aboutsummaryrefslogtreecommitdiffstats
path: root/tests/vpp/perf/crypto/10ge2p1x710-ethip4ipsec1tnlhwasync-ip4base-policy-aes256gcm-ndrpdr.robot
AgeCommit message (Collapse)AuthorFilesLines
2024-05-29style(crypto): Move robot tag DRV_VFIO_PCIVratko Polak1-2/+2
Move DRV_VFIO_PCI after TXQ_SIZE_0. Upcoming suites need more space in the preceding line. 131 suite files edited, luckily doable by two commands: $ sed -i 's/ | DRV_VFIO_PCI//' *.robot $ sed -i 's/ | TXQ_SIZE_0/ | TXQ_SIZE_0 | DRV_VFIO_PCI/' *.robot Change-Id: Idf30d20d321922718d523a216056d22ae67e50aa Signed-off-by: Vratko Polak <vrpolak@cisco.com>
2024-04-30feat(ipsec): Use strings instead of enums in RobotVratko Polak1-4/+2
Only related to enums appearing in ipsec suites. + Add conversion utility as enum_utils.py file. + Rename PolicyAction closer to ipsec_types.api: IpsecSpdAction. + Device and perf suites updated to use str in Variables table. - Perf suites are being tested. Change-Id: I3b1678c4d6cc303c590e5e3665ab1b05d104a121 Signed-off-by: Vratko Polak <vrpolak@cisco.com>
2024-04-26feat(tests): IPsecHW rxq ratiopmikus1-0/+1
Signed-off-by: Peter Mikus <peter.mikus@protonmail.ch> Change-Id: I17866709e1c7edf078055aef4db15774e136b111
2024-04-17style(ipsec): Do not import ipsec.robot to suitesVratko Polak1-3/+2
It is already available via default.robot import. Change-Id: I52c8f5d62f641edfbbc4b750e40274a75b169a22 Signed-off-by: Vratko Polak <vrpolak@cisco.com>
2023-10-26feat(trex): cleanup t-rex profilespmikus1-3/+3
Signed-off-by: pmikus <peter.mikus@protonmail.ch> Change-Id: Ib93dc1552945fe91ab5346b9b759d56c7468debf
2022-09-30Add VPP wireguard async mode test suiteYulong Pei1-1/+1
Add VPP wireguard async mode test suite to use QAT device for crypto. Also change keyword ipsechw to cryptohw in suite_setup.robot since currently crypto device is not only used by IPSec. Signed-off-by: Yulong Pei <yulong.pei@intel.com> Signed-off-by: xinfeng zhao <xinfengx.zhao@intel.com> Change-Id: Ibdadb3b09c04b7181415ffd4a248abddc6289075
2022-01-17fix(IPsec): fix policy testsJuraj Linkeš1-3/+3
Replace the hardcoded SPD inbound/outbound ranges with values derived from test inputs. Add the necessary routes now that the tunnel endpoints are not in the same subnet. Also add ip neighbor entry on DUT2 for the same reason. Also replace ipsec sa dump with show ipsec all in teardown of tests where both SAs and SPDs are configured to improve troubleshooting. Change-Id: I7d89a99fcf457a701c87bf6ac07364b62802677d Signed-off-by: Juraj Linkeš <juraj.linkes@pantheon.tech>
2021-12-15docs: small update structure fixViliam Luc1-1/+0
Signed-off-by: Viliam Luc <vluc@cisco.com> Change-Id: Ib0a853f7bd8cdbb0dee747e4f601bc4e54d006e9
2021-12-13doc: fixing documentation structureViliam Luc1-24/+31
When building documentation using sphinx we see ~1200 similar warnings [0] [0] - https://s3-logs.fd.io/vex-yul-rot-jenkins-1/csit-verify-tox-master-ubuntu2004-x86_64/3289/doc_verify.log.gz These warning are harmless and can be fixed later Signed-off-by: Viliam Luc <vluc@cisco.com> Change-Id: I1ac1099d38935971d47491dde905715345d3935c
2021-11-03Re-adressing ipsec int tests to fit deployment in AWSMaros Mullner1-5/+5
Signed-off-by: Maros Mullner <maros.mullner@pantheon.tech> Change-Id: I83b00d56a50d98c36547621cb2f41cb3b2f35741
2021-05-26Perf: Add perfmon_plugin for telemetrypmikus1-3/+4
Signed-off-by: pmikus <pmikus@cisco.com> Change-Id: I710af90aa5474381a82095c8a11ecf6c01c2483b
2020-12-16API: deprecated IPSEC APIsJan Gelety1-1/+1
Jira: CSIT-1597 + add ipsec_sa tear down action Change-Id: I4d1e6f26c14e61e8ddc6f29fbf5528a034c84eb0 Signed-off-by: Jan Gelety <jgelety@cisco.com>
2020-11-26Re-enable 9000B tests for ipsecVratko Polak1-0/+12
Ticket: CSIT-1771 VPP-1207 VPP-1675 Change-Id: I8ba2d62054361e72b833943327434ea071e7e568 Signed-off-by: Vratko Polak <vrpolak@cisco.com>
2020-09-11Add ipsec async mode performance test casesYulong Pei1-0/+151
In VPP 20.05, vpp added async crypto engine that support to use QAT hardware to do encryption and decryption, vnet/ipsec enabled async mode to use async crypto engine. Current async crypto engine also use dpdk_cryptodev as async handlers, in the future it may add other native QAT driver as async handlers. Note that async crypto engine is to support vnet/ipsec, it is different with current existing dpdk backend which itself has ESP implementation in plugins/dpdk/ipsec. Change-Id: I4e6eaa7ca1eddb8b1c45212de0684fb26907119b Signed-off-by: Yulong Pei <yulong.pei@intel.com>