Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[src/trunk]: src Add test cases for IPComp
details: https://anonhg.NetBSD.org/src/rev/597ff49528c8
branches: trunk
changeset: 354894:597ff49528c8
user: ozaki-r <ozaki-r%NetBSD.org@localhost>
date: Mon Jul 03 06:01:16 2017 +0000
description:
Add test cases for IPComp
diffstat:
distrib/sets/lists/tests/mi | 3 +-
tests/net/ipsec/Makefile | 5 +-
tests/net/ipsec/algorithms.sh | 21 +-
tests/net/ipsec/common.sh | 13 +-
tests/net/ipsec/t_ipsec_transport.sh | 80 ++++-
tests/net/ipsec/t_ipsec_tunnel_ipcomp.sh | 409 +++++++++++++++++++++++++++++++
6 files changed, 510 insertions(+), 21 deletions(-)
diffs (truncated from 645 to 300 lines):
diff -r 810e4ca99221 -r 597ff49528c8 distrib/sets/lists/tests/mi
--- a/distrib/sets/lists/tests/mi Mon Jul 03 03:12:42 2017 +0000
+++ b/distrib/sets/lists/tests/mi Mon Jul 03 06:01:16 2017 +0000
@@ -1,4 +1,4 @@
-# $NetBSD: mi,v 1.753 2017/06/09 06:09:01 knakahara Exp $
+# $NetBSD: mi,v 1.754 2017/07/03 06:01:16 ozaki-r Exp $
#
# Note: don't delete entries from here - mark them as "obsolete" instead.
#
@@ -3319,6 +3319,7 @@
./usr/tests/net/ipsec/t_ipsec_sysctl tests-net-tests atf,rump
./usr/tests/net/ipsec/t_ipsec_transport tests-net-tests atf,rump
./usr/tests/net/ipsec/t_ipsec_tunnel tests-net-tests atf,rump
+./usr/tests/net/ipsec/t_ipsec_tunnel_ipcomp tests-net-tests atf,rump
./usr/tests/net/ipsec/t_ipsec_tunnel_odd tests-net-tests atf,rump
./usr/tests/net/mcast tests-net-tests compattestfile,atf
./usr/tests/net/mcast/Atffile tests-net-tests atf,rump
diff -r 810e4ca99221 -r 597ff49528c8 tests/net/ipsec/Makefile
--- a/tests/net/ipsec/Makefile Mon Jul 03 03:12:42 2017 +0000
+++ b/tests/net/ipsec/Makefile Mon Jul 03 06:01:16 2017 +0000
@@ -1,4 +1,4 @@
-# $NetBSD: Makefile,v 1.6 2017/05/15 09:58:22 ozaki-r Exp $
+# $NetBSD: Makefile,v 1.7 2017/07/03 06:01:16 ozaki-r Exp $
#
.include <bsd.own.mk>
@@ -6,7 +6,8 @@
TESTSDIR= ${TESTSBASE}/net/ipsec
.for name in ipsec_ah_keys ipsec_esp_keys ipsec_gif ipsec_l2tp ipsec_misc \
- ipsec_sysctl ipsec_transport ipsec_tunnel ipsec_tunnel_odd
+ ipsec_sysctl ipsec_transport ipsec_tunnel ipsec_tunnel_ipcomp \
+ ipsec_tunnel_odd
TESTS_SH+= t_${name}
TESTS_SH_SRC_t_${name}= ../net_common.sh ./common.sh ./algorithms.sh \
t_${name}.sh
diff -r 810e4ca99221 -r 597ff49528c8 tests/net/ipsec/algorithms.sh
--- a/tests/net/ipsec/algorithms.sh Mon Jul 03 03:12:42 2017 +0000
+++ b/tests/net/ipsec/algorithms.sh Mon Jul 03 06:01:16 2017 +0000
@@ -1,4 +1,4 @@
-# $NetBSD: algorithms.sh,v 1.4 2017/05/12 02:34:45 ozaki-r Exp $
+# $NetBSD: algorithms.sh,v 1.5 2017/07/03 06:01:16 ozaki-r Exp $
#
# Copyright (c) 2017 Internet Initiative Japan Inc.
# All rights reserved.
@@ -111,6 +111,12 @@
#valid_keys_tcpmd5="8 640"
#invalid_keys_tcpmd5="648"
+IPCOMP_COMPRESSION_ALGORITHMS="deflate"
+IPCOMP_COMPRESSION_ALGORITHMS_MINIMUM="deflate"
+valid_keys_deflate="0"
+invalid_keys_deflate="8"
+minlen_deflate="90"
+
get_one_valid_keylen()
{
local algo=$1
@@ -170,7 +176,18 @@
if [ $proto = esp ]; then
echo "-E $algo $key"
+ elif [ $proto = ah ]; then
+ echo "-A $algo $key"
else
- echo "-A $algo $key"
+ echo "-C $algo $key"
fi
}
+
+get_minlen()
+{
+ local algo=$1
+ local minlen=
+
+ eval minlen="\$minlen_${algo}"
