:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: -p esp -e des3_ede -a sha256 -m tunnel -s '65450' :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 00:12:44 ] :: [ PASS ] :: Command 'tcpport=4053' (Expected 0, got 0) :: [ 00:12:44 ] :: [ PASS ] :: Command 'udpport=4053' (Expected 0, got 0) :: [ 00:12:44 ] :: [ PASS ] :: Command 'sctpport=4053' (Expected 0, got 0) :: [ 00:12:44 ] :: [ LOG ] :: ***** icmp ****** :: [ 00:12:44 ] :: [ PASS ] :: Command 'tcpdump -i br0 > icmp.packet &' (Expected 0, got 0) :: [ 00:12:46 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 00:12:48 ] :: [ PASS ] :: Command 'ip netns exec ha ping -i 0.4 -c 5 -s 10 192.168.0.2' (Expected 0, got 0) :: [ 00:12:50 ] :: [ PASS ] :: Command 'ip netns exec ha ping -i 0.4 -c 5 -s 1441 192.168.0.2' (Expected 0, got 0) :: [ 00:12:51 ] :: [ PASS ] :: Command 'ip netns exec ha ping -i 0.4 -c 5 -s 65450 192.168.0.2' (Expected 0, got 0) :: [ 00:12:54 ] :: [ PASS ] :: Command 'pkill tcpdump; sleep 2' (Expected 0, got 0) :: [ 00:12:54 ] :: [ PASS ] :: Command 'cat icmp.packet | egrep 'AH|ESP|IPComp' | head -n5' (Expected 0, got 0) :: [ 00:12:54 ] :: [ LOG ] :: ***** tcp ****** :: [ 00:12:54 ] :: [ PASS ] :: Command 'tcpdump -i br0 > tcp.packet &' (Expected 0, got 0) :: [ 00:12:56 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 00:12:56 ] :: [ PASS ] :: Command 'ip netns exec hb socat -u -4 tcp-l:4053 open:tcprecv,creat &' (Expected 0, got 0) :: [ 00:12:58 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 00:12:58 ] :: [ PASS ] :: Command 'ip netns exec ha socat -u -4 /dev/zero,readbytes=1048576 tcp-connect:192.168.0.2:4053' (Expected 0, got 0) :: [ 00:13:02 ] :: [ PASS ] :: Command 'sleep 4' (Expected 0, got 0) :: [ 00:13:02 ] :: [ PASS ] :: tcp should receive 1048576 bytes, received 1048576 bytes (Expected 0, got 0) :: [ 00:13:04 ] :: [ PASS ] :: Command 'pkill tcpdump; sleep 2' (Expected 0, got 0) :: [ 00:13:04 ] :: [ PASS ] :: Command 'cat tcp.packet | egrep 'AH|ESP|IPComp' | head -n5' (Expected 0, got 0) :: [ 00:13:04 ] :: [ LOG ] :: ***** udp ****** :: [ 00:13:04 ] :: [ PASS ] :: Command 'tcpdump -i br0 > udp.packet &' (Expected 0, got 0) :: [ 00:13:06 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 00:13:06 ] :: [ PASS ] :: Command 'ip netns exec hb socat -u -4 udp-l:4053 open:udprecv,creat &' (Expected 0, got 0) :: [ 00:13:08 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 00:13:09 ] :: [ PASS ] :: Command 'ip netns exec ha socat -u -4 /dev/zero,readbytes=1441 udp-sendto:192.168.0.2:4053' (Expected 0, got 0) :: [ 00:13:19 ] :: [ PASS ] :: Command 'sleep 10' (Expected 0, got 0) :: [ 00:13:19 ] :: [ PASS ] :: udp should receive 1441 bytes, received 1441 bytes (Expected 0, got 0) :: [ 00:13:19 ] :: [ PASS ] :: Command 'pkill socat' (Expected 0, got 0) :: [ 00:13:21 ] :: [ PASS ] :: Command 'pkill tcpdump; sleep 2' (Expected 0, got 0) :: [ 00:13:21 ] :: [ PASS ] :: Command 'cat udp.packet | egrep 'AH|ESP|IPComp' | head -n5' (Expected 0, got 0) :: [ 00:13:21 ] :: [ PASS ] :: Command 'tcpdump -i br0 > udp.packet &' (Expected 0, got 0) :: [ 00:13:23 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 00:13:23 ] :: [ PASS ] :: Command 'ip netns exec hb socat -u -4 udp-l:4053 open:udprecv,creat &' (Expected 0, got 0) :: [ 00:13:25 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 00:13:25 ] :: [ PASS ] :: Command 'ip netns exec ha socat -u -4 /dev/zero,readbytes=3000 udp-sendto:192.168.0.2:4053' (Expected 0, got 0) :: [ 00:13:35 ] :: [ PASS ] :: Command 'sleep 10' (Expected 0, got 0) :: [ 00:13:35 ] :: [ PASS ] :: udp should receive 3000 bytes, received 3000 bytes (Expected 0, got 0) :: [ 00:13:35 ] :: [ PASS ] :: Command 'pkill socat' (Expected 0, got 0) :: [ 00:13:37 ] :: [ PASS ] :: Command 'pkill tcpdump; sleep 2' (Expected 0, got 0) :: [ 00:13:37 ] :: [ PASS ] :: Command 'cat udp.packet | egrep 'AH|ESP|IPComp' | head -n5' (Expected 0, got 0) :: [ 00:13:38 ] :: [ LOG ] :: ***** sctp ****** :: [ 00:13:38 ] :: [ PASS ] :: Command 'tcpdump -i br0 > sctp.packet &' (Expected 0, got 0) :: [ 00:13:40 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 00:13:40 ] :: [ PASS ] :: Command 'ip netns exec hb socat -u -4 sctp-listen:4053 open:sctprecv,creat &' (Expected 0, got 0) :: [ 00:13:42 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 00:13:42 ] :: [ PASS ] :: Command 'ip netns exec ha socat -u -4 /dev/zero,readbytes=2000 sctp:192.168.0.2:4053' (Expected 0, got 0) :: [ 00:13:46 ] :: [ PASS ] :: Command 'sleep 4' (Expected 0, got 0) :: [ 00:13:46 ] :: [ PASS ] :: sctp should receive 2000 bytes, received 2000 bytes (Expected 0, got 0) :: [ 00:13:48 ] :: [ PASS ] :: Command 'pkill tcpdump; sleep 2' (Expected 0, got 0) :: [ 00:13:48 ] :: [ PASS ] :: Command 'cat sctp.packet | egrep 'AH|ESP|IPComp' | head -n5' (Expected 0, got 0) :: [ 00:13:48 ] :: [ INFO ] :: Sending proc_crypto as proc_crypto :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 64s :: Assertions: 48 good, 0 bad :: RESULT: PASS (-p esp -e des3_ede -a sha256 -m tunnel -s '65450')