Lines Matching +full:two +full:- +full:user

2 # SPDX-License-Identifier: BSD-2-Clause
34 atf_set require.user root
50 atf_check -s exit:0 -o ignore jexec a ping -c 1 192.0.2.2
54 dev-type tun
57 cipher AES-256-GCM
68 script-security 2
69 auth-user-pass-verify /usr/bin/true via-env
76 dev-type tun
81 auth-user-pass $(atf_get_srcdir)/user.pass
94 atf_check -s exit:0 -o ignore jexec b ping -c 1 198.51.100.1
96 echo 'foo' | jexec b nc -u -w 2 192.0.2.1 1194
97 atf_check -s exit:0 -o ignore jexec b ping -c 3 198.51.100.1
101 atf_check -s exit:2 -o ignore jexec b ping -t 1 -c 1 198.51.100.1
113 atf_set require.user root
129 atf_check -s exit:0 -o ignore jexec a ping -c 1 192.0.2.2
133 dev-type tun
136 cipher AES-256-GCM
147 script-security 2
148 auth-user-pass-verify /usr/bin/true via-env
155 dev-type tun
160 auth-user-pass $(atf_get_srcdir)/user.pass
173 atf_check -s exit:0 -o ignore jexec b ping -c 1 198.51.100.1
181 atf_check -s exit:0 -o ignore jexec b ping -c 3 198.51.100.1
193 atf_set require.user root
209 atf_check -s exit:0 -o ignore jexec a ping -c 1 192.0.2.2
215 dev-type tun
217 cipher AES-256-GCM
227 script-security 2
228 auth-user-pass-verify /usr/bin/true via-env
235 dev-type tun
240 auth-user-pass $(atf_get_srcdir)/user.pass
253 atf_check -s exit:0 -o ignore jexec b ping -c 3 198.51.100.1
265 atf_set require.user root
281 atf_check -s exit:0 -o ignore jexec a ping -c 1 192.0.2.2
285 dev-type tun
288 cipher AES-256-GCM
292 server-ipv6 2001:db8:1::/64
300 script-security 2
301 auth-user-pass-verify /usr/bin/true via-env
308 dev-type tun
313 auth-user-pass $(atf_get_srcdir)/user.pass
326 atf_check -s exit:0 -o ignore jexec b ping6 -c 3 2001:db8:1::1
338 atf_set require.user root
354 atf_check -s exit:0 -o ignore jexec a ping6 -c 1 2001:db8::2
358 dev-type tun
361 cipher AES-256-GCM
372 script-security 2
373 auth-user-pass-verify /usr/bin/true via-env
380 dev-type tun
385 auth-user-pass $(atf_get_srcdir)/user.pass
396 cat test.img | jexec a nc -N -l 1234 &
401 atf_check -s exit:0 -o ignore jexec b ping -c 3 198.51.100.1
406 atf_check -s exit:0 -o ignore jexec b \
407 ping -c 1 -s $i 198.51.100.1
410 rcvmd5=$(jexec b nc -N -w 3 198.51.100.1 1234 | md5)
428 atf_set require.user root
444 atf_check -s exit:0 -o ignore jexec a ping6 -c 1 2001:db8::2
448 dev-type tun
451 cipher AES-256-GCM
455 server-ipv6 2001:db8:1::/64
463 script-security 2
464 auth-user-pass-verify /usr/bin/true via-env
471 dev-type tun
476 auth-user-pass $(atf_get_srcdir)/user.pass
489 atf_check -s exit:0 -o ignore jexec b ping6 -c 3 2001:db8:1::1
490 atf_check -s exit:0 -o ignore jexec b ping6 -c 3 -z 16 2001:db8:1::1
493 jexec b route add -6 2001:db8::1 2001:db8:1::1
494 atf_check -s exit:2 -o ignore jexec b ping6 -t 1 -c 3 2001:db8:1::1
506 atf_set require.user root
523 atf_check -s exit:0 -o ignore jexec a ping -c 1 192.0.2.2
527 dev-type tun
530 cipher AES-256-GCM
541 script-security 2
542 auth-user-pass-verify /usr/bin/true via-env
551 dev-type tun
556 auth-user-pass $(atf_get_srcdir)/user.pass
569 atf_check -s exit:0 -o ignore jexec b ping -c 3 198.51.100.1
577 while echo "status" | jexec a nc -N 192.0.2.1 1234 | grep 192.0.2.2; do
592 atf_set require.user root
