Commit 3bf679e2 authored by Jakub Kicinski's avatar Jakub Kicinski

Merge branch 'selftests-updates-to-allow-single-instance-of-nettest-for-client-and-server'

David Ahern says:

====================
selftests: Updates to allow single instance of nettest for client and server

Update nettest to handle namespace change internally to allow a
single instance to run both client and server modes. Device validation
needs to be moved after the namespace change and a few run time
options need to be split to allow values for client and server.

v4
- really fix the memory leak with stdout/stderr buffers

v3
- send proper status in do_server for UDP sockets
- fix memory leak with stdout/stderr buffers
- new patch with separate option for address binding
- new patch to remove unnecessary newline

v2
- fix checkpath warnings
====================

Link: https://lore.kernel.org/r/20210114030949.54425-1-dsahern@kernel.orgSigned-off-by: default avatarJakub Kicinski <kuba@kernel.org>
parents c0103729 5265a014
...@@ -801,9 +801,9 @@ ipv4_tcp_md5_novrf() ...@@ -801,9 +801,9 @@ ipv4_tcp_md5_novrf()
# basic use case # basic use case
log_start log_start
run_cmd nettest -s -M ${MD5_PW} -r ${NSB_IP} & run_cmd nettest -s -M ${MD5_PW} -m ${NSB_IP} &
sleep 1 sleep 1
run_cmd_nsb nettest -r ${NSA_IP} -M ${MD5_PW} run_cmd_nsb nettest -r ${NSA_IP} -X ${MD5_PW}
log_test $? 0 "MD5: Single address config" log_test $? 0 "MD5: Single address config"
# client sends MD5, server not configured # client sends MD5, server not configured
...@@ -811,23 +811,23 @@ ipv4_tcp_md5_novrf() ...@@ -811,23 +811,23 @@ ipv4_tcp_md5_novrf()
show_hint "Should timeout due to MD5 mismatch" show_hint "Should timeout due to MD5 mismatch"
run_cmd nettest -s & run_cmd nettest -s &
sleep 1 sleep 1
run_cmd_nsb nettest -r ${NSA_IP} -M ${MD5_PW} run_cmd_nsb nettest -r ${NSA_IP} -X ${MD5_PW}
log_test $? 2 "MD5: Server no config, client uses password" log_test $? 2 "MD5: Server no config, client uses password"
# wrong password # wrong password
log_start log_start
show_hint "Should timeout since client uses wrong password" show_hint "Should timeout since client uses wrong password"
run_cmd nettest -s -M ${MD5_PW} -r ${NSB_IP} & run_cmd nettest -s -M ${MD5_PW} -m ${NSB_IP} &
sleep 1 sleep 1
run_cmd_nsb nettest -r ${NSA_IP} -M ${MD5_WRONG_PW} run_cmd_nsb nettest -r ${NSA_IP} -X ${MD5_WRONG_PW}
log_test $? 2 "MD5: Client uses wrong password" log_test $? 2 "MD5: Client uses wrong password"
# client from different address # client from different address
log_start log_start
show_hint "Should timeout due to MD5 mismatch" show_hint "Should timeout due to MD5 mismatch"
run_cmd nettest -s -M ${MD5_PW} -r ${NSB_LO_IP} & run_cmd nettest -s -M ${MD5_PW} -m ${NSB_LO_IP} &
sleep 1 sleep 1
run_cmd_nsb nettest -r ${NSA_IP} -M ${MD5_PW} run_cmd_nsb nettest -r ${NSA_IP} -X ${MD5_PW}
log_test $? 2 "MD5: Client address does not match address configured with password" log_test $? 2 "MD5: Client address does not match address configured with password"
# #
...@@ -838,7 +838,7 @@ ipv4_tcp_md5_novrf() ...@@ -838,7 +838,7 @@ ipv4_tcp_md5_novrf()
log_start log_start
run_cmd nettest -s -M ${MD5_PW} -m ${NS_NET} & run_cmd nettest -s -M ${MD5_PW} -m ${NS_NET} &
sleep 1 sleep 1
run_cmd_nsb nettest -r ${NSA_IP} -M ${MD5_PW} run_cmd_nsb nettest -r ${NSA_IP} -X ${MD5_PW}
log_test $? 0 "MD5: Prefix config" log_test $? 0 "MD5: Prefix config"
# client in prefix, wrong password # client in prefix, wrong password
...@@ -846,7 +846,7 @@ ipv4_tcp_md5_novrf() ...@@ -846,7 +846,7 @@ ipv4_tcp_md5_novrf()
show_hint "Should timeout since client uses wrong password" show_hint "Should timeout since client uses wrong password"
run_cmd nettest -s -M ${MD5_PW} -m ${NS_NET} & run_cmd nettest -s -M ${MD5_PW} -m ${NS_NET} &
sleep 1 sleep 1
run_cmd_nsb nettest -r ${NSA_IP} -M ${MD5_WRONG_PW} run_cmd_nsb nettest -r ${NSA_IP} -X ${MD5_WRONG_PW}
log_test $? 2 "MD5: Prefix config, client uses wrong password" log_test $? 2 "MD5: Prefix config, client uses wrong password"
# client outside of prefix # client outside of prefix
...@@ -854,7 +854,7 @@ ipv4_tcp_md5_novrf() ...@@ -854,7 +854,7 @@ ipv4_tcp_md5_novrf()
show_hint "Should timeout due to MD5 mismatch" show_hint "Should timeout due to MD5 mismatch"
run_cmd nettest -s -M ${MD5_PW} -m ${NS_NET} & run_cmd nettest -s -M ${MD5_PW} -m ${NS_NET} &
sleep 1 sleep 1
run_cmd_nsb nettest -l ${NSB_LO_IP} -r ${NSA_IP} -M ${MD5_PW} run_cmd_nsb nettest -c ${NSB_LO_IP} -r ${NSA_IP} -X ${MD5_PW}
log_test $? 2 "MD5: Prefix config, client address not in configured prefix" log_test $? 2 "MD5: Prefix config, client address not in configured prefix"
} }
...@@ -869,33 +869,33 @@ ipv4_tcp_md5() ...@@ -869,33 +869,33 @@ ipv4_tcp_md5()
# basic use case # basic use case
log_start log_start
run_cmd nettest -s -d ${VRF} -M ${MD5_PW} -r ${NSB_IP} & run_cmd nettest -s -I ${VRF} -M ${MD5_PW} -m ${NSB_IP} &
sleep 1 sleep 1
run_cmd_nsb nettest -r ${NSA_IP} -M ${MD5_PW} run_cmd_nsb nettest -r ${NSA_IP} -X ${MD5_PW}
log_test $? 0 "MD5: VRF: Single address config" log_test $? 0 "MD5: VRF: Single address config"
# client sends MD5, server not configured # client sends MD5, server not configured
log_start log_start
show_hint "Should timeout since server does not have MD5 auth" show_hint "Should timeout since server does not have MD5 auth"
run_cmd nettest -s -d ${VRF} & run_cmd nettest -s -I ${VRF} &
sleep 1 sleep 1
run_cmd_nsb nettest -r ${NSA_IP} -M ${MD5_PW} run_cmd_nsb nettest -r ${NSA_IP} -X ${MD5_PW}
log_test $? 2 "MD5: VRF: Server no config, client uses password" log_test $? 2 "MD5: VRF: Server no config, client uses password"
# wrong password # wrong password
log_start log_start
show_hint "Should timeout since client uses wrong password" show_hint "Should timeout since client uses wrong password"
run_cmd nettest -s -d ${VRF} -M ${MD5_PW} -r ${NSB_IP} & run_cmd nettest -s -I ${VRF} -M ${MD5_PW} -m ${NSB_IP} &
sleep 1 sleep 1
run_cmd_nsb nettest -r ${NSA_IP} -M ${MD5_WRONG_PW} run_cmd_nsb nettest -r ${NSA_IP} -X ${MD5_WRONG_PW}
log_test $? 2 "MD5: VRF: Client uses wrong password" log_test $? 2 "MD5: VRF: Client uses wrong password"
# client from different address # client from different address
log_start log_start
show_hint "Should timeout since server config differs from client" show_hint "Should timeout since server config differs from client"
run_cmd nettest -s -d ${VRF} -M ${MD5_PW} -r ${NSB_LO_IP} & run_cmd nettest -s -I ${VRF} -M ${MD5_PW} -m ${NSB_LO_IP} &
sleep 1 sleep 1
run_cmd_nsb nettest -r ${NSA_IP} -M ${MD5_PW} run_cmd_nsb nettest -r ${NSA_IP} -X ${MD5_PW}
log_test $? 2 "MD5: VRF: Client address does not match address configured with password" log_test $? 2 "MD5: VRF: Client address does not match address configured with password"
# #
...@@ -904,25 +904,25 @@ ipv4_tcp_md5() ...@@ -904,25 +904,25 @@ ipv4_tcp_md5()
# client in prefix # client in prefix
log_start log_start
run_cmd nettest -s -d ${VRF} -M ${MD5_PW} -m ${NS_NET} & run_cmd nettest -s -I ${VRF} -M ${MD5_PW} -m ${NS_NET} &
sleep 1 sleep 1
run_cmd_nsb nettest -r ${NSA_IP} -M ${MD5_PW} run_cmd_nsb nettest -r ${NSA_IP} -X ${MD5_PW}
log_test $? 0 "MD5: VRF: Prefix config" log_test $? 0 "MD5: VRF: Prefix config"
# client in prefix, wrong password # client in prefix, wrong password
log_start log_start
show_hint "Should timeout since client uses wrong password" show_hint "Should timeout since client uses wrong password"
run_cmd nettest -s -d ${VRF} -M ${MD5_PW} -m ${NS_NET} & run_cmd nettest -s -I ${VRF} -M ${MD5_PW} -m ${NS_NET} &
sleep 1 sleep 1
run_cmd_nsb nettest -r ${NSA_IP} -M ${MD5_WRONG_PW} run_cmd_nsb nettest -r ${NSA_IP} -X ${MD5_WRONG_PW}
log_test $? 2 "MD5: VRF: Prefix config, client uses wrong password" log_test $? 2 "MD5: VRF: Prefix config, client uses wrong password"
# client outside of prefix # client outside of prefix
log_start log_start
show_hint "Should timeout since client address is outside of prefix" show_hint "Should timeout since client address is outside of prefix"
run_cmd nettest -s -d ${VRF} -M ${MD5_PW} -m ${NS_NET} & run_cmd nettest -s -I ${VRF} -M ${MD5_PW} -m ${NS_NET} &
sleep 1 sleep 1
run_cmd_nsb nettest -l ${NSB_LO_IP} -r ${NSA_IP} -M ${MD5_PW} run_cmd_nsb nettest -c ${NSB_LO_IP} -r ${NSA_IP} -X ${MD5_PW}
log_test $? 2 "MD5: VRF: Prefix config, client address not in configured prefix" log_test $? 2 "MD5: VRF: Prefix config, client address not in configured prefix"
# #
...@@ -930,74 +930,74 @@ ipv4_tcp_md5() ...@@ -930,74 +930,74 @@ ipv4_tcp_md5()
# #
log_start log_start
run_cmd nettest -s -d ${VRF} -M ${MD5_PW} -r ${NSB_IP} & run_cmd nettest -s -I ${VRF} -M ${MD5_PW} -m ${NSB_IP} &
run_cmd nettest -s -M ${MD5_WRONG_PW} -r ${NSB_IP} & run_cmd nettest -s -M ${MD5_WRONG_PW} -m ${NSB_IP} &
sleep 1 sleep 1
run_cmd_nsb nettest -r ${NSA_IP} -M ${MD5_PW} run_cmd_nsb nettest -r ${NSA_IP} -X ${MD5_PW}
log_test $? 0 "MD5: VRF: Single address config in default VRF and VRF, conn in VRF" log_test $? 0 "MD5: VRF: Single address config in default VRF and VRF, conn in VRF"
log_start log_start
run_cmd nettest -s -d ${VRF} -M ${MD5_PW} -r ${NSB_IP} & run_cmd nettest -s -I ${VRF} -M ${MD5_PW} -m ${NSB_IP} &
run_cmd nettest -s -M ${MD5_WRONG_PW} -r ${NSB_IP} & run_cmd nettest -s -M ${MD5_WRONG_PW} -m ${NSB_IP} &
sleep 1 sleep 1
run_cmd_nsc nettest -r ${NSA_IP} -M ${MD5_WRONG_PW} run_cmd_nsc nettest -r ${NSA_IP} -X ${MD5_WRONG_PW}
log_test $? 0 "MD5: VRF: Single address config in default VRF and VRF, conn in default VRF" log_test $? 0 "MD5: VRF: Single address config in default VRF and VRF, conn in default VRF"
log_start log_start
show_hint "Should timeout since client in default VRF uses VRF password" show_hint "Should timeout since client in default VRF uses VRF password"
run_cmd nettest -s -d ${VRF} -M ${MD5_PW} -r ${NSB_IP} & run_cmd nettest -s -I ${VRF} -M ${MD5_PW} -m ${NSB_IP} &
run_cmd nettest -s -M ${MD5_WRONG_PW} -r ${NSB_IP} & run_cmd nettest -s -M ${MD5_WRONG_PW} -m ${NSB_IP} &
sleep 1 sleep 1
run_cmd_nsc nettest -r ${NSA_IP} -M ${MD5_PW} run_cmd_nsc nettest -r ${NSA_IP} -X ${MD5_PW}
log_test $? 2 "MD5: VRF: Single address config in default VRF and VRF, conn in default VRF with VRF pw" log_test $? 2 "MD5: VRF: Single address config in default VRF and VRF, conn in default VRF with VRF pw"
log_start log_start
show_hint "Should timeout since client in VRF uses default VRF password" show_hint "Should timeout since client in VRF uses default VRF password"
run_cmd nettest -s -d ${VRF} -M ${MD5_PW} -r ${NSB_IP} & run_cmd nettest -s -I ${VRF} -M ${MD5_PW} -m ${NSB_IP} &
run_cmd nettest -s -M ${MD5_WRONG_PW} -r ${NSB_IP} & run_cmd nettest -s -M ${MD5_WRONG_PW} -m ${NSB_IP} &
sleep 1 sleep 1
run_cmd_nsb nettest -r ${NSA_IP} -M ${MD5_WRONG_PW} run_cmd_nsb nettest -r ${NSA_IP} -X ${MD5_WRONG_PW}
log_test $? 2 "MD5: VRF: Single address config in default VRF and VRF, conn in VRF with default VRF pw" log_test $? 2 "MD5: VRF: Single address config in default VRF and VRF, conn in VRF with default VRF pw"
log_start log_start
run_cmd nettest -s -d ${VRF} -M ${MD5_PW} -m ${NS_NET} & run_cmd nettest -s -I ${VRF} -M ${MD5_PW} -m ${NS_NET} &
run_cmd nettest -s -M ${MD5_WRONG_PW} -m ${NS_NET} & run_cmd nettest -s -M ${MD5_WRONG_PW} -m ${NS_NET} &
sleep 1 sleep 1
run_cmd_nsb nettest -r ${NSA_IP} -M ${MD5_PW} run_cmd_nsb nettest -r ${NSA_IP} -X ${MD5_PW}
log_test $? 0 "MD5: VRF: Prefix config in default VRF and VRF, conn in VRF" log_test $? 0 "MD5: VRF: Prefix config in default VRF and VRF, conn in VRF"
log_start log_start
run_cmd nettest -s -d ${VRF} -M ${MD5_PW} -m ${NS_NET} & run_cmd nettest -s -I ${VRF} -M ${MD5_PW} -m ${NS_NET} &
