:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: -p esp -e des3_ede -a sha256 -m tunnel -s '65450' :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 00:35:20 ] :: [ PASS ] :: Command 'tcpport=4053' (Expected 0, got 0) :: [ 00:35:20 ] :: [ PASS ] :: Command 'udpport=4053' (Expected 0, got 0) :: [ 00:35:20 ] :: [ PASS ] :: Command 'sctpport=4053' (Expected 0, got 0) :: [ 00:35:20 ] :: [ LOG ] :: ***** icmp ****** :: [ 00:35:20 ] :: [ PASS ] :: Command 'tcpdump -i br0 > icmp.packet &' (Expected 0, got 0) :: [ 00:35:22 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 00:35:23 ] :: [ PASS ] :: Command 'ip netns exec ha ping -i 0.4 -c 5 -s 10 192.168.0.2' (Expected 0, got 0) :: [ 00:35:25 ] :: [ PASS ] :: Command 'ip netns exec ha ping -i 0.4 -c 5 -s 1444 192.168.0.2' (Expected 0, got 0) :: [ 00:35:27 ] :: [ PASS ] :: Command 'ip netns exec ha ping -i 0.4 -c 5 -s 65450 192.168.0.2' (Expected 0, got 0) :: [ 00:35:29 ] :: [ PASS ] :: Command 'pkill tcpdump; sleep 2' (Expected 0, got 0) :: [ 00:35:29 ] :: [ PASS ] :: Command 'cat icmp.packet | egrep 'AH|ESP|IPComp' | head -n5' (Expected 0, got 0) :: [ 00:35:29 ] :: [ LOG ] :: ***** tcp ****** :: [ 00:35:29 ] :: [ PASS ] :: Command 'tcpdump -i br0 > tcp.packet &' (Expected 0, got 0) :: [ 00:35:31 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 00:35:31 ] :: [ PASS ] :: Command 'ip netns exec hb socat -u -4 tcp-l:4053 open:tcprecv,creat &' (Expected 0, got 0) :: [ 00:35:33 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 00:35:33 ] :: [ PASS ] :: Command 'ip netns exec ha socat -u -4 /dev/zero,readbytes=1048576 tcp-connect:192.168.0.2:4053' (Expected 0, got 0) :: [ 00:35:37 ] :: [ PASS ] :: Command 'sleep 4' (Expected 0, got 0) :: [ 00:35:37 ] :: [ PASS ] :: tcp should receive 1048576 bytes, received 1048576 bytes (Expected 0, got 0) :: [ 00:35:39 ] :: [ PASS ] :: Command 'pkill tcpdump; sleep 2' (Expected 0, got 0) :: [ 00:35:39 ] :: [ PASS ] :: Command 'cat tcp.packet | egrep 'AH|ESP|IPComp' | head -n5' (Expected 0, got 0) :: [ 00:35:39 ] :: [ LOG ] :: ***** udp ****** :: [ 00:35:39 ] :: [ PASS ] :: Command 'tcpdump -i br0 > udp.packet &' (Expected 0, got 0) :: [ 00:35:41 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 00:35:41 ] :: [ PASS ] :: Command 'ip netns exec hb socat -u -4 udp-l:4053 open:udprecv,creat &' (Expected 0, got 0) :: [ 00:35:43 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 00:35:43 ] :: [ PASS ] :: Command 'ip netns exec ha socat -u -4 /dev/zero,readbytes=1444 udp-sendto:192.168.0.2:4053' (Expected 0, got 0) :: [ 00:35:53 ] :: [ PASS ] :: Command 'sleep 10' (Expected 0, got 0) :: [ 00:35:53 ] :: [ PASS ] :: udp should receive 1444 bytes, received 1444 bytes (Expected 0, got 0) :: [ 00:35:53 ] :: [ PASS ] :: Command 'pkill socat' (Expected 0, got 0) :: [ 00:35:55 ] :: [ PASS ] :: Command 'pkill tcpdump; sleep 2' (Expected 0, got 0) :: [ 00:35:55 ] :: [ PASS ] :: Command 'cat udp.packet | egrep 'AH|ESP|IPComp' | head -n5' (Expected 0, got 0) :: [ 00:35:55 ] :: [ PASS ] :: Command 'tcpdump -i br0 > udp.packet &' (Expected 0, got 0) :: [ 00:35:57 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 00:35:57 ] :: [ PASS ] :: Command 'ip netns exec hb socat -u -4 udp-l:4053 open:udprecv,creat &' (Expected 0, got 0) :: [ 00:35:59 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 00:35:59 ] :: [ PASS ] :: Command 'ip netns exec ha socat -u -4 /dev/zero,readbytes=3000 udp-sendto:192.168.0.2:4053' (Expected 0, got 0) :: [ 00:36:09 ] :: [ PASS ] :: Command 'sleep 10' (Expected 0, got 0) :: [ 00:36:09 ] :: [ PASS ] :: udp should receive 3000 bytes, received 3000 bytes (Expected 0, got 0) :: [ 00:36:09 ] :: [ PASS ] :: Command 'pkill socat' (Expected 0, got 0) :: [ 00:36:11 ] :: [ PASS ] :: Command 'pkill tcpdump; sleep 2' (Expected 0, got 0) :: [ 00:36:11 ] :: [ PASS ] :: Command 'cat udp.packet | egrep 'AH|ESP|IPComp' | head -n5' (Expected 0, got 0) :: [ 00:36:11 ] :: [ LOG ] :: ***** sctp ****** :: [ 00:36:11 ] :: [ PASS ] :: Command 'tcpdump -i br0 > sctp.packet &' (Expected 0, got 0) :: [ 00:36:13 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 00:36:14 ] :: [ PASS ] :: Command 'ip netns exec hb socat -u -4 sctp-listen:4053 open:sctprecv,creat &' (Expected 0, got 0) :: [ 00:36:16 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 00:36:16 ] :: [ PASS ] :: Command 'ip netns exec ha socat -u -4 /dev/zero,readbytes=2000 sctp:192.168.0.2:4053' (Expected 0, got 0) :: [ 00:36:20 ] :: [ PASS ] :: Command 'sleep 4' (Expected 0, got 0) :: [ 00:36:20 ] :: [ PASS ] :: sctp should receive 2000 bytes, received 2000 bytes (Expected 0, got 0) :: [ 00:36:22 ] :: [ PASS ] :: Command 'pkill tcpdump; sleep 2' (Expected 0, got 0) :: [ 00:36:22 ] :: [ PASS ] :: Command 'cat sctp.packet | egrep 'AH|ESP|IPComp' | head -n5' (Expected 0, got 0) :: [ 00:36:22 ] :: [ INFO ] :: Sending proc_crypto as proc_crypto :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 62s :: Assertions: 48 good, 0 bad :: RESULT: PASS (-p esp -e des3_ede -a sha256 -m tunnel -s '65450')