2 # This isn't actually a shell script. It just looks like one.
3 # Some tools other than /bin/sh process it.
5 # Lines that start with # are comments. # to the right is not valid.
7 # The first word provides the test type. For a list of test types,
8 # see doc/{,src/}makecheck.html.
10 # skiptest means run no test.
12 # The second word is the name of the test to run. This is a directory.
14 # The third word may be one of:
16 # blank/good the test is believed to function, report failure
17 # bad the test is known to fail, report unexpected success
18 # suspended the test should not be run
20 # The fourth word may be a number, which is a PR# if the test is failing.
25 # east-des-parity-01: see if DES parity check functions correctly.
27 skiptest east-des-parity-01 missing
31 # east-icmp-01: pass ping packets through manually keyed ESP SA and confirm
34 klipstest east-icmp-01 good
37 # east-icmp-03: pass ping packets through manually keyed ESP SA
38 # with IPCOMP and confirm encipherment.
40 klipstest east-icmp-03 good
43 # east-icmp-04: pass ping packets through manually keyed ESP SA
44 # with 3DES-SHA-1 authenticators
46 klipstest east-icmp-04 good
49 # east-ah-icmp-01: pass ping packets through manually keyed AH SA and confirm
50 # authentication is added (MD5 version)
52 skiptest east-ah-icmp-01 good
55 # east-ah-icmp-02: pass ping packets through manually keyed AH SA and confirm
56 # authentication is added (SHA1 version)
58 skiptest east-ah-icmp-02 good
61 # east-espiv-01: check that ESP packets get unpredictable IVs rather than
62 # using the last ciphertext block of the previous packet
64 klipstest east-espiv-01 good
67 # west-bigicmp-01: test receiving fragmented ESP packets
69 klipstest west-bigicmp-01 good
72 # west-icmp-01: pass enciphered ping packets through manually keyed ESP SA
73 # and confirm decryption
75 klipstest west-icmp-01 good
78 # west-icmp-03: decode ESP/IPCOMP packets
80 klipstest west-icmp-03 good
83 # west-icmp-04: decode ESP-3DES-SHA1 packets
85 klipstest west-icmp-04 good
88 # west-ah-icmp-01: pass authenticated ping packets through manually keyed SA
89 # and confirm authentication
91 klipstest west-ah-icmp-01 good
94 # west-ah-icmp-02: pass authenticated ping packets through manually keyed SA
95 # and confirm authentication
97 klipstest west-ah-icmp-02 good
100 # east-lifetime-02: soft byte lifetime
102 klipstest east-lifetime-02 good
105 # east-lifetime-03: soft byte lifetime
107 klipstest east-lifetime-03 good
110 # east-lifetime-04: soft addtime
112 skiptest east-lifetime-04 missing
115 # east-drop-01: %drop policy
117 klipstest east-drop-01 good
120 # east-hold-01: %hold policy
122 klipstest east-hold-01 good
125 # east-none-01: %none policy
127 klipstest east-none-01 good
130 # east-pass-01: %pass policy
132 klipstest east-pass-01 good
135 # east-reject-01: %reject policy
137 klipstest east-reject-01 good
140 # east-trap-01: %trap policy
142 klipstest east-trap-01 good
145 # east-trapsubnet-01: %trapsubnet policy
147 klipstest east-trapsubnet-01 good
150 # east-ikepass-01: local ike with pass policy
152 #klipstest east-ikepass-01 good
155 # east-drop-02: remote source IKE with drop policy
157 klipstest east-drop-02 good
160 # east-hold-02: remote source IKE with hold policy
162 klipstest east-hold-02 good
165 # east-none-02: remote source IKE with none policy
167 klipstest east-none-02 good
170 # east-pass-02: remote source IKE with pass policy
172 klipstest east-pass-02 good
175 # east-reject-02: remote source IKE with reject policy
177 klipstest east-reject-02 good
180 # east-trap-02: remote source IKE with trap policy
182 klipstest east-trap-02 good
185 # east-trapsubnet-02: remote source IKE with trapsubnet policy
187 klipstest east-trapsubnet-02 good
190 # west-drop-02: remote source IKE with drop policy
192 klipstest west-drop-02 good
195 # west-hold-02: remote source IKE with hold policy
197 klipstest west-hold-02 good
200 # west-none-02: remote source IKE with none policy
202 klipstest west-none-02 good
205 # west-pass-02: remote source IKE with pass policy
207 klipstest west-pass-02 good
210 # west-reject-02: remote source IKE with reject policy
212 klipstest west-reject-02 good
215 # west-trap-02: remote source IKE with trap policy
217 klipstest west-trap-02 good
220 # west-trapsubnet-02: remote source IKE with trapsubnet policy
222 klipstest west-trapsubnet-02 good
225 # west-esp-short-01: short ESP packet DoS test
227 klipstest west-esp-short-01 good
230 # west-esp-short-02: short ESP packet DoS test
232 klipstest west-esp-short-02 good
235 # proc-fs-01: see if the /proc/net entries look okay
237 ctltest proc-fs-01 good
240 # proc-fs-02: see if the /proc/net entries get cleaned up okay
242 ## DHR 2003 Apr 5: tests with modules hang ## ctltest proc-fs-02 good
245 # module-memory-01: test for module memory leaks
247 ## DHR 2003 Apr 5: tests with modules hang ## ctltest module-memory-01 bad
250 # east-saref-pfkey-01: test for saref allocation
252 ctltest east-saref-pfkey-01 good
255 # west-rcv-nfmark-set-01: test for saref set on receive
257 klipstest west-rcv-nfmark-set-01 good
260 # saref-alloc-01: test for saref allocation exhaustion
262 ctltest saref-alloc-01 good
265 # east-icmp-02: test if we can double encrypt packets - spi group
267 klipstest east-icmp-02 good
270 # west-icmp-02: test if we can double decrypt packets
271 # and confirm decryption
273 klipstest west-icmp-02 good
276 # ah-esp-01: check an automatically keyed conn using ah+esp
278 skiptest ah-esp-01 good
281 # east-icmp-05: tests for AES256
282 klipstest east-icmp-05 good
285 # west-icmp-05: tests for AES256
286 klipstest west-icmp-05 good
289 # east-spi-01: send test case for ESP-3DES with no authentication
290 # also tests having same SPI# for incoming and
293 klipstest east-spi-01 good
296 # west-spi-01: receive test case for ESP-3DES with no authentication.
298 klipstest west-spi-01 good
301 # west-natt-01: receive test case for ESP-3DES-MD5 with UDP encapsulation
303 klipstest west-natt-01 good
306 # east-natt-01: receive test case for ESP-3DES-MD5 with UDP encapsulation
308 klipstest east-natt-01 good