run_cmd nettest -s -M ${MD5_WRONG_PW} -m ${NS_NET} & run_cmd nettest -s -M ${MD5_WRONG_PW} -m ${NS_NET} &
sleep 1 sleep 1
run_cmd_nsc nettest -r ${NSA_IP} -M ${MD5_WRONG_PW} run_cmd_nsc nettest -r ${NSA_IP} -X ${MD5_WRONG_PW}
log_test $? 0 "MD5: VRF: Prefix config in default VRF and VRF, conn in default VRF" log_test $? 0 "MD5: VRF: Prefix config in default VRF and VRF, conn in default VRF"
log_start log_start
show_hint "Should timeout since client in default VRF uses VRF password" show_hint "Should timeout since client in default VRF uses VRF password"
run_cmd nettest -s -d ${VRF} -M ${MD5_PW} -m ${NS_NET} & run_cmd nettest -s -I ${VRF} -M ${MD5_PW} -m ${NS_NET} &
run_cmd nettest -s -M ${MD5_WRONG_PW} -m ${NS_NET} & run_cmd nettest -s -M ${MD5_WRONG_PW} -m ${NS_NET} &
sleep 1 sleep 1
run_cmd_nsc nettest -r ${NSA_IP} -M ${MD5_PW} run_cmd_nsc nettest -r ${NSA_IP} -X ${MD5_PW}
log_test $? 2 "MD5: VRF: Prefix config in default VRF and VRF, conn in default VRF with VRF pw" log_test $? 2 "MD5: VRF: Prefix config in default VRF and VRF, conn in default VRF with VRF pw"
log_start log_start
show_hint "Should timeout since client in VRF uses default VRF password" show_hint "Should timeout since client in VRF uses default VRF password"
run_cmd nettest -s -d ${VRF} -M ${MD5_PW} -m ${NS_NET} & run_cmd nettest -s -I ${VRF} -M ${MD5_PW} -m ${NS_NET} &
run_cmd nettest -s -M ${MD5_WRONG_PW} -m ${NS_NET} & run_cmd nettest -s -M ${MD5_WRONG_PW} -m ${NS_NET} &
sleep 1 sleep 1
run_cmd_nsb nettest -r ${NSA_IP} -M ${MD5_WRONG_PW} run_cmd_nsb nettest -r ${NSA_IP} -X ${MD5_WRONG_PW}
log_test $? 2 "MD5: VRF: Prefix config in default VRF and VRF, conn in VRF with default VRF pw" log_test $? 2 "MD5: VRF: Prefix config in default VRF and VRF, conn in VRF with default VRF pw"
# #
# negative tests # negative tests
# #
log_start log_start
run_cmd nettest -s -d ${NSA_DEV} -M ${MD5_PW} -r ${NSB_IP} run_cmd nettest -s -I ${NSA_DEV} -M ${MD5_PW} -m ${NSB_IP}
log_test $? 1 "MD5: VRF: Device must be a VRF - single address" log_test $? 1 "MD5: VRF: Device must be a VRF - single address"
log_start log_start
run_cmd nettest -s -d ${NSA_DEV} -M ${MD5_PW} -m ${NS_NET} run_cmd nettest -s -I ${NSA_DEV} -M ${MD5_PW} -m ${NS_NET}
log_test $? 1 "MD5: VRF: Device must be a VRF - prefix" log_test $? 1 "MD5: VRF: Device must be a VRF - prefix"
} }
...@@ -1020,7 +1020,7 @@ ipv4_tcp_novrf() ...@@ -1020,7 +1020,7 @@ ipv4_tcp_novrf()
a=${NSA_IP} a=${NSA_IP}
log_start log_start
run_cmd nettest -s -d ${NSA_DEV} & run_cmd nettest -s -I ${NSA_DEV} &
sleep 1 sleep 1
run_cmd_nsb nettest -r ${a} run_cmd_nsb nettest -r ${a}
log_test_addr ${a} $? 0 "Device server" log_test_addr ${a} $? 0 "Device server"
...@@ -1076,7 +1076,7 @@ ipv4_tcp_novrf() ...@@ -1076,7 +1076,7 @@ ipv4_tcp_novrf()
a=${NSA_IP} a=${NSA_IP}
log_start log_start
run_cmd nettest -s -d ${NSA_DEV} & run_cmd nettest -s -I ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -r ${a} -0 ${a} run_cmd nettest -r ${a} -0 ${a}
log_test_addr ${a} $? 0 "Device server, unbound client, local connection" log_test_addr ${a} $? 0 "Device server, unbound client, local connection"
...@@ -1085,7 +1085,7 @@ ipv4_tcp_novrf() ...@@ -1085,7 +1085,7 @@ ipv4_tcp_novrf()
do do
log_start log_start
show_hint "Should fail 'Connection refused' since addresses on loopback are out of device scope" show_hint "Should fail 'Connection refused' since addresses on loopback are out of device scope"
run_cmd nettest -s -d ${NSA_DEV} & run_cmd nettest -s -I ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -r ${a} run_cmd nettest -r ${a}
log_test_addr ${a} $? 1 "Device server, unbound client, local connection" log_test_addr ${a} $? 1 "Device server, unbound client, local connection"
...@@ -1110,7 +1110,7 @@ ipv4_tcp_novrf() ...@@ -1110,7 +1110,7 @@ ipv4_tcp_novrf()
a=${NSA_IP} a=${NSA_IP}
log_start log_start
run_cmd nettest -s -d ${NSA_DEV} -2 ${NSA_DEV} & run_cmd nettest -s -I ${NSA_DEV} -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -d ${NSA_DEV} -r ${a} -0 ${a} run_cmd nettest -d ${NSA_DEV} -r ${a} -0 ${a}
log_test_addr ${a} $? 0 "Device server, device client, local connection" log_test_addr ${a} $? 0 "Device server, device client, local connection"
...@@ -1145,13 +1145,13 @@ ipv4_tcp_vrf() ...@@ -1145,13 +1145,13 @@ ipv4_tcp_vrf()
log_test_addr ${a} $? 1 "Global server" log_test_addr ${a} $? 1 "Global server"
log_start log_start
run_cmd nettest -s -d ${VRF} -2 ${VRF} & run_cmd nettest -s -I ${VRF} -3 ${VRF} &
sleep 1 sleep 1
run_cmd_nsb nettest -r ${a} run_cmd_nsb nettest -r ${a}
log_test_addr ${a} $? 0 "VRF server" log_test_addr ${a} $? 0 "VRF server"
log_start log_start
run_cmd nettest -s -d ${NSA_DEV} -2 ${NSA_DEV} & run_cmd nettest -s -I ${NSA_DEV} -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd_nsb nettest -r ${a} run_cmd_nsb nettest -r ${a}
log_test_addr ${a} $? 0 "Device server" log_test_addr ${a} $? 0 "Device server"
...@@ -1186,14 +1186,14 @@ ipv4_tcp_vrf() ...@@ -1186,14 +1186,14 @@ ipv4_tcp_vrf()
do do
log_start log_start
show_hint "client socket should be bound to VRF" show_hint "client socket should be bound to VRF"
run_cmd nettest -s -2 ${VRF} & run_cmd nettest -s -3 ${VRF} &
sleep 1 sleep 1
run_cmd_nsb nettest -r ${a} run_cmd_nsb nettest -r ${a}
log_test_addr ${a} $? 0 "Global server" log_test_addr ${a} $? 0 "Global server"
log_start log_start
show_hint "client socket should be bound to VRF" show_hint "client socket should be bound to VRF"
run_cmd nettest -s -d ${VRF} -2 ${VRF} & run_cmd nettest -s -I ${VRF} -3 ${VRF} &
sleep 1 sleep 1
run_cmd_nsb nettest -r ${a} run_cmd_nsb nettest -r ${a}
log_test_addr ${a} $? 0 "VRF server" log_test_addr ${a} $? 0 "VRF server"
...@@ -1208,7 +1208,7 @@ ipv4_tcp_vrf() ...@@ -1208,7 +1208,7 @@ ipv4_tcp_vrf()
a=${NSA_IP} a=${NSA_IP}
log_start log_start
show_hint "client socket should be bound to device" show_hint "client socket should be bound to device"
run_cmd nettest -s -d ${NSA_DEV} -2 ${NSA_DEV} & run_cmd nettest -s -I ${NSA_DEV} -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd_nsb nettest -r ${a} run_cmd_nsb nettest -r ${a}
log_test_addr ${a} $? 0 "Device server" log_test_addr ${a} $? 0 "Device server"
...@@ -1218,7 +1218,7 @@ ipv4_tcp_vrf() ...@@ -1218,7 +1218,7 @@ ipv4_tcp_vrf()
do do
log_start log_start
show_hint "Should fail 'Connection refused' since client is not bound to VRF" show_hint "Should fail 'Connection refused' since client is not bound to VRF"
run_cmd nettest -s -d ${VRF} & run_cmd nettest -s -I ${VRF} &
sleep 1 sleep 1
run_cmd nettest -r ${a} run_cmd nettest -r ${a}
log_test_addr ${a} $? 1 "Global server, local connection" log_test_addr ${a} $? 1 "Global server, local connection"
...@@ -1255,7 +1255,7 @@ ipv4_tcp_vrf() ...@@ -1255,7 +1255,7 @@ ipv4_tcp_vrf()
for a in ${NSA_IP} ${VRF_IP} 127.0.0.1 for a in ${NSA_IP} ${VRF_IP} 127.0.0.1
do do
log_start log_start
run_cmd nettest -s -d ${VRF} -2 ${VRF} & run_cmd nettest -s -I ${VRF} -3 ${VRF} &
sleep 1 sleep 1
run_cmd nettest -r ${a} -d ${VRF} -0 ${a} run_cmd nettest -r ${a} -d ${VRF} -0 ${a}
log_test_addr ${a} $? 0 "VRF server, VRF client, local connection" log_test_addr ${a} $? 0 "VRF server, VRF client, local connection"
...@@ -1263,26 +1263,26 @@ ipv4_tcp_vrf() ...@@ -1263,26 +1263,26 @@ ipv4_tcp_vrf()
a=${NSA_IP} a=${NSA_IP}
log_start log_start
run_cmd nettest -s -d ${VRF} -2 ${VRF} & run_cmd nettest -s -I ${VRF} -3 ${VRF} &
sleep 1 sleep 1
run_cmd nettest -r ${a} -d ${NSA_DEV} -0 ${a} run_cmd nettest -r ${a} -d ${NSA_DEV} -0 ${a}
log_test_addr ${a} $? 0 "VRF server, device client, local connection" log_test_addr ${a} $? 0 "VRF server, device client, local connection"
log_start log_start
show_hint "Should fail 'No route to host' since client is out of VRF scope" show_hint "Should fail 'No route to host' since client is out of VRF scope"
run_cmd nettest -s -d ${VRF} & run_cmd nettest -s -I ${VRF} &
sleep 1 sleep 1
run_cmd nettest -r ${a} run_cmd nettest -r ${a}
log_test_addr ${a} $? 1 "VRF server, unbound client, local connection" log_test_addr ${a} $? 1 "VRF server, unbound client, local connection"
log_start log_start
run_cmd nettest -s -d ${NSA_DEV} -2 ${NSA_DEV} & run_cmd nettest -s -I ${NSA_DEV} -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -r ${a} -d ${VRF} -0 ${a} run_cmd nettest -r ${a} -d ${VRF} -0 ${a}
log_test_addr ${a} $? 0 "Device server, VRF client, local connection" log_test_addr ${a} $? 0 "Device server, VRF client, local connection"
log_start log_start
run_cmd nettest -s -d ${NSA_DEV} -2 ${NSA_DEV} & run_cmd nettest -s -I ${NSA_DEV} -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -r ${a} -d ${NSA_DEV} -0 ${a} run_cmd nettest -r ${a} -d ${NSA_DEV} -0 ${a}
log_test_addr ${a} $? 0 "Device server, device client, local connection" log_test_addr ${a} $? 0 "Device server, device client, local connection"
...@@ -1321,7 +1321,7 @@ ipv4_udp_novrf() ...@@ -1321,7 +1321,7 @@ ipv4_udp_novrf()
for a in ${NSA_IP} ${NSA_LO_IP} for a in ${NSA_IP} ${NSA_LO_IP}
do do
log_start log_start
run_cmd nettest -D -s -2 ${NSA_DEV} & run_cmd nettest -D -s -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd_nsb nettest -D -r ${a} run_cmd_nsb nettest -D -r ${a}
log_test_addr ${a} $? 0 "Global server" log_test_addr ${a} $? 0 "Global server"
...@@ -1334,7 +1334,7 @@ ipv4_udp_novrf() ...@@ -1334,7 +1334,7 @@ ipv4_udp_novrf()
a=${NSA_IP} a=${NSA_IP}
log_start log_start
run_cmd nettest -D -d ${NSA_DEV} -s -2 ${NSA_DEV} & run_cmd nettest -D -I ${NSA_DEV} -s -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd_nsb nettest -D -r ${a} run_cmd_nsb nettest -D -r ${a}
log_test_addr ${a} $? 0 "Device server" log_test_addr ${a} $? 0 "Device server"
...@@ -1393,7 +1393,7 @@ ipv4_udp_novrf() ...@@ -1393,7 +1393,7 @@ ipv4_udp_novrf()
a=${NSA_IP} a=${NSA_IP}
log_start log_start
run_cmd nettest -s -D -d ${NSA_DEV} -2 ${NSA_DEV} & run_cmd nettest -s -D -I ${NSA_DEV} -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -D -r ${a} run_cmd nettest -D -r ${a}
log_test_addr ${a} $? 0 "Device server, unbound client, local connection" log_test_addr ${a} $? 0 "Device server, unbound client, local connection"
...@@ -1402,7 +1402,7 @@ ipv4_udp_novrf() ...@@ -1402,7 +1402,7 @@ ipv4_udp_novrf()
do do
log_start log_start
show_hint "Should fail 'Connection refused' since address is out of device scope" show_hint "Should fail 'Connection refused' since address is out of device scope"
run_cmd nettest -s -D -d ${NSA_DEV} & run_cmd nettest -s -D -I ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -D -r ${a} run_cmd nettest -D -r ${a}
log_test_addr ${a} $? 1 "Device server, unbound client, local connection" log_test_addr ${a} $? 1 "Device server, unbound client, local connection"
...@@ -1456,7 +1456,7 @@ ipv4_udp_novrf() ...@@ -1456,7 +1456,7 @@ ipv4_udp_novrf()
a=${NSA_IP} a=${NSA_IP}
log_start log_start
run_cmd nettest -D -s -d ${NSA_DEV} -2 ${NSA_DEV} & run_cmd nettest -D -s -I ${NSA_DEV} -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -D -d ${NSA_DEV} -r ${a} -0 ${a} run_cmd nettest -D -d ${NSA_DEV} -r ${a} -0 ${a}
log_test_addr ${a} $? 0 "Device server, device client, local conn" log_test_addr ${a} $? 0 "Device server, device client, local conn"
...@@ -1487,13 +1487,13 @@ ipv4_udp_vrf() ...@@ -1487,13 +1487,13 @@ ipv4_udp_vrf()
log_test_addr ${a} $? 1 "Global server" log_test_addr ${a} $? 1 "Global server"
log_start log_start
run_cmd nettest -D -d ${VRF} -s -2 ${NSA_DEV} & run_cmd nettest -D -I ${VRF} -s -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd_nsb nettest -D -r ${a} run_cmd_nsb nettest -D -r ${a}
