xref: /freebsd/tests/sys/netpfil/pf/killstate.sh (revision c2e11d81d295f7d55ac8b6858b09d8fa123cbfe8)
1065b5c7fSKristof Provost# $FreeBSD$
2065b5c7fSKristof Provost#
3065b5c7fSKristof Provost# SPDX-License-Identifier: BSD-2-Clause-FreeBSD
4065b5c7fSKristof Provost#
5065b5c7fSKristof Provost# Copyright (c) 2021 Rubicon Communications, LLC (Netgate)
6065b5c7fSKristof Provost#
7065b5c7fSKristof Provost# Redistribution and use in source and binary forms, with or without
8065b5c7fSKristof Provost# modification, are permitted provided that the following conditions
9065b5c7fSKristof Provost# are met:
10065b5c7fSKristof Provost# 1. Redistributions of source code must retain the above copyright
11065b5c7fSKristof Provost#    notice, this list of conditions and the following disclaimer.
12065b5c7fSKristof Provost# 2. Redistributions in binary form must reproduce the above copyright
13065b5c7fSKristof Provost#    notice, this list of conditions and the following disclaimer in the
14065b5c7fSKristof Provost#    documentation and/or other materials provided with the distribution.
15065b5c7fSKristof Provost#
16065b5c7fSKristof Provost# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
17065b5c7fSKristof Provost# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18065b5c7fSKristof Provost# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19065b5c7fSKristof Provost# ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
20065b5c7fSKristof Provost# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21065b5c7fSKristof Provost# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22065b5c7fSKristof Provost# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23065b5c7fSKristof Provost# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24065b5c7fSKristof Provost# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25065b5c7fSKristof Provost# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26065b5c7fSKristof Provost# SUCH DAMAGE.
27065b5c7fSKristof Provost
28065b5c7fSKristof Provost. $(atf_get_srcdir)/utils.subr
29065b5c7fSKristof Provost
30065b5c7fSKristof Provostcommon_dir=$(atf_get_srcdir)/../common
31065b5c7fSKristof Provost
32065b5c7fSKristof Provostatf_test_case "v4" "cleanup"
33065b5c7fSKristof Provostv4_head()
34065b5c7fSKristof Provost{
35065b5c7fSKristof Provost	atf_set descr 'Test killing states by IPv4 address'
36065b5c7fSKristof Provost	atf_set require.user root
37065b5c7fSKristof Provost	atf_set require.progs scapy
38065b5c7fSKristof Provost}
39065b5c7fSKristof Provost
40065b5c7fSKristof Provostv4_body()
41065b5c7fSKristof Provost{
42065b5c7fSKristof Provost	pft_init
43065b5c7fSKristof Provost
44065b5c7fSKristof Provost	epair=$(vnet_mkepair)
45065b5c7fSKristof Provost	ifconfig ${epair}a 192.0.2.1/24 up
46065b5c7fSKristof Provost
47065b5c7fSKristof Provost	vnet_mkjail alcatraz ${epair}b
48065b5c7fSKristof Provost	jexec alcatraz ifconfig ${epair}b 192.0.2.2/24 up
49065b5c7fSKristof Provost	jexec alcatraz pfctl -e
50065b5c7fSKristof Provost
51065b5c7fSKristof Provost	pft_set_rules alcatraz "block all" \
52065b5c7fSKristof Provost		"pass in proto icmp"
53065b5c7fSKristof Provost
54065b5c7fSKristof Provost	# Sanity check & establish state
55065b5c7fSKristof Provost	# Note: use pft_ping so we always use the same ID, so pf considers all
56065b5c7fSKristof Provost	# echo requests part of the same flow.
