# # This isn't actually a shell script. It just looks like one. # Some tools other than /bin/sh process it. # # Lines that start with # are comments. # to the right is not valid. # # The first word provides the test type. For a list of test types, # see doc/{,src/}makecheck.html. # # skiptest means run no test. # # The second word is the name of the test to run. This is a directory. # # The third word may be one of: # # blank/good the test is believed to function, report failure # bad the test is known to fail, report unexpected success # suspended the test should not be run # # The fourth word may be a number, which is a PR# if the test is failing. # # # east-des-parity-01: see if DES parity check functions correctly. # skiptest east-des-parity-01 missing # # east-icmp-01: pass ping packets through manually keyed ESP SA and confirm # encipherment. # klipstest east-icmp-01 good # # east-icmp-03: pass ping packets through manually keyed ESP SA # with IPCOMP and confirm encipherment. # klipstest east-icmp-03 good # # east-icmp-04: pass ping packets through manually keyed ESP SA # with 3DES-SHA-1 authenticators # klipstest east-icmp-04 good # # east-ah-icmp-01: pass ping packets through manually keyed AH SA and confirm # authentication is added (MD5 version) # skiptest east-ah-icmp-01 good # # east-ah-icmp-02: pass ping packets through manually keyed AH SA and confirm # authentication is added (SHA1 version) # skiptest east-ah-icmp-02 good # # east-espiv-01: check that ESP packets get unpredictable IVs rather than # using the last ciphertext block of the previous packet # klipstest east-espiv-01 good # # west-bigicmp-01: test receiving fragmented ESP packets # klipstest west-bigicmp-01 good # # west-icmp-01: pass enciphered ping packets through manually keyed ESP SA # and confirm decryption # klipstest west-icmp-01 good # # west-icmp-03: decode ESP/IPCOMP packets # klipstest west-icmp-03 good # # west-icmp-04: decode ESP-3DES-SHA1 packets # klipstest west-icmp-04 good # # west-ah-icmp-01: pass authenticated ping packets through manually keyed SA # and confirm authentication # klipstest west-ah-icmp-01 good # # west-ah-icmp-02: pass authenticated ping packets through manually keyed SA # and confirm authentication # klipstest west-ah-icmp-02 good # # east-lifetime-02: soft byte lifetime # klipstest east-lifetime-02 good # # east-lifetime-03: soft byte lifetime # klipstest east-lifetime-03 good # # east-lifetime-04: soft addtime # skiptest east-lifetime-04 missing # # east-drop-01: %drop policy # klipstest east-drop-01 good # # east-hold-01: %hold policy # klipstest east-hold-01 good # # east-none-01: %none policy # klipstest east-none-01 good # # east-pass-01: %pass policy # klipstest east-pass-01 good # # east-reject-01: %reject policy # klipstest east-reject-01 good # # east-trap-01: %trap policy # klipstest east-trap-01 good # # east-trapsubnet-01: %trapsubnet policy # klipstest east-trapsubnet-01 good # # east-ikepass-01: local ike with pass policy # #klipstest east-ikepass-01 good # # east-drop-02: remote source IKE with drop policy # klipstest east-drop-02 good # # east-hold-02: remote source IKE with hold policy # klipstest east-hold-02 good # # east-none-02: remote source IKE with none policy # klipstest east-none-02 good # # east-pass-02: remote source IKE with pass policy # klipstest east-pass-02 good # # east-reject-02: remote source IKE with reject policy # klipstest east-reject-02 good # # east-trap-02: remote source IKE with trap policy # klipstest east-trap-02 good # # east-trapsubnet-02: remote source IKE with trapsubnet policy # klipstest east-trapsubnet-02 good # # west-drop-02: remote source IKE with drop policy # klipstest west-drop-02 good # # west-hold-02: remote source IKE with hold policy # klipstest west-hold-02 good # # west-none-02: remote source IKE with none policy # klipstest west-none-02 good # # west-pass-02: remote source IKE with pass policy # klipstest west-pass-02 good # # west-reject-02: remote source IKE with reject policy # klipstest west-reject-02 good # # west-trap-02: remote source IKE with trap policy # klipstest west-trap-02 good # # west-trapsubnet-02: remote source IKE with trapsubnet policy # klipstest west-trapsubnet-02 good # # west-esp-short-01: short ESP packet DoS test # klipstest west-esp-short-01 good # # west-esp-short-02: short ESP packet DoS test # klipstest west-esp-short-02 good # # proc-fs-01: see if the /proc/net entries look okay # ctltest proc-fs-01 good # # proc-fs-02: see if the /proc/net entries get cleaned up okay # ## DHR 2003 Apr 5: tests with modules hang ## ctltest proc-fs-02 good # # module-memory-01: test for module memory leaks # ## DHR 2003 Apr 5: tests with modules hang ## ctltest module-memory-01 bad # # east-saref-pfkey-01: test for saref allocation # ctltest east-saref-pfkey-01 good # # west-rcv-nfmark-set-01: test for saref set on receive # klipstest west-rcv-nfmark-set-01 good # # saref-alloc-01: test for saref allocation exhaustion # ctltest saref-alloc-01 good # # east-icmp-02: test if we can double encrypt packets - spi group # klipstest east-icmp-02 good # # west-icmp-02: test if we can double decrypt packets # and confirm decryption # klipstest west-icmp-02 good # # ah-esp-01: check an automatically keyed conn using ah+esp # skiptest ah-esp-01 good # # east-icmp-05: tests for AES256 klipstest east-icmp-05 good # # west-icmp-05: tests for AES256 klipstest west-icmp-05 good # # east-spi-01: send test case for ESP-3DES with no authentication # also tests having same SPI# for incoming and # and outgoing. # klipstest east-spi-01 good # # west-spi-01: receive test case for ESP-3DES with no authentication. # klipstest west-spi-01 good # # west-natt-01: receive test case for ESP-3DES-MD5 with UDP encapsulation # klipstest west-natt-01 good # # east-natt-01: receive test case for ESP-3DES-MD5 with UDP encapsulation # klipstest east-natt-01 good