log_test_addr ${a} $? 0 "VRF server" log_test_addr ${a} $? 0 "VRF server"
log_start log_start
run_cmd nettest -D -d ${NSA_DEV} -s -2 ${NSA_DEV} & run_cmd nettest -D -I ${NSA_DEV} -s -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd_nsb nettest -D -r ${a} run_cmd_nsb nettest -D -r ${a}
log_test_addr ${a} $? 0 "Enslaved device server" log_test_addr ${a} $? 0 "Enslaved device server"
...@@ -1513,26 +1513,26 @@ ipv4_udp_vrf() ...@@ -1513,26 +1513,26 @@ ipv4_udp_vrf()
a=${NSA_IP} a=${NSA_IP}
log_start log_start
run_cmd nettest -s -D -d ${VRF} -2 ${NSA_DEV} & run_cmd nettest -s -D -I ${VRF} -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -D -d ${VRF} -r ${a} run_cmd nettest -D -d ${VRF} -r ${a}
log_test_addr ${a} $? 0 "VRF server, VRF client, local conn" log_test_addr ${a} $? 0 "VRF server, VRF client, local conn"
log_start log_start
run_cmd nettest -s -D -d ${VRF} -2 ${NSA_DEV} & run_cmd nettest -s -D -I ${VRF} -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -D -d ${NSA_DEV} -r ${a} run_cmd nettest -D -d ${NSA_DEV} -r ${a}
log_test_addr ${a} $? 0 "VRF server, enslaved device client, local connection" log_test_addr ${a} $? 0 "VRF server, enslaved device client, local connection"
a=${NSA_IP} a=${NSA_IP}
log_start log_start
run_cmd nettest -s -D -d ${NSA_DEV} -2 ${NSA_DEV} & run_cmd nettest -s -D -I ${NSA_DEV} -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -D -d ${VRF} -r ${a} run_cmd nettest -D -d ${VRF} -r ${a}
log_test_addr ${a} $? 0 "Enslaved device server, VRF client, local conn" log_test_addr ${a} $? 0 "Enslaved device server, VRF client, local conn"
log_start log_start
run_cmd nettest -s -D -d ${NSA_DEV} -2 ${NSA_DEV} & run_cmd nettest -s -D -I ${NSA_DEV} -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -D -d ${NSA_DEV} -r ${a} run_cmd nettest -D -d ${NSA_DEV} -r ${a}
log_test_addr ${a} $? 0 "Enslaved device server, device client, local conn" log_test_addr ${a} $? 0 "Enslaved device server, device client, local conn"
...@@ -1547,19 +1547,19 @@ ipv4_udp_vrf() ...@@ -1547,19 +1547,19 @@ ipv4_udp_vrf()
for a in ${NSA_IP} ${VRF_IP} for a in ${NSA_IP} ${VRF_IP}
do do
log_start log_start
run_cmd nettest -D -s -2 ${NSA_DEV} & run_cmd nettest -D -s -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd_nsb nettest -D -r ${a} run_cmd_nsb nettest -D -r ${a}
log_test_addr ${a} $? 0 "Global server" log_test_addr ${a} $? 0 "Global server"
log_start log_start
run_cmd nettest -D -d ${VRF} -s -2 ${NSA_DEV} & run_cmd nettest -D -I ${VRF} -s -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd_nsb nettest -D -r ${a} run_cmd_nsb nettest -D -r ${a}
log_test_addr ${a} $? 0 "VRF server" log_test_addr ${a} $? 0 "VRF server"
log_start log_start
run_cmd nettest -D -d ${NSA_DEV} -s -2 ${NSA_DEV} & run_cmd nettest -D -I ${NSA_DEV} -s -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd_nsb nettest -D -r ${a} run_cmd_nsb nettest -D -r ${a}
log_test_addr ${a} $? 0 "Enslaved device server" log_test_addr ${a} $? 0 "Enslaved device server"
...@@ -1601,31 +1601,31 @@ ipv4_udp_vrf() ...@@ -1601,31 +1601,31 @@ ipv4_udp_vrf()
# #
a=${NSA_IP} a=${NSA_IP}
log_start log_start
run_cmd nettest -D -s -2 ${NSA_DEV} & run_cmd nettest -D -s -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -D -d ${VRF} -r ${a} run_cmd nettest -D -d ${VRF} -r ${a}
log_test_addr ${a} $? 0 "Global server, VRF client, local conn" log_test_addr ${a} $? 0 "Global server, VRF client, local conn"
log_start log_start
run_cmd nettest -s -D -d ${VRF} -2 ${NSA_DEV} & run_cmd nettest -s -D -I ${VRF} -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -D -d ${VRF} -r ${a} run_cmd nettest -D -d ${VRF} -r ${a}
log_test_addr ${a} $? 0 "VRF server, VRF client, local conn" log_test_addr ${a} $? 0 "VRF server, VRF client, local conn"
log_start log_start
run_cmd nettest -s -D -d ${VRF} -2 ${NSA_DEV} & run_cmd nettest -s -D -I ${VRF} -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -D -d ${NSA_DEV} -r ${a} run_cmd nettest -D -d ${NSA_DEV} -r ${a}
log_test_addr ${a} $? 0 "VRF server, device client, local conn" log_test_addr ${a} $? 0 "VRF server, device client, local conn"
log_start log_start
run_cmd nettest -s -D -d ${NSA_DEV} -2 ${NSA_DEV} & run_cmd nettest -s -D -I ${NSA_DEV} -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -D -d ${VRF} -r ${a} run_cmd nettest -D -d ${VRF} -r ${a}
log_test_addr ${a} $? 0 "Enslaved device server, VRF client, local conn" log_test_addr ${a} $? 0 "Enslaved device server, VRF client, local conn"
log_start log_start
run_cmd nettest -s -D -d ${NSA_DEV} -2 ${NSA_DEV} & run_cmd nettest -s -D -I ${NSA_DEV} -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -D -d ${NSA_DEV} -r ${a} run_cmd nettest -D -d ${NSA_DEV} -r ${a}
log_test_addr ${a} $? 0 "Enslaved device server, device client, local conn" log_test_addr ${a} $? 0 "Enslaved device server, device client, local conn"
...@@ -1633,7 +1633,7 @@ ipv4_udp_vrf() ...@@ -1633,7 +1633,7 @@ ipv4_udp_vrf()
for a in ${VRF_IP} 127.0.0.1 for a in ${VRF_IP} 127.0.0.1
do do
log_start log_start
run_cmd nettest -D -s -2 ${VRF} & run_cmd nettest -D -s -3 ${VRF} &
sleep 1 sleep 1
run_cmd nettest -D -d ${VRF} -r ${a} run_cmd nettest -D -d ${VRF} -r ${a}
log_test_addr ${a} $? 0 "Global server, VRF client, local conn" log_test_addr ${a} $? 0 "Global server, VRF client, local conn"
...@@ -1642,7 +1642,7 @@ ipv4_udp_vrf() ...@@ -1642,7 +1642,7 @@ ipv4_udp_vrf()
for a in ${VRF_IP} 127.0.0.1 for a in ${VRF_IP} 127.0.0.1
do do
log_start log_start
run_cmd nettest -s -D -d ${VRF} -2 ${VRF} & run_cmd nettest -s -D -I ${VRF} -3 ${VRF} &
sleep 1 sleep 1
run_cmd nettest -D -d ${VRF} -r ${a} run_cmd nettest -D -d ${VRF} -r ${a}
log_test_addr ${a} $? 0 "VRF server, VRF client, local conn" log_test_addr ${a} $? 0 "VRF server, VRF client, local conn"
...@@ -1697,7 +1697,7 @@ ipv4_addr_bind_novrf() ...@@ -1697,7 +1697,7 @@ ipv4_addr_bind_novrf()
log_test_addr ${a} $? 0 "Raw socket bind to local address" log_test_addr ${a} $? 0 "Raw socket bind to local address"
log_start log_start
run_cmd nettest -s -R -P icmp -l ${a} -d ${NSA_DEV} -b run_cmd nettest -s -R -P icmp -l ${a} -I ${NSA_DEV} -b
log_test_addr ${a} $? 0 "Raw socket bind to local address after device bind" log_test_addr ${a} $? 0 "Raw socket bind to local address after device bind"
done done
...@@ -1706,11 +1706,11 @@ ipv4_addr_bind_novrf() ...@@ -1706,11 +1706,11 @@ ipv4_addr_bind_novrf()
# #
a=${NSA_IP} a=${NSA_IP}
log_start log_start
run_cmd nettest -l ${a} -r ${NSB_IP} -t1 -b run_cmd nettest -c ${a} -r ${NSB_IP} -t1 -b
log_test_addr ${a} $? 0 "TCP socket bind to local address" log_test_addr ${a} $? 0 "TCP socket bind to local address"
log_start log_start
run_cmd nettest -l ${a} -r ${NSB_IP} -d ${NSA_DEV} -t1 -b run_cmd nettest -c ${a} -r ${NSB_IP} -d ${NSA_DEV} -t1 -b
log_test_addr ${a} $? 0 "TCP socket bind to local address after device bind" log_test_addr ${a} $? 0 "TCP socket bind to local address after device bind"
# Sadly, the kernel allows binding a socket to a device and then # Sadly, the kernel allows binding a socket to a device and then
...@@ -1720,7 +1720,7 @@ ipv4_addr_bind_novrf() ...@@ -1720,7 +1720,7 @@ ipv4_addr_bind_novrf()
#a=${NSA_LO_IP} #a=${NSA_LO_IP}
#log_start #log_start
#show_hint "Should fail with 'Cannot assign requested address'" #show_hint "Should fail with 'Cannot assign requested address'"
#run_cmd nettest -s -l ${a} -d ${NSA_DEV} -t1 -b #run_cmd nettest -s -l ${a} -I ${NSA_DEV} -t1 -b
#log_test_addr ${a} $? 1 "TCP socket bind to out of scope local address" #log_test_addr ${a} $? 1 "TCP socket bind to out of scope local address"
} }
...@@ -1736,17 +1736,17 @@ ipv4_addr_bind_vrf() ...@@ -1736,17 +1736,17 @@ ipv4_addr_bind_vrf()
log_test_addr ${a} $? 0 "Raw socket bind to local address" log_test_addr ${a} $? 0 "Raw socket bind to local address"
log_start log_start
run_cmd nettest -s -R -P icmp -l ${a} -d ${NSA_DEV} -b run_cmd nettest -s -R -P icmp -l ${a} -I ${NSA_DEV} -b
log_test_addr ${a} $? 0 "Raw socket bind to local address after device bind" log_test_addr ${a} $? 0 "Raw socket bind to local address after device bind"
log_start log_start
run_cmd nettest -s -R -P icmp -l ${a} -d ${VRF} -b run_cmd nettest -s -R -P icmp -l ${a} -I ${VRF} -b
log_test_addr ${a} $? 0 "Raw socket bind to local address after VRF bind" log_test_addr ${a} $? 0 "Raw socket bind to local address after VRF bind"
done done
a=${NSA_LO_IP} a=${NSA_LO_IP}
log_start log_start
show_hint "Address on loopback is out of VRF scope" show_hint "Address on loopback is out of VRF scope"
run_cmd nettest -s -R -P icmp -l ${a} -d ${VRF} -b run_cmd nettest -s -R -P icmp -l ${a} -I ${VRF} -b
log_test_addr ${a} $? 1 "Raw socket bind to out of scope address after VRF bind" log_test_addr ${a} $? 1 "Raw socket bind to out of scope address after VRF bind"
# #
...@@ -1755,23 +1755,23 @@ ipv4_addr_bind_vrf() ...@@ -1755,23 +1755,23 @@ ipv4_addr_bind_vrf()
for a in ${NSA_IP} ${VRF_IP} for a in ${NSA_IP} ${VRF_IP}
do do
log_start log_start
run_cmd nettest -s -l ${a} -d ${VRF} -t1 -b run_cmd nettest -s -l ${a} -I ${VRF} -t1 -b
log_test_addr ${a} $? 0 "TCP socket bind to local address" log_test_addr ${a} $? 0 "TCP socket bind to local address"
log_start log_start
run_cmd nettest -s -l ${a} -d ${NSA_DEV} -t1 -b run_cmd nettest -s -l ${a} -I ${NSA_DEV} -t1 -b
log_test_addr ${a} $? 0 "TCP socket bind to local address after device bind" log_test_addr ${a} $? 0 "TCP socket bind to local address after device bind"
done done
a=${NSA_LO_IP} a=${NSA_LO_IP}
log_start log_start
show_hint "Address on loopback out of scope for VRF" show_hint "Address on loopback out of scope for VRF"
run_cmd nettest -s -l ${a} -d ${VRF} -t1 -b run_cmd nettest -s -l ${a} -I ${VRF} -t1 -b
log_test_addr ${a} $? 1 "TCP socket bind to invalid local address for VRF" log_test_addr ${a} $? 1 "TCP socket bind to invalid local address for VRF"
log_start log_start
show_hint "Address on loopback out of scope for device in VRF" show_hint "Address on loopback out of scope for device in VRF"
run_cmd nettest -s -l ${a} -d ${NSA_DEV} -t1 -b run_cmd nettest -s -l ${a} -I ${NSA_DEV} -t1 -b
log_test_addr ${a} $? 1 "TCP socket bind to invalid local address for device bind" log_test_addr ${a} $? 1 "TCP socket bind to invalid local address for device bind"
} }
...@@ -1818,7 +1818,7 @@ ipv4_rt() ...@@ -1818,7 +1818,7 @@ ipv4_rt()
for a in ${NSA_IP} ${VRF_IP} for a in ${NSA_IP} ${VRF_IP}
do do
log_start log_start
run_cmd nettest ${varg} -s -d ${VRF} & run_cmd nettest ${varg} -s -I ${VRF} &
sleep 1 sleep 1
run_cmd_nsb nettest ${varg} -r ${a} & run_cmd_nsb nettest ${varg} -r ${a} &
sleep 3 sleep 3
...@@ -1831,7 +1831,7 @@ ipv4_rt() ...@@ -1831,7 +1831,7 @@ ipv4_rt()
a=${NSA_IP} a=${NSA_IP}
log_start log_start
run_cmd nettest ${varg} -s -d ${NSA_DEV} & run_cmd nettest ${varg} -s -I ${NSA_DEV} &
sleep 1 sleep 1
run_cmd_nsb nettest ${varg} -r ${a} & run_cmd_nsb nettest ${varg} -r ${a} &
sleep 3 sleep 3
...@@ -1886,7 +1886,7 @@ ipv4_rt() ...@@ -1886,7 +1886,7 @@ ipv4_rt()
for a in ${NSA_IP} ${VRF_IP} for a in ${NSA_IP} ${VRF_IP}
do do
log_start log_start
run_cmd nettest ${varg} -d ${VRF} -s & run_cmd nettest ${varg} -I ${VRF} -s &
sleep 1 sleep 1
run_cmd nettest ${varg} -d ${VRF} -r ${a} & run_cmd nettest ${varg} -d ${VRF} -r ${a} &
sleep 3 sleep 3
...@@ -1910,7 +1910,7 @@ ipv4_rt() ...@@ -1910,7 +1910,7 @@ ipv4_rt()
setup ${with_vrf} setup ${with_vrf}
log_start log_start
run_cmd nettest ${varg} -d ${VRF} -s & run_cmd nettest ${varg} -I ${VRF} -s &
sleep 1 sleep 1
run_cmd nettest ${varg} -d ${NSA_DEV} -r ${a} & run_cmd nettest ${varg} -d ${NSA_DEV} -r ${a} &