609 atf_check -s exit:0 -o ignore jexec a ping -c 1 192.0.2.2
613 dev-type tun
616 cipher AES-256-GCM
627 script-security 2
628 auth-user-pass-verify /usr/bin/true via-env
635 dev-type tun
640 auth-user-pass $(atf_get_srcdir)/user.pass
647 explicit-exit-notify
653 atf_check -s exit:0 -o ignore jexec b ping -c 3 198.51.100.1
655 if ! echo "status" | jexec a nc -N 192.0.2.1 1234 | grep 192.0.2.2; then
662 while echo "status" | jexec a nc -N 192.0.2.1 1234 | grep 192.0.2.2; do
678 atf_set require.user root
690 two=$(vnet_mkepair)
698 ifconfig ${two}a up
699 ifconfig ${bridge} addm ${two}a
705 vnet_mkjail two ${two}b
706 jexec two ifconfig ${two}b 192.0.2.3/24 up
707 jexec two ifconfig lo0 127.0.0.1/8 up
708 jexec two ifconfig lo0 inet alias 203.0.113.1/24
711 atf_check -s exit:0 -o ignore jexec one ping -c 1 192.0.2.1
712 atf_check -s exit:0 -o ignore jexec two ping -c 1 192.0.2.1
718 dev-type tun
721 cipher AES-256-GCM
735 duplicate-cn
736 script-security 2
737 auth-user-pass-verify /usr/bin/true via-env
742 client-config-dir $(atf_get_srcdir)/ccd
746 dev-type tun
751 auth-user-pass $(atf_get_srcdir)/user.pass
760 ovpn_start two "
762 dev-type tun
767 auth-user-pass $(atf_get_srcdir)/user.pass
780 atf_check -s exit:0 -o ignore jexec one ping -c 3 198.51.100.1
781 atf_check -s exit:0 -o ignore jexec two ping -c 3 198.51.100.1
783 # Client-to-client communication
784 atf_check -s exit:0 -o ignore jexec one ping -c 3 198.51.100.3
785 atf_check -s exit:0 -o ignore jexec two ping -c 3 198.51.100.2
788 atf_check -s exit:0 -o ignore jexec one ping -c 3 203.0.113.1
799 atf_set descr "Test pf's route-to with OpenVPN tunnels"
800 atf_set require.user root
819 atf_check -s exit:0 -o ignore jexec a ping -c 1 192.0.2.2
823 dev-type tun
826 cipher AES-256-GCM
837 script-security 2
838 auth-user-pass-verify /usr/bin/true via-env
845 dev-type tun
850 auth-user-pass $(atf_get_srcdir)/user.pass
865 atf_check -s exit:0 -o ignore jexec b ping -c 1 -S 198.51.100.2 198.51.100.1
866 atf_check -s exit:0 -o ignore jexec b ping -c 1 -S 198.51.100.2 198.51.100.254
868 # Break our route to .254 so that we need a route-to to make things work.
870 jexec b route add 198.51.100.254 -interface ${n}a
873 atf_check -s exit:2 -o ignore jexec b ping -c 1 -S 198.51.100.2 198.51.100.254
875 jexec b pfctl -e
877 "pass out route-to (tun0 198.51.100.1) proto icmp from 198.51.100.2 "
878 atf_check -s exit:0 -o ignore jexec b ping -c 3 -S 198.51.100.2 198.51.100.254
891 atf_set require.user root
904 two=$(vnet_mkepair)
912 ifconfig ${two}a up
913 ifconfig ${bridge} addm ${two}a
926 vnet_mkjail two ${two}b
927 jexec two ifconfig lo0 inet 127.0.0.1/8 up
928 jexec two ifconfig ${two}b 192.0.2.3/24 up
931 atf_check -s exit:0 -o ignore jexec one ping -c 1 192.0.2.1
932 atf_check -s exit:0 -o ignore jexec two ping -c 1 192.0.2.1
933 atf_check -s exit:0 -o ignore jexec srv ping -c 1 203.0.113.2
939 dev-type tun
942 cipher AES-256-GCM
956 duplicate-cn
957 script-security 2
958 auth-user-pass-verify /usr/bin/true via-env
965 dev-type tun
970 auth-user-pass $(atf_get_srcdir)/user.pass
980 ovpn_start two "
982 dev-type tun
987 auth-user-pass $(atf_get_srcdir)/user.pass