57065b5c7fSKristof Provost	atf_check -s exit:0 -o ignore ${common_dir}/pft_ping.py \
58065b5c7fSKristof Provost		--sendif ${epair}a \
59065b5c7fSKristof Provost		--to 192.0.2.2 \
60065b5c7fSKristof Provost		--replyif ${epair}a
61065b5c7fSKristof Provost
62065b5c7fSKristof Provost	# Change rules to now deny the ICMP traffic
63065b5c7fSKristof Provost	pft_set_rules noflush alcatraz "block all"
64065b5c7fSKristof Provost
65065b5c7fSKristof Provost	# Established state means we can still ping alcatraz
66065b5c7fSKristof Provost	atf_check -s exit:0 -o ignore ${common_dir}/pft_ping.py \
67065b5c7fSKristof Provost		--sendif ${epair}a \
68065b5c7fSKristof Provost		--to 192.0.2.2 \
69065b5c7fSKristof Provost		--replyif ${epair}a
70065b5c7fSKristof Provost
71065b5c7fSKristof Provost	# Killing with the wrong IP doesn't affect our state
72065b5c7fSKristof Provost	jexec alcatraz pfctl -k 192.0.2.3
73065b5c7fSKristof Provost
74065b5c7fSKristof Provost	# So we can still ping
75065b5c7fSKristof Provost	atf_check -s exit:0 -o ignore ${common_dir}/pft_ping.py \
76065b5c7fSKristof Provost		--sendif ${epair}a \
77065b5c7fSKristof Provost		--to 192.0.2.2 \
78065b5c7fSKristof Provost		--replyif ${epair}a
79065b5c7fSKristof Provost
80065b5c7fSKristof Provost	# Killing with one correct address and one incorrect doesn't kill the state
81065b5c7fSKristof Provost	jexec alcatraz pfctl -k 192.0.2.1 -k 192.0.2.3
82065b5c7fSKristof Provost
83065b5c7fSKristof Provost	# So we can still ping
84065b5c7fSKristof Provost	atf_check -s exit:0 -o ignore ${common_dir}/pft_ping.py \
85065b5c7fSKristof Provost		--sendif ${epair}a \
86065b5c7fSKristof Provost		--to 192.0.2.2 \
87065b5c7fSKristof Provost		--replyif ${epair}a
88065b5c7fSKristof Provost
89065b5c7fSKristof Provost	# Killing with correct address does remove the state
90065b5c7fSKristof Provost	jexec alcatraz pfctl -k 192.0.2.1
91065b5c7fSKristof Provost
92065b5c7fSKristof Provost	# Now the ping fails
93065b5c7fSKristof Provost	atf_check -s exit:1 -o ignore ${common_dir}/pft_ping.py \
94065b5c7fSKristof Provost		--sendif ${epair}a \
95065b5c7fSKristof Provost		--to 192.0.2.2 \
96065b5c7fSKristof Provost		--replyif ${epair}a
97065b5c7fSKristof Provost}
98065b5c7fSKristof Provost
99065b5c7fSKristof Provostv4_cleanup()
100065b5c7fSKristof Provost{
101065b5c7fSKristof Provost	pft_cleanup
102065b5c7fSKristof Provost}
103065b5c7fSKristof Provost
1049af23174SKristof Provostatf_test_case "v6" "cleanup"
1059af23174SKristof Provostv6_head()
1069af23174SKristof Provost{
1079af23174SKristof Provost	atf_set descr 'Test killing states by IPv6 address'
1089af23174SKristof Provost	atf_set require.user root
1099af23174SKristof Provost	atf_set require.progs scapy
1109af23174SKristof Provost}
1119af23174SKristof Provost
1129af23174SKristof Provostv6_body()
1139af23174SKristof Provost{
1149af23174SKristof Provost	pft_init
1159af23174SKristof Provost
1169af23174SKristof Provost	epair=$(vnet_mkepair)
1179af23174SKristof Provost	ifconfig ${epair}a inet6 2001:db8::1/64 up no_dad
1189af23174SKristof Provost
1199af23174SKristof Provost	vnet_mkjail alcatraz ${epair}b
1209af23174SKristof Provost	jexec alcatraz ifconfig ${epair}b inet6 2001:db8::2/64 up no_dad
1219af23174SKristof Provost	jexec alcatraz pfctl -e
1229af23174SKristof Provost
1239af23174SKristof Provost	pft_set_rules alcatraz "block all" \
1249af23174SKristof Provost		"pass in proto icmp6"
1259af23174SKristof Provost
1269af23174SKristof Provost	# Sanity check & establish state
1279af23174SKristof Provost	# Note: use pft_ping so we always use the same ID, so pf considers all
1289af23174SKristof Provost	# echo requests part of the same flow.