sleep 3 sleep 3
...@@ -1921,7 +1921,7 @@ ipv4_rt() ...@@ -1921,7 +1921,7 @@ ipv4_rt()
setup ${with_vrf} setup ${with_vrf}
log_start log_start
run_cmd nettest ${varg} -d ${NSA_DEV} -s & run_cmd nettest ${varg} -I ${NSA_DEV} -s &
sleep 1 sleep 1
run_cmd nettest ${varg} -d ${NSA_DEV} -r ${a} & run_cmd nettest ${varg} -d ${NSA_DEV} -r ${a} &
sleep 3 sleep 3
...@@ -2265,9 +2265,9 @@ ipv6_tcp_md5_novrf() ...@@ -2265,9 +2265,9 @@ ipv6_tcp_md5_novrf()
# basic use case # basic use case
log_start log_start
run_cmd nettest -6 -s -M ${MD5_PW} -r ${NSB_IP6} & run_cmd nettest -6 -s -M ${MD5_PW} -m ${NSB_IP6} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -r ${NSA_IP6} -M ${MD5_PW} run_cmd_nsb nettest -6 -r ${NSA_IP6} -X ${MD5_PW}
log_test $? 0 "MD5: Single address config" log_test $? 0 "MD5: Single address config"
# client sends MD5, server not configured # client sends MD5, server not configured
...@@ -2275,23 +2275,23 @@ ipv6_tcp_md5_novrf() ...@@ -2275,23 +2275,23 @@ ipv6_tcp_md5_novrf()
show_hint "Should timeout due to MD5 mismatch" show_hint "Should timeout due to MD5 mismatch"
run_cmd nettest -6 -s & run_cmd nettest -6 -s &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -r ${NSA_IP6} -M ${MD5_PW} run_cmd_nsb nettest -6 -r ${NSA_IP6} -X ${MD5_PW}
log_test $? 2 "MD5: Server no config, client uses password" log_test $? 2 "MD5: Server no config, client uses password"
# wrong password # wrong password
log_start log_start
show_hint "Should timeout since client uses wrong password" show_hint "Should timeout since client uses wrong password"
run_cmd nettest -6 -s -M ${MD5_PW} -r ${NSB_IP6} & run_cmd nettest -6 -s -M ${MD5_PW} -m ${NSB_IP6} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -r ${NSA_IP6} -M ${MD5_WRONG_PW} run_cmd_nsb nettest -6 -r ${NSA_IP6} -X ${MD5_WRONG_PW}
log_test $? 2 "MD5: Client uses wrong password" log_test $? 2 "MD5: Client uses wrong password"
# client from different address # client from different address
log_start log_start
show_hint "Should timeout due to MD5 mismatch" show_hint "Should timeout due to MD5 mismatch"
run_cmd nettest -6 -s -M ${MD5_PW} -r ${NSB_LO_IP6} & run_cmd nettest -6 -s -M ${MD5_PW} -m ${NSB_LO_IP6} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -r ${NSA_IP6} -M ${MD5_PW} run_cmd_nsb nettest -6 -r ${NSA_IP6} -X ${MD5_PW}
log_test $? 2 "MD5: Client address does not match address configured with password" log_test $? 2 "MD5: Client address does not match address configured with password"
# #
...@@ -2302,7 +2302,7 @@ ipv6_tcp_md5_novrf() ...@@ -2302,7 +2302,7 @@ ipv6_tcp_md5_novrf()
log_start log_start
run_cmd nettest -6 -s -M ${MD5_PW} -m ${NS_NET6} & run_cmd nettest -6 -s -M ${MD5_PW} -m ${NS_NET6} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -r ${NSA_IP6} -M ${MD5_PW} run_cmd_nsb nettest -6 -r ${NSA_IP6} -X ${MD5_PW}
log_test $? 0 "MD5: Prefix config" log_test $? 0 "MD5: Prefix config"
# client in prefix, wrong password # client in prefix, wrong password
...@@ -2310,7 +2310,7 @@ ipv6_tcp_md5_novrf() ...@@ -2310,7 +2310,7 @@ ipv6_tcp_md5_novrf()
show_hint "Should timeout since client uses wrong password" show_hint "Should timeout since client uses wrong password"
run_cmd nettest -6 -s -M ${MD5_PW} -m ${NS_NET6} & run_cmd nettest -6 -s -M ${MD5_PW} -m ${NS_NET6} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -r ${NSA_IP6} -M ${MD5_WRONG_PW} run_cmd_nsb nettest -6 -r ${NSA_IP6} -X ${MD5_WRONG_PW}
log_test $? 2 "MD5: Prefix config, client uses wrong password" log_test $? 2 "MD5: Prefix config, client uses wrong password"
# client outside of prefix # client outside of prefix
...@@ -2318,7 +2318,7 @@ ipv6_tcp_md5_novrf() ...@@ -2318,7 +2318,7 @@ ipv6_tcp_md5_novrf()
show_hint "Should timeout due to MD5 mismatch" show_hint "Should timeout due to MD5 mismatch"
run_cmd nettest -6 -s -M ${MD5_PW} -m ${NS_NET6} & run_cmd nettest -6 -s -M ${MD5_PW} -m ${NS_NET6} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -l ${NSB_LO_IP6} -r ${NSA_IP6} -M ${MD5_PW} run_cmd_nsb nettest -6 -c ${NSB_LO_IP6} -r ${NSA_IP6} -X ${MD5_PW}
log_test $? 2 "MD5: Prefix config, client address not in configured prefix" log_test $? 2 "MD5: Prefix config, client address not in configured prefix"
} }
...@@ -2333,33 +2333,33 @@ ipv6_tcp_md5() ...@@ -2333,33 +2333,33 @@ ipv6_tcp_md5()
# basic use case # basic use case
log_start log_start
run_cmd nettest -6 -s -d ${VRF} -M ${MD5_PW} -r ${NSB_IP6} & run_cmd nettest -6 -s -I ${VRF} -M ${MD5_PW} -m ${NSB_IP6} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -r ${NSA_IP6} -M ${MD5_PW} run_cmd_nsb nettest -6 -r ${NSA_IP6} -X ${MD5_PW}
log_test $? 0 "MD5: VRF: Single address config" log_test $? 0 "MD5: VRF: Single address config"
# client sends MD5, server not configured # client sends MD5, server not configured
log_start log_start
show_hint "Should timeout since server does not have MD5 auth" show_hint "Should timeout since server does not have MD5 auth"
run_cmd nettest -6 -s -d ${VRF} & run_cmd nettest -6 -s -I ${VRF} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -r ${NSA_IP6} -M ${MD5_PW} run_cmd_nsb nettest -6 -r ${NSA_IP6} -X ${MD5_PW}
log_test $? 2 "MD5: VRF: Server no config, client uses password" log_test $? 2 "MD5: VRF: Server no config, client uses password"
# wrong password # wrong password
log_start log_start
show_hint "Should timeout since client uses wrong password" show_hint "Should timeout since client uses wrong password"
run_cmd nettest -6 -s -d ${VRF} -M ${MD5_PW} -r ${NSB_IP6} & run_cmd nettest -6 -s -I ${VRF} -M ${MD5_PW} -m ${NSB_IP6} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -r ${NSA_IP6} -M ${MD5_WRONG_PW} run_cmd_nsb nettest -6 -r ${NSA_IP6} -X ${MD5_WRONG_PW}
log_test $? 2 "MD5: VRF: Client uses wrong password" log_test $? 2 "MD5: VRF: Client uses wrong password"
# client from different address # client from different address
log_start log_start
show_hint "Should timeout since server config differs from client" show_hint "Should timeout since server config differs from client"
run_cmd nettest -6 -s -d ${VRF} -M ${MD5_PW} -r ${NSB_LO_IP6} & run_cmd nettest -6 -s -I ${VRF} -M ${MD5_PW} -m ${NSB_LO_IP6} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -r ${NSA_IP6} -M ${MD5_PW} run_cmd_nsb nettest -6 -r ${NSA_IP6} -X ${MD5_PW}
log_test $? 2 "MD5: VRF: Client address does not match address configured with password" log_test $? 2 "MD5: VRF: Client address does not match address configured with password"
# #
...@@ -2368,25 +2368,25 @@ ipv6_tcp_md5() ...@@ -2368,25 +2368,25 @@ ipv6_tcp_md5()
# client in prefix # client in prefix
log_start log_start
run_cmd nettest -6 -s -d ${VRF} -M ${MD5_PW} -m ${NS_NET6} & run_cmd nettest -6 -s -I ${VRF} -M ${MD5_PW} -m ${NS_NET6} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -r ${NSA_IP6} -M ${MD5_PW} run_cmd_nsb nettest -6 -r ${NSA_IP6} -X ${MD5_PW}
log_test $? 0 "MD5: VRF: Prefix config" log_test $? 0 "MD5: VRF: Prefix config"
# client in prefix, wrong password # client in prefix, wrong password
log_start log_start
show_hint "Should timeout since client uses wrong password" show_hint "Should timeout since client uses wrong password"
run_cmd nettest -6 -s -d ${VRF} -M ${MD5_PW} -m ${NS_NET6} & run_cmd nettest -6 -s -I ${VRF} -M ${MD5_PW} -m ${NS_NET6} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -r ${NSA_IP6} -M ${MD5_WRONG_PW} run_cmd_nsb nettest -6 -r ${NSA_IP6} -X ${MD5_WRONG_PW}
log_test $? 2 "MD5: VRF: Prefix config, client uses wrong password" log_test $? 2 "MD5: VRF: Prefix config, client uses wrong password"
# client outside of prefix # client outside of prefix
log_start log_start
show_hint "Should timeout since client address is outside of prefix" show_hint "Should timeout since client address is outside of prefix"
run_cmd nettest -6 -s -d ${VRF} -M ${MD5_PW} -m ${NS_NET6} & run_cmd nettest -6 -s -I ${VRF} -M ${MD5_PW} -m ${NS_NET6} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -l ${NSB_LO_IP6} -r ${NSA_IP6} -M ${MD5_PW} run_cmd_nsb nettest -6 -c ${NSB_LO_IP6} -r ${NSA_IP6} -X ${MD5_PW}
log_test $? 2 "MD5: VRF: Prefix config, client address not in configured prefix" log_test $? 2 "MD5: VRF: Prefix config, client address not in configured prefix"
# #
...@@ -2394,74 +2394,74 @@ ipv6_tcp_md5() ...@@ -2394,74 +2394,74 @@ ipv6_tcp_md5()
# #
log_start log_start
run_cmd nettest -6 -s -d ${VRF} -M ${MD5_PW} -r ${NSB_IP6} & run_cmd nettest -6 -s -I ${VRF} -M ${MD5_PW} -m ${NSB_IP6} &
run_cmd nettest -6 -s -M ${MD5_WRONG_PW} -r ${NSB_IP6} & run_cmd nettest -6 -s -M ${MD5_WRONG_PW} -m ${NSB_IP6} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -r ${NSA_IP6} -M ${MD5_PW} run_cmd_nsb nettest -6 -r ${NSA_IP6} -X ${MD5_PW}
log_test $? 0 "MD5: VRF: Single address config in default VRF and VRF, conn in VRF" log_test $? 0 "MD5: VRF: Single address config in default VRF and VRF, conn in VRF"
log_start log_start
run_cmd nettest -6 -s -d ${VRF} -M ${MD5_PW} -r ${NSB_IP6} & run_cmd nettest -6 -s -I ${VRF} -M ${MD5_PW} -m ${NSB_IP6} &
run_cmd nettest -6 -s -M ${MD5_WRONG_PW} -r ${NSB_IP6} & run_cmd nettest -6 -s -M ${MD5_WRONG_PW} -m ${NSB_IP6} &
sleep 1 sleep 1
run_cmd_nsc nettest -6 -r ${NSA_IP6} -M ${MD5_WRONG_PW} run_cmd_nsc nettest -6 -r ${NSA_IP6} -X ${MD5_WRONG_PW}
log_test $? 0 "MD5: VRF: Single address config in default VRF and VRF, conn in default VRF" log_test $? 0 "MD5: VRF: Single address config in default VRF and VRF, conn in default VRF"
log_start log_start
show_hint "Should timeout since client in default VRF uses VRF password" show_hint "Should timeout since client in default VRF uses VRF password"
run_cmd nettest -6 -s -d ${VRF} -M ${MD5_PW} -r ${NSB_IP6} & run_cmd nettest -6 -s -I ${VRF} -M ${MD5_PW} -m ${NSB_IP6} &
run_cmd nettest -6 -s -M ${MD5_WRONG_PW} -r ${NSB_IP6} & run_cmd nettest -6 -s -M ${MD5_WRONG_PW} -m ${NSB_IP6} &
sleep 1 sleep 1
run_cmd_nsc nettest -6 -r ${NSA_IP6} -M ${MD5_PW} run_cmd_nsc nettest -6 -r ${NSA_IP6} -X ${MD5_PW}
log_test $? 2 "MD5: VRF: Single address config in default VRF and VRF, conn in default VRF with VRF pw" log_test $? 2 "MD5: VRF: Single address config in default VRF and VRF, conn in default VRF with VRF pw"
log_start log_start
show_hint "Should timeout since client in VRF uses default VRF password" show_hint "Should timeout since client in VRF uses default VRF password"
run_cmd nettest -6 -s -d ${VRF} -M ${MD5_PW} -r ${NSB_IP6} & run_cmd nettest -6 -s -I ${VRF} -M ${MD5_PW} -m ${NSB_IP6} &
run_cmd nettest -6 -s -M ${MD5_WRONG_PW} -r ${NSB_IP6} & run_cmd nettest -6 -s -M ${MD5_WRONG_PW} -m ${NSB_IP6} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -r ${NSA_IP6} -M ${MD5_WRONG_PW} run_cmd_nsb nettest -6 -r ${NSA_IP6} -X ${MD5_WRONG_PW}
log_test $? 2 "MD5: VRF: Single address config in default VRF and VRF, conn in VRF with default VRF pw" log_test $? 2 "MD5: VRF: Single address config in default VRF and VRF, conn in VRF with default VRF pw"
log_start log_start
run_cmd nettest -6 -s -d ${VRF} -M ${MD5_PW} -m ${NS_NET6} & run_cmd nettest -6 -s -I ${VRF} -M ${MD5_PW} -m ${NS_NET6} &
run_cmd nettest -6 -s -M ${MD5_WRONG_PW} -m ${NS_NET6} & run_cmd nettest -6 -s -M ${MD5_WRONG_PW} -m ${NS_NET6} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -r ${NSA_IP6} -M ${MD5_PW} run_cmd_nsb nettest -6 -r ${NSA_IP6} -X ${MD5_PW}
log_test $? 0 "MD5: VRF: Prefix config in default VRF and VRF, conn in VRF" log_test $? 0 "MD5: VRF: Prefix config in default VRF and VRF, conn in VRF"
log_start log_start
run_cmd nettest -6 -s -d ${VRF} -M ${MD5_PW} -m ${NS_NET6} & run_cmd nettest -6 -s -I ${VRF} -M ${MD5_PW} -m ${NS_NET6} &
