summaryrefslogtreecommitdiffstats
path: root/ipsec/ipsec-impl/src/test/java/io/fd/hc2vpp/ipsec/read/IpsecStateCustomizerTest.java
diff options
context:
space:
mode:
Diffstat (limited to 'ipsec/ipsec-impl/src/test/java/io/fd/hc2vpp/ipsec/read/IpsecStateCustomizerTest.java')
-rw-r--r--ipsec/ipsec-impl/src/test/java/io/fd/hc2vpp/ipsec/read/IpsecStateCustomizerTest.java52
1 files changed, 30 insertions, 22 deletions
diff --git a/ipsec/ipsec-impl/src/test/java/io/fd/hc2vpp/ipsec/read/IpsecStateCustomizerTest.java b/ipsec/ipsec-impl/src/test/java/io/fd/hc2vpp/ipsec/read/IpsecStateCustomizerTest.java
index 9b8f9157f..46ebd89d8 100644
--- a/ipsec/ipsec-impl/src/test/java/io/fd/hc2vpp/ipsec/read/IpsecStateCustomizerTest.java
+++ b/ipsec/ipsec-impl/src/test/java/io/fd/hc2vpp/ipsec/read/IpsecStateCustomizerTest.java
@@ -16,6 +16,9 @@
package io.fd.hc2vpp.ipsec.read;
+import static io.fd.vpp.jvpp.core.types.IpsecCryptoAlg.IPSEC_API_CRYPTO_ALG_AES_CBC_128;
+import static io.fd.vpp.jvpp.core.types.IpsecIntegAlg.IPSEC_API_INTEG_ALG_SHA1_96;
+import static io.fd.vpp.jvpp.core.types.IpsecProto.IPSEC_API_PROTO_ESP;
import static org.junit.Assert.assertEquals;
import static org.mockito.ArgumentMatchers.any;
import static org.mockito.Mockito.when;
@@ -29,8 +32,13 @@ import io.fd.honeycomb.translate.spi.read.ReaderCustomizer;
import io.fd.vpp.jvpp.core.dto.IpsecSaDetails;
import io.fd.vpp.jvpp.core.dto.IpsecSaDetailsReplyDump;
import io.fd.vpp.jvpp.core.dto.IpsecSaDump;
+import io.fd.vpp.jvpp.core.types.IpsecSadEntry;
+import io.fd.vpp.jvpp.core.types.IpsecSadFlags;
+import io.fd.vpp.jvpp.core.types.Key;
import java.util.LinkedList;
import org.junit.Test;
+import org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.inet.types.rev130715.Ipv4AddressNoZone;
+import org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.ipsec.rev181214.IkeEncryptionAlgorithmT;
import org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.ipsec.rev181214.IpsecState;
import org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.ipsec.rev181214.IpsecStateBuilder;
import org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.ipsec.rev181214.ipsec.sa.state.grouping.Sa;
@@ -40,18 +48,14 @@ public class IpsecStateCustomizerTest extends ReaderCustomizerTest<IpsecState, I
implements ByteDataTranslator, Ipv4Translator, Ipv6Translator {
private static InstanceIdentifier<IpsecState> IPSEC_STATE_ID = InstanceIdentifier.create(IpsecState.class);
- private static final String LOCAL_ADDR_START = "192.168.11.1";
- private static final String REMOTE_ADDR_START = "192.168.22.1";
- private static final String TUNNEL_SRC_ADDR = LOCAL_ADDR_START;
- private static final String TUNNEL_DST_ADDR = REMOTE_ADDR_START;
+ private static final Ipv4AddressNoZone TUNNEL_SRC_ADDR = new Ipv4AddressNoZone("192.168.11.1");
+ private static final Ipv4AddressNoZone TUNNEL_DST_ADDR = new Ipv4AddressNoZone("192.168.22.1");
private static final int REPLY_WINDOW = 88;
private static final int SA_ID = 10;
private static final int SPI = 1001;
- private static final int CRYPTO_ALG = 1;
private static final String CRYPTO_KEY = "123456789";