1299af23174SKristof Provost	atf_check -s exit:0 -o ignore ${common_dir}/pft_ping.py \
1309af23174SKristof Provost		--ip6 \
1319af23174SKristof Provost		--sendif ${epair}a \
1329af23174SKristof Provost		--to 2001:db8::2 \
1339af23174SKristof Provost		--replyif ${epair}a
1349af23174SKristof Provost
1359af23174SKristof Provost	# Change rules to now deny the ICMP traffic
1369af23174SKristof Provost	pft_set_rules noflush alcatraz "block all"
1379af23174SKristof Provost
1389af23174SKristof Provost	# Established state means we can still ping alcatraz
1399af23174SKristof Provost	atf_check -s exit:0 -o ignore ${common_dir}/pft_ping.py \
1409af23174SKristof Provost		--ip6 \
1419af23174SKristof Provost		--sendif ${epair}a \
1429af23174SKristof Provost		--to 2001:db8::2 \
1439af23174SKristof Provost		--replyif ${epair}a
1449af23174SKristof Provost
1459af23174SKristof Provost	# Killing with the wrong IP doesn't affect our state
1469af23174SKristof Provost	jexec alcatraz pfctl -k 2001:db8::3
1479af23174SKristof Provost	atf_check -s exit:0 -o ignore ${common_dir}/pft_ping.py \
1489af23174SKristof Provost		--ip6 \
1499af23174SKristof Provost		--sendif ${epair}a \
1509af23174SKristof Provost		--to 2001:db8::2 \
1519af23174SKristof Provost		--replyif ${epair}a
1529af23174SKristof Provost
1539af23174SKristof Provost	# Killing with one correct address and one incorrect doesn't kill the state
1549af23174SKristof Provost	jexec alcatraz pfctl -k 2001:db8::1 -k 2001:db8::3
1559af23174SKristof Provost	atf_check -s exit:0 -o ignore ${common_dir}/pft_ping.py \
1569af23174SKristof Provost		--ip6 \
1579af23174SKristof Provost		--sendif ${epair}a \
1589af23174SKristof Provost		--to 2001:db8::2 \
1599af23174SKristof Provost		--replyif ${epair}a
1609af23174SKristof Provost
1619af23174SKristof Provost	# Killing with correct address does remove the state
1629af23174SKristof Provost	jexec alcatraz pfctl -k 2001:db8::1
1639af23174SKristof Provost	atf_check -s exit:1 -o ignore ${common_dir}/pft_ping.py \
1649af23174SKristof Provost		--ip6 \
1659af23174SKristof Provost		--sendif ${epair}a \
1669af23174SKristof Provost		--to 2001:db8::2 \
1679af23174SKristof Provost		--replyif ${epair}a
1689af23174SKristof Provost
1699af23174SKristof Provost}
1709af23174SKristof Provost
1719af23174SKristof Provostv6_cleanup()
1729af23174SKristof Provost{
1739af23174SKristof Provost	pft_cleanup
1749af23174SKristof Provost}
1759af23174SKristof Provost
176065b5c7fSKristof Provostatf_test_case "label" "cleanup"
177065b5c7fSKristof Provostlabel_head()
178065b5c7fSKristof Provost{
179065b5c7fSKristof Provost	atf_set descr 'Test killing states by label'
180065b5c7fSKristof Provost	atf_set require.user root
181065b5c7fSKristof Provost	atf_set require.progs scapy
182065b5c7fSKristof Provost}
183065b5c7fSKristof Provost
184065b5c7fSKristof Provostlabel_body()
185065b5c7fSKristof Provost{
186065b5c7fSKristof Provost	pft_init
187065b5c7fSKristof Provost
188065b5c7fSKristof Provost	epair=$(vnet_mkepair)
189065b5c7fSKristof Provost	ifconfig ${epair}a 192.0.2.1/24 up
190065b5c7fSKristof Provost
191065b5c7fSKristof Provost	vnet_mkjail alcatraz ${epair}b
192065b5c7fSKristof Provost	jexec alcatraz ifconfig ${epair}b 192.0.2.2/24 up
193065b5c7fSKristof Provost	jexec alcatraz pfctl -e
194065b5c7fSKristof Provost
195065b5c7fSKristof Provost	pft_set_rules alcatraz "block all" \
196065b5c7fSKristof Provost		"pass in proto tcp label bar" \
197065b5c7fSKristof Provost		"pass in proto icmp label foo"
198065b5c7fSKristof Provost
199065b5c7fSKristof Provost	# Sanity check & establish state
200065b5c7fSKristof Provost	# Note: use pft_ping so we always use the same ID, so pf considers all
201065b5c7fSKristof Provost	# echo requests part of the same flow.