run_cmd nettest -6 -s -M ${MD5_WRONG_PW} -m ${NS_NET6} & run_cmd nettest -6 -s -M ${MD5_WRONG_PW} -m ${NS_NET6} &
sleep 1 sleep 1
run_cmd_nsc nettest -6 -r ${NSA_IP6} -M ${MD5_WRONG_PW} run_cmd_nsc nettest -6 -r ${NSA_IP6} -X ${MD5_WRONG_PW}
log_test $? 0 "MD5: VRF: Prefix config in default VRF and VRF, conn in default VRF" log_test $? 0 "MD5: VRF: Prefix config in default VRF and VRF, conn in default VRF"
log_start log_start
show_hint "Should timeout since client in default VRF uses VRF password" show_hint "Should timeout since client in default VRF uses VRF password"
run_cmd nettest -6 -s -d ${VRF} -M ${MD5_PW} -m ${NS_NET6} & run_cmd nettest -6 -s -I ${VRF} -M ${MD5_PW} -m ${NS_NET6} &
run_cmd nettest -6 -s -M ${MD5_WRONG_PW} -m ${NS_NET6} & run_cmd nettest -6 -s -M ${MD5_WRONG_PW} -m ${NS_NET6} &
sleep 1 sleep 1
run_cmd_nsc nettest -6 -r ${NSA_IP6} -M ${MD5_PW} run_cmd_nsc nettest -6 -r ${NSA_IP6} -X ${MD5_PW}
log_test $? 2 "MD5: VRF: Prefix config in default VRF and VRF, conn in default VRF with VRF pw" log_test $? 2 "MD5: VRF: Prefix config in default VRF and VRF, conn in default VRF with VRF pw"
log_start log_start
show_hint "Should timeout since client in VRF uses default VRF password" show_hint "Should timeout since client in VRF uses default VRF password"
run_cmd nettest -6 -s -d ${VRF} -M ${MD5_PW} -m ${NS_NET6} & run_cmd nettest -6 -s -I ${VRF} -M ${MD5_PW} -m ${NS_NET6} &
run_cmd nettest -6 -s -M ${MD5_WRONG_PW} -m ${NS_NET6} & run_cmd nettest -6 -s -M ${MD5_WRONG_PW} -m ${NS_NET6} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -r ${NSA_IP6} -M ${MD5_WRONG_PW} run_cmd_nsb nettest -6 -r ${NSA_IP6} -X ${MD5_WRONG_PW}
log_test $? 2 "MD5: VRF: Prefix config in default VRF and VRF, conn in VRF with default VRF pw" log_test $? 2 "MD5: VRF: Prefix config in default VRF and VRF, conn in VRF with default VRF pw"
# #
# negative tests # negative tests
# #
log_start log_start
run_cmd nettest -6 -s -d ${NSA_DEV} -M ${MD5_PW} -r ${NSB_IP6} run_cmd nettest -6 -s -I ${NSA_DEV} -M ${MD5_PW} -m ${NSB_IP6}
log_test $? 1 "MD5: VRF: Device must be a VRF - single address" log_test $? 1 "MD5: VRF: Device must be a VRF - single address"
log_start log_start
run_cmd nettest -6 -s -d ${NSA_DEV} -M ${MD5_PW} -m ${NS_NET6} run_cmd nettest -6 -s -I ${NSA_DEV} -M ${MD5_PW} -m ${NS_NET6}
log_test $? 1 "MD5: VRF: Device must be a VRF - prefix" log_test $? 1 "MD5: VRF: Device must be a VRF - prefix"
} }
...@@ -2534,7 +2534,7 @@ ipv6_tcp_novrf() ...@@ -2534,7 +2534,7 @@ ipv6_tcp_novrf()
a=${NSA_IP6} a=${NSA_IP6}
log_start log_start
run_cmd nettest -6 -s -d ${NSA_DEV} -2 ${NSA_DEV} & run_cmd nettest -6 -s -I ${NSA_DEV} -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -6 -r ${a} -0 ${a} run_cmd nettest -6 -r ${a} -0 ${a}
log_test_addr ${a} $? 0 "Device server, unbound client, local connection" log_test_addr ${a} $? 0 "Device server, unbound client, local connection"
...@@ -2543,7 +2543,7 @@ ipv6_tcp_novrf() ...@@ -2543,7 +2543,7 @@ ipv6_tcp_novrf()
do do
log_start log_start
show_hint "Should fail 'Connection refused' since addresses on loopback are out of device scope" show_hint "Should fail 'Connection refused' since addresses on loopback are out of device scope"
run_cmd nettest -6 -s -d ${NSA_DEV} & run_cmd nettest -6 -s -I ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -6 -r ${a} run_cmd nettest -6 -r ${a}
log_test_addr ${a} $? 1 "Device server, unbound client, local connection" log_test_addr ${a} $? 1 "Device server, unbound client, local connection"
...@@ -2569,7 +2569,7 @@ ipv6_tcp_novrf() ...@@ -2569,7 +2569,7 @@ ipv6_tcp_novrf()
for a in ${NSA_IP6} ${NSA_LINKIP6} for a in ${NSA_IP6} ${NSA_LINKIP6}
do do
log_start log_start
run_cmd nettest -6 -s -d ${NSA_DEV} -2 ${NSA_DEV} & run_cmd nettest -6 -s -I ${NSA_DEV} -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -6 -d ${NSA_DEV} -r ${a} run_cmd nettest -6 -d ${NSA_DEV} -r ${a}
log_test_addr ${a} $? 0 "Device server, device client, local conn" log_test_addr ${a} $? 0 "Device server, device client, local conn"
...@@ -2611,7 +2611,7 @@ ipv6_tcp_vrf() ...@@ -2611,7 +2611,7 @@ ipv6_tcp_vrf()
for a in ${NSA_IP6} ${VRF_IP6} for a in ${NSA_IP6} ${VRF_IP6}
do do
log_start log_start
run_cmd nettest -6 -s -d ${VRF} -2 ${VRF} & run_cmd nettest -6 -s -I ${VRF} -3 ${VRF} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -r ${a} run_cmd_nsb nettest -6 -r ${a}
log_test_addr ${a} $? 0 "VRF server" log_test_addr ${a} $? 0 "VRF server"
...@@ -2620,7 +2620,7 @@ ipv6_tcp_vrf() ...@@ -2620,7 +2620,7 @@ ipv6_tcp_vrf()
# link local is always bound to ingress device # link local is always bound to ingress device
a=${NSA_LINKIP6}%${NSB_DEV} a=${NSA_LINKIP6}%${NSB_DEV}
log_start log_start
run_cmd nettest -6 -s -d ${VRF} -2 ${NSA_DEV} & run_cmd nettest -6 -s -I ${VRF} -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -r ${a} run_cmd_nsb nettest -6 -r ${a}
log_test_addr ${a} $? 0 "VRF server" log_test_addr ${a} $? 0 "VRF server"
...@@ -2628,7 +2628,7 @@ ipv6_tcp_vrf() ...@@ -2628,7 +2628,7 @@ ipv6_tcp_vrf()
for a in ${NSA_IP6} ${VRF_IP6} ${NSA_LINKIP6}%${NSB_DEV} for a in ${NSA_IP6} ${VRF_IP6} ${NSA_LINKIP6}%${NSB_DEV}
do do
log_start log_start
run_cmd nettest -6 -s -d ${NSA_DEV} -2 ${NSA_DEV} & run_cmd nettest -6 -s -I ${NSA_DEV} -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -r ${a} run_cmd_nsb nettest -6 -r ${a}
log_test_addr ${a} $? 0 "Device server" log_test_addr ${a} $? 0 "Device server"
...@@ -2664,7 +2664,7 @@ ipv6_tcp_vrf() ...@@ -2664,7 +2664,7 @@ ipv6_tcp_vrf()
for a in ${NSA_IP6} ${VRF_IP6} for a in ${NSA_IP6} ${VRF_IP6}
do do
log_start log_start
run_cmd nettest -6 -s -2 ${VRF} & run_cmd nettest -6 -s -3 ${VRF} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -r ${a} run_cmd_nsb nettest -6 -r ${a}
log_test_addr ${a} $? 0 "Global server" log_test_addr ${a} $? 0 "Global server"
...@@ -2673,7 +2673,7 @@ ipv6_tcp_vrf() ...@@ -2673,7 +2673,7 @@ ipv6_tcp_vrf()
for a in ${NSA_IP6} ${VRF_IP6} for a in ${NSA_IP6} ${VRF_IP6}
do do
log_start log_start
run_cmd nettest -6 -s -d ${VRF} -2 ${VRF} & run_cmd nettest -6 -s -I ${VRF} -3 ${VRF} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -r ${a} run_cmd_nsb nettest -6 -r ${a}
log_test_addr ${a} $? 0 "VRF server" log_test_addr ${a} $? 0 "VRF server"
...@@ -2682,13 +2682,13 @@ ipv6_tcp_vrf() ...@@ -2682,13 +2682,13 @@ ipv6_tcp_vrf()
# For LLA, child socket is bound to device # For LLA, child socket is bound to device
a=${NSA_LINKIP6}%${NSB_DEV} a=${NSA_LINKIP6}%${NSB_DEV}
log_start log_start
run_cmd nettest -6 -s -2 ${NSA_DEV} & run_cmd nettest -6 -s -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -r ${a} run_cmd_nsb nettest -6 -r ${a}
log_test_addr ${a} $? 0 "Global server" log_test_addr ${a} $? 0 "Global server"
log_start log_start
run_cmd nettest -6 -s -d ${VRF} -2 ${NSA_DEV} & run_cmd nettest -6 -s -I ${VRF} -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -r ${a} run_cmd_nsb nettest -6 -r ${a}
log_test_addr ${a} $? 0 "VRF server" log_test_addr ${a} $? 0 "VRF server"
...@@ -2696,7 +2696,7 @@ ipv6_tcp_vrf() ...@@ -2696,7 +2696,7 @@ ipv6_tcp_vrf()
for a in ${NSA_IP6} ${NSA_LINKIP6}%${NSB_DEV} for a in ${NSA_IP6} ${NSA_LINKIP6}%${NSB_DEV}
do do
log_start log_start
run_cmd nettest -6 -s -d ${NSA_DEV} -2 ${NSA_DEV} & run_cmd nettest -6 -s -I ${NSA_DEV} -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -r ${a} run_cmd_nsb nettest -6 -r ${a}
log_test_addr ${a} $? 0 "Device server" log_test_addr ${a} $? 0 "Device server"
...@@ -2716,7 +2716,7 @@ ipv6_tcp_vrf() ...@@ -2716,7 +2716,7 @@ ipv6_tcp_vrf()
do do
log_start log_start
show_hint "Fails 'Connection refused' since client is not in VRF" show_hint "Fails 'Connection refused' since client is not in VRF"
run_cmd nettest -6 -s -d ${VRF} & run_cmd nettest -6 -s -I ${VRF} &
sleep 1 sleep 1
run_cmd nettest -6 -r ${a} run_cmd nettest -6 -r ${a}
log_test_addr ${a} $? 1 "Global server, local connection" log_test_addr ${a} $? 1 "Global server, local connection"
...@@ -2771,7 +2771,7 @@ ipv6_tcp_vrf() ...@@ -2771,7 +2771,7 @@ ipv6_tcp_vrf()
for a in ${NSA_IP6} ${VRF_IP6} ::1 for a in ${NSA_IP6} ${VRF_IP6} ::1
do do
log_start log_start
run_cmd nettest -6 -s -d ${VRF} -2 ${VRF} & run_cmd nettest -6 -s -I ${VRF} -3 ${VRF} &
sleep 1 sleep 1
run_cmd nettest -6 -r ${a} -d ${VRF} -0 ${a} run_cmd nettest -6 -r ${a} -d ${VRF} -0 ${a}
log_test_addr ${a} $? 0 "VRF server, VRF client, local connection" log_test_addr ${a} $? 0 "VRF server, VRF client, local connection"
...@@ -2779,7 +2779,7 @@ ipv6_tcp_vrf() ...@@ -2779,7 +2779,7 @@ ipv6_tcp_vrf()
a=${NSA_IP6} a=${NSA_IP6}
log_start log_start
run_cmd nettest -6 -s -d ${VRF} -2 ${VRF} & run_cmd nettest -6 -s -I ${VRF} -3 ${VRF} &
sleep 1 sleep 1
run_cmd nettest -6 -r ${a} -d ${NSA_DEV} -0 ${a} run_cmd nettest -6 -r ${a} -d ${NSA_DEV} -0 ${a}
log_test_addr ${a} $? 0 "VRF server, device client, local connection" log_test_addr ${a} $? 0 "VRF server, device client, local connection"
...@@ -2787,13 +2787,13 @@ ipv6_tcp_vrf() ...@@ -2787,13 +2787,13 @@ ipv6_tcp_vrf()
a=${NSA_IP6} a=${NSA_IP6}
log_start log_start
show_hint "Should fail since unbound client is out of VRF scope" show_hint "Should fail since unbound client is out of VRF scope"
run_cmd nettest -6 -s -d ${VRF} & run_cmd nettest -6 -s -I ${VRF} &
sleep 1 sleep 1
run_cmd nettest -6 -r ${a} run_cmd nettest -6 -r ${a}
log_test_addr ${a} $? 1 "VRF server, unbound client, local connection" log_test_addr ${a} $? 1 "VRF server, unbound client, local connection"
log_start log_start
run_cmd nettest -6 -s -d ${NSA_DEV} -2 ${NSA_DEV} & run_cmd nettest -6 -s -I ${NSA_DEV} -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -6 -r ${a} -d ${VRF} -0 ${a} run_cmd nettest -6 -r ${a} -d ${VRF} -0 ${a}
log_test_addr ${a} $? 0 "Device server, VRF client, local connection" log_test_addr ${a} $? 0 "Device server, VRF client, local connection"
...@@ -2801,7 +2801,7 @@ ipv6_tcp_vrf() ...@@ -2801,7 +2801,7 @@ ipv6_tcp_vrf()
for a in ${NSA_IP6} ${NSA_LINKIP6} for a in ${NSA_IP6} ${NSA_LINKIP6}
do do
log_start log_start
run_cmd nettest -6 -s -d ${NSA_DEV} -2 ${NSA_DEV} & run_cmd nettest -6 -s -I ${NSA_DEV} -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -6 -r ${a} -d ${NSA_DEV} -0 ${a} run_cmd nettest -6 -r ${a} -d ${NSA_DEV} -0 ${a}
log_test_addr ${a} $? 0 "Device server, device client, local connection" log_test_addr ${a} $? 0 "Device server, device client, local connection"
...@@ -2841,13 +2841,13 @@ ipv6_udp_novrf() ...@@ -2841,13 +2841,13 @@ ipv6_udp_novrf()
for a in ${NSA_IP6} ${NSA_LINKIP6}%${NSB_DEV} for a in ${NSA_IP6} ${NSA_LINKIP6}%${NSB_DEV}
do do
log_start log_start
run_cmd nettest -6 -D -s -2 ${NSA_DEV} & run_cmd nettest -6 -D -s -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -D -r ${a} run_cmd_nsb nettest -6 -D -r ${a}
log_test_addr ${a} $? 0 "Global server" log_test_addr ${a} $? 0 "Global server"
log_start log_start
run_cmd nettest -6 -D -d ${NSA_DEV} -s -2 ${NSA_DEV} & run_cmd nettest -6 -D -I ${NSA_DEV} -s -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -D -r ${a} run_cmd_nsb nettest -6 -D -r ${a}
log_test_addr ${a} $? 0 "Device server" log_test_addr ${a} $? 0 "Device server"
...@@ -2855,7 +2855,7 @@ ipv6_udp_novrf() ...@@ -2855,7 +2855,7 @@ ipv6_udp_novrf()
a=${NSA_LO_IP6} a=${NSA_LO_IP6}
log_start log_start
run_cmd nettest -6 -D -s -2 ${NSA_DEV} & run_cmd nettest -6 -D -s -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -D -r ${a} run_cmd_nsb nettest -6 -D -r ${a}
log_test_addr ${a} $? 0 "Global server" log_test_addr ${a} $? 0 "Global server"
...@@ -2865,7 +2865,7 @@ ipv6_udp_novrf() ...@@ -2865,7 +2865,7 @@ ipv6_udp_novrf()
