1234567890123456" hmac-sha1 "12345678901234567890"
+}
+
+v6_cleanup()
+{
+	ist_cleanup
+}
+
+atf_init_test_cases()
+{
+	atf_add_test_case "v4"
+	atf_add_test_case "v6"
+}

Added: head/tests/sys/netipsec/tunnel/aesni_aes_cbc_256_hmac_sha2_256.sh
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/tests/sys/netipsec/tunnel/aesni_aes_cbc_256_hmac_sha2_256.sh	Sun Dec  3 13:52:35 2017	(r326497)
@@ -0,0 +1,47 @@
+# $FreeBSD$
+
+. $(atf_get_srcdir)/utils.subr
+
+atf_test_case "v4" "cleanup"
+v4_head()
+{
+	atf_set descr 'IPSec inet4 tunnel using aes-cbc-256-hmac-sha2-256 and AESNI'
+	atf_set require.user root
+	# Unload AESNI module if loaded
+	kldstat -q -n aesni && kldunload aesni
+}
+
+v4_body()
+{
+	ist_test 4 rijndael-cbc "12345678901234567890123456789012" hmac-sha2-256 "12345678901234567890123456789012"
+}
+
+v4_cleanup()
+{
+	ist_cleanup
+}
+
+atf_test_case "v6" "cleanup"
+v6_head()
+{
+	atf_set descr 'IPSec inet6 tunnel using aes-cbc-256-hmac-sha2-256 and AESNI'
+	atf_set require.user root
+	# Unload AESNI module if loaded
+	kldstat -q -n aesni && kldunload aesni
+}
+
+v6_body()
+{
+	ist_test 6 rijndael-cbc "12345678901234567890123456789012" hmac-sha2-256 "12345678901234567890123456789012"
+}
+
+v6_cleanup()
+{
+	ist_cleanup
+}
+
+atf_init_test_cases()
+{
+	atf_add_test_case "v4"
+	atf_add_test_case "v6"
+}

Added: head/tests/sys/netipsec/tunnel/aesni_aes_gcm_128.sh
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/tests/sys/netipsec/tunnel/aesni_aes_gcm_128.sh	Sun Dec  3 13:52:35 2017	(r326497)
@@ -0,0 +1,48 @@
+# $FreeBSD$
+
+. $(atf_get_srcdir)/utils.subr
+
+atf_test_case "v4" "cleanup"
+v4_head()
+{
+	atf_set descr 'IPSec inet4 tunnel using aes-gcm-128 and AESNI'
+	atf_set require.user root
+	# load AESNI module if not already
+	kldstat -q -n aesni || kldload aesni
+}
+
+v4_body()
+{
+	ist_test 4 aes-gcm-16 "12345678901234567890"
+}
+
+v4_cleanup()
+{
+	ist_cleanup
+}
+
+atf_test_case "v6" "cleanup"
+v6_head()
+{
+	atf_set descr 'IPSec inet6 tunnel using aes-gcm-128 and AESNI'
+	atf_set require.user root
+	# load AESNI module if not already
+	kldstat -q -n aesni || kldload aesni
+}
+
+v6_body()
+{
+	atf_expect_fail "PR 201447"
+	ist_test 6 aes-gcm-16 "12345678901234567890"
+}
+
+v6_cleanup()
+{
+	ist_cleanup
+}
+
+atf_init_test_cases()
+{
+	atf_add_test_case "v4"
+	atf_add_test_case "v6"
+}

Added: head/tests/sys/netipsec/tunnel/aesni_aes_gcm_256.sh
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/tests/sys/netipsec/tunnel/aesni_aes_gcm_256.sh	Sun Dec  3 13:52:35 2017	(r326497)
@@ -0,0 +1,48 @@
+# $FreeBSD$
+
+. $(atf_get_srcdir)/utils.subr
+
+atf_test_case "v4" "cleanup"
+v4_head()
+{
+	atf_set descr 'IPSec inet4 tunnel using aes-gcm-256 and AESNI'
+	atf_set require.user root
+	# load AESNI module if not already
+	kldstat -q -n aesni || kldload aesni
+}
+
+v4_body()
+{
+	ist_test 4 aes-gcm-16 "123456789012345678901234567890123456"
+}
+
+v4_cleanup()
+{
+	ist_cleanup
+}
+
+atf_test_case "v6" "cleanup"
+v6_head()
+{
+	atf_set descr 'IPSec inet6 tunnel using aes-gcm-256 and AESNI'
+	atf_set require.user root
+	# load AESNI module if not already
+	kldstat -q -n aesni || kldload aesni
+}
+
+v6_body()
+{
+	atf_expect_fail "PR 201447"
+	ist_test 6 aes-gcm-16 "123456789012345678901234567890123456"
+}
+
+v6_cleanup()
+{
+	ist_cleanup
+}
+
+atf_init_test_cases()
+{
+	atf_add_test_case "v4"
+	atf_add_test_case "v6"
+}