202065b5c7fSKristof Provost	atf_check -s exit:0 -o ignore ${common_dir}/pft_ping.py \
203065b5c7fSKristof Provost		--sendif ${epair}a \
204065b5c7fSKristof Provost		--to 192.0.2.2 \
205065b5c7fSKristof Provost		--replyif ${epair}a
206065b5c7fSKristof Provost
207065b5c7fSKristof Provost	# Change rules to now deny the ICMP traffic
208065b5c7fSKristof Provost	pft_set_rules noflush alcatraz "block all"
209065b5c7fSKristof Provost
210065b5c7fSKristof Provost	# Established state means we can still ping alcatraz
211065b5c7fSKristof Provost	atf_check -s exit:0 -o ignore ${common_dir}/pft_ping.py \
212065b5c7fSKristof Provost		--sendif ${epair}a \
213065b5c7fSKristof Provost		--to 192.0.2.2 \
214065b5c7fSKristof Provost		--replyif ${epair}a
215065b5c7fSKristof Provost
216065b5c7fSKristof Provost	# Killing a label on a different rules keeps the state
217065b5c7fSKristof Provost	jexec alcatraz pfctl -k label -k bar
218065b5c7fSKristof Provost	atf_check -s exit:0 -o ignore ${common_dir}/pft_ping.py \
219065b5c7fSKristof Provost		--sendif ${epair}a \
220065b5c7fSKristof Provost		--to 192.0.2.2 \
221065b5c7fSKristof Provost		--replyif ${epair}a
222065b5c7fSKristof Provost
223065b5c7fSKristof Provost	# Killing a non-existing label keeps the state
224065b5c7fSKristof Provost	jexec alcatraz pfctl -k label -k baz
225065b5c7fSKristof Provost	atf_check -s exit:0 -o ignore ${common_dir}/pft_ping.py \
226065b5c7fSKristof Provost		--sendif ${epair}a \
227065b5c7fSKristof Provost		--to 192.0.2.2 \
228065b5c7fSKristof Provost		--replyif ${epair}a
229065b5c7fSKristof Provost
230065b5c7fSKristof Provost	# Killing the correct label kills the state
231065b5c7fSKristof Provost	jexec alcatraz pfctl -k label -k foo
232065b5c7fSKristof Provost	atf_check -s exit:1 -o ignore ${common_dir}/pft_ping.py \
233065b5c7fSKristof Provost		--sendif ${epair}a \
234065b5c7fSKristof Provost		--to 192.0.2.2 \
235065b5c7fSKristof Provost		--replyif ${epair}a
236065b5c7fSKristof Provost}
237065b5c7fSKristof Provost
238065b5c7fSKristof Provostlabel_cleanup()
239065b5c7fSKristof Provost{
240065b5c7fSKristof Provost	pft_cleanup
241065b5c7fSKristof Provost}
242065b5c7fSKristof Provost
2435632f585SKristof Provostatf_test_case "multilabel" "cleanup"
2445632f585SKristof Provostmultilabel_head()
2455632f585SKristof Provost{
2465632f585SKristof Provost	atf_set descr 'Test killing states with multiple labels by label'
2475632f585SKristof Provost	atf_set require.user root
2485632f585SKristof Provost	atf_set require.progs scapy
2495632f585SKristof Provost}
2505632f585SKristof Provost
2515632f585SKristof Provostmultilabel_body()
2525632f585SKristof Provost{
2535632f585SKristof Provost	pft_init
2545632f585SKristof Provost
2555632f585SKristof Provost	epair=$(vnet_mkepair)
2565632f585SKristof Provost	ifconfig ${epair}a 192.0.2.1/24 up
2575632f585SKristof Provost
2585632f585SKristof Provost	vnet_mkjail alcatraz ${epair}b
2595632f585SKristof Provost	jexec alcatraz ifconfig ${epair}b 192.0.2.2/24 up
2605632f585SKristof Provost	jexec alcatraz pfctl -e
2615632f585SKristof Provost
2625632f585SKristof Provost	pft_set_rules alcatraz "block all" \
2635632f585SKristof Provost		"pass in proto icmp label foo label bar"
2645632f585SKristof Provost
2655632f585SKristof Provost	# Sanity check & establish state
2665632f585SKristof Provost	# Note: use pft_ping so we always use the same ID, so pf considers all
2675632f585SKristof Provost	# echo requests part of the same flow.