# behavior. # behavior.
#log_start #log_start
#show_hint "Should fail since loopback address is out of scope" #show_hint "Should fail since loopback address is out of scope"
#run_cmd nettest -6 -D -d ${NSA_DEV} -s -2 ${NSA_DEV} & #run_cmd nettest -6 -D -I ${NSA_DEV} -s -3 ${NSA_DEV} &
#sleep 1 #sleep 1
#run_cmd_nsb nettest -6 -D -r ${a} #run_cmd_nsb nettest -6 -D -r ${a}
#log_test_addr ${a} $? 1 "Device server" #log_test_addr ${a} $? 1 "Device server"
...@@ -2933,7 +2933,7 @@ ipv6_udp_novrf() ...@@ -2933,7 +2933,7 @@ ipv6_udp_novrf()
a=${NSA_IP6} a=${NSA_IP6}
log_start log_start
run_cmd nettest -6 -s -D -d ${NSA_DEV} -2 ${NSA_DEV} & run_cmd nettest -6 -s -D -I ${NSA_DEV} -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -6 -D -r ${a} run_cmd nettest -6 -D -r ${a}
log_test_addr ${a} $? 0 "Device server, unbound client, local connection" log_test_addr ${a} $? 0 "Device server, unbound client, local connection"
...@@ -2942,7 +2942,7 @@ ipv6_udp_novrf() ...@@ -2942,7 +2942,7 @@ ipv6_udp_novrf()
do do
log_start log_start
show_hint "Should fail 'Connection refused' since address is out of device scope" show_hint "Should fail 'Connection refused' since address is out of device scope"
run_cmd nettest -6 -s -D -d ${NSA_DEV} & run_cmd nettest -6 -s -D -I ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -6 -D -r ${a} run_cmd nettest -6 -D -r ${a}
log_test_addr ${a} $? 1 "Device server, local connection" log_test_addr ${a} $? 1 "Device server, local connection"
...@@ -2993,7 +2993,7 @@ ipv6_udp_novrf() ...@@ -2993,7 +2993,7 @@ ipv6_udp_novrf()
a=${NSA_IP6} a=${NSA_IP6}
log_start log_start
run_cmd nettest -6 -D -s -d ${NSA_DEV} -2 ${NSA_DEV} & run_cmd nettest -6 -D -s -I ${NSA_DEV} -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -6 -D -d ${NSA_DEV} -r ${a} -0 ${a} run_cmd nettest -6 -D -d ${NSA_DEV} -r ${a} -0 ${a}
log_test_addr ${a} $? 0 "Device server, device client, local conn" log_test_addr ${a} $? 0 "Device server, device client, local conn"
...@@ -3040,7 +3040,7 @@ ipv6_udp_vrf() ...@@ -3040,7 +3040,7 @@ ipv6_udp_vrf()
for a in ${NSA_IP6} ${VRF_IP6} for a in ${NSA_IP6} ${VRF_IP6}
do do
log_start log_start
run_cmd nettest -6 -D -d ${VRF} -s -2 ${NSA_DEV} & run_cmd nettest -6 -D -I ${VRF} -s -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -D -r ${a} run_cmd_nsb nettest -6 -D -r ${a}
log_test_addr ${a} $? 0 "VRF server" log_test_addr ${a} $? 0 "VRF server"
...@@ -3049,7 +3049,7 @@ ipv6_udp_vrf() ...@@ -3049,7 +3049,7 @@ ipv6_udp_vrf()
for a in ${NSA_IP6} ${VRF_IP6} for a in ${NSA_IP6} ${VRF_IP6}
do do
log_start log_start
run_cmd nettest -6 -D -d ${NSA_DEV} -s -2 ${NSA_DEV} & run_cmd nettest -6 -D -I ${NSA_DEV} -s -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -D -r ${a} run_cmd_nsb nettest -6 -D -r ${a}
log_test_addr ${a} $? 0 "Enslaved device server" log_test_addr ${a} $? 0 "Enslaved device server"
...@@ -3080,7 +3080,7 @@ ipv6_udp_vrf() ...@@ -3080,7 +3080,7 @@ ipv6_udp_vrf()
for a in ${NSA_IP6} ${VRF_IP6} for a in ${NSA_IP6} ${VRF_IP6}
do do
log_start log_start
run_cmd nettest -6 -D -d ${VRF} -s & run_cmd nettest -6 -D -I ${VRF} -s &
sleep 1 sleep 1
run_cmd nettest -6 -D -d ${VRF} -r ${a} run_cmd nettest -6 -D -d ${VRF} -r ${a}
log_test_addr ${a} $? 0 "VRF server, VRF client, local conn" log_test_addr ${a} $? 0 "VRF server, VRF client, local conn"
...@@ -3095,19 +3095,19 @@ ipv6_udp_vrf() ...@@ -3095,19 +3095,19 @@ ipv6_udp_vrf()
log_test_addr ${a} $? 1 "Global server, device client, local conn" log_test_addr ${a} $? 1 "Global server, device client, local conn"
log_start log_start
run_cmd nettest -6 -D -d ${VRF} -s -2 ${NSA_DEV} & run_cmd nettest -6 -D -I ${VRF} -s -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -6 -D -d ${NSA_DEV} -r ${a} run_cmd nettest -6 -D -d ${NSA_DEV} -r ${a}
log_test_addr ${a} $? 0 "VRF server, device client, local conn" log_test_addr ${a} $? 0 "VRF server, device client, local conn"
log_start log_start
run_cmd nettest -6 -D -d ${NSA_DEV} -s -2 ${NSA_DEV} & run_cmd nettest -6 -D -I ${NSA_DEV} -s -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -6 -D -d ${VRF} -r ${a} run_cmd nettest -6 -D -d ${VRF} -r ${a}
log_test_addr ${a} $? 0 "Enslaved device server, VRF client, local conn" log_test_addr ${a} $? 0 "Enslaved device server, VRF client, local conn"
log_start log_start
run_cmd nettest -6 -D -d ${NSA_DEV} -s -2 ${NSA_DEV} & run_cmd nettest -6 -D -I ${NSA_DEV} -s -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -6 -D -d ${NSA_DEV} -r ${a} run_cmd nettest -6 -D -d ${NSA_DEV} -r ${a}
log_test_addr ${a} $? 0 "Enslaved device server, device client, local conn" log_test_addr ${a} $? 0 "Enslaved device server, device client, local conn"
...@@ -3122,7 +3122,7 @@ ipv6_udp_vrf() ...@@ -3122,7 +3122,7 @@ ipv6_udp_vrf()
for a in ${NSA_IP6} ${VRF_IP6} for a in ${NSA_IP6} ${VRF_IP6}
do do
log_start log_start
run_cmd nettest -6 -D -s -2 ${NSA_DEV} & run_cmd nettest -6 -D -s -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -D -r ${a} run_cmd_nsb nettest -6 -D -r ${a}
log_test_addr ${a} $? 0 "Global server" log_test_addr ${a} $? 0 "Global server"
...@@ -3131,7 +3131,7 @@ ipv6_udp_vrf() ...@@ -3131,7 +3131,7 @@ ipv6_udp_vrf()
for a in ${NSA_IP6} ${VRF_IP6} for a in ${NSA_IP6} ${VRF_IP6}
do do
log_start log_start
run_cmd nettest -6 -D -d ${VRF} -s -2 ${NSA_DEV} & run_cmd nettest -6 -D -I ${VRF} -s -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -D -r ${a} run_cmd_nsb nettest -6 -D -r ${a}
log_test_addr ${a} $? 0 "VRF server" log_test_addr ${a} $? 0 "VRF server"
...@@ -3140,7 +3140,7 @@ ipv6_udp_vrf() ...@@ -3140,7 +3140,7 @@ ipv6_udp_vrf()
for a in ${NSA_IP6} ${VRF_IP6} for a in ${NSA_IP6} ${VRF_IP6}
do do
log_start log_start
run_cmd nettest -6 -D -d ${NSA_DEV} -s -2 ${NSA_DEV} & run_cmd nettest -6 -D -I ${NSA_DEV} -s -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd_nsb nettest -6 -D -r ${a} run_cmd_nsb nettest -6 -D -r ${a}
log_test_addr ${a} $? 0 "Enslaved device server" log_test_addr ${a} $? 0 "Enslaved device server"
...@@ -3184,13 +3184,13 @@ ipv6_udp_vrf() ...@@ -3184,13 +3184,13 @@ ipv6_udp_vrf()
# #
a=${NSA_IP6} a=${NSA_IP6}
log_start log_start
run_cmd nettest -6 -D -s -2 ${NSA_DEV} & run_cmd nettest -6 -D -s -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -6 -D -d ${VRF} -r ${a} run_cmd nettest -6 -D -d ${VRF} -r ${a}
log_test_addr ${a} $? 0 "Global server, VRF client, local conn" log_test_addr ${a} $? 0 "Global server, VRF client, local conn"
#log_start #log_start
run_cmd nettest -6 -D -d ${VRF} -s -2 ${NSA_DEV} & run_cmd nettest -6 -D -I ${VRF} -s -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -6 -D -d ${VRF} -r ${a} run_cmd nettest -6 -D -d ${VRF} -r ${a}
log_test_addr ${a} $? 0 "VRF server, VRF client, local conn" log_test_addr ${a} $? 0 "VRF server, VRF client, local conn"
...@@ -3198,13 +3198,13 @@ ipv6_udp_vrf() ...@@ -3198,13 +3198,13 @@ ipv6_udp_vrf()
a=${VRF_IP6} a=${VRF_IP6}
log_start log_start
run_cmd nettest -6 -D -s -2 ${VRF} & run_cmd nettest -6 -D -s -3 ${VRF} &
sleep 1 sleep 1
run_cmd nettest -6 -D -d ${VRF} -r ${a} run_cmd nettest -6 -D -d ${VRF} -r ${a}
log_test_addr ${a} $? 0 "Global server, VRF client, local conn" log_test_addr ${a} $? 0 "Global server, VRF client, local conn"
log_start log_start
run_cmd nettest -6 -D -d ${VRF} -s -2 ${VRF} & run_cmd nettest -6 -D -I ${VRF} -s -3 ${VRF} &
sleep 1 sleep 1
run_cmd nettest -6 -D -d ${VRF} -r ${a} run_cmd nettest -6 -D -d ${VRF} -r ${a}
log_test_addr ${a} $? 0 "VRF server, VRF client, local conn" log_test_addr ${a} $? 0 "VRF server, VRF client, local conn"
...@@ -3220,25 +3220,25 @@ ipv6_udp_vrf() ...@@ -3220,25 +3220,25 @@ ipv6_udp_vrf()
# device to global IP # device to global IP
a=${NSA_IP6} a=${NSA_IP6}
log_start log_start
run_cmd nettest -6 -D -s -2 ${NSA_DEV} & run_cmd nettest -6 -D -s -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -6 -D -d ${NSA_DEV} -r ${a} run_cmd nettest -6 -D -d ${NSA_DEV} -r ${a}
log_test_addr ${a} $? 0 "Global server, device client, local conn" log_test_addr ${a} $? 0 "Global server, device client, local conn"
log_start log_start
run_cmd nettest -6 -D -d ${VRF} -s -2 ${NSA_DEV} & run_cmd nettest -6 -D -I ${VRF} -s -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -6 -D -d ${NSA_DEV} -r ${a} run_cmd nettest -6 -D -d ${NSA_DEV} -r ${a}
log_test_addr ${a} $? 0 "VRF server, device client, local conn" log_test_addr ${a} $? 0 "VRF server, device client, local conn"
log_start log_start
run_cmd nettest -6 -D -d ${NSA_DEV} -s -2 ${NSA_DEV} & run_cmd nettest -6 -D -I ${NSA_DEV} -s -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -6 -D -d ${VRF} -r ${a} run_cmd nettest -6 -D -d ${VRF} -r ${a}
log_test_addr ${a} $? 0 "Device server, VRF client, local conn" log_test_addr ${a} $? 0 "Device server, VRF client, local conn"
log_start log_start
run_cmd nettest -6 -D -d ${NSA_DEV} -s -2 ${NSA_DEV} & run_cmd nettest -6 -D -I ${NSA_DEV} -s -3 ${NSA_DEV} &
sleep 1 sleep 1
run_cmd nettest -6 -D -d ${NSA_DEV} -r ${a} run_cmd nettest -6 -D -d ${NSA_DEV} -r ${a}
log_test_addr ${a} $? 0 "Device server, device client, local conn" log_test_addr ${a} $? 0 "Device server, device client, local conn"
...@@ -3332,7 +3332,7 @@ ipv6_addr_bind_novrf() ...@@ -3332,7 +3332,7 @@ ipv6_addr_bind_novrf()
log_test_addr ${a} $? 0 "Raw socket bind to local address" log_test_addr ${a} $? 0 "Raw socket bind to local address"
log_start log_start
run_cmd nettest -6 -s -R -P ipv6-icmp -l ${a} -d ${NSA_DEV} -b run_cmd nettest -6 -s -R -P ipv6-icmp -l ${a} -I ${NSA_DEV} -b
log_test_addr ${a} $? 0 "Raw socket bind to local address after device bind" log_test_addr ${a} $? 0 "Raw socket bind to local address after device bind"
done done
...@@ -3345,13 +3345,13 @@ ipv6_addr_bind_novrf() ...@@ -3345,13 +3345,13 @@ ipv6_addr_bind_novrf()
log_test_addr ${a} $? 0 "TCP socket bind to local address" log_test_addr ${a} $? 0 "TCP socket bind to local address"
log_start log_start
run_cmd nettest -6 -s -l ${a} -d ${NSA_DEV} -t1 -b run_cmd nettest -6 -s -l ${a} -I ${NSA_DEV} -t1 -b
log_test_addr ${a} $? 0 "TCP socket bind to local address after device bind" log_test_addr ${a} $? 0 "TCP socket bind to local address after device bind"
a=${NSA_LO_IP6} a=${NSA_LO_IP6}
log_start log_start
show_hint "Should fail with 'Cannot assign requested address'" show_hint "Should fail with 'Cannot assign requested address'"
run_cmd nettest -6 -s -l ${a} -d ${NSA_DEV} -t1 -b run_cmd nettest -6 -s -l ${a} -I ${NSA_DEV} -t1 -b
log_test_addr ${a} $? 1 "TCP socket bind to out of scope local address" log_test_addr ${a} $? 1 "TCP socket bind to out of scope local address"
} }
...@@ -3363,18 +3363,18 @@ ipv6_addr_bind_vrf() ...@@ -3363,18 +3363,18 @@ ipv6_addr_bind_vrf()
for a in ${NSA_IP6} ${VRF_IP6} for a in ${NSA_IP6} ${VRF_IP6}
do do
log_start log_start
run_cmd nettest -6 -s -R -P ipv6-icmp -l ${a} -d ${VRF} -b run_cmd nettest -6 -s -R -P ipv6-icmp -l ${a} -I ${VRF} -b
log_test_addr ${a} $? 0 "Raw socket bind to local address after vrf bind" log_test_addr ${a} $? 0 "Raw socket bind to local address after vrf bind"
log_start log_start
run_cmd nettest -6 -s -R -P ipv6-icmp -l ${a} -d ${NSA_DEV} -b run_cmd nettest -6 -s -R -P ipv6-icmp -l ${a} -I ${NSA_DEV} -b
log_test_addr ${a} $? 0 "Raw socket bind to local address after device bind" log_test_addr ${a} $? 0 "Raw socket bind to local address after device bind"
done done
a=${NSA_LO_IP6} a=${NSA_LO_IP6}
log_start log_start
show_hint "Address on loopback is out of VRF scope" show_hint "Address on loopback is out of VRF scope"
run_cmd nettest -6 -s -R -P ipv6-icmp -l ${a} -d ${VRF} -b run_cmd nettest -6 -s -R -P ipv6-icmp -l ${a} -I ${VRF} -b
log_test_addr ${a} $? 1 "Raw socket bind to invalid local address after vrf bind" log_test_addr ${a} $? 1 "Raw socket bind to invalid local address after vrf bind"
# #
...@@ -3384,29 +3384,29 @@ ipv6_addr_bind_vrf() ...@@ -3384,29 +3384,29 @@ ipv6_addr_bind_vrf()
for a in ${NSA_IP6} ${VRF_IP6} for a in ${NSA_IP6} ${VRF_IP6}
do do
log_start log_start
run_cmd nettest -6 -s -l ${a} -d ${VRF} -t1 -b run_cmd nettest -6 -s -l ${a} -I ${VRF} -t1 -b
log_test_addr ${a} $? 0 "TCP socket bind to local address with VRF bind" log_test_addr ${a} $? 0 "TCP socket bind to local address with VRF bind"
done done
a=${NSA_IP6} a=${NSA_IP6}
log_start log_start
run_cmd nettest -6 -s -l ${a} -d ${NSA_DEV} -t1 -b run_cmd nettest -6 -s -l ${a} -I ${NSA_DEV} -t1 -b
log_test_addr ${a} $? 0 "TCP socket bind to local address with device bind" log_test_addr ${a} $? 0 "TCP socket bind to local address with device bind"
a=${VRF_IP6} a=${VRF_IP6}
log_start log_start
run_cmd nettest -6 -s -l ${a} -d ${NSA_DEV} -t1 -b run_cmd nettest -6 -s -l ${a} -I ${NSA_DEV} -t1 -b
log_test_addr ${a} $? 1 "TCP socket bind to VRF address with device bind" log_test_addr ${a} $? 1 "TCP socket bind to VRF address with device bind"
a=${NSA_LO_IP6} a=${NSA_LO_IP6}
log_start log_start
show_hint "Address on loopback out of scope for VRF" show_hint "Address on loopback out of scope for VRF"
run_cmd nettest -6 -s -l ${a} -d ${VRF} -t1 -b run_cmd nettest -6 -s -l ${a} -I ${VRF} -t1 -b
log_test_addr ${a} $? 1 "TCP socket bind to invalid local address for VRF" log_test_addr ${a} $? 1 "TCP socket bind to invalid local address for VRF"
log_start log_start
show_hint "Address on loopback out of scope for device in VRF" show_hint "Address on loopback out of scope for device in VRF"
run_cmd nettest -6 -s -l ${a} -d ${NSA_DEV} -t1 -b run_cmd nettest -6 -s -l ${a} -I ${NSA_DEV} -t1 -b
log_test_addr ${a} $? 1 "TCP socket bind to invalid local address for device bind" log_test_addr ${a} $? 1 "TCP socket bind to invalid local address for device bind"
} }
...@@ -3454,7 +3454,7 @@ ipv6_rt() ...@@ -3454,7 +3454,7 @@ ipv6_rt()
for a in ${NSA_IP6} ${VRF_IP6} for a in ${NSA_IP6} ${VRF_IP6}
do do
log_start log_start
run_cmd nettest ${varg} -d ${VRF} -s & run_cmd nettest ${varg} -I ${VRF} -s &
sleep 1 sleep 1
run_cmd_nsb nettest ${varg} -r ${a} & run_cmd_nsb nettest ${varg} -r ${a} &
sleep 3 sleep 3
...@@ -3468,7 +3468,7 @@ ipv6_rt() ...@@ -3468,7 +3468,7 @@ ipv6_rt()
for a in ${NSA_IP6} ${VRF_IP6} for a in ${NSA_IP6} ${VRF_IP6}
do do
log_start log_start
run_cmd nettest ${varg} -d ${NSA_DEV} -s & run_cmd nettest ${varg} -I ${NSA_DEV} -s &
sleep 1 sleep 1
run_cmd_nsb nettest ${varg} -r ${a} & run_cmd_nsb nettest ${varg} -r ${a} &
sleep 3 sleep 3
...@@ -3525,7 +3525,7 @@ ipv6_rt() ...@@ -3525,7 +3525,7 @@ ipv6_rt()
for a in ${NSA_IP6} ${VRF_IP6} for a in ${NSA_IP6} ${VRF_IP6}
do do
log_start log_start
run_cmd nettest ${varg} -d ${VRF} -s & run_cmd nettest ${varg} -I ${VRF} -s &
sleep 1 sleep 1
run_cmd nettest ${varg} -d ${VRF} -r ${a} & run_cmd nettest ${varg} -d ${VRF} -r ${a} &
sleep 3 sleep 3
...@@ -3549,7 +3549,7 @@ ipv6_rt() ...@@ -3549,7 +3549,7 @@ ipv6_rt()
setup ${with_vrf} setup ${with_vrf}
log_start log_start
run_cmd nettest ${varg} -d ${VRF} -s & run_cmd nettest ${varg} -I ${VRF} -s &
sleep 1 sleep 1
run_cmd nettest ${varg} -d ${NSA_DEV} -r ${a} & run_cmd nettest ${varg} -d ${NSA_DEV} -r ${a} &
sleep 3 sleep 3
...@@ -3560,7 +3560,7 @@ ipv6_rt() ...@@ -3560,7 +3560,7 @@ ipv6_rt()
setup ${with_vrf} setup ${with_vrf}
log_start log_start
run_cmd nettest ${varg} -d ${NSA_DEV} -s & run_cmd nettest ${varg} -I ${NSA_DEV} -s &
sleep 1 sleep 1
run_cmd nettest ${varg} -d ${NSA_DEV} -r ${a} & run_cmd nettest ${varg} -d ${NSA_DEV} -r ${a} &
sleep 3 sleep 3
......