Added: head/tests/sys/netipsec/tunnel/empty.sh
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/tests/sys/netipsec/tunnel/empty.sh	Sun Dec  3 13:52:35 2017	(r326497)
@@ -0,0 +1,44 @@
+# $FreeBSD$
+
+. $(atf_get_srcdir)/utils.subr
+
+atf_test_case "v4" "cleanup"
+v4_head()
+{
+	atf_set descr 'IPSec inet4 tunnel using NULL encryption'
+	atf_set require.user root
+}
+
+v4_body()
+{
+	# Can't use filename "null" for this script: PR 223564
+	ist_test 4 null ""
+}
+
+v4_cleanup()
+{
+	ist_cleanup
+}
+
+atf_test_case "v6" "cleanup"
+v6_head()
+{
+	atf_set descr 'IPSec inet6 tunnel using NULL encryption'
+	atf_set require.user root
+}
+
+v6_body()
+{
+	ist_test 6 null ""
+}
+
+v6_cleanup()
+{
+	ist_cleanup
+}
+
+atf_init_test_cases()
+{
+	atf_add_test_case "v4"
+	atf_add_test_case "v6"
+}

Added: head/tests/sys/netipsec/tunnel/utils.subr
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/tests/sys/netipsec/tunnel/utils.subr	Sun Dec  3 13:52:35 2017	(r326497)
@@ -0,0 +1,166 @@
+# $FreeBSD$
+# Utility functions (mainly from pf tests, should be merged one day)
+##
+
+: ${TMPDIR=/tmp}
+
+ist_init()
+{
+	if [ "$(sysctl -i -n kern.features.vimage)" != 1 ]; then
+		atf_skip "This test requires VIMAGE"
+	fi
+}
+
+pft_mkepair()
+{
+	ifname=$(ifconfig epair create)
+	echo $ifname >> created_interfaces.lst
+	echo ${ifname%a}
+}
+
+pft_mkjail()
+{
+	jailname=$1
+	shift
+
+	vnet_interfaces=
+	for ifname in $@
+	do
+		vnet_interfaces="${vnet_interfaces} vnet.interface=${ifname}"
+	done
+	jail -c name=${jailname} persist vnet ${vnet_interfaces}
+
+	echo $jailname >> created_jails.lst
+}
+
+ist_labsetup ()
+{
+	epair_LAN_A=$(pft_mkepair)
+	ifconfig ${epair_LAN_A}a up
+	epair_PUB_A=$(pft_mkepair)
+	ifconfig ${epair_PUB_A}a up
+	epair_LAN_B=$(pft_mkepair)
+	ifconfig ${epair_LAN_B}a up
+	epair_PUB_B=$(pft_mkepair)
+	ifconfig ${epair_PUB_B}a up
+
+	pft_mkjail hostA ${epair_LAN_A}a
+	pft_mkjail ipsecA ${epair_LAN_A}b ${epair_PUB_A}a
+	pft_mkjail router ${epair_PUB_A}b ${epair_PUB_B}b
+	pft_mkjail ipsecB ${epair_LAN_B}b ${epair_PUB_B}a
+	pft_mkjail hostB ${epair_LAN_B}a
+}
+
+ist_v4_setup ()
+{
+	jexec hostA ifconfig ${epair_LAN_A}a 192.0.2.1/30 up
+	jexec ipsecA ifconfig ${epair_LAN_A}b 192.0.2.2/30 up
+	jexec ipsecA ifconfig ${epair_PUB_A}a 198.51.100.2/30 up
+	jexec router ifconfig ${epair_PUB_A}b 198.51.100.1/30 up
+	jexec router ifconfig ${epair_PUB_B}b 198.51.100.6/30 up
+	jexec ipsecB ifconfig ${epair_PUB_B}a 198.51.100.7/30 up
+	jexec ipsecB ifconfig ${epair_LAN_B}b 203.0.113.2/30 up
+	jexec hostB ifconfig ${epair_LAN_B}a 203.0.113.1/30 up
+	jexec ipsecA sysctl net.inet.ip.forwarding=1
+	jexec router sysctl net.inet.ip.forwarding=1
+	jexec ipsecB sysctl net.inet.ip.forwarding=1
+	jexec hostA route add default 192.0.2.2
+	jexec ipsecA route add default 198.51.100.1
+	jexec ipsecB route add default 198.51.100.6
+	jexec hostB route add default 203.0.113.2
+}
+
+ist_v6_setup ()
+{
+	jexec hostA ifconfig ${epair_LAN_A}a inet6 2001:db8:1::1/64 up no_dad