+ echo $minlen
+}
diff -r 810e4ca99221 -r 597ff49528c8 tests/net/ipsec/common.sh
--- a/tests/net/ipsec/common.sh Mon Jul 03 03:12:42 2017 +0000
+++ b/tests/net/ipsec/common.sh Mon Jul 03 06:01:16 2017 +0000
@@ -1,4 +1,4 @@
-# $NetBSD: common.sh,v 1.3 2017/05/15 09:56:47 ozaki-r Exp $
+# $NetBSD: common.sh,v 1.4 2017/07/03 06:01:16 ozaki-r Exp $
#
# Copyright (c) 2017 Internet Initiative Japan Inc.
# All rights reserved.
@@ -53,3 +53,14 @@
$HIJACKING setkey -D
# TODO: more detail checks
}
+
+generate_pktproto()
+{
+ local proto=$1
+
+ if [ $proto = ipcomp ]; then
+ echo IPComp
+ else
+ echo $proto | tr 'a-z' 'A-Z'
+ fi
+}
diff -r 810e4ca99221 -r 597ff49528c8 tests/net/ipsec/t_ipsec_transport.sh
--- a/tests/net/ipsec/t_ipsec_transport.sh Mon Jul 03 03:12:42 2017 +0000
+++ b/tests/net/ipsec/t_ipsec_transport.sh Mon Jul 03 06:01:16 2017 +0000
@@ -1,4 +1,4 @@
-# $NetBSD: t_ipsec_transport.sh,v 1.4 2017/05/12 02:34:45 ozaki-r Exp $
+# $NetBSD: t_ipsec_transport.sh,v 1.5 2017/07/03 06:01:16 ozaki-r Exp $
#
# Copyright (c) 2017 Internet Initiative Japan Inc.
# All rights reserved.
@@ -31,6 +31,17 @@
DEBUG=${DEBUG:-false}
+check_packets()
+{
+ local outfile=$1
+ local src=$2
+ local dst=$3
+ local pktproto=$4
+
+ atf_check -s exit:0 -o match:"$src > $dst: $pktproto" cat $outfile
+ atf_check -s exit:0 -o match:"$dst > $src: $pktproto" cat $outfile
+}
+
test_ipsec4_transport()
{
local proto=$1
@@ -39,8 +50,9 @@
local ip_peer=10.0.0.2
local tmpfile=./tmp
local outfile=./out
- local proto_cap=$(echo $proto | tr 'a-z' 'A-Z')
+ local pktproto=$(generate_pktproto $proto)
local algo_args="$(generate_algo_args $proto $algo)"
+ local pktsize=
rump_server_crypto_start $SOCK_LOCAL netipsec
rump_server_crypto_start $SOCK_PEER netipsec
@@ -88,13 +100,30 @@
check_sa_entries $SOCK_PEER $ip_local $ip_peer
export RUMP_SERVER=$SOCK_LOCAL
- atf_check -s exit:0 -o ignore rump.ping -c 1 -n -w 3 $ip_peer
+ if [ $proto = ipcomp ]; then
+ # IPComp sends a packet as-is if a compressed payload of
+ # the packet is greater than or equal to the original payload.
+ # So we have to fill a payload with 1 to let IPComp always send
+ # a compressed packet.
- extract_new_packets $BUS > $outfile
- atf_check -s exit:0 -o match:"$ip_local > $ip_peer: $proto_cap" \
- cat $outfile
- atf_check -s exit:0 -o match:"$ip_peer > $ip_local: $proto_cap" \
- cat $outfile
+ # pktsize == minlen - 1
+ pktsize=$(($(get_minlen $algo) - 8 - 1))
+ atf_check -s exit:0 -o ignore \
+ rump.ping -c 1 -n -w 3 -s $pktsize -p ff $ip_peer
+ extract_new_packets $BUS > $outfile
+ check_packets $outfile $ip_local $ip_peer ICMP
+
+ # pktsize == minlen
+ pktsize=$(($(get_minlen $algo) - 8))
+ atf_check -s exit:0 -o ignore \
+ rump.ping -c 1 -n -w 3 -s $pktsize -p ff $ip_peer
+ extract_new_packets $BUS > $outfile
+ check_packets $outfile $ip_local $ip_peer $pktproto
+ else
+ atf_check -s exit:0 -o ignore rump.ping -c 1 -n -w 3 $ip_peer
+ extract_new_packets $BUS > $outfile
+ check_packets $outfile $ip_local $ip_peer $pktproto
+ fi
test_flush_entries $SOCK_LOCAL
test_flush_entries $SOCK_PEER
@@ -108,7 +137,7 @@
local ip_peer=fd00::2
local tmpfile=./tmp
local outfile=./out
- local proto_cap=$(echo $proto | tr 'a-z' 'A-Z')
+ local pktproto=$(generate_pktproto $proto)
local algo_args="$(generate_algo_args $proto $algo)"
rump_server_crypto_start $SOCK_LOCAL netinet6 netipsec
@@ -157,13 +186,30 @@
check_sa_entries $SOCK_PEER $ip_local $ip_peer
export RUMP_SERVER=$SOCK_LOCAL
- atf_check -s exit:0 -o ignore rump.ping6 -c 1 -n -X 3 $ip_peer
+ if [ $proto = ipcomp ]; then
+ # IPComp sends a packet as-is if a compressed payload of
+ # the packet is greater than or equal to the original payload.