...@@ -9,6 +9,7 @@ ...@@ -9,6 +9,7 @@
#include <sys/types.h> #include <sys/types.h>
#include <sys/ioctl.h> #include <sys/ioctl.h>
#include <sys/socket.h> #include <sys/socket.h>
#include <sys/wait.h>
#include <linux/tcp.h> #include <linux/tcp.h>
#include <arpa/inet.h> #include <arpa/inet.h>
#include <net/if.h> #include <net/if.h>
...@@ -17,6 +18,7 @@ ...@@ -17,6 +18,7 @@
#include <fcntl.h> #include <fcntl.h>
#include <libgen.h> #include <libgen.h>
#include <limits.h> #include <limits.h>
#include <sched.h>
#include <stdarg.h> #include <stdarg.h>
#include <stdio.h> #include <stdio.h>
#include <stdlib.h> #include <stdlib.h>
...@@ -34,6 +36,8 @@ ...@@ -34,6 +36,8 @@
#define DEFAULT_PORT 12345 #define DEFAULT_PORT 12345
#define NS_PREFIX "/run/netns/"
#ifndef MAX #ifndef MAX
#define MAX(a, b) ((a) > (b) ? (a) : (b)) #define MAX(a, b) ((a) > (b) ? (a) : (b))
#endif #endif
...@@ -43,12 +47,15 @@ ...@@ -43,12 +47,15 @@
struct sock_args { struct sock_args {
/* local address */ /* local address */
const char *local_addr_str;
const char *client_local_addr_str;
union { union {
struct in_addr in; struct in_addr in;
struct in6_addr in6; struct in6_addr in6;
} local_addr; } local_addr;
/* remote address */ /* remote address */
const char *remote_addr_str;
union { union {
struct in_addr in; struct in_addr in;
struct in6_addr in6; struct in6_addr in6;
...@@ -73,10 +80,16 @@ struct sock_args { ...@@ -73,10 +80,16 @@ struct sock_args {
int use_setsockopt; int use_setsockopt;
int use_cmsg; int use_cmsg;
const char *dev; const char *dev;
const char *server_dev;
int ifindex; int ifindex;
const char *clientns;
const char *serverns;
const char *password; const char *password;
const char *client_pw;
/* prefix for MD5 password */ /* prefix for MD5 password */
const char *md5_prefix_str;
union { union {
struct sockaddr_in v4; struct sockaddr_in v4;
struct sockaddr_in6 v6; struct sockaddr_in6 v6;
...@@ -84,15 +97,19 @@ struct sock_args { ...@@ -84,15 +97,19 @@ struct sock_args {
unsigned int prefix_len; unsigned int prefix_len;
/* expected addresses and device index for connection */ /* expected addresses and device index for connection */
const char *expected_dev;
const char *expected_server_dev;
int expected_ifindex; int expected_ifindex;
/* local address */ /* local address */
const char *expected_laddr_str;
union { union {
struct in_addr in; struct in_addr in;
struct in6_addr in6; struct in6_addr in6;
} expected_laddr; } expected_laddr;
/* remote address */ /* remote address */
const char *expected_raddr_str;
union { union {
struct in_addr in; struct in_addr in;
struct in6_addr in6; struct in6_addr in6;
...@@ -186,7 +203,7 @@ static void log_address(const char *desc, struct sockaddr *sa) ...@@ -186,7 +203,7 @@ static void log_address(const char *desc, struct sockaddr *sa)
if (sa->sa_family == AF_INET) { if (sa->sa_family == AF_INET) {
struct sockaddr_in *s = (struct sockaddr_in *) sa; struct sockaddr_in *s = (struct sockaddr_in *) sa;
log_msg("%s %s:%d", log_msg("%s %s:%d\n",
desc, desc,
inet_ntop(AF_INET, &s->sin_addr, addrstr, inet_ntop(AF_INET, &s->sin_addr, addrstr,
sizeof(addrstr)), sizeof(addrstr)),
...@@ -195,18 +212,37 @@ static void log_address(const char *desc, struct sockaddr *sa) ...@@ -195,18 +212,37 @@ static void log_address(const char *desc, struct sockaddr *sa)
} else if (sa->sa_family == AF_INET6) { } else if (sa->sa_family == AF_INET6) {
struct sockaddr_in6 *s6 = (struct sockaddr_in6 *) sa; struct sockaddr_in6 *s6 = (struct sockaddr_in6 *) sa;
log_msg("%s [%s]:%d", log_msg("%s [%s]:%d\n",
desc, desc,
inet_ntop(AF_INET6, &s6->sin6_addr, addrstr, inet_ntop(AF_INET6, &s6->sin6_addr, addrstr,
sizeof(addrstr)), sizeof(addrstr)),
ntohs(s6->sin6_port)); ntohs(s6->sin6_port));
} }
printf("\n");
fflush(stdout); fflush(stdout);
} }
static int switch_ns(const char *ns)
{
char path[PATH_MAX];
int fd, ret;
if (geteuid())
log_error("warning: likely need root to set netns %s!\n", ns);
snprintf(path, sizeof(path), "%s%s", NS_PREFIX, ns);
fd = open(path, 0);
if (fd < 0) {
log_err_errno("Failed to open netns path; can not switch netns");
return 1;
}
ret = setns(fd, CLONE_NEWNET);
close(fd);
return ret;
}
static int tcp_md5sig(int sd, void *addr, socklen_t alen, struct sock_args *args) static int tcp_md5sig(int sd, void *addr, socklen_t alen, struct sock_args *args)
{ {
int keylen = strlen(args->password); int keylen = strlen(args->password);
...@@ -259,13 +295,13 @@ static int tcp_md5_remote(int sd, struct sock_args *args) ...@@ -259,13 +295,13 @@ static int tcp_md5_remote(int sd, struct sock_args *args)
switch (args->version) { switch (args->version) {
case AF_INET: case AF_INET:
sin.sin_port = htons(args->port); sin.sin_port = htons(args->port);
sin.sin_addr = args->remote_addr.in; sin.sin_addr = args->md5_prefix.v4.sin_addr;
addr = &sin; addr = &sin;
alen = sizeof(sin); alen = sizeof(sin);
break; break;
case AF_INET6: case AF_INET6:
sin6.sin6_port = htons(args->port); sin6.sin6_port = htons(args->port);
sin6.sin6_addr = args->remote_addr.in6; sin6.sin6_addr = args->md5_prefix.v6.sin6_addr;
addr = &sin6; addr = &sin6;
alen = sizeof(sin6); alen = sizeof(sin6);
break; break;
...@@ -522,6 +558,33 @@ static int str_to_uint(const char *str, int min, int max, unsigned int *value) ...@@ -522,6 +558,33 @@ static int str_to_uint(const char *str, int min, int max, unsigned int *value)
return -1; return -1;
} }
static int resolve_devices(struct sock_args *args)
{
if (args->dev) {
args->ifindex = get_ifidx(args->dev);
if (args->ifindex < 0) {
log_error("Invalid device name\n");
return 1;
}
}
if (args->expected_dev) {
unsigned int tmp;
if (str_to_uint(args->expected_dev, 0, INT_MAX, &tmp) == 0) {
args->expected_ifindex = (int)tmp;
} else {
args->expected_ifindex = get_ifidx(args->expected_dev);
if (args->expected_ifindex < 0) {
fprintf(stderr, "Invalid expected device\n");
return 1;
}
}
}
return 0;
}
static int expected_addr_match(struct sockaddr *sa, void *expected, static int expected_addr_match(struct sockaddr *sa, void *expected,
const char *desc) const char *desc)
{ {
...@@ -533,7 +596,7 @@ static int expected_addr_match(struct sockaddr *sa, void *expected, ...@@ -533,7 +596,7 @@ static int expected_addr_match(struct sockaddr *sa, void *expected,
struct in_addr *exp_in = (struct in_addr *) expected; struct in_addr *exp_in = (struct in_addr *) expected;
if (s->sin_addr.s_addr != exp_in->s_addr) { if (s->sin_addr.s_addr != exp_in->s_addr) {
log_error("%s address does not match expected %s", log_error("%s address does not match expected %s\n",
desc, desc,
inet_ntop(AF_INET, exp_in, inet_ntop(AF_INET, exp_in,
addrstr, sizeof(addrstr))); addrstr, sizeof(addrstr)));
...@@ -544,14 +607,14 @@ static int expected_addr_match(struct sockaddr *sa, void *expected, ...@@ -544,14 +607,14 @@ static int expected_addr_match(struct sockaddr *sa, void *expected,
struct in6_addr *exp_in = (struct in6_addr *) expected; struct in6_addr *exp_in = (struct in6_addr *) expected;
if (memcmp(&s6->sin6_addr, exp_in, sizeof(*exp_in))) { if (memcmp(&s6->sin6_addr, exp_in, sizeof(*exp_in))) {
log_error("%s address does not match expected %s", log_error("%s address does not match expected %s\n",
desc, desc,
inet_ntop(AF_INET6, exp_in, inet_ntop(AF_INET6, exp_in,
addrstr, sizeof(addrstr))); addrstr, sizeof(addrstr)));
rc = 1; rc = 1;
} }
} else { } else {
log_error("%s address does not match expected - unknown family", log_error("%s address does not match expected - unknown family\n",
desc); desc);
rc = 1; rc = 1;
} }
...@@ -599,6 +662,160 @@ static int show_sockstat(int sd, struct sock_args *args) ...@@ -599,6 +662,160 @@ static int show_sockstat(int sd, struct sock_args *args)
return rc; return rc;
} }
enum addr_type {
ADDR_TYPE_LOCAL,
ADDR_TYPE_REMOTE,
ADDR_TYPE_MCAST,
ADDR_TYPE_EXPECTED_LOCAL,
ADDR_TYPE_EXPECTED_REMOTE,
ADDR_TYPE_MD5_PREFIX,
};
static int convert_addr(struct sock_args *args, const char *_str,
enum addr_type atype)
{
int pfx_len_max = args->version == AF_INET6 ? 128 : 32;
int family = args->version;
char *str, *dev, *sep;
struct in6_addr *in6;
struct in_addr *in;
const char *desc;
void *addr;
int rc = 0;
str = strdup(_str);
if (!str)
return -ENOMEM;
switch (atype) {
case ADDR_TYPE_LOCAL:
desc = "local";
addr = &args->local_addr;
break;
case ADDR_TYPE_REMOTE:
desc = "remote";
addr = &args->remote_addr;
break;
case ADDR_TYPE_MCAST:
desc = "mcast grp";
addr = &args->grp;
break;
case ADDR_TYPE_EXPECTED_LOCAL:
desc = "expected local";
addr = &args->expected_laddr;
break;
case ADDR_TYPE_EXPECTED_REMOTE:
desc = "expected remote";
addr = &args->expected_raddr;
break;
case ADDR_TYPE_MD5_PREFIX:
desc = "md5 prefix";
if (family == AF_INET) {
args->md5_prefix.v4.sin_family = AF_INET;
addr = &args->md5_prefix.v4.sin_addr;
} else if (family == AF_INET6) {
args->md5_prefix.v6.sin6_family = AF_INET6;
addr = &args->md5_prefix.v6.sin6_addr;
} else
return 1;
sep = strchr(str, '/');
if (sep) {
*sep = '\0';
sep++;
if (str_to_uint(sep, 1, pfx_len_max,
&args->prefix_len) != 0) {
fprintf(stderr, "Invalid port\n");
return 1;
}
} else {
args->prefix_len = 0;
}
break;
default:
log_error("unknown address type\n");
exit(1);
}
switch (family) {
case AF_INET:
in = (struct in_addr *) addr;
if (str) {
if (inet_pton(AF_INET, str, in) == 0) {
log_error("Invalid %s IP address\n", desc);
rc = -1;
goto out;
}
} else {
in->s_addr = htonl(INADDR_ANY);
}
break;
case AF_INET6:
dev = strchr(str, '%');
if (dev) {
*dev = '\0';
dev++;
}
in6 = (struct in6_addr *) addr;
if (str) {
if (inet_pton(AF_INET6, str, in6) == 0) {
log_error("Invalid %s IPv6 address\n", desc);
rc = -1;
goto out;
}
} else {
*in6 = in6addr_any;
}
if (dev) {
args->scope_id = get_ifidx(dev);
if (args->scope_id < 0) {
log_error("Invalid scope on %s IPv6 address\n",
desc);
rc = -1;
goto out;
}
}
break;
default:
log_error("Invalid address family\n");
}
out:
free(str);
return rc;
}
static int validate_addresses(struct sock_args *args)
{
if (args->local_addr_str &&
convert_addr(args, args->local_addr_str, ADDR_TYPE_LOCAL) < 0)
return 1;
if (args->remote_addr_str &&
convert_addr(args, args->remote_addr_str, ADDR_TYPE_REMOTE) < 0)
return 1;
if (args->md5_prefix_str &&
convert_addr(args, args->md5_prefix_str,
ADDR_TYPE_MD5_PREFIX) < 0)
return 1;
if (args->expected_laddr_str &&
convert_addr(args, args->expected_laddr_str,
ADDR_TYPE_EXPECTED_LOCAL))
return 1;
if (args->expected_raddr_str &&
convert_addr(args, args->expected_raddr_str,
ADDR_TYPE_EXPECTED_REMOTE))
return 1;
return 0;
}
static int get_index_from_cmsg(struct msghdr *m) static int get_index_from_cmsg(struct msghdr *m)
{ {
struct cmsghdr *cm; struct cmsghdr *cm;
...@@ -1180,8 +1397,19 @@ static int lsock_init(struct sock_args *args) ...@@ -1180,8 +1397,19 @@ static int lsock_init(struct sock_args *args)
return -1; return -1;
} }
static int do_server(struct sock_args *args) static void ipc_write(int fd, int message)
{
/* Not in both_mode, so there's no process to signal */
if (fd < 0)
return;
if (write(fd, &message, sizeof(message)) < 0)
log_err_errno("Failed to send client status");
}
static int do_server(struct sock_args *args, int ipc_fd)
{ {
/* ipc_fd = -1 if no parent process to signal */
struct timeval timeout = { .tv_sec = prog_timeout }, *ptval = NULL; struct timeval timeout = { .tv_sec = prog_timeout }, *ptval = NULL;
unsigned char addr[sizeof(struct sockaddr_in6)] = {}; unsigned char addr[sizeof(struct sockaddr_in6)] = {};
socklen_t alen = sizeof(addr); socklen_t alen = sizeof(addr);
...@@ -1190,6 +1418,20 @@ static int do_server(struct sock_args *args) ...@@ -1190,6 +1418,20 @@ static int do_server(struct sock_args *args)
fd_set rfds; fd_set rfds;
int rc; int rc;
if (args->serverns) {
if (switch_ns(args->serverns)) {
log_error("Could not set server netns to %s\n",
args->serverns);
goto err_exit;
}
log_msg("Switched server netns\n");
}
args->dev = args->server_dev;
args->expected_dev = args->expected_server_dev;
if (resolve_devices(args) || validate_addresses(args))
goto err_exit;
if (prog_timeout) if (prog_timeout)
ptval = &timeout; ptval = &timeout;
...@@ -1199,14 +1441,16 @@ static int do_server(struct sock_args *args) ...@@ -1199,14 +1441,16 @@ static int do_server(struct sock_args *args)
lsd = lsock_init(args); lsd = lsock_init(args);
if (lsd < 0) if (lsd < 0)
return 1; goto err_exit;
if (args->bind_test_only) { if (args->bind_test_only) {
close(lsd); close(lsd);
ipc_write(ipc_fd, 1);
return 0; return 0;
} }
if (args->type != SOCK_STREAM) { if (args->type != SOCK_STREAM) {
ipc_write(ipc_fd, 1);
rc = msg_loop(0, lsd, (void *) addr, alen, args); rc = msg_loop(0, lsd, (void *) addr, alen, args);
close(lsd); close(lsd);
return rc; return rc;
...@@ -1214,11 +1458,11 @@ static int do_server(struct sock_args *args) ...@@ -1214,11 +1458,11 @@ static int do_server(struct sock_args *args)
if (args->password && tcp_md5_remote(lsd, args)) { if (args->password && tcp_md5_remote(lsd, args)) {
close(lsd); close(lsd);
return 1; goto err_exit;
} }
ipc_write(ipc_fd, 1);
while (1) { while (1) {
log_msg("\n");
log_msg("waiting for client connection.\n"); log_msg("waiting for client connection.\n");
FD_ZERO(&rfds); FD_ZERO(&rfds);
FD_SET(lsd, &rfds); FD_SET(lsd, &rfds);
...@@ -1264,6 +1508,9 @@ static int do_server(struct sock_args *args) ...@@ -1264,6 +1508,9 @@ static int do_server(struct sock_args *args)
close(lsd); close(lsd);
return rc; return rc;
err_exit:
ipc_write(ipc_fd, 0);
return 1;
} }