+	jexec ipsecA ifconfig ${epair_LAN_A}b inet6 2001:db8:1::2/64 up no_dad
+	jexec ipsecA ifconfig ${epair_PUB_A}a inet6 2001:db8:23::2/64 up no_dad
+	jexec router ifconfig ${epair_PUB_A}b inet6 2001:db8:23::3/64 up no_dad
+	jexec router ifconfig ${epair_PUB_B}b inet6 2001:db8:34::3/64 up no_dad
+	jexec ipsecB ifconfig ${epair_PUB_B}a inet6 2001:db8:34::2/64 up no_dad
+	jexec ipsecB ifconfig ${epair_LAN_B}b inet6 2001:db8:45::2/64 up no_dad
+	jexec hostB ifconfig ${epair_LAN_B}a inet6 2001:db8:45::1/64 up no_dad
+	jexec ipsecA sysctl net.inet6.ip6.forwarding=1
+	jexec router sysctl net.inet6.ip6.forwarding=1
+	jexec ipsecB sysctl net.inet6.ip6.forwarding=1
+	jexec hostA route -6 add default 2001:db8:1::2
+	jexec ipsecA route -6 add default 2001:db8:23::3
+	jexec ipsecB route -6 add default 2001:db8:34::3
+	jexec hostB route -6 add default 2001:db8:45::2
+}
+
+ist_setkey()
+{
+	jname=$1
+	dir=$2
+	afnet=$3
+	enc_algo=$4
+	enc_key=$5
+	auth_algo=$6
+	auth_key=$7
+
+	# Load
+	(
+		printf "#arguments debug: ${jname} ${afnet} ${dir} ${enc_algo} "
+		printf "${enc_key} ${auth_algo} ${auth_key}\n"
+		printf "flush;\n"
+		printf "spdflush;\n"
+		if [ ${afnet} -eq 4 ]; then
+			SRC_LAN="192.0.2.0/24"
+			DST_LAN="203.0.113.0/24"
+			SRC_GW="198.51.100.2"
+			DST_GW="198.51.100.7"
+		else
+			SRC_LAN="2001:db8:1::/64"
+			DST_LAN="2001:db8:45::/64"
+			SRC_GW="2001:db8:23::2"
+			DST_GW="2001:db8:34::2"
+		fi
+		printf "spdadd ${SRC_LAN} ${DST_LAN} any -P "
+		[ ${dir} = "out" ] && printf "out" || printf "in"
+		printf " ipsec esp/tunnel/${SRC_GW}-${DST_GW}/require;\n"
+		printf "spdadd ${DST_LAN} ${SRC_LAN} any -P "
+		[ ${dir} = "out" ] && printf "in" || printf "out"
+		printf " ipsec esp/tunnel/${DST_GW}-${SRC_GW}/require;\n"
+		printf "add ${SRC_GW} ${DST_GW} esp 0x1000 -E ${enc_algo} \"${enc_key}\""
+		[ -n "${auth_algo}" ] && printf " -A ${auth_algo} \"${auth_key}\";\n" || printf ";\n"
+		printf "add ${DST_GW} ${SRC_GW} esp 0x1001 -E ${enc_algo} \"${enc_key}\""
+		[ -n "$auth_algo" ] && printf " -A ${auth_algo} \"${auth_key}\";\n" || printf ";\n"
+	) > ${TMPDIR}/ipsec.${jname}.conf
+}
+
+ist_test()
+{
+	ist_init
+	ist_labsetup
+	[ $1 -eq 4 ] && ist_v4_setup || ist_v6_setup
+	ist_setkey ipsecA out $@
+	atf_check -s exit:0 -o ignore jexec ipsecA setkey -f ${TMPDIR}/ipsec.ipsecA.conf
+	ist_setkey ipsecB in $@
+	atf_check -s exit:0 -o ignore jexec ipsecB setkey -f ${TMPDIR}/ipsec.ipsecB.conf
+	# Check ipsec tunnel
+	if [ $1 -eq 4 ]; then
+		atf_check -s exit:0 -o ignore jexec hostA ping -c 1 203.0.113.1
+	else
+		atf_check -s exit:0 -o ignore jexec hostA ping6 -c 1 2001:db8:45::1
+	fi
+}
+ist_cleanup()
+{
+	if [ -f created_jails.lst ]; then
+		for jailname in $(cat created_jails.lst)
+		do
+			jail -r ${jailname}
+			rm -f ${TMPDIR}/ipsec.${jailname}.conf
+		done
+		rm created_jails.lst
+	fi
+
+	if [ -f created_interfaces.lst ]; then
+		for ifname in $(cat created_interfaces.lst)
+		do
+			ifconfig ${ifname} destroy
+		done
+		rm created_interfaces.lst
+	fi
+}


More information about the svn-src-head mailing list