+ # So we have to fill a payload with 1 to let IPComp always send
+ # a compressed packet.
- extract_new_packets $BUS > $outfile
- atf_check -s exit:0 -o match:"$ip_local > $ip_peer: $proto_cap" \
- cat $outfile
- atf_check -s exit:0 -o match:"$ip_peer > $ip_local: $proto_cap" \
- cat $outfile
+ # pktsize == minlen - 1
+ pktsize=$(($(get_minlen $algo) - 8 - 1))
+ atf_check -s exit:0 -o ignore \
+ rump.ping6 -c 1 -n -X 3 -s $pktsize -p ff $ip_peer
+ extract_new_packets $BUS > $outfile
+ check_packets $outfile $ip_local $ip_peer ICMP6
+
+ # pktsize == minlen
+ pktsize=$(($(get_minlen $algo) - 8))
+ atf_check -s exit:0 -o ignore \
+ rump.ping6 -c 1 -n -X 3 -s $pktsize -p ff $ip_peer
+ extract_new_packets $BUS > $outfile
+ check_packets $outfile $ip_local $ip_peer $pktproto
+ else
+ atf_check -s exit:0 -o ignore rump.ping6 -c 1 -n -X 3 $ip_peer
+ extract_new_packets $BUS > $outfile
+ check_packets $outfile $ip_local $ip_peer $pktproto
+ fi
test_flush_entries $SOCK_LOCAL
test_flush_entries $SOCK_PEER
@@ -223,4 +269,8 @@
add_test_transport_mode ipv4 ah $algo
add_test_transport_mode ipv6 ah $algo
done
+ for algo in $IPCOMP_COMPRESSION_ALGORITHMS; do
+ add_test_transport_mode ipv4 ipcomp $algo
+ add_test_transport_mode ipv6 ipcomp $algo
+ done
}
diff -r 810e4ca99221 -r 597ff49528c8 tests/net/ipsec/t_ipsec_tunnel_ipcomp.sh
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/tests/net/ipsec/t_ipsec_tunnel_ipcomp.sh Mon Jul 03 06:01:16 2017 +0000
@@ -0,0 +1,409 @@
+# $NetBSD: t_ipsec_tunnel_ipcomp.sh,v 1.1 2017/07/03 06:01:16 ozaki-r Exp $
+#
+# Copyright (c) 2017 Internet Initiative Japan Inc.
+# All rights reserved.
+#
+# Redistribution and use in source and binary forms, with or without
+# modification, are permitted provided that the following conditions
+# are met:
+# 1. Redistributions of source code must retain the above copyright
+# notice, this list of conditions and the following disclaimer.
+# 2. Redistributions in binary form must reproduce the above copyright
+# notice, this list of conditions and the following disclaimer in the
+# documentation and/or other materials provided with the distribution.
+#
+# THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
+# ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
+# TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
+# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+# POSSIBILITY OF SUCH DAMAGE.
+#
+
+SOCK_LOCAL=unix://ipsec_local
+SOCK_TUNNEL_LOCAL=unix://ipsec_tunel_local
+SOCK_TUNNEL_REMOTE=unix://ipsec_tunnel_remote
+SOCK_REMOTE=unix://ipsec_remote
+BUS_LOCAL=./bus_ipsec_local
+BUS_TUNNEL=./bus_ipsec_tunnel
+BUS_REMOTE=./bus_ipsec_remote
+
+DEBUG=${DEBUG:-false}
+
+setup_servers()
+{
+
+ # See https://www.netbsd.org/docs/network/ipsec/#sample_vpn
+ rump_server_crypto_start $SOCK_LOCAL netinet6
+ rump_server_crypto_start $SOCK_TUNNEL_LOCAL netipsec netinet6
+ rump_server_crypto_start $SOCK_TUNNEL_REMOTE netipsec netinet6
+ rump_server_crypto_start $SOCK_REMOTE netinet6
+ rump_server_add_iface $SOCK_LOCAL shmif0 $BUS_LOCAL
+ rump_server_add_iface $SOCK_TUNNEL_LOCAL shmif0 $BUS_LOCAL
+ rump_server_add_iface $SOCK_TUNNEL_LOCAL shmif1 $BUS_TUNNEL
+ rump_server_add_iface $SOCK_TUNNEL_REMOTE shmif0 $BUS_REMOTE
+ rump_server_add_iface $SOCK_TUNNEL_REMOTE shmif1 $BUS_TUNNEL
+ rump_server_add_iface $SOCK_REMOTE shmif0 $BUS_REMOTE
+}
+
+check_tunnel_ipcomp_packets()
+{
+ local outfile=$1
+ local osrc=$2
+ local odst=$3
+ local oproto=$4
+ local isrc=$5
+ local idst=$6
+ local iproto=$7
+
+ $DEBUG && cat $outfile
Home |
Main Index |
Thread Index |
Old Index