diff options
author | Jan Gelety <jgelety@cisco.com> | 2019-02-05 18:30:16 +0100 |
---|---|---|
committer | Jan Gelety <jgelety@cisco.com> | 2019-02-05 18:30:16 +0100 |
commit | 2230a8ab108fa114752decfc69321ec5a47f36a6 (patch) | |
tree | 3d791f40ca250882864c87ce3598eefed7a4a1b8 /tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-ndrpdr.robot | |
parent | 5c739ab22c2b62dd38a4d89d62188e1baa7a0f45 (diff) |
FIX: Set ipsec backend to dpdk backend when aes-gcm cipher used
Change-Id: I008b9e0fd62cdc8e29136930762bd7412bd50181
Signed-off-by: Jan Gelety <jgelety@cisco.com>
Diffstat (limited to 'tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-ndrpdr.robot')
-rw-r--r-- | tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-ndrpdr.robot | 5 |
1 files changed, 5 insertions, 0 deletions
diff --git a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-ndrpdr.robot b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-ndrpdr.robot index a6f0af493e..fb3ed929c6 100644 --- a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-ndrpdr.robot +++ b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-ndrpdr.robot @@ -91,6 +91,7 @@ | | Set Test Variable | ${min_rate} | ${10000} | | ${encr_alg} = | Crypto Alg AES GCM 128 | | ${auth_alg} = | Integ Alg AES GCM 128 +| | ${ipsec_proto} = | IPsec Proto ESP | | ... | | Given Add worker threads and rxqueues to all DUTs | ${phy_cores} | ${rxq} | | And Add PCI devices to all DUTs @@ -102,6 +103,10 @@ | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs | | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} +| | And VPP IPsec Select Backend | ${dut1} | ${ipsec_proto} | index=${1} +| | And VPP IPsec Select Backend | ${dut2} | ${ipsec_proto} | index=${1} +| | And VPP IPsec Backend Dump | ${dut1} +| | And VPP IPsec Backend Dump | ${dut2} | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces | | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} |