2685632f585SKristof Provost	atf_check -s exit:0 -o ignore ${common_dir}/pft_ping.py \
2695632f585SKristof Provost		--sendif ${epair}a \
2705632f585SKristof Provost		--to 192.0.2.2 \
2715632f585SKristof Provost		--replyif ${epair}a
2725632f585SKristof Provost
2735632f585SKristof Provost	# Change rules to now deny the ICMP traffic
2745632f585SKristof Provost	pft_set_rules noflush alcatraz "block all"
2755632f585SKristof Provost
2765632f585SKristof Provost	# Established state means we can still ping alcatraz
2775632f585SKristof Provost	atf_check -s exit:0 -o ignore ${common_dir}/pft_ping.py \
2785632f585SKristof Provost		--sendif ${epair}a \
2795632f585SKristof Provost		--to 192.0.2.2 \
2805632f585SKristof Provost		--replyif ${epair}a
2815632f585SKristof Provost
2825632f585SKristof Provost	# Killing a label on a different rules keeps the state
2835632f585SKristof Provost	jexec alcatraz pfctl -k label -k baz
2845632f585SKristof Provost	atf_check -s exit:0 -o ignore ${common_dir}/pft_ping.py \
2855632f585SKristof Provost		--sendif ${epair}a \
2865632f585SKristof Provost		--to 192.0.2.2 \
2875632f585SKristof Provost		--replyif ${epair}a
2885632f585SKristof Provost
2895632f585SKristof Provost	# Killing the state with the last label works
2905632f585SKristof Provost	jexec alcatraz pfctl -k label -k bar
2915632f585SKristof Provost	atf_check -s exit:1 -o ignore ${common_dir}/pft_ping.py \
2925632f585SKristof Provost		--sendif ${epair}a \
2935632f585SKristof Provost		--to 192.0.2.2 \
2945632f585SKristof Provost		--replyif ${epair}a
2955632f585SKristof Provost
2965632f585SKristof Provost	pft_set_rules alcatraz "block all" \
2975632f585SKristof Provost		"pass in proto icmp label foo label bar"
2985632f585SKristof Provost
2995632f585SKristof Provost	# Reestablish state
3005632f585SKristof Provost	atf_check -s exit:0 -o ignore ${common_dir}/pft_ping.py \
3015632f585SKristof Provost		--sendif ${epair}a \
3025632f585SKristof Provost		--to 192.0.2.2 \
3035632f585SKristof Provost		--replyif ${epair}a
3045632f585SKristof Provost
3055632f585SKristof Provost	# Change rules to now deny the ICMP traffic
3065632f585SKristof Provost	pft_set_rules noflush alcatraz "block all"
3075632f585SKristof Provost
3085632f585SKristof Provost	# Killing with the first label works too
3095632f585SKristof Provost	jexec alcatraz pfctl -k label -k foo
3105632f585SKristof Provost	atf_check -s exit:1 -o ignore ${common_dir}/pft_ping.py \
3115632f585SKristof Provost		--sendif ${epair}a \
3125632f585SKristof Provost		--to 192.0.2.2 \
3135632f585SKristof Provost		--replyif ${epair}a
3145632f585SKristof Provost}
3155632f585SKristof Provost
3165632f585SKristof Provostmultilabel_cleanup()
3175632f585SKristof Provost{
3185632f585SKristof Provost	pft_cleanup
3195632f585SKristof Provost}
3205632f585SKristof Provost
321*c2e11d81SKristof Provostatf_test_case "gateway" "cleanup"
322*c2e11d81SKristof Provostgateway_head()
323*c2e11d81SKristof Provost{
324*c2e11d81SKristof Provost	atf_set descr 'Test killing states by route-to/reply-to address'
325*c2e11d81SKristof Provost	atf_set require.user root
326*c2e11d81SKristof Provost	atf_set require.progs scapy
327*c2e11d81SKristof Provost}
