diff options
author | Yulong Pei <yulong.pei@intel.com> | 2019-03-21 18:24:46 +0800 |
---|---|---|
committer | Jan Gelety <jgelety@cisco.com> | 2019-03-28 13:29:49 +0000 |
commit | af05b72edc65aaecd6efc635eef9902a32d247ee (patch) | |
tree | 3efa21558d0b4a026be28c812c99646a7aa5134c /tests/vpp/perf/crypto/10ge2p1x553-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr.robot | |
parent | fa7eba4ce1949e79a679ea1683d022596d89e496 (diff) |
Add ipsec crypto test for Denverton platform
add ipsec cryto test to support Denverton hardware crypto device C3xxx.
replace HW_cryptodev keyword to HW_DH895xcc or HW_C3xxx, or add more other
hardware crypto device type support in the future.
Change-Id: I181bca4095757fde7ca45ab3856273ac5930d902
Signed-off-by: Yulong Pei <yulong.pei@intel.com>
Diffstat (limited to 'tests/vpp/perf/crypto/10ge2p1x553-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr.robot')
-rw-r--r-- | tests/vpp/perf/crypto/10ge2p1x553-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr.robot | 162 |
1 files changed, 162 insertions, 0 deletions
diff --git a/tests/vpp/perf/crypto/10ge2p1x553-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr.robot b/tests/vpp/perf/crypto/10ge2p1x553-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr.robot new file mode 100644 index 0000000000..d7ff1dac04 --- /dev/null +++ b/tests/vpp/perf/crypto/10ge2p1x553-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr.robot @@ -0,0 +1,162 @@ +# Copyright (c) 2019 Cisco and/or its affiliates. +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at: +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +*** Settings *** +| Resource | resources/libraries/robot/performance/performance_setup.robot +| Resource | resources/libraries/robot/crypto/ipsec.robot +| ... +| Force Tags | 3_NODE_SINGLE_LINK_TOPO | PERFTEST | HW_ENV | MRR +| ... | IP4FWD | IPSEC | IPSECSW | IPSECTUN | NIC_Intel-X553 | BASE +| ... +| Suite Setup | Set up IPSec performance test suite | L3 | Intel-X553 +| ... | SW_cryptodev +| Suite Teardown | Tear down 3-node performance topology +| ... +| Test Setup | Set up performance test +| ... +| Test Teardown | Tear down performance mrr test +| ... +| Test Template | Local Template +| ... +| Documentation | *Raw results IPv4 IPsec tunnel mode performance test suite.* +| ... +| ... | *[Top] Network Topologies:* TG-DUT1-DUT2-TG 3-node circular topology +| ... | with single links between nodes. +| ... | *[Enc] Packet Encapsulations:* Eth-IPv4 on TG-DUTn, +| ... | Eth-IPv4-IPSec on DUT1-DUT2 +| ... | *[Cfg] DUT configuration:* DUT1 and DUT2 are configured with DPDK SW +| ... | crypto devices and multiple IPsec tunnels between them. +| ... | DUTs get IPv4 traffic from TG, encrypt it +| ... | and send to another DUT, where packets are decrypted and sent back to TG +| ... | *[Ver] TG verification:* In MaxReceivedRate test TG sends traffic +| ... | at line rate and reports total received/sent packets over trial period. +| ... | Test packets are generated by TG on +| ... | links to DUTs. TG traffic profile contains two L3 flow-groups +| ... | (flow-group per direction, number of flows per flow-group equals to +| ... | number of IPSec tunnels) with all packets +| ... | containing Ethernet header, IPv4 header with IP protocol=61 and +| ... | static payload. MAC addresses are matching MAC addresses of the TG +| ... | node interfaces. Incrementing of IP.dst (IPv4 destination address) field +| ... | is applied to both streams. +| ... | *[Ref] Applicable standard specifications:* RFC4303 and RFC2544. + +*** Variables *** +# X553 bandwidth limit 20Gbps/2=10Gbps +| ${s_10G}= | ${10000000000} +# X553 Mpps limit 29.76Mpps/2=14.88Mpps +| ${s_14.88Mpps}= | ${14880952} +| ${tg_if1_ip4}= | 192.168.10.2 +| ${dut1_if1_ip4}= | 192.168.10.1 +| ${dut1_if2_ip4}= | 172.168.1.1 +| ${dut2_if1_ip4}= | 172.168.1.2 +| ${dut2_if2_ip4}= | 192.168.20.1 +| ${tg_if2_ip4}= | 192.168.20.2 +| ${raddr_ip4}= | 20.0.0.0 +| ${laddr_ip4}= | 10.0.0.0 +| ${addr_range}= | ${32} +| ${overhead}= | ${54} +| ${n_tunnels}= | ${1} +# Traffic profile: +| ${traffic_profile}= | trex-sl-3n-ethip4-ip4dst${n_tunnels} + +*** Keywords *** +| Local Template +| | [Documentation] +| | ... | [Cfg] DUT runs IPSec tunneling AES GCM config. +| | ... | Each DUT uses ${phy_cores} physical core(s) for worker threads. +| | ... | [Ver] Measure MaxReceivedRate for ${framesize}B frames using single\ +| | ... | trial throughput test. +| | ... +| | ... | *Arguments:* +| | ... | - framesize - Framesize in Bytes in integer or string (IMIX_v4_1). +| | ... | Type: integer, string +| | ... | - phy_cores - Number of physical cores. Type: integer +| | ... | - rxq - Number of RX queues, default value: ${None}. Type: integer +| | ... +| | [Arguments] | ${framesize} | ${phy_cores} | ${rxq}=${None} +| | ... +| | ${encr_alg} = | Crypto Alg AES GCM 128 +| | ${auth_alg} = | Integ Alg AES GCM 128 +| | ${ipsec_proto} = | IPsec Proto ESP +| | ... +| | Given Add worker threads and rxqueues to all DUTs | ${phy_cores} | ${rxq} +| | And Add PCI devices to all DUTs +| | ${max_rate} | ${jumbo} = | Get Max Rate And Jumbo And Handle Multi Seg +| | ... | ${s_10G} | ${framesize} | overhead=${overhead} +| | ... | pps_limit=${s_14.88Mpps} +| | And Add DPDK SW cryptodev on DUTs in 3-node single-link circular topology +| | ... | aesni_gcm | ${phy_cores} +| | And Add DPDK dev default RXD to all DUTs | 2048 +| | And Add DPDK dev default TXD to all DUTs | 2048 +| | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} +| | And VPP IPsec Select Backend | ${dut1} | ${ipsec_proto} | index=${1} +| | And VPP IPsec Select Backend | ${dut2} | ${ipsec_proto} | index=${1} +| | And VPP IPsec Backend Dump | ${dut1} +| | And VPP IPsec Backend Dump | ${dut2} +| | And Initialize IPSec in 3-node circular topology +| | And VPP IPsec Create Tunnel Interfaces +| | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} +| | ... | ${dut2_if1} | ${n_tunnels} | ${encr_alg} | ${encr_key} | ${auth_alg} +| | ... | ${auth_key} | ${laddr_ip4} | ${raddr_ip4} | ${addr_range} +| | Then Traffic should pass with maximum rate +| | ... | ${max_rate}pps | ${framesize} | ${traffic_profile} + +*** Test Cases *** +| tc01-64B-1c-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr +| | [Tags] | 64B | 1C +| | framesize=${64} | phy_cores=${1} + +| tc02-64B-2c-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr +| | [Tags] | 64B | 2C +| | framesize=${64} | phy_cores=${2} + +| tc03-64B-4c-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr +| | [Tags] | 64B | 4C +| | framesize=${64} | phy_cores=${4} + +| tc04-1518B-1c-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr +| | [Tags] | 1518B | 1C +| | framesize=${1518} | phy_cores=${1} + +| tc05-1518B-2c-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr +| | [Tags] | 1518B | 2C +| | framesize=${1518} | phy_cores=${2} + +| tc06-1518B-4c-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr +| | [Tags] | 1518B | 4C +| | framesize=${1518} | phy_cores=${4} + +| tc07-9000B-1c-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr +| | [Tags] | 9000B | 1C +| | framesize=${9000} | phy_cores=${1} + +| tc08-9000B-2c-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr +| | [Tags] | 9000B | 2C +| | framesize=${9000} | phy_cores=${2} + +| tc09-9000B-4c-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr +| | [Tags] | 9000B | 4C +| | framesize=${9000} | phy_cores=${4} + +| tc10-IMIX-1c-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr +| | [Tags] | IMIX | 1C +| | framesize=IMIX_v4_1 | phy_cores=${1} + +| tc11-IMIX-2c-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr +| | [Tags] | IMIX | 2C +| | framesize=IMIX_v4_1 | phy_cores=${2} + +| tc12-IMIX-4c-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr +| | [Tags] | IMIX | 4C +| | framesize=IMIX_v4_1 | phy_cores=${4} |