private static final int INTEG_ALG = 2;
private static final String INTEG_KEY = "987654321";
- private static final int PROTOCOL = 1;
private static final int LAST_SEQ_INB = 8;
private static final int HOLD_DOWN = 88;
@@ -65,24 +69,28 @@ public class IpsecStateCustomizerTest extends ReaderCustomizerTest<IpsecState, I
}
@Override
- protected void setUp() throws Exception {
+ protected void setUp() {
final IpsecSaDetailsReplyDump saDetailsReply = new IpsecSaDetailsReplyDump();
LinkedList<IpsecSaDetails> saDetails = new LinkedList<>();
IpsecSaDetails saDetail = new IpsecSaDetails();
- saDetail.spi = SPI;
- saDetail.saId = SA_ID;
- saDetail.cryptoAlg = CRYPTO_ALG;
- saDetail.cryptoKey = CRYPTO_KEY.getBytes();
- saDetail.integAlg = INTEG_ALG;
- saDetail.integKey = INTEG_KEY.getBytes();
- saDetail.isTunnel = BYTE_TRUE;
- saDetail.isTunnelIp6 = BYTE_FALSE;
- saDetail.protocol = PROTOCOL;
+ saDetail.entry = new IpsecSadEntry();
+ saDetail.entry.spi = SPI;
+ saDetail.entry.sadId = SA_ID;
+ saDetail.entry.cryptoAlgorithm = IPSEC_API_CRYPTO_ALG_AES_CBC_128;
+ saDetail.entry.cryptoKey = new Key();
+ saDetail.entry.cryptoKey.data = CRYPTO_KEY.getBytes();
+ saDetail.entry.cryptoKey.length = (byte) CRYPTO_KEY.getBytes().length;
+ saDetail.entry.integrityAlgorithm = IPSEC_API_INTEG_ALG_SHA1_96;
+ saDetail.entry.integrityKey = new Key();
+ saDetail.entry.integrityKey.data = INTEG_KEY.getBytes();
+ saDetail.entry.integrityKey.length = (byte) INTEG_KEY.getBytes().length;
+ saDetail.entry.protocol = IPSEC_API_PROTO_ESP;
saDetail.lastSeqInbound = LAST_SEQ_INB;
saDetail.replayWindow = REPLY_WINDOW;
- saDetail.useAntiReplay = BYTE_TRUE;
- saDetail.tunnelSrcAddr = ipv4AddressNoZoneToArray(TUNNEL_SRC_ADDR);
- saDetail.tunnelDstAddr = ipv4AddressNoZoneToArray(TUNNEL_DST_ADDR);
+ saDetail.entry.flags = IpsecSadFlags.forValue(IpsecSadFlags.IPSEC_API_SAD_FLAG_IS_TUNNEL.value +
+ IpsecSadFlags.IPSEC_API_SAD_FLAG_USE_ANTI_REPLAY.value);
+ saDetail.entry.tunnelSrc = ipv4AddressNoZoneToAddress(TUNNEL_SRC_ADDR);
+ saDetail.entry.tunnelDst = ipv4AddressNoZoneToAddress(TUNNEL_DST_ADDR);
saDetails.add(saDetail);
saDetailsReply.ipsecSaDetails = saDetails;
IpsecSaDump saDump = new IpsecSaDump();
@@ -98,15 +106,15 @@ public class IpsecStateCustomizerTest extends ReaderCustomizerTest<IpsecState, I
Sa sa = builder.getSa().get(0);
assertEquals(sa.getAntiReplayWindow().intValue(), REPLY_WINDOW);
assertEquals(sa.getAuthenticationAlgorithm().getIntValue(), INTEG_ALG);
- assertEquals(sa.getEncryptionAlgorithm().getIntValue(), CRYPTO_ALG);
+ assertEquals(sa.getEncryptionAlgorithm(), IkeEncryptionAlgorithmT.EncrAesCbc128);
assertEquals(sa.getSpi().intValue(), SPI);
}
@Test
- public void testMerge() throws Exception {
+ public void testMerge() {
final IpsecStateBuilder parentBuilder = new IpsecStateBuilder();
final IpsecStateBuilder builderForNewdata = new IpsecStateBuilder();
- builderForNewdata.setHoldDown(new Long(HOLD_DOWN));
+ builderForNewdata.setHoldDown((long) HOLD_DOWN);
getCustomizer().merge(parentBuilder, builderForNewdata.build());
assertEquals(parentBuilder.getHoldDown().intValue(), HOLD_DOWN);
}