1000 atf_check -s exit:0 -o ignore jexec one ping -c 1 198.51.100.1
1001 atf_check -s exit:0 -o ignore jexec two ping -c 1 198.51.100.1
1003 # Client-to-client communication
1004 atf_check -s exit:0 -o ignore jexec one ping -c 1 198.51.100.3
1005 atf_check -s exit:0 -o ignore jexec one ping -c 1 198.51.100.2
1006 atf_check -s exit:0 -o ignore jexec two ping -c 1 198.51.100.2
1007 atf_check -s exit:0 -o ignore jexec two ping -c 1 198.51.100.3
1010 atf_check -s exit:0 -o ignore jexec one ping -c 1 203.0.113.1
1011 atf_check -s exit:0 -o ignore jexec two ping -c 1 203.0.113.1
1013 atf_check -s exit:0 -o ignore jexec srv ping -c 1 -S 203.0.113.1 198.51.100.2
1014 atf_check -s exit:0 -o ignore jexec srv ping -c 1 -S 203.0.113.1 198.51.100.3
1016 atf_check -s exit:0 -o ignore jexec one ping -c 1 203.0.113.2
1017 atf_check -s exit:0 -o ignore jexec two ping -c 1 203.0.113.2
1019 atf_check -s exit:0 -o ignore jexec lan ping -c 1 198.51.100.1
1020 atf_check -s exit:0 -o ignore jexec lan ping -c 1 198.51.100.2
1021 atf_check -s exit:0 -o ignore jexec lan ping -c 1 198.51.100.3
1022 atf_check -s exit:2 -o ignore jexec lan ping -c 1 198.51.100.4
1044 atf_check -s exit:0 -o ignore jexec a ping -c 1 192.0.2.2
1048 dev-type tun
1052 data-ciphers ${algo}
1063 script-security 2
1064 auth-user-pass-verify /usr/bin/true via-env
1071 dev-type tun
1076 data-ciphers ${algo}
1079 auth-user-pass $(atf_get_srcdir)/user.pass
1092 atf_check -s exit:0 -o ignore jexec b ping -c 3 198.51.100.1
1099 atf_set require.user root
1105 ovpn_algo_body CHACHA20-POLY1305
1116 atf_set descr 'Test DCO with AES-128-GCM'
1117 atf_set require.user root
1123 ovpn_algo_body AES-128-GCM
1135 atf_set require.user root
1143 atf_check -s exit:0 \
1156 atf_set require.user root
1174 atf_check -s exit:0 -o ignore jexec b ping -c 1 192.0.2.1
1175 atf_check -s exit:0 -o ignore jexec b ping -c 1 192.0.2.2
1179 dev-type tun
1182 cipher AES-256-GCM
1193 script-security 2
1194 auth-user-pass-verify /usr/bin/true via-env
1201 dev-type tun
1206 auth-user-pass $(atf_get_srcdir)/user.pass
1218 jexec b pfctl -e
1226 atf_check -s exit:0 -o ignore jexec b ping -c 3 198.51.100.1
1238 atf_set require.user root
1255 atf_check -s exit:0 -o ignore jexec b ping6 -c 1 2001:db8::1
1256 atf_check -s exit:0 -o ignore jexec b ping6 -c 1 2001:db8::2
1260 dev-type tun
1263 cipher AES-256-GCM
1267 server-ipv6 2001:db8:1::/64
1275 script-security 2
1276 auth-user-pass-verify /usr/bin/true via-env
1283 dev-type tun
1288 auth-user-pass $(atf_get_srcdir)/user.pass
1300 jexec b pfctl -e
1308 atf_check -s exit:0 -o ignore jexec b ping6 -c 3 2001:db8:1::1
1309 atf_check -s exit:0 -o ignore jexec b ping6 -c 3 -z 16 2001:db8:1::1
1321 atf_set require.user root
1337 atf_check -s exit:0 -o ignore jexec a ping -c 1 192.0.2.2
1341 dev-type tun
1344 cipher AES-256-GCM
1355 script-security 2
1356 auth-user-pass-verify /usr/bin/true via-env
1365 dev-type tun
1370 auth-user-pass $(atf_get_srcdir)/user.pass
1383 atf_check -s exit:0 -o ignore jexec b ping -c 3 198.51.100.1
1386 if ! echo "status" | jexec a nc -N 192.0.2.1 1234 | grep 192.0.2.2; then
1397 if ! echo "status" | jexec a nc -N 192.0.2.1 1234 | grep 192.0.2.3; then