From 83e9b227be8316ac06b9104ce9096cfe4b06605e Mon Sep 17 00:00:00 2001 From: Jan Gelety Date: Mon, 18 Feb 2019 14:55:23 +0100 Subject: FIX: ipsec + vpp stable version update - use exec ipsec sa add - use exec ipsec spd add - use exec set ipsec sa Change-Id: I69d59dd230b99d8efc9bcb5e3fbab79a8b11b18a Signed-off-by: Jan Gelety --- .../eth2p-ethip4ipsectnl-ip4base-func.robot | 1 + .../eth2p-ethip4ipsectpt-ip4base-func.robot | 1 + .../eth2p-ethip6ipsectnl-ip6base-func.robot | 39 +++++++++++----------- .../eth2p-ethip6ipsectpt-ip6base-func.robot | 20 +++++++++++ ...ipsecscale1000tnl-ip4base-int-aes-gcm-mrr.robot | 2 ++ ...ecscale1000tnl-ip4base-int-aes-gcm-ndrpdr.robot | 2 ++ ...ipsecscale1000tnl-ip4base-tnl-aes-gcm-mrr.robot | 2 ++ ...ecscale1000tnl-ip4base-tnl-aes-gcm-ndrpdr.robot | 2 ++ 8 files changed, 50 insertions(+), 19 deletions(-) (limited to 'tests/vpp') diff --git a/tests/vpp/func/crypto/default/eth2p-ethip4ipsectnl-ip4base-func.robot b/tests/vpp/func/crypto/default/eth2p-ethip4ipsectnl-ip4base-func.robot index 814d8ee45c..2cab1cdd44 100644 --- a/tests/vpp/func/crypto/default/eth2p-ethip4ipsectnl-ip4base-func.robot +++ b/tests/vpp/func/crypto/default/eth2p-ethip4ipsectnl-ip4base-func.robot @@ -383,6 +383,7 @@ | | ... | mode. Then update SA keys - use new keys. | | ... | [Ver] Send and receive ESP packet between TG and VPP node before\ | | ... | and after SA keys update. +| | [Tags] | EXPECTED_FAILING | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Generate keys for IPSec | ${encr_alg} | ${auth_alg} diff --git a/tests/vpp/func/crypto/default/eth2p-ethip4ipsectpt-ip4base-func.robot b/tests/vpp/func/crypto/default/eth2p-ethip4ipsectpt-ip4base-func.robot index e599cf9506..009889b2dc 100644 --- a/tests/vpp/func/crypto/default/eth2p-ethip4ipsectpt-ip4base-func.robot +++ b/tests/vpp/func/crypto/default/eth2p-ethip4ipsectpt-ip4base-func.robot @@ -359,6 +359,7 @@ | | ... | mode. Then update SA keys - use new keys. | | ... | [Ver] Send and receive ESP packet between TG and VPP node before\ | | ... | and after SA keys update. +| | [Tags] | EXPECTED_FAILING | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Generate keys for IPSec | ${encr_alg} | ${auth_alg} diff --git a/tests/vpp/func/crypto/default/eth2p-ethip6ipsectnl-ip6base-func.robot b/tests/vpp/func/crypto/default/eth2p-ethip6ipsectnl-ip6base-func.robot index 26d109a0b7..b3a81f0653 100644 --- a/tests/vpp/func/crypto/default/eth2p-ethip6ipsectnl-ip6base-func.robot +++ b/tests/vpp/func/crypto/default/eth2p-ethip6ipsectnl-ip6base-func.robot @@ -56,7 +56,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_src_ip} | ${tg_src_ip} -| | ... | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | ${dut_tun_ip} | ${tg_tun_ip} | is_ipv6=${TRUE} | | Then Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${tg_spi} @@ -77,7 +77,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_src_ip} | ${tg_src_ip} -| | ... | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | ${dut_tun_ip} | ${tg_tun_ip} | is_ipv6=${TRUE} | | Then Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${tg_spi} @@ -98,7 +98,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_src_ip} | ${tg_src_ip} -| | ... | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | ${dut_tun_ip} | ${tg_tun_ip} | is_ipv6=${TRUE} | | Then Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${tg_spi} @@ -120,7 +120,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_src_ip} | ${tg_src_ip} -| | ... | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | ${dut_tun_ip} | ${tg_tun_ip} | is_ipv6=${TRUE} | | Then Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${tg_spi} @@ -141,7 +141,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_src_ip} | ${tg_src_ip} -| | ... | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | ${dut_tun_ip} | ${tg_tun_ip} | is_ipv6=${TRUE} | | Then Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${tg_spi} @@ -163,7 +163,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_src_ip} | ${tg_src_ip} -| | ... | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | ${dut_tun_ip} | ${tg_tun_ip} | is_ipv6=${TRUE} | | Then Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${tg_spi} @@ -185,7 +185,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_src_ip} | ${tg_src_ip} -| | ... | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | ${dut_tun_ip} | ${tg_tun_ip} | is_ipv6=${TRUE} | | Then Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${tg_spi} @@ -207,7 +207,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_src_ip} | ${tg_src_ip} -| | ... | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | ${dut_tun_ip} | ${tg_tun_ip} | is_ipv6=${TRUE} | | Then Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${tg_spi} @@ -228,7 +228,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_src_ip} | ${tg_src_ip} -| | ... | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | ${dut_tun_ip} | ${tg_tun_ip} | is_ipv6=${TRUE} | | Then Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${tg_spi} @@ -250,7 +250,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_src_ip} | ${tg_src_ip} -| | ... | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | ${dut_tun_ip} | ${tg_tun_ip} | is_ipv6=${TRUE} | | Then Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${tg_spi} @@ -272,7 +272,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_src_ip} | ${tg_src_ip} -| | ... | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | ${dut_tun_ip} | ${tg_tun_ip} | is_ipv6=${TRUE} | | Then Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${tg_spi} @@ -293,7 +293,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_src_ip} | ${tg_src_ip} -| | ... | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | ${dut_tun_ip} | ${tg_tun_ip} | is_ipv6=${TRUE} | | Then Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${tg_spi} @@ -316,7 +316,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_src_ip} | ${tg_src_ip} -| | ... | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | ${dut_tun_ip} | ${tg_tun_ip} | is_ipv6=${TRUE} | | Then Run Keyword And Expect Error | ESP packet Rx timeout | | ... | Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} @@ -340,7 +340,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_src_ip} | ${tg_src_ip} -| | ... | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | ${dut_tun_ip} | ${tg_tun_ip} | is_ipv6=${TRUE} | | Then Run Keyword And Expect Error | ESP packet Rx timeout | | ... | Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} @@ -366,7 +366,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_src_ip} | ${tg_src_ip} -| | ... | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | ${dut_tun_ip} | ${tg_tun_ip} | is_ipv6=${TRUE} | | Then Run Keyword And Expect Error | ESP packet Rx timeout | | ... | Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} @@ -383,13 +383,14 @@ | | ... | mode. Then update SA keys - use new keys. | | ... | [Ver] Send and receive ESP packet between TG and VPP node before\ | | ... | and after SA keys update. +| | [Tags] | EXPECTED_FAILING | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_src_ip} | ${tg_src_ip} -| | ... | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | ${dut_tun_ip} | ${tg_tun_ip} | is_ipv6=${TRUE} | | Then Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${tg_spi} @@ -421,7 +422,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_src_ip} | ${tg_src_ip} -| | ... | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | ${dut_tun_ip} | ${tg_tun_ip} | is_ipv6=${TRUE} | | ${encr_key2}= | And Get Second Random String | ${encr_alg} | Crypto | | Then Run Keyword And Expect Error | ESP packet Rx timeout | | ... | Send IPsec Packet and verify ESP encapsulation in received packet @@ -456,7 +457,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_src_ip} | ${tg_src_ip} -| | ... | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | ${dut_tun_ip} | ${tg_tun_ip} | is_ipv6=${TRUE} | | ${auth_key2}= | And Get Second Random String | ${auth_alg} | Integ | | Then Run Keyword And Expect Error | ESP packet Rx timeout | | ... | Send IPsec Packet and verify ESP encapsulation in received packet @@ -492,7 +493,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_src_ip} | ${tg_src_ip} -| | ... | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | ${dut_tun_ip} | ${tg_tun_ip} | is_ipv6=${TRUE} | | ${encr_key2}= | And Get Second Random String | ${encr_alg} | Crypto | | ${auth_key2}= | And Get Second Random String | ${auth_alg} | Integ | | Then Run Keyword And Expect Error | ESP packet Rx timeout diff --git a/tests/vpp/func/crypto/default/eth2p-ethip6ipsectpt-ip6base-func.robot b/tests/vpp/func/crypto/default/eth2p-ethip6ipsectpt-ip6base-func.robot index e36630b681..276732f077 100644 --- a/tests/vpp/func/crypto/default/eth2p-ethip6ipsectpt-ip6base-func.robot +++ b/tests/vpp/func/crypto/default/eth2p-ethip6ipsectpt-ip6base-func.robot @@ -57,6 +57,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | is_ipv6=${TRUE} | | Then Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${tg_spi} @@ -77,6 +78,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | is_ipv6=${TRUE} | | Then Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${tg_spi} @@ -97,6 +99,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | is_ipv6=${TRUE} | | Then Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${tg_spi} @@ -117,6 +120,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | is_ipv6=${TRUE} | | Then Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${tg_spi} @@ -136,6 +140,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | is_ipv6=${TRUE} | | Then Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${tg_spi} @@ -156,6 +161,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | is_ipv6=${TRUE} | | Then Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${tg_spi} @@ -176,6 +182,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | is_ipv6=${TRUE} | | Then Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${tg_spi} @@ -196,6 +203,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | is_ipv6=${TRUE} | | Then Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${tg_spi} @@ -215,6 +223,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | is_ipv6=${TRUE} | | Then Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${tg_spi} @@ -235,6 +244,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | is_ipv6=${TRUE} | | Then Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${tg_spi} @@ -255,6 +265,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | is_ipv6=${TRUE} | | Then Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${tg_spi} @@ -274,6 +285,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | is_ipv6=${TRUE} | | Then Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${tg_spi} @@ -296,6 +308,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | is_ipv6=${TRUE} | | Then Run Keyword And Expect Error | ESP packet Rx timeout | | ... | Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} @@ -319,6 +332,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | is_ipv6=${TRUE} | | Then Run Keyword And Expect Error | ESP packet Rx timeout | | ... | Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} @@ -344,6 +358,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | is_ipv6=${TRUE} | | Then Run Keyword And Expect Error | ESP packet Rx timeout | | ... | Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} @@ -359,12 +374,14 @@ | | ... | mode. Then update SA keys - use new keys. | | ... | [Ver] Send and receive ESP packet between TG and VPP node before\ | | ... | and after SA keys update. +| | [Tags] | EXPECTED_FAILING | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | is_ipv6=${TRUE} | | Then Send IPsec Packet and verify ESP encapsulation in received packet | | ... | ${tg_node} | ${tg_if} | ${dut_if_mac} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} | ${tg_spi} @@ -394,6 +411,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | is_ipv6=${TRUE} | | ${encr_key2}= | And Get Second Random String | ${encr_alg} | Crypto | | Then Run Keyword And Expect Error | ESP packet Rx timeout | | ... | Send IPsec Packet and verify ESP encapsulation in received packet @@ -426,6 +444,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | is_ipv6=${TRUE} | | ${auth_key2}= | And Get Second Random String | ${auth_alg} | Integ | | Then Run Keyword And Expect Error | ESP packet Rx timeout | | ... | Send IPsec Packet and verify ESP encapsulation in received packet @@ -459,6 +478,7 @@ | | When Configure manual keyed connection for IPSec | | ... | ${dut_node} | ${dut_if} | ${encr_alg} | ${encr_key} | ${auth_alg} | | ... | ${auth_key} | ${dut_spi} | ${tg_spi} | ${dut_tun_ip} | ${tg_tun_ip} +| | ... | is_ipv6=${TRUE} | | ${encr_key2}= | And Get Second Random String | ${encr_alg} | Crypto | | ${auth_key2}= | And Get Second Random String | ${auth_alg} | Integ | | Then Run Keyword And Expect Error | ESP packet Rx timeout diff --git a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-mrr.robot b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-mrr.robot index 0d715ce38e..1b0314159f 100644 --- a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-mrr.robot +++ b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-mrr.robot @@ -98,6 +98,8 @@ | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs | | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} +| | And VPP IPsec Backend Dump | ${dut1} +| | And VPP IPsec Backend Dump | ${dut2} | | And VPP IPsec Select Backend | ${dut1} | ${ipsec_proto} | index=${1} | | And VPP IPsec Select Backend | ${dut2} | ${ipsec_proto} | index=${1} | | And VPP IPsec Backend Dump | ${dut1} diff --git a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-ndrpdr.robot b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-ndrpdr.robot index fb3ed929c6..112b6ed3bf 100644 --- a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-ndrpdr.robot +++ b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-ndrpdr.robot @@ -103,6 +103,8 @@ | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs | | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} +| | And VPP IPsec Backend Dump | ${dut1} +| | And VPP IPsec Backend Dump | ${dut2} | | And VPP IPsec Select Backend | ${dut1} | ${ipsec_proto} | index=${1} | | And VPP IPsec Select Backend | ${dut2} | ${ipsec_proto} | index=${1} | | And VPP IPsec Backend Dump | ${dut1} diff --git a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-tnl-aes-gcm-mrr.robot b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-tnl-aes-gcm-mrr.robot index d24f3dcf24..73bdfc6f77 100644 --- a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-tnl-aes-gcm-mrr.robot +++ b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-tnl-aes-gcm-mrr.robot @@ -99,6 +99,8 @@ | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs | | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} +| | And VPP IPsec Backend Dump | ${dut1} +| | And VPP IPsec Backend Dump | ${dut2} | | And VPP IPsec Select Backend | ${dut1} | ${ipsec_proto} | index=${1} | | And VPP IPsec Select Backend | ${dut2} | ${ipsec_proto} | index=${1} | | And VPP IPsec Backend Dump | ${dut1} diff --git a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-tnl-aes-gcm-ndrpdr.robot b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-tnl-aes-gcm-ndrpdr.robot index 5bda099a34..a9ff5b300b 100644 --- a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-tnl-aes-gcm-ndrpdr.robot +++ b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-tnl-aes-gcm-ndrpdr.robot @@ -104,6 +104,8 @@ | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs | | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} +| | And VPP IPsec Backend Dump | ${dut1} +| | And VPP IPsec Backend Dump | ${dut2} | | And VPP IPsec Select Backend | ${dut1} | ${ipsec_proto} | index=${1} | | And VPP IPsec Select Backend | ${dut2} | ${ipsec_proto} | index=${1} | | And VPP IPsec Backend Dump | ${dut1} -- cgit 1.2.3-korg