diff options
author | Jan Gelety <jgelety@cisco.com> | 2019-10-30 04:52:03 +0100 |
---|---|---|
committer | Peter Mikus <pmikus@cisco.com> | 2019-11-11 11:51:40 +0000 |
commit | a4cad14b7e0b7e94f9e80b1a45cd86b3bc09d0a0 (patch) | |
tree | 9ec0286524c2335dd526586c197ed333dbd7c4f4 /tests/vpp/device/crypto | |
parent | d5e00a369ffef5edf929ef5b03b7c544021b2e41 (diff) |
FIX: do not use ping in vpp-device tests
Change-Id: Ic11f863e7ffad70d45e6e8dc39c70efc62cecc96
Signed-off-by: Jan Gelety <jgelety@cisco.com>
Diffstat (limited to 'tests/vpp/device/crypto')
4 files changed, 32 insertions, 28 deletions
diff --git a/tests/vpp/device/crypto/eth2p-ethip4ipsec1tnlsw-ip4base-policy-aes-128-cbc-sha-512-256-dev.robot b/tests/vpp/device/crypto/eth2p-ethip4ipsec1tnlsw-ip4base-policy-aes-128-cbc-sha-512-256-dev.robot index 72ba5935ff..f8be1944ee 100644 --- a/tests/vpp/device/crypto/eth2p-ethip4ipsec1tnlsw-ip4base-policy-aes-128-cbc-sha-512-256-dev.robot +++ b/tests/vpp/device/crypto/eth2p-ethip4ipsec1tnlsw-ip4base-policy-aes-128-cbc-sha-512-256-dev.robot @@ -45,10 +45,11 @@ | ${tg_spi}= | ${1000} | ${dut_spi}= | ${1001} | ${ESP_PROTO}= | ${50} -| ${tg_if_ip4}= | 192.168.100.2 -| ${dut_if_ip4}= | 192.168.100.3 -| ${tg_lo_ip4}= | 192.168.3.3 -| ${dut_lo_ip4}= | 192.168.4.4 +| ${tg_if1_ip4}= | 192.168.100.2 +| ${tg_if2_ip4}= | 192.168.4.4 +| ${dut_if1_ip4}= | 192.168.100.3 +| ${dut_if2_ip4}= | 192.168.4.3 +| ${tg_host_ip4}= | 192.168.3.3 | ${ip4_plen}= | ${24} *** Keywords *** @@ -81,12 +82,12 @@ | | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Configure manual keyed connection for IPSec | | ... | ${dut1} | ${dut1_if1} | ${encr_alg} | ${encr_key} | ${auth_alg} -| | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_src_ip} | ${tg_src_ip} +| | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${tg_dst_ip} | ${tg_src_ip} | | ... | ${dut_tun_ip} | ${tg_tun_ip} | | Then Send IPsec Packet and verify ESP encapsulation in received packet -| | ... | ${tg} | ${tg_if1} | ${dut1_if1_mac} +| | ... | ${tg} | ${tg_if1} | ${tg_if2} | ${dut1_if1_mac} | ${dut1_if2_mac} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${tg_spi} -| | ... | ${dut_spi} | ${tg_src_ip} | ${dut_src_ip} | ${tg_tun_ip} +| | ... | ${dut_spi} | ${tg_src_ip} | ${tg_dst_ip} | ${tg_tun_ip} | | ... | ${dut_tun_ip} *** Test Cases *** diff --git a/tests/vpp/device/crypto/eth2p-ethip4ipsec1tptsw-ip4base-policy-aes-128-cbc-sha-512-256-dev.robot b/tests/vpp/device/crypto/eth2p-ethip4ipsec1tptsw-ip4base-policy-aes-128-cbc-sha-512-256-dev.robot index 84b38364e6..26f19cb5e5 100644 --- a/tests/vpp/device/crypto/eth2p-ethip4ipsec1tptsw-ip4base-policy-aes-128-cbc-sha-512-256-dev.robot +++ b/tests/vpp/device/crypto/eth2p-ethip4ipsec1tptsw-ip4base-policy-aes-128-cbc-sha-512-256-dev.robot @@ -45,10 +45,11 @@ | ${tg_spi}= | ${1000} | ${dut_spi}= | ${1001} | ${ESP_PROTO}= | ${50} -| ${tg_if_ip4}= | 192.168.100.2 -| ${dut_if_ip4}= | 192.168.100.3 -| ${tg_lo_ip4}= | 192.168.3.3 -| ${dut_lo_ip4}= | 192.168.4.4 +| ${tg_if1_ip4}= | 192.168.100.2 +| ${tg_if2_ip4}= | 192.168.4.4 +| ${dut_if1_ip4}= | 192.168.100.3 +| ${dut_if2_ip4}= | 192.168.4.3 +| ${tg_host_ip4}= | 192.168.3.3 | ${ip4_plen}= | ${24} *** Keywords *** @@ -81,11 +82,11 @@ | | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Configure manual keyed connection for IPSec | | ... | ${dut1} | ${dut1_if1} | ${encr_alg} | ${encr_key} | ${auth_alg} -| | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${tg_dst_ip} | ${tg_src_ip} | | Then Send IPsec Packet and verify ESP encapsulation in received packet -| | ... | ${tg} | ${tg_if1} | ${dut1_if1_mac} +| | ... | ${tg} | ${tg_if1} | ${tg_if2} | ${dut1_if1_mac} | ${dut1_if2_mac} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${tg_spi} -| | ... | ${dut_spi} | ${tg_tun_ip} | ${dut_tun_ip} +| | ... | ${dut_spi} | ${tg_src_ip} | ${tg_dst_ip} *** Test Cases *** | tc01-110B-ethip4ipsec1tptsw-ip4base-policy-aes-128-cbc-sha-512-256-dev diff --git a/tests/vpp/device/crypto/eth2p-ethip6ipsec1tnlsw-ip6base-policy-aes-128-cbc-sha-512-256-dev.robot b/tests/vpp/device/crypto/eth2p-ethip6ipsec1tnlsw-ip6base-policy-aes-128-cbc-sha-512-256-dev.robot index f3a8ba1e86..6fe272a5f4 100644 --- a/tests/vpp/device/crypto/eth2p-ethip6ipsec1tnlsw-ip6base-policy-aes-128-cbc-sha-512-256-dev.robot +++ b/tests/vpp/device/crypto/eth2p-ethip6ipsec1tnlsw-ip6base-policy-aes-128-cbc-sha-512-256-dev.robot @@ -45,10 +45,11 @@ | ${tg_spi}= | ${1000} | ${dut_spi}= | ${1001} | ${ESP_PROTO}= | ${50} -| ${tg_if_ip6}= | 3ffe:5f::1 -| ${dut_if_ip6}= | 3ffe:5f::2 -| ${tg_lo_ip6}= | 3ffe:60::3 -| ${dut_lo_ip6}= | 3ffe:60::4 +| ${tg_if1_ip6}= | 3ffe:5f::1 +| ${tg_if2_ip6}= | 3ffe:60::4 +| ${dut_if1_ip6}= | 3ffe:5f::2 +| ${dut_if2_ip6}= | 3ffe:60::3 +| ${tg_host_ip6}= | 3ffe:61::3 | ${ip6_plen}= | ${64} | ${ip6_plen_rt}= | ${128} @@ -82,12 +83,12 @@ | | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Configure manual keyed connection for IPSec | | ... | ${dut1} | ${dut1_if1} | ${encr_alg} | ${encr_key} | ${auth_alg} -| | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_src_ip} | ${tg_src_ip} +| | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${tg_dst_ip} | ${tg_src_ip} | | ... | ${dut_tun_ip} | ${tg_tun_ip} | is_ipv6=${TRUE} | | Then Send IPsec Packet and verify ESP encapsulation in received packet -| | ... | ${tg} | ${tg_if1} | ${dut1_if1_mac} +| | ... | ${tg} | ${tg_if1} | ${tg_if2} | ${dut1_if1_mac} | ${dut1_if2_mac} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${tg_spi} -| | ... | ${dut_spi} | ${tg_src_ip} | ${dut_src_ip} | ${tg_tun_ip} +| | ... | ${dut_spi} | ${tg_src_ip} | ${tg_dst_ip} | ${tg_tun_ip} | | ... | ${dut_tun_ip} *** Test Cases *** diff --git a/tests/vpp/device/crypto/eth2p-ethip6ipsec1tptsw-ip6base-policy-aes-128-cbc-sha-512-256-dev.robot b/tests/vpp/device/crypto/eth2p-ethip6ipsec1tptsw-ip6base-policy-aes-128-cbc-sha-512-256-dev.robot index 473cd001a9..342ce95005 100644 --- a/tests/vpp/device/crypto/eth2p-ethip6ipsec1tptsw-ip6base-policy-aes-128-cbc-sha-512-256-dev.robot +++ b/tests/vpp/device/crypto/eth2p-ethip6ipsec1tptsw-ip6base-policy-aes-128-cbc-sha-512-256-dev.robot @@ -45,10 +45,11 @@ | ${tg_spi}= | ${1000} | ${dut_spi}= | ${1001} | ${ESP_PROTO}= | ${50} -| ${tg_if_ip6}= | 3ffe:5f::1 -| ${dut_if_ip6}= | 3ffe:5f::2 -| ${tg_lo_ip6}= | 3ffe:60::3 -| ${dut_lo_ip6}= | 3ffe:60::4 +| ${tg_if1_ip6}= | 3ffe:5f::1 +| ${tg_if2_ip6}= | 3ffe:60::4 +| ${dut_if1_ip6}= | 3ffe:5f::2 +| ${dut_if2_ip6}= | 3ffe:60::3 +| ${tg_host_ip6}= | 3ffe:61::3 | ${ip6_plen}= | ${64} | ${ip6_plen_rt}= | ${128} @@ -82,12 +83,12 @@ | | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Configure manual keyed connection for IPSec | | ... | ${dut1} | ${dut1_if1} | ${encr_alg} | ${encr_key} | ${auth_alg} -| | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${tg_dst_ip} | ${tg_src_ip} | | ... | is_ipv6=${TRUE} | | Then Send IPsec Packet and verify ESP encapsulation in received packet -| | ... | ${tg} | ${tg_if1} | ${dut1_if1_mac} +| | ... | ${tg} | ${tg_if1} | ${tg_if2} | ${dut1_if1_mac} | ${dut1_if2_mac} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${tg_spi} -| | ... | ${dut_spi} | ${tg_tun_ip} | ${dut_tun_ip} +| | ... | ${dut_spi} | ${tg_src_ip} | ${tg_dst_ip} *** Test Cases *** | tc01-124B-ethip6ipsec1tptsw-ip6base-policy-aes-128-cbc-sha-512-256-dev |