328*c2e11d81SKristof Provost
329*c2e11d81SKristof Provostgateway_body()
330*c2e11d81SKristof Provost{
331*c2e11d81SKristof Provost	pft_init
332*c2e11d81SKristof Provost
333*c2e11d81SKristof Provost	epair=$(vnet_mkepair)
334*c2e11d81SKristof Provost	ifconfig ${epair}a 192.0.2.1/24 up
335*c2e11d81SKristof Provost
336*c2e11d81SKristof Provost	vnet_mkjail alcatraz ${epair}b
337*c2e11d81SKristof Provost	jexec alcatraz ifconfig ${epair}b 192.0.2.2/24 up
338*c2e11d81SKristof Provost	jexec alcatraz pfctl -e
339*c2e11d81SKristof Provost
340*c2e11d81SKristof Provost	pft_set_rules alcatraz "block all" \
341*c2e11d81SKristof Provost		"pass in reply-to (${epair}b 192.0.2.1) proto icmp"
342*c2e11d81SKristof Provost
343*c2e11d81SKristof Provost	# Sanity check & establish state
344*c2e11d81SKristof Provost	# Note: use pft_ping so we always use the same ID, so pf considers all
345*c2e11d81SKristof Provost	# echo requests part of the same flow.
346*c2e11d81SKristof Provost	atf_check -s exit:0 -o ignore ${common_dir}/pft_ping.py \
347*c2e11d81SKristof Provost		--sendif ${epair}a \
348*c2e11d81SKristof Provost		--to 192.0.2.2 \
349*c2e11d81SKristof Provost		--replyif ${epair}a
350*c2e11d81SKristof Provost
351*c2e11d81SKristof Provost	# Change rules to now deny the ICMP traffic
352*c2e11d81SKristof Provost	pft_set_rules noflush alcatraz "block all"
353*c2e11d81SKristof Provost
354*c2e11d81SKristof Provost	# Established state means we can still ping alcatraz
355*c2e11d81SKristof Provost	atf_check -s exit:0 -o ignore ${common_dir}/pft_ping.py \
356*c2e11d81SKristof Provost		--sendif ${epair}a \
357*c2e11d81SKristof Provost		--to 192.0.2.2 \
358*c2e11d81SKristof Provost		--replyif ${epair}a
359*c2e11d81SKristof Provost
360*c2e11d81SKristof Provost	# Killing with a different gateway does not affect our state
361*c2e11d81SKristof Provost	jexec alcatraz pfctl -k gateway -k 192.0.2.2
362*c2e11d81SKristof Provost	atf_check -s exit:0 -o ignore ${common_dir}/pft_ping.py \
363*c2e11d81SKristof Provost		--sendif ${epair}a \
364*c2e11d81SKristof Provost		--to 192.0.2.2 \
365*c2e11d81SKristof Provost		--replyif ${epair}a
366*c2e11d81SKristof Provost
367*c2e11d81SKristof Provost	# Killing states with the relevant gateway does terminate our state
368*c2e11d81SKristof Provost	jexec alcatraz pfctl -k gateway -k 192.0.2.1
369*c2e11d81SKristof Provost	atf_check -s exit:1 -o ignore ${common_dir}/pft_ping.py \
370*c2e11d81SKristof Provost		--sendif ${epair}a \
371*c2e11d81SKristof Provost		--to 192.0.2.2 \
372*c2e11d81SKristof Provost		--replyif ${epair}a
373*c2e11d81SKristof Provost}
374*c2e11d81SKristof Provost
375*c2e11d81SKristof Provostgateway_cleanup()
376*c2e11d81SKristof Provost{
377*c2e11d81SKristof Provost	pft_cleanup
378*c2e11d81SKristof Provost}
379*c2e11d81SKristof Provost
380065b5c7fSKristof Provostatf_init_test_cases()
381065b5c7fSKristof Provost{
382065b5c7fSKristof Provost	atf_add_test_case "v4"
3839af23174SKristof Provost	atf_add_test_case "v6"
384065b5c7fSKristof Provost	atf_add_test_case "label"
3855632f585SKristof Provost	atf_add_test_case "multilabel"
386*c2e11d81SKristof Provost	atf_add_test_case "gateway"
387065b5c7fSKristof Provost}
388