static int wait_for_connect(int sd) static int wait_for_connect(int sd)
...@@ -1375,6 +1622,26 @@ static int do_client(struct sock_args *args) ...@@ -1375,6 +1622,26 @@ static int do_client(struct sock_args *args)
return 1; return 1;
} }
if (args->clientns) {
if (switch_ns(args->clientns)) {
log_error("Could not set client netns to %s\n",
args->clientns);
return 1;
}
log_msg("Switched client netns\n");
}
args->local_addr_str = args->client_local_addr_str;
if (resolve_devices(args) || validate_addresses(args))
return 1;
if ((args->use_setsockopt || args->use_cmsg) && !args->ifindex) {
fprintf(stderr, "Device binding not specified\n");
return 1;
}
if (args->use_setsockopt || args->use_cmsg)
args->dev = NULL;
switch (args->version) { switch (args->version) {
case AF_INET: case AF_INET:
sin.sin_port = htons(args->port); sin.sin_port = htons(args->port);
...@@ -1394,6 +1661,8 @@ static int do_client(struct sock_args *args) ...@@ -1394,6 +1661,8 @@ static int do_client(struct sock_args *args)
break; break;
} }
args->password = args->client_pw;
if (args->has_grp) if (args->has_grp)
sd = msock_client(args); sd = msock_client(args);
else else
...@@ -1419,132 +1688,6 @@ static int do_client(struct sock_args *args) ...@@ -1419,132 +1688,6 @@ static int do_client(struct sock_args *args)
return rc; return rc;
} }
enum addr_type {
ADDR_TYPE_LOCAL,
ADDR_TYPE_REMOTE,
ADDR_TYPE_MCAST,
ADDR_TYPE_EXPECTED_LOCAL,
ADDR_TYPE_EXPECTED_REMOTE,
ADDR_TYPE_MD5_PREFIX,
};
static int convert_addr(struct sock_args *args, const char *_str,
enum addr_type atype)
{
int pfx_len_max = args->version == AF_INET6 ? 128 : 32;
int family = args->version;
char *str, *dev, *sep;
struct in6_addr *in6;
struct in_addr *in;
const char *desc;
void *addr;
int rc = 0;
str = strdup(_str);
if (!str)
return -ENOMEM;
switch (atype) {
case ADDR_TYPE_LOCAL:
desc = "local";
addr = &args->local_addr;
break;
case ADDR_TYPE_REMOTE:
desc = "remote";
addr = &args->remote_addr;
break;
case ADDR_TYPE_MCAST:
desc = "mcast grp";
addr = &args->grp;
break;
case ADDR_TYPE_EXPECTED_LOCAL:
desc = "expected local";
addr = &args->expected_laddr;
break;
case ADDR_TYPE_EXPECTED_REMOTE:
desc = "expected remote";
addr = &args->expected_raddr;
break;
case ADDR_TYPE_MD5_PREFIX:
desc = "md5 prefix";
if (family == AF_INET) {
args->md5_prefix.v4.sin_family = AF_INET;
addr = &args->md5_prefix.v4.sin_addr;
} else if (family == AF_INET6) {
args->md5_prefix.v6.sin6_family = AF_INET6;
addr = &args->md5_prefix.v6.sin6_addr;
} else
return 1;
sep = strchr(str, '/');
if (sep) {
*sep = '\0';
sep++;
if (str_to_uint(sep, 1, pfx_len_max,
&args->prefix_len) != 0) {
fprintf(stderr, "Invalid port\n");
return 1;
}
} else {
args->prefix_len = pfx_len_max;
}
break;
default:
log_error("unknown address type");
exit(1);
}
switch (family) {
case AF_INET:
in = (struct in_addr *) addr;
if (str) {
if (inet_pton(AF_INET, str, in) == 0) {
log_error("Invalid %s IP address\n", desc);
rc = -1;
goto out;
}
} else {
in->s_addr = htonl(INADDR_ANY);
}
break;
case AF_INET6:
dev = strchr(str, '%');
if (dev) {
*dev = '\0';
dev++;
}
in6 = (struct in6_addr *) addr;
if (str) {
if (inet_pton(AF_INET6, str, in6) == 0) {
log_error("Invalid %s IPv6 address\n", desc);
rc = -1;
goto out;
}
} else {
*in6 = in6addr_any;
}
if (dev) {
args->scope_id = get_ifidx(dev);
if (args->scope_id < 0) {
log_error("Invalid scope on %s IPv6 address\n",
desc);
rc = -1;
goto out;
}
}
break;
default:
log_error("Invalid address family\n");
}
out:
free(str);
return rc;
}
static char *random_msg(int len) static char *random_msg(int len)
{ {
int i, n = 0, olen = len + 1; int i, n = 0, olen = len + 1;
...@@ -1568,7 +1711,68 @@ static char *random_msg(int len) ...@@ -1568,7 +1711,68 @@ static char *random_msg(int len)
return m; return m;
} }
#define GETOPT_STR "sr:l:p:t:g:P:DRn:M:m:d:SCi6L:0:1:2:Fbq" static int ipc_child(int fd, struct sock_args *args)
{
char *outbuf, *errbuf;
int rc = 1;
outbuf = malloc(4096);
errbuf = malloc(4096);
if (!outbuf || !errbuf) {
fprintf(stderr, "server: Failed to allocate buffers for stdout and stderr\n");
goto out;
}
setbuffer(stdout, outbuf, 4096);
setbuffer(stderr, errbuf, 4096);
server_mode = 1; /* to tell log_msg in case we are in both_mode */
/* when running in both mode, address validation applies
* solely to client side
*/
args->has_expected_laddr = 0;
args->has_expected_raddr = 0;
rc = do_server(args, fd);
out:
free(outbuf);
free(errbuf);
return rc;
}
static int ipc_parent(int cpid, int fd, struct sock_args *args)
{
int client_status;
int status;
int buf;
/* do the client-side function here in the parent process,
* waiting to be told when to continue
*/
if (read(fd, &buf, sizeof(buf)) <= 0) {
log_err_errno("Failed to read IPC status from status");
return 1;
}
if (!buf) {
log_error("Server failed; can not continue\n");
return 1;
}
log_msg("Server is ready\n");
client_status = do_client(args);
log_msg("parent is done!\n");
if (kill(cpid, 0) == 0)
kill(cpid, SIGKILL);
wait(&status);
return client_status;
}
#define GETOPT_STR "sr:l:c:p:t:g:P:DRn:M:X:m:d:I:BN:O:SCi6L:0:1:2:3:Fbq"
static void print_usage(char *prog) static void print_usage(char *prog)
{ {
...@@ -1582,13 +1786,18 @@ static void print_usage(char *prog) ...@@ -1582,13 +1786,18 @@ static void print_usage(char *prog)
" -t timeout seconds (default: none)\n" " -t timeout seconds (default: none)\n"
"\n" "\n"
"Optional:\n" "Optional:\n"
" -B do both client and server via fork and IPC\n"
" -N ns set client to network namespace ns (requires root)\n"
" -O ns set server to network namespace ns (requires root)\n"
" -F Restart server loop\n" " -F Restart server loop\n"
" -6 IPv6 (default is IPv4)\n" " -6 IPv6 (default is IPv4)\n"
" -P proto protocol for socket: icmp, ospf (default: none)\n" " -P proto protocol for socket: icmp, ospf (default: none)\n"
" -D|R datagram (D) / raw (R) socket (default stream)\n" " -D|R datagram (D) / raw (R) socket (default stream)\n"
" -l addr local address to bind to\n" " -l addr local address to bind to in server mode\n"
" -c addr local address to bind to in client mode\n"
"\n" "\n"
" -d dev bind socket to given device name\n" " -d dev bind socket to given device name\n"
" -I dev bind socket to given device name - server mode\n"
" -S use setsockopt (IP_UNICAST_IF or IP_MULTICAST_IF)\n" " -S use setsockopt (IP_UNICAST_IF or IP_MULTICAST_IF)\n"
" to set device binding\n" " to set device binding\n"
" -C use cmsg and IP_PKTINFO to specify device binding\n" " -C use cmsg and IP_PKTINFO to specify device binding\n"
...@@ -1597,6 +1806,7 @@ static void print_usage(char *prog) ...@@ -1597,6 +1806,7 @@ static void print_usage(char *prog)
" -n num number of times to send message\n" " -n num number of times to send message\n"
"\n" "\n"
" -M password use MD5 sum protection\n" " -M password use MD5 sum protection\n"
" -X password MD5 password for client mode\n"
" -m prefix/len prefix and length to use for MD5 key\n" " -m prefix/len prefix and length to use for MD5 key\n"
" -g grp multicast group (e.g., 239.1.1.1)\n" " -g grp multicast group (e.g., 239.1.1.1)\n"
" -i interactive mode (default is echo and terminate)\n" " -i interactive mode (default is echo and terminate)\n"
...@@ -1604,6 +1814,7 @@ static void print_usage(char *prog) ...@@ -1604,6 +1814,7 @@ static void print_usage(char *prog)
" -0 addr Expected local address\n" " -0 addr Expected local address\n"
" -1 addr Expected remote address\n" " -1 addr Expected remote address\n"
" -2 dev Expected device name (or index) to receive packet\n" " -2 dev Expected device name (or index) to receive packet\n"
" -3 dev Expected device name (or index) to receive packets - server mode\n"
"\n" "\n"
" -b Bind test only.\n" " -b Bind test only.\n"
" -q Be quiet. Run test without printing anything.\n" " -q Be quiet. Run test without printing anything.\n"
...@@ -1618,8 +1829,11 @@ int main(int argc, char *argv[]) ...@@ -1618,8 +1829,11 @@ int main(int argc, char *argv[])
.port = DEFAULT_PORT, .port = DEFAULT_PORT,
}; };
struct protoent *pe; struct protoent *pe;
int both_mode = 0;
unsigned int tmp; unsigned int tmp;
int forever = 0; int forever = 0;
int fd[2];
int cpid;
/* process inputs */ /* process inputs */
extern char *optarg; extern char *optarg;
...@@ -1631,6 +1845,9 @@ int main(int argc, char *argv[]) ...@@ -1631,6 +1845,9 @@ int main(int argc, char *argv[])
while ((rc = getopt(argc, argv, GETOPT_STR)) != -1) { while ((rc = getopt(argc, argv, GETOPT_STR)) != -1) {
switch (rc) { switch (rc) {
case 'B':
both_mode = 1;
break;
case 's': case 's':
server_mode = 1; server_mode = 1;
break; break;
...@@ -1639,13 +1856,15 @@ int main(int argc, char *argv[]) ...@@ -1639,13 +1856,15 @@ int main(int argc, char *argv[])
break; break;
case 'l': case 'l':
args.has_local_ip = 1; args.has_local_ip = 1;
if (convert_addr(&args, optarg, ADDR_TYPE_LOCAL) < 0) args.local_addr_str = optarg;
return 1;
break; break;
case 'r': case 'r':
args.has_remote_ip = 1; args.has_remote_ip = 1;
if (convert_addr(&args, optarg, ADDR_TYPE_REMOTE) < 0) args.remote_addr_str = optarg;
return 1; break;
case 'c':
args.has_local_ip = 1;
args.client_local_addr_str = optarg;
break; break;
case 'p': case 'p':
if (str_to_uint(optarg, 1, 65535, &tmp) != 0) { if (str_to_uint(optarg, 1, 65535, &tmp) != 0) {
...@@ -1685,15 +1904,23 @@ int main(int argc, char *argv[]) ...@@ -1685,15 +1904,23 @@ int main(int argc, char *argv[])
case 'n': case 'n':
iter = atoi(optarg); iter = atoi(optarg);
break; break;
case 'N':
args.clientns = optarg;
break;
case 'O':
args.serverns = optarg;
break;
case 'L': case 'L':
msg = random_msg(atoi(optarg)); msg = random_msg(atoi(optarg));
break; break;
case 'M': case 'M':
args.password = optarg; args.password = optarg;
break; break;
case 'X':
args.client_pw = optarg;
break;
case 'm': case 'm':
if (convert_addr(&args, optarg, ADDR_TYPE_MD5_PREFIX) < 0) args.md5_prefix_str = optarg;
return 1;
break; break;
case 'S': case 'S':
args.use_setsockopt = 1; args.use_setsockopt = 1;
...@@ -1703,11 +1930,9 @@ int main(int argc, char *argv[]) ...@@ -1703,11 +1930,9 @@ int main(int argc, char *argv[])
break; break;
case 'd': case 'd':
args.dev = optarg; args.dev = optarg;
args.ifindex = get_ifidx(optarg); break;
if (args.ifindex < 0) { case 'I':
fprintf(stderr, "Invalid device name\n"); args.server_dev = optarg;
return 1;
}
break; break;
case 'i': case 'i':
interactive = 1; interactive = 1;
...@@ -1726,28 +1951,17 @@ int main(int argc, char *argv[]) ...@@ -1726,28 +1951,17 @@ int main(int argc, char *argv[])
break; break;
case '0': case '0':
args.has_expected_laddr = 1; args.has_expected_laddr = 1;
if (convert_addr(&args, optarg, args.expected_laddr_str = optarg;
ADDR_TYPE_EXPECTED_LOCAL))
return 1;
break; break;
case '1': case '1':
args.has_expected_raddr = 1; args.has_expected_raddr = 1;
if (convert_addr(&args, optarg, args.expected_raddr_str = optarg;
ADDR_TYPE_EXPECTED_REMOTE))
return 1;
break; break;
case '2': case '2':
if (str_to_uint(optarg, 0, INT_MAX, &tmp) == 0) { args.expected_dev = optarg;
args.expected_ifindex = (int)tmp; break;
} else { case '3':
args.expected_ifindex = get_ifidx(optarg); args.expected_server_dev = optarg;
if (args.expected_ifindex < 0) {
fprintf(stderr,
"Invalid expected device\n");
return 1;
}
}
break; break;
case 'q': case 'q':
quiet = 1; quiet = 1;
...@@ -1759,23 +1973,17 @@ int main(int argc, char *argv[]) ...@@ -1759,23 +1973,17 @@ int main(int argc, char *argv[])
} }
if (args.password && if (args.password &&
((!args.has_remote_ip && !args.prefix_len) || args.type != SOCK_STREAM)) { ((!args.has_remote_ip && !args.md5_prefix_str) ||
args.type != SOCK_STREAM)) {
log_error("MD5 passwords apply to TCP only and require a remote ip for the password\n"); log_error("MD5 passwords apply to TCP only and require a remote ip for the password\n");
return 1; return 1;
} }
if (args.prefix_len && !args.password) { if (args.md5_prefix_str && !args.password) {
log_error("Prefix range for MD5 protection specified without a password\n"); log_error("Prefix range for MD5 protection specified without a password\n");
return 1; return 1;
} }
if ((args.use_setsockopt || args.use_cmsg) && !args.ifindex) {
fprintf(stderr, "Device binding not specified\n");
return 1;
}
if (args.use_setsockopt || args.use_cmsg)
args.dev = NULL;
if (iter == 0) { if (iter == 0) {
fprintf(stderr, "Invalid number of messages to send\n"); fprintf(stderr, "Invalid number of messages to send\n");
return 1; return 1;
...@@ -1792,7 +2000,7 @@ int main(int argc, char *argv[]) ...@@ -1792,7 +2000,7 @@ int main(int argc, char *argv[])
return 1; return 1;
} }
if (!server_mode && !args.has_grp && if ((both_mode || !server_mode) && !args.has_grp &&
!args.has_remote_ip && !args.has_local_ip) { !args.has_remote_ip && !args.has_local_ip) {
fprintf(stderr, fprintf(stderr,
"Local (server mode) or remote IP (client IP) required\n"); "Local (server mode) or remote IP (client IP) required\n");
...@@ -1804,9 +2012,26 @@ int main(int argc, char *argv[]) ...@@ -1804,9 +2012,26 @@ int main(int argc, char *argv[])
msg = NULL; msg = NULL;
} }
if (both_mode) {
if (pipe(fd) < 0) {
perror("pipe");
exit(1);
}
cpid = fork();
if (cpid < 0) {
perror("fork");
exit(1);
}
if (cpid)
return ipc_parent(cpid, fd[0], &args);
return ipc_child(fd[1], &args);
}
if (server_mode) { if (server_mode) {
do { do {
rc = do_server(&args); rc = do_server(&args, -1);
} while (forever); } while (forever);
return rc; return rc;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment