diff options
author | Klement Sekera <klement.sekera@gmail.com> | 2022-04-26 19:02:15 +0200 |
---|---|---|
committer | Ole Tr�an <otroan@employees.org> | 2022-05-10 18:52:08 +0000 |
commit | d9b0c6fbf7aa5bd9af84264105b39c82028a4a29 (patch) | |
tree | 4f786cfd8ebc2443cb11e11b74c8657204068898 /test/test_ipsec_esp.py | |
parent | f90348bcb4afd0af2611cefc43b17ef3042b511c (diff) |
tests: replace pycodestyle with black
Drop pycodestyle for code style checking in favor of black. Black is
much faster, stable PEP8 compliant code style checker offering also
automatic formatting. It aims to be very stable and produce smallest
diffs. It's used by many small and big projects.
Running checkstyle with black takes a few seconds with a terse output.
Thus, test-checkstyle-diff is no longer necessary.
Expand scope of checkstyle to all python files in the repo, replacing
test-checkstyle with checkstyle-python.
Also, fixstyle-python is now available for automatic style formatting.
Note: python virtualenv has been consolidated in test/Makefile,
test/requirements*.txt which will eventually be moved to a central
location. This is required to simply the automated generation of
docker executor images in the CI.
Type: improvement
Change-Id: I022a326603485f58585e879ac0f697fceefbc9c8
Signed-off-by: Klement Sekera <klement.sekera@gmail.com>
Signed-off-by: Dave Wallace <dwallacelf@gmail.com>
Diffstat (limited to 'test/test_ipsec_esp.py')
-rw-r--r-- | test/test_ipsec_esp.py | 1135 |
1 files changed, 737 insertions, 398 deletions
diff --git a/test/test_ipsec_esp.py b/test/test_ipsec_esp.py index 74d01cd5568..54b877112e9 100644 --- a/test/test_ipsec_esp.py +++ b/test/test_ipsec_esp.py @@ -8,14 +8,26 @@ from scapy.packet import Raw from parameterized import parameterized from framework import VppTestRunner -from template_ipsec import IpsecTra46Tests, IpsecTun46Tests, TemplateIpsec, \ - IpsecTcpTests, IpsecTun4Tests, IpsecTra4Tests, config_tra_params, \ - config_tun_params, IPsecIPv4Params, IPsecIPv6Params, \ - IpsecTra4, IpsecTun4, IpsecTra6, IpsecTun6, \ - IpsecTun6HandoffTests, IpsecTun4HandoffTests, \ - IpsecTra6ExtTests -from vpp_ipsec import VppIpsecSpd, VppIpsecSpdEntry, VppIpsecSA,\ - VppIpsecSpdItfBinding +from template_ipsec import ( + IpsecTra46Tests, + IpsecTun46Tests, + TemplateIpsec, + IpsecTcpTests, + IpsecTun4Tests, + IpsecTra4Tests, + config_tra_params, + config_tun_params, + IPsecIPv4Params, + IPsecIPv6Params, + IpsecTra4, + IpsecTun4, + IpsecTra6, + IpsecTun6, + IpsecTun6HandoffTests, + IpsecTun4HandoffTests, + IpsecTra6ExtTests, +) +from vpp_ipsec import VppIpsecSpd, VppIpsecSpdEntry, VppIpsecSA, VppIpsecSpdItfBinding from vpp_ip_route import VppIpRoute, VppRoutePath from vpp_ip import DpoProto from vpp_papi import VppEnum @@ -68,13 +80,11 @@ class ConfigIpsecESP(TemplateIpsec): self.tun_spd.add_vpp_config() self.net_objs.append(self.tun_spd) - b = VppIpsecSpdItfBinding(self, self.tun_spd, - self.tun_if) + b = VppIpsecSpdItfBinding(self, self.tun_spd, self.tun_if) b.add_vpp_config() self.net_objs.append(b) - b = VppIpsecSpdItfBinding(self, self.tra_spd, - self.tra_if) + b = VppIpsecSpdItfBinding(self, self.tra_spd, self.tra_if) b.add_vpp_config() self.net_objs.append(b) @@ -87,10 +97,16 @@ class ConfigIpsecESP(TemplateIpsec): for p in params: d = DpoProto.DPO_PROTO_IP6 if p.is_ipv6 else DpoProto.DPO_PROTO_IP4 - r = VppIpRoute(self, p.remote_tun_if_host, p.addr_len, - [VppRoutePath(self.tun_if.remote_addr[p.addr_type], - 0xffffffff, - proto=d)]) + r = VppIpRoute( + self, + p.remote_tun_if_host, + p.addr_len, + [ + VppRoutePath( + self.tun_if.remote_addr[p.addr_type], 0xFFFFFFFF, proto=d + ) + ], + ) r.add_vpp_config() self.net_objs.append(r) @@ -120,75 +136,125 @@ class ConfigIpsecESP(TemplateIpsec): salt = params.salt objs = [] - params.tun_sa_in = VppIpsecSA(self, scapy_tun_sa_id, scapy_tun_spi, - auth_algo_vpp_id, auth_key, - crypt_algo_vpp_id, crypt_key, - self.vpp_esp_protocol, - self.tun_if.local_addr[addr_type], - self.tun_if.remote_addr[addr_type], - tun_flags=tun_flags, - dscp=params.dscp, - flags=flags, - salt=salt, - hop_limit=params.outer_hop_limit) - params.tun_sa_out = VppIpsecSA(self, vpp_tun_sa_id, vpp_tun_spi, - auth_algo_vpp_id, auth_key, - crypt_algo_vpp_id, crypt_key, - self.vpp_esp_protocol, - self.tun_if.remote_addr[addr_type], - self.tun_if.local_addr[addr_type], - tun_flags=tun_flags, - dscp=params.dscp, - flags=flags, - salt=salt, - hop_limit=params.outer_hop_limit) + params.tun_sa_in = VppIpsecSA( + self, + scapy_tun_sa_id, + scapy_tun_spi, + auth_algo_vpp_id, + auth_key, + crypt_algo_vpp_id, + crypt_key, + self.vpp_esp_protocol, + self.tun_if.local_addr[addr_type], + self.tun_if.remote_addr[addr_type], + tun_flags=tun_flags, + dscp=params.dscp, + flags=flags, + salt=salt, + hop_limit=params.outer_hop_limit, + ) + params.tun_sa_out = VppIpsecSA( + self, + vpp_tun_sa_id, + vpp_tun_spi, + auth_algo_vpp_id, + auth_key, + crypt_algo_vpp_id, + crypt_key, + self.vpp_esp_protocol, + self.tun_if.remote_addr[addr_type], + self.tun_if.local_addr[addr_type], + tun_flags=tun_flags, + dscp=params.dscp, + flags=flags, + salt=salt, + hop_limit=params.outer_hop_limit, + ) objs.append(params.tun_sa_in) objs.append(params.tun_sa_out) - params.spd_policy_in_any = VppIpsecSpdEntry(self, self.tun_spd, - scapy_tun_sa_id, - addr_any, addr_bcast, - addr_any, addr_bcast, - socket.IPPROTO_ESP) - params.spd_policy_out_any = VppIpsecSpdEntry(self, self.tun_spd, - scapy_tun_sa_id, - addr_any, addr_bcast, - addr_any, addr_bcast, - socket.IPPROTO_ESP, - is_outbound=0) + params.spd_policy_in_any = VppIpsecSpdEntry( + self, + self.tun_spd, + scapy_tun_sa_id, + addr_any, + addr_bcast, + addr_any, + addr_bcast, + socket.IPPROTO_ESP, + ) + params.spd_policy_out_any = VppIpsecSpdEntry( + self, + self.tun_spd, + scapy_tun_sa_id, + addr_any, + addr_bcast, + addr_any, + addr_bcast, + socket.IPPROTO_ESP, + is_outbound=0, + ) objs.append(params.spd_policy_out_any) objs.append(params.spd_policy_in_any) - objs.append(VppIpsecSpdEntry(self, self.tun_spd, vpp_tun_sa_id, - remote_tun_if_host, remote_tun_if_host, - self.pg1.remote_addr[addr_type], - self.pg1.remote_addr[addr_type], - 0, - priority=10, - policy=e.IPSEC_API_SPD_ACTION_PROTECT, - is_outbound=0)) - objs.append(VppIpsecSpdEntry(self, self.tun_spd, scapy_tun_sa_id, - self.pg1.remote_addr[addr_type], - self.pg1.remote_addr[addr_type], - remote_tun_if_host, remote_tun_if_host, - 0, - policy=e.IPSEC_API_SPD_ACTION_PROTECT, - priority=10)) - objs.append(VppIpsecSpdEntry(self, self.tun_spd, vpp_tun_sa_id, - remote_tun_if_host, remote_tun_if_host, - self.pg0.local_addr[addr_type], - self.pg0.local_addr[addr_type], - 0, - priority=20, - policy=e.IPSEC_API_SPD_ACTION_PROTECT, - is_outbound=0)) - objs.append(VppIpsecSpdEntry(self, self.tun_spd, scapy_tun_sa_id, - self.pg0.local_addr[addr_type], - self.pg0.local_addr[addr_type], - remote_tun_if_host, remote_tun_if_host, - 0, - policy=e.IPSEC_API_SPD_ACTION_PROTECT, - priority=20)) + objs.append( + VppIpsecSpdEntry( + self, + self.tun_spd, + vpp_tun_sa_id, + remote_tun_if_host, + remote_tun_if_host, + self.pg1.remote_addr[addr_type], + self.pg1.remote_addr[addr_type], + 0, + priority=10, + policy=e.IPSEC_API_SPD_ACTION_PROTECT, + is_outbound=0, + ) + ) + objs.append( + VppIpsecSpdEntry( + self, + self.tun_spd, + scapy_tun_sa_id, + self.pg1.remote_addr[addr_type], + self.pg1.remote_addr[addr_type], + remote_tun_if_host, + remote_tun_if_host, + 0, + policy=e.IPSEC_API_SPD_ACTION_PROTECT, + priority=10, + ) + ) + objs.append( + VppIpsecSpdEntry( + self, + self.tun_spd, + vpp_tun_sa_id, + remote_tun_if_host, + remote_tun_if_host, + self.pg0.local_addr[addr_type], + self.pg0.local_addr[addr_type], + 0, + priority=20, + policy=e.IPSEC_API_SPD_ACTION_PROTECT, + is_outbound=0, + ) + ) + objs.append( + VppIpsecSpdEntry( + self, + self.tun_spd, + scapy_tun_sa_id, + self.pg0.local_addr[addr_type], + self.pg0.local_addr[addr_type], + remote_tun_if_host, + remote_tun_if_host, + 0, + policy=e.IPSEC_API_SPD_ACTION_PROTECT, + priority=20, + ) + ) for o in objs: o.add_vpp_config() self.net_objs = self.net_objs + objs @@ -210,45 +276,87 @@ class ConfigIpsecESP(TemplateIpsec): salt = params.salt objs = [] - params.tra_sa_in = VppIpsecSA(self, scapy_tra_sa_id, scapy_tra_spi, - auth_algo_vpp_id, auth_key, - crypt_algo_vpp_id, crypt_key, - self.vpp_esp_protocol, - flags=flags, - salt=salt) - params.tra_sa_out = VppIpsecSA(self, vpp_tra_sa_id, vpp_tra_spi, - auth_algo_vpp_id, auth_key, - crypt_algo_vpp_id, crypt_key, - self.vpp_esp_protocol, - flags=flags, - salt=salt) + params.tra_sa_in = VppIpsecSA( + self, + scapy_tra_sa_id, + scapy_tra_spi, + auth_algo_vpp_id, + auth_key, + crypt_algo_vpp_id, + crypt_key, + self.vpp_esp_protocol, + flags=flags, + salt=salt, + ) + params.tra_sa_out = VppIpsecSA( + self, + vpp_tra_sa_id, + vpp_tra_spi, + auth_algo_vpp_id, + auth_key, + crypt_algo_vpp_id, + crypt_key, + self.vpp_esp_protocol, + flags=flags, + salt=salt, + ) objs.append(params.tra_sa_in) objs.append(params.tra_sa_out) - objs.append(VppIpsecSpdEntry(self, self.tra_spd, vpp_tra_sa_id, - addr_any, addr_bcast, - addr_any, addr_bcast, - socket.IPPROTO_ESP)) - objs.append(VppIpsecSpdEntry(self, self.tra_spd, vpp_tra_sa_id, - addr_any, addr_bcast, - addr_any, addr_bcast, - socket.IPPROTO_ESP, - is_outbound=0)) - objs.append(VppIpsecSpdEntry(self, self.tra_spd, vpp_tra_sa_id, - self.tra_if.local_addr[addr_type], - self.tra_if.local_addr[addr_type], - self.tra_if.remote_addr[addr_type], - self.tra_if.remote_addr[addr_type], - 0, priority=10, - policy=e.IPSEC_API_SPD_ACTION_PROTECT, - is_outbound=0)) - objs.append(VppIpsecSpdEntry(self, self.tra_spd, scapy_tra_sa_id, - self.tra_if.local_addr[addr_type], - self.tra_if.local_addr[addr_type], - self.tra_if.remote_addr[addr_type], - self.tra_if.remote_addr[addr_type], - 0, policy=e.IPSEC_API_SPD_ACTION_PROTECT, - priority=10)) + objs.append( + VppIpsecSpdEntry( + self, + self.tra_spd, + vpp_tra_sa_id, + addr_any, + addr_bcast, + addr_any, + addr_bcast, + socket.IPPROTO_ESP, + ) + ) + objs.append( + VppIpsecSpdEntry( + self, + self.tra_spd, + vpp_tra_sa_id, + addr_any, + addr_bcast, + addr_any, + addr_bcast, + socket.IPPROTO_ESP, + is_outbound=0, + ) + ) + objs.append( + VppIpsecSpdEntry( + self, + self.tra_spd, + vpp_tra_sa_id, + self.tra_if.local_addr[addr_type], + self.tra_if.local_addr[addr_type], + self.tra_if.remote_addr[addr_type], + self.tra_if.remote_addr[addr_type], + 0, + priority=10, + policy=e.IPSEC_API_SPD_ACTION_PROTECT, + is_outbound=0, + ) + ) + objs.append( + VppIpsecSpdEntry( + self, + self.tra_spd, + scapy_tra_sa_id, + self.tra_if.local_addr[addr_type], + self.tra_if.local_addr[addr_type], + self.tra_if.remote_addr[addr_type], + self.tra_if.remote_addr[addr_type], + 0, + policy=e.IPSEC_API_SPD_ACTION_PROTECT, + priority=10, + ) + ) for o in objs: o.add_vpp_config() self.net_objs = self.net_objs + objs @@ -308,9 +416,10 @@ class TemplateIpsecEsp(ConfigIpsecESP): super(TemplateIpsecEsp, self).tearDown() -class TestIpsecEsp1(TemplateIpsecEsp, IpsecTra46Tests, - IpsecTun46Tests, IpsecTra6ExtTests): - """ Ipsec ESP - TUN & TRA tests """ +class TestIpsecEsp1( + TemplateIpsecEsp, IpsecTra46Tests, IpsecTun46Tests, IpsecTra6ExtTests +): + """Ipsec ESP - TUN & TRA tests""" @classmethod def setUpClass(cls): @@ -327,7 +436,7 @@ class TestIpsecEsp1(TemplateIpsecEsp, IpsecTra46Tests, super(TestIpsecEsp1, self).tearDown() def test_tun_46(self): - """ ipsec 4o6 tunnel """ + """ipsec 4o6 tunnel""" # add an SPD entry to direct 2.2.2.2 to the v6 tunnel SA p6 = self.ipv6_params p4 = self.ipv4_params @@ -335,20 +444,25 @@ class TestIpsecEsp1(TemplateIpsecEsp, IpsecTra46Tests, p6.remote_tun_if_host4 = "2.2.2.2" e = VppEnum.vl_api_ipsec_spd_action_t - VppIpsecSpdEntry(self, - self.tun_spd, - p6.scapy_tun_sa_id, - self.pg1.remote_addr[p4.addr_type], - self.pg1.remote_addr[p4.addr_type], - p6.remote_tun_if_host4, - p6.remote_tun_if_host4, - 0, - priority=10, - policy=e.IPSEC_API_SPD_ACTION_PROTECT, - is_outbound=1).add_vpp_config() - VppIpRoute(self, p6.remote_tun_if_host4, p4.addr_len, - [VppRoutePath(self.tun_if.remote_addr[p4.addr_type], - 0xffffffff)]).add_vpp_config() + VppIpsecSpdEntry( + self, + self.tun_spd, + p6.scapy_tun_sa_id, + self.pg1.remote_addr[p4.addr_type], + self.pg1.remote_addr[p4.addr_type], + p6.remote_tun_if_host4, + p6.remote_tun_if_host4, + 0, + priority=10, + policy=e.IPSEC_API_SPD_ACTION_PROTECT, + is_outbound=1, + ).add_vpp_config() + VppIpRoute( + self, + p6.remote_tun_if_host4, + p4.addr_len, + [VppRoutePath(self.tun_if.remote_addr[p4.addr_type], 0xFFFFFFFF)], + ).add_vpp_config() old_name = self.tun6_encrypt_node_name self.tun6_encrypt_node_name = "esp4-encrypt" @@ -357,7 +471,7 @@ class TestIpsecEsp1(TemplateIpsecEsp, IpsecTra46Tests, self.tun6_encrypt_node_name = old_name def test_tun_64(self): - """ ipsec 6o4 tunnel """ + """ipsec 6o4 tunnel""" # add an SPD entry to direct 4444::4 to the v4 tunnel SA p6 = self.ipv6_params p4 = self.ipv4_params @@ -365,22 +479,26 @@ class TestIpsecEsp1(TemplateIpsecEsp, IpsecTra46Tests, p4.remote_tun_if_host6 = "4444::4" e = VppEnum.vl_api_ipsec_spd_action_t - VppIpsecSpdEntry(self, - self.tun_spd, - p4.scapy_tun_sa_id, - self.pg1.remote_addr[p6.addr_type], - self.pg1.remote_addr[p6.addr_type], - p4.remote_tun_if_host6, - p4.remote_tun_if_host6, - 0, - priority=10, - policy=e.IPSEC_API_SPD_ACTION_PROTECT, - is_outbound=1).add_vpp_config() + VppIpsecSpdEntry( + self, + self.tun_spd, + p4.scapy_tun_sa_id, + self.pg1.remote_addr[p6.addr_type], + self.pg1.remote_addr[p6.addr_type], + p4.remote_tun_if_host6, + p4.remote_tun_if_host6, + 0, + priority=10, + policy=e.IPSEC_API_SPD_ACTION_PROTECT, + is_outbound=1, + ).add_vpp_config() d = DpoProto.DPO_PROTO_IP6 - VppIpRoute(self, p4.remote_tun_if_host6, p6.addr_len, - [VppRoutePath(self.tun_if.remote_addr[p6.addr_type], - 0xffffffff, - proto=d)]).add_vpp_config() + VppIpRoute( + self, + p4.remote_tun_if_host6, + p6.addr_len, + [VppRoutePath(self.tun_if.remote_addr[p6.addr_type], 0xFFFFFFFF, proto=d)], + ).add_vpp_config() old_name = self.tun4_encrypt_node_name self.tun4_encrypt_node_name = "esp6-encrypt" @@ -389,16 +507,18 @@ class TestIpsecEsp1(TemplateIpsecEsp, IpsecTra46Tests, class TestIpsecEspTun(TemplateIpsecEsp, IpsecTun46Tests): - """ Ipsec ESP - TUN encap tests """ + """Ipsec ESP - TUN encap tests""" def setUp(self): self.ipv4_params = IPsecIPv4Params() self.ipv6_params = IPsecIPv6Params() - c = (VppEnum.vl_api_tunnel_encap_decap_flags_t. - TUNNEL_API_ENCAP_DECAP_FLAG_ENCAP_COPY_DSCP) - c1 = c | (VppEnum.vl_api_tunnel_encap_decap_flags_t. - TUNNEL_API_ENCAP_DECAP_FLAG_ENCAP_COPY_ECN) + c = ( + VppEnum.vl_api_tunnel_encap_decap_flags_t.TUNNEL_API_ENCAP_DECAP_FLAG_ENCAP_COPY_DSCP + ) + c1 = c | ( + VppEnum.vl_api_tunnel_encap_decap_flags_t.TUNNEL_API_ENCAP_DECAP_FLAG_ENCAP_COPY_ECN + ) self.ipv4_params.tun_flags = c self.ipv6_params.tun_flags = c1 @@ -407,19 +527,23 @@ class TestIpsecEspTun(TemplateIpsecEsp, IpsecTun46Tests): def gen_pkts(self, sw_intf, src, dst, count=1, payload_size=54): # set the DSCP + ECN - flags are set to copy only DSCP - return [Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) / - IP(src=src, dst=dst, tos=5) / - UDP(sport=4444, dport=4444) / - Raw(b'X' * payload_size) - for i in range(count)] + return [ + Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) + / IP(src=src, dst=dst, tos=5) + / UDP(sport=4444, dport=4444) + / Raw(b"X" * payload_size) + for i in range(count) + ] def gen_pkts6(self, p, sw_intf, src, dst, count=1, payload_size=54): # set the DSCP + ECN - flags are set to copy both - return [Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) / - IPv6(src=src, dst=dst, tc=5) / - UDP(sport=4444, dport=4444) / - Raw(b'X' * payload_size) - for i in range(count)] + return [ + Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) + / IPv6(src=src, dst=dst, tc=5) + / UDP(sport=4444, dport=4444) + / Raw(b"X" * payload_size) + for i in range(count) + ] def verify_encrypted(self, p, sa, rxs): # just check that only the DSCP is copied @@ -433,7 +557,7 @@ class TestIpsecEspTun(TemplateIpsecEsp, IpsecTun46Tests): class TestIpsecEspTun2(TemplateIpsecEsp, IpsecTun46Tests): - """ Ipsec ESP - TUN DSCP tests """ + """Ipsec ESP - TUN DSCP tests""" def setUp(self): self.ipv4_params = IPsecIPv4Params() @@ -445,39 +569,44 @@ class TestIpsecEspTun2(TemplateIpsecEsp, IpsecTun46Tests): super(TestIpsecEspTun2, self).setUp() def gen_pkts(self, sw_intf, src, dst, count=1, payload_size=54): - return [Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) / - IP(src=src, dst=dst) / - UDP(sport=4444, dport=4444) / - Raw(b'X' * payload_size) - for i in range(count)] + return [ + Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) + / IP(src=src, dst=dst) + / UDP(sport=4444, dport=4444) + / Raw(b"X" * payload_size) + for i in range(count) + ] def gen_pkts6(self, p, sw_intf, src, dst, count=1, payload_size=54): - return [Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) / - IPv6(src=src, dst=dst) / - UDP(sport=4444, dport=4444) / - Raw(b'X' * payload_size) - for i in range(count)] + return [ + Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) + / IPv6(src=src, dst=dst) + / UDP(sport=4444, dport=4444) + / Raw(b"X" * payload_size) + for i in range(count) + ] def verify_encrypted(self, p, sa, rxs): # just check that only the DSCP is set for rx in rxs: - self.assertEqual(rx[IP].tos, - VppEnum.vl_api_ip_dscp_t.IP_API_DSCP_EF << 2) + self.assertEqual(rx[IP].tos, VppEnum.vl_api_ip_dscp_t.IP_API_DSCP_EF << 2) def verify_encrypted6(self, p, sa, rxs): # just check that the DSCP is set for rx in rxs: - self.assertEqual(rx[IPv6].tc, - VppEnum.vl_api_ip_dscp_t.IP_API_DSCP_AF11 << 2) + self.assertEqual( + rx[IPv6].tc, VppEnum.vl_api_ip_dscp_t.IP_API_DSCP_AF11 << 2 + ) class TestIpsecEsp2(TemplateIpsecEsp, IpsecTcpTests): - """ Ipsec ESP - TCP tests """ + """Ipsec ESP - TCP tests""" + pass class TestIpsecEspAsync(TemplateIpsecEsp): - """ Ipsec ESP - Aysnc tests """ + """Ipsec ESP - Aysnc tests""" vpp_worker_count = 2 @@ -486,15 +615,16 @@ class TestIpsecEspAsync(TemplateIpsecEsp): self.p_sync = IPsecIPv4Params() - self.p_sync.crypt_algo_vpp_id = (VppEnum.vl_api_ipsec_crypto_alg_t. - IPSEC_API_CRYPTO_ALG_AES_CBC_256) - self.p_sync.crypt_algo = 'AES-CBC' # scapy name - self.p_sync.crypt_key = b'JPjyOWBeVEQiMe7hJPjyOWBeVEQiMe7h' + self.p_sync.crypt_algo_vpp_id = ( + VppEnum.vl_api_ipsec_crypto_alg_t.IPSEC_API_CRYPTO_ALG_AES_CBC_256 + ) + self.p_sync.crypt_algo = "AES-CBC" # scapy name + self.p_sync.crypt_key = b"JPjyOWBeVEQiMe7hJPjyOWBeVEQiMe7h" - self.p_sync.scapy_tun_sa_id += 0xf0000 - self.p_sync.scapy_tun_spi += 0xf0000 - self.p_sync.vpp_tun_sa_id += 0xf0000 - self.p_sync.vpp_tun_spi += 0xf0000 + self.p_sync.scapy_tun_sa_id += 0xF0000 + self.p_sync.scapy_tun_spi += 0xF0000 + self.p_sync.vpp_tun_sa_id += 0xF0000 + self.p_sync.vpp_tun_spi += 0xF0000 self.p_sync.remote_tun_if_host = "2.2.2.2" e = VppEnum.vl_api_ipsec_spd_action_t @@ -508,7 +638,8 @@ class TestIpsecEspAsync(TemplateIpsecEsp): self.p_sync.crypt_key, self.vpp_esp_protocol, self.tun_if.local_addr[self.p_sync.addr_type], - self.tun_if.remote_addr[self.p_sync.addr_type]).add_vpp_config() + self.tun_if.remote_addr[self.p_sync.addr_type], + ).add_vpp_config() self.p_sync.spd = VppIpsecSpdEntry( self, self.tun_spd, @@ -520,35 +651,40 @@ class TestIpsecEspAsync(TemplateIpsecEsp): 0, priority=1, policy=e.IPSEC_API_SPD_ACTION_PROTECT, - is_outbound=1).add_vpp_config() - VppIpRoute(self, - self.p_sync.remote_tun_if_host, - self.p_sync.addr_len, - [VppRoutePath( - self.tun_if.remote_addr[self.p_sync.addr_type], - 0xffffffff)]).add_vpp_config() + is_outbound=1, + ).add_vpp_config() + VppIpRoute( + self, + self.p_sync.remote_tun_if_host, + self.p_sync.addr_len, + [VppRoutePath(self.tun_if.remote_addr[self.p_sync.addr_type], 0xFFFFFFFF)], + ).add_vpp_config() config_tun_params(self.p_sync, self.encryption_type, self.tun_if) self.p_async = IPsecIPv4Params() - self.p_async.crypt_algo_vpp_id = (VppEnum.vl_api_ipsec_crypto_alg_t. - IPSEC_API_CRYPTO_ALG_AES_GCM_256) - self.p_async.auth_algo_vpp_id = (VppEnum.vl_api_ipsec_integ_alg_t. - IPSEC_API_INTEG_ALG_NONE) - self.p_async.crypt_algo = 'AES-GCM' # scapy name - self.p_async.crypt_key = b'JPjyOWBeVEQiMe7hJPjyOWBeVEQiMe7h' - self.p_async.auth_algo = 'NULL' - - self.p_async.scapy_tun_sa_id += 0xe0000 - self.p_async.scapy_tun_spi += 0xe0000 - self.p_async.vpp_tun_sa_id += 0xe0000 - self.p_async.vpp_tun_spi += 0xe0000 + self.p_async.crypt_algo_vpp_id = ( + VppEnum.vl_api_ipsec_crypto_alg_t.IPSEC_API_CRYPTO_ALG_AES_GCM_256 + ) + self.p_async.auth_algo_vpp_id = ( + VppEnum.vl_api_ipsec_integ_alg_t.IPSEC_API_INTEG_ALG_NONE + ) + self.p_async.crypt_algo = "AES-GCM" # scapy name + self.p_async.crypt_key = b"JPjyOWBeVEQiMe7hJPjyOWBeVEQiMe7h" + self.p_async.auth_algo = "NULL" + + self.p_async.scapy_tun_sa_id += 0xE0000 + self.p_async.scapy_tun_spi += 0xE0000 + self.p_async.vpp_tun_sa_id += 0xE0000 + self.p_async.vpp_tun_spi += 0xE0000 self.p_async.remote_tun_if_host = "2.2.2.3" iflags = VppEnum.vl_api_ipsec_sad_flags_t - self.p_async.flags = (iflags.IPSEC_API_SAD_FLAG_USE_ESN | - iflags.IPSEC_API_SAD_FLAG_USE_ANTI_REPLAY | - iflags.IPSEC_API_SAD_FLAG_ASYNC) + self.p_async.flags = ( + iflags.IPSEC_API_SAD_FLAG_USE_ESN + | iflags.IPSEC_API_SAD_FLAG_USE_ANTI_REPLAY + | iflags.IPSEC_API_SAD_FLAG_ASYNC + ) self.p_async.sa = VppIpsecSA( self, @@ -561,7 +697,8 @@ class TestIpsecEspAsync(TemplateIpsecEsp): self.vpp_esp_protocol, self.tun_if.local_addr[self.p_async.addr_type], self.tun_if.remote_addr[self.p_async.addr_type], - flags=self.p_async.flags).add_vpp_config() + flags=self.p_async.flags, + ).add_vpp_config() self.p_async.spd = VppIpsecSpdEntry( self, self.tun_spd, @@ -573,30 +710,35 @@ class TestIpsecEspAsync(TemplateIpsecEsp): 0, priority=2, policy=e.IPSEC_API_SPD_ACTION_PROTECT, - is_outbound=1).add_vpp_config() - VppIpRoute(self, - self.p_async.remote_tun_if_host, - self.p_async.addr_len, - [VppRoutePath( - self.tun_if.remote_addr[self.p_async.addr_type], - 0xffffffff)]).add_vpp_config() + is_outbound=1, + ).add_vpp_config() + VppIpRoute( + self, + self.p_async.remote_tun_if_host, + self.p_async.addr_len, + [VppRoutePath(self.tun_if.remote_addr[self.p_async.addr_type], 0xFFFFFFFF)], + ).add_vpp_config() config_tun_params(self.p_async, self.encryption_type, self.tun_if) def test_dual_stream(self): - """ Alternating SAs """ + """Alternating SAs""" p = self.params[self.p_sync.addr_type] self.vapi.ipsec_set_async_mode(async_enable=True) - pkts = [(Ether(src=self.pg1.remote_mac, dst=self.pg1.local_mac) / - IP(src=self.pg1.remote_ip4, - dst=self.p_sync.remote_tun_if_host) / - UDP(sport=4444, dport=4444) / - Raw(b'0x0' * 200)), - (Ether(src=self.pg1.remote_mac, dst=self.pg1.local_mac) / - IP(src=self.pg1.remote_ip4, - dst=p.remote_tun_if_host) / - UDP(sport=4444, dport=4444) / - Raw(b'0x0' * 200))] + pkts = [ + ( + Ether(src=self.pg1.remote_mac, dst=self.pg1.local_mac) + / IP(src=self.pg1.remote_ip4, dst=self.p_sync.remote_tun_if_host) + / UDP(sport=4444, dport=4444) + / Raw(b"0x0" * 200) + ), + ( + Ether(src=self.pg1.remote_mac, dst=self.pg1.local_mac) + / IP(src=self.pg1.remote_ip4, dst=p.remote_tun_if_host) + / UDP(sport=4444, dport=4444) + / Raw(b"0x0" * 200) + ), + ] pkts *= 1023 rxs = self.send_and_expect(self.pg1, pkts, self.pg0) @@ -619,15 +761,18 @@ class TestIpsecEspAsync(TemplateIpsecEsp): self.vapi.ipsec_set_async_mode(async_enable=False) def test_sync_async_noop_stream(self): - """ Alternating SAs sync/async/noop """ + """Alternating SAs sync/async/noop""" p = self.params[self.p_sync.addr_type] # first pin the default/noop SA to worker 0 - pkts = [(Ether(src=self.pg1.remote_mac, dst=self.pg1.local_mac) / - IP(src=self.pg1.remote_ip4, - dst=p.remote_tun_if_host) / - UDP(sport=4444, dport=4444) / - Raw(b'0x0' * 200))] + pkts = [ + ( + Ether(src=self.pg1.remote_mac, dst=self.pg1.local_mac) + / IP(src=self.pg1.remote_ip4, dst=p.remote_tun_if_host) + / UDP(sport=4444, dport=4444) + / Raw(b"0x0" * 200) + ) + ] rxs = self.send_and_expect(self.pg1, pkts, self.pg0, worker=0) self.logger.info(self.vapi.cli("sh ipsec sa")) @@ -635,21 +780,26 @@ class TestIpsecEspAsync(TemplateIpsecEsp): # then use all the other SAs on worker 1. # some will handoff, other take the sync and async paths - pkts = [(Ether(src=self.pg1.remote_mac, dst=self.pg1.local_mac) / - IP(src=self.pg1.remote_ip4, - dst=self.p_sync.remote_tun_if_host) / - UDP(sport=4444, dport=4444) / - Raw(b'0x0' * 200)), - (Ether(src=self.pg1.remote_mac, dst=self.pg1.local_mac) / - IP(src=self.pg1.remote_ip4, - dst=p.remote_tun_if_host) / - UDP(sport=4444, dport=4444) / - Raw(b'0x0' * 200)), - (Ether(src=self.pg1.remote_mac, dst=self.pg1.local_mac) / - IP(src=self.pg1.remote_ip4, - dst=self.p_async.remote_tun_if_host) / - UDP(sport=4444, dport=4444) / - Raw(b'0x0' * 200))] + pkts = [ + ( + Ether(src=self.pg1.remote_mac, dst=self.pg1.local_mac) + / IP(src=self.pg1.remote_ip4, dst=self.p_sync.remote_tun_if_host) + / UDP(sport=4444, dport=4444) + / Raw(b"0x0" * 200) + ), + ( + Ether(src=self.pg1.remote_mac, dst=self.pg1.local_mac) + / IP(src=self.pg1.remote_ip4, dst=p.remote_tun_if_host) + / UDP(sport=4444, dport=4444) + / Raw(b"0x0" * 200) + ), + ( + Ether(src=self.pg1.remote_mac, dst=self.pg1.local_mac) + / IP(src=self.pg1.remote_ip4, dst=self.p_async.remote_tun_if_host) + / UDP(sport=4444, dport=4444) + / Raw(b"0x0" * 200) + ), + ] pkts *= 1023 rxs = self.send_and_expect(self.pg1, pkts, self.pg0, worker=1) @@ -678,10 +828,11 @@ class TestIpsecEspAsync(TemplateIpsecEsp): self.assertTrue("DISABLED" in self.vapi.cli("sh crypto async status")) -class TestIpsecEspHandoff(TemplateIpsecEsp, - IpsecTun6HandoffTests, - IpsecTun4HandoffTests): - """ Ipsec ESP - handoff tests """ +class TestIpsecEspHandoff( + TemplateIpsecEsp, IpsecTun6HandoffTests, IpsecTun4HandoffTests +): + """Ipsec ESP - handoff tests""" + pass @@ -706,33 +857,33 @@ class TemplateIpsecEspUdp(ConfigIpsecESP): self.logger.info(self.vapi.ppcli("show int addr")) p = self.ipv4_params - p.flags = (VppEnum.vl_api_ipsec_sad_flags_t. - IPSEC_API_SAD_FLAG_UDP_ENCAP | - VppEnum.vl_api_ipsec_sad_flags_t. - IPSEC_API_SAD_FLAG_USE_ANTI_REPLAY) + p.flags = ( + VppEnum.vl_api_ipsec_sad_flags_t.IPSEC_API_SAD_FLAG_UDP_ENCAP + | VppEnum.vl_api_ipsec_sad_flags_t.IPSEC_API_SAD_FLAG_USE_ANTI_REPLAY + ) p.nat_header = UDP(sport=5454, dport=4500) self.tra_spd = VppIpsecSpd(self, self.tra_spd_id) self.tra_spd.add_vpp_config() - VppIpsecSpdItfBinding(self, self.tra_spd, - self.tra_if).add_vpp_config() + VppIpsecSpdItfBinding(self, self.tra_spd, self.tra_if).add_vpp_config() self.config_esp_tra(p) config_tra_params(p, self.encryption_type) self.tun_spd = VppIpsecSpd(self, self.tun_spd_id) self.tun_spd.add_vpp_config() - VppIpsecSpdItfBinding(self, self.tun_spd, - self.tun_if).add_vpp_config() + VppIpsecSpdItfBinding(self, self.tun_spd, self.tun_if).add_vpp_config() self.config_esp_tun(p) self.logger.info(self.vapi.ppcli("show ipsec all")) d = DpoProto.DPO_PROTO_IP4 - VppIpRoute(self, p.remote_tun_if_host, p.addr_len, - [VppRoutePath(self.tun_if.remote_addr[p.addr_type], - 0xffffffff, - proto=d)]).add_vpp_config() + VppIpRoute( + self, + p.remote_tun_if_host, + p.addr_len, + [VppRoutePath(self.tun_if.remote_addr[p.addr_type], 0xFFFFFFFF, proto=d)], + ).add_vpp_config() def tearDown(self): super(TemplateIpsecEspUdp, self).tearDown() @@ -742,11 +893,12 @@ class TemplateIpsecEspUdp(ConfigIpsecESP): class TestIpsecEspUdp(TemplateIpsecEspUdp, IpsecTra4Tests): - """ Ipsec NAT-T ESP UDP tests """ + """Ipsec NAT-T ESP UDP tests""" + pass -class MyParameters(): +class MyParameters: def __init__(self): saf = VppEnum.vl_api_ipsec_sad_flags_t flag_esn = saf.IPSEC_API_SAD_FLAG_USE_ESN @@ -754,111 +906,143 @@ class MyParameters(): self.flags = [0, flag_esn, flag_ar] # foreach crypto algorithm self.algos = { - 'AES-GCM-128/NONE': { - 'vpp-crypto': (VppEnum.vl_api_ipsec_crypto_alg_t. - IPSEC_API_CRYPTO_ALG_AES_GCM_128), - 'vpp-integ': (VppEnum.vl_api_ipsec_integ_alg_t. - IPSEC_API_INTEG_ALG_NONE), - 'scapy-crypto': "AES-GCM", - 'scapy-integ': "NULL", - 'key': b"JPjyOWBeVEQiMe7h", - 'salt': 0}, - 'AES-GCM-192/NONE': { - 'vpp-crypto': (VppEnum.vl_api_ipsec_crypto_alg_t. - IPSEC_API_CRYPTO_ALG_AES_GCM_192), - 'vpp-integ': (VppEnum.vl_api_ipsec_integ_alg_t. - IPSEC_API_INTEG_ALG_NONE), - 'scapy-crypto': "AES-GCM", - 'scapy-integ': "NULL", - 'key': b"JPjyOWBeVEQiMe7h01234567", - 'salt': 1010}, - 'AES-GCM-256/NONE': { - 'vpp-crypto': (VppEnum.vl_api_ipsec_crypto_alg_t. - IPSEC_API_CRYPTO_ALG_AES_GCM_256), - 'vpp-integ': (VppEnum.vl_api_ipsec_integ_alg_t. - IPSEC_API_INTEG_ALG_NONE), - 'scapy-crypto': "AES-GCM", - 'scapy-integ': "NULL", - 'key': b"JPjyOWBeVEQiMe7h0123456787654321", - 'salt': 2020}, - 'AES-CBC-128/MD5-96': { - 'vpp-crypto': (VppEnum.vl_api_ipsec_crypto_alg_t. - IPSEC_API_CRYPTO_ALG_AES_CBC_128), - 'vpp-integ': (VppEnum.vl_api_ipsec_integ_alg_t. - IPSEC_API_INTEG_ALG_MD5_96), - 'scapy-crypto': "AES-CBC", - 'scapy-integ': "HMAC-MD5-96", - 'salt': 0, - 'key': b"JPjyOWBeVEQiMe7h"}, - 'AES-CBC-192/SHA1-96': { - 'vpp-crypto': (VppEnum.vl_api_ipsec_crypto_alg_t. - IPSEC_API_CRYPTO_ALG_AES_CBC_192), - 'vpp-integ': (VppEnum.vl_api_ipsec_integ_alg_t. - IPSEC_API_INTEG_ALG_SHA1_96), - 'scapy-crypto': "AES-CBC", - 'scapy-integ': "HMAC-SHA1-96", - 'salt': 0, - 'key': b"JPjyOWBeVEQiMe7hJPjyOWBe"}, - 'AES-CBC-256/SHA1-96': { - 'vpp-crypto': (VppEnum.vl_api_ipsec_crypto_alg_t. - IPSEC_API_CRYPTO_ALG_AES_CBC_256), - 'vpp-integ': (VppEnum.vl_api_ipsec_integ_alg_t. - IPSEC_API_INTEG_ALG_SHA1_96), - 'scapy-crypto': "AES-CBC", - 'scapy-integ': "HMAC-SHA1-96", - 'salt': 0, - 'key': b"JPjyOWBeVEQiMe7hJPjyOWBeVEQiMe7h"}, - '3DES-CBC/SHA1-96': { - 'vpp-crypto': (VppEnum.vl_api_ipsec_crypto_alg_t. - IPSEC_API_CRYPTO_ALG_3DES_CBC), - 'vpp-integ': (VppEnum.vl_api_ipsec_integ_alg_t. - IPSEC_API_INTEG_ALG_SHA1_96), - 'scapy-crypto': "3DES", - 'scapy-integ': "HMAC-SHA1-96", - 'salt': 0, - 'key': b"JPjyOWBeVEQiMe7h00112233"}, - 'NONE/SHA1-96': { - 'vpp-crypto': (VppEnum.vl_api_ipsec_crypto_alg_t. - IPSEC_API_CRYPTO_ALG_NONE), - 'vpp-integ': (VppEnum.vl_api_ipsec_integ_alg_t. - IPSEC_API_INTEG_ALG_SHA1_96), - 'scapy-crypto': "NULL", - 'scapy-integ': "HMAC-SHA1-96", - 'salt': 0, - 'key': b"JPjyOWBeVEQiMe7h00112233"}, - 'AES-CTR-128/SHA1-96': { - 'vpp-crypto': (VppEnum.vl_api_ipsec_crypto_alg_t. - IPSEC_API_CRYPTO_ALG_AES_CTR_128), - 'vpp-integ': (VppEnum.vl_api_ipsec_integ_alg_t. - IPSEC_API_INTEG_ALG_SHA1_96), - 'scapy-crypto': "AES-CTR", - 'scapy-integ': "HMAC-SHA1-96", - 'salt': 0, - 'key': b"JPjyOWBeVEQiMe7h"}, - 'AES-CTR-192/SHA1-96': { - 'vpp-crypto': (VppEnum.vl_api_ipsec_crypto_alg_t. - IPSEC_API_CRYPTO_ALG_AES_CTR_192), - 'vpp-integ': (VppEnum.vl_api_ipsec_integ_alg_t. - IPSEC_API_INTEG_ALG_SHA1_96), - 'scapy-crypto': "AES-CTR", - 'scapy-integ': "HMAC-SHA1-96", - 'salt': 1010, - 'key': b"JPjyOWBeVEQiMe7hJPjyOWBe"}, - 'AES-CTR-256/SHA1-96': { - 'vpp-crypto': (VppEnum.vl_api_ipsec_crypto_alg_t. - IPSEC_API_CRYPTO_ALG_AES_CTR_256), - 'vpp-integ': (VppEnum.vl_api_ipsec_integ_alg_t. - IPSEC_API_INTEG_ALG_SHA1_96), - 'scapy-crypto': "AES-CTR", - 'scapy-integ': "HMAC-SHA1-96", - 'salt': 2020, - 'key': b"JPjyOWBeVEQiMe7hJPjyOWBeVEQiMe7h"}} - - -class RunTestIpsecEspAll(ConfigIpsecESP, - IpsecTra4, IpsecTra6, - IpsecTun4, IpsecTun6): - """ Ipsec ESP all Algos """ + "AES-GCM-128/NONE": { + "vpp-crypto": ( + VppEnum.vl_api_ipsec_crypto_alg_t.IPSEC_API_CRYPTO_ALG_AES_GCM_128 + ), + "vpp-integ": ( + VppEnum.vl_api_ipsec_integ_alg_t.IPSEC_API_INTEG_ALG_NONE + ), + "scapy-crypto": "AES-GCM", + "scapy-integ": "NULL", + "key": b"JPjyOWBeVEQiMe7h", + "salt": 0, + }, + "AES-GCM-192/NONE": { + "vpp-crypto": ( + VppEnum.vl_api_ipsec_crypto_alg_t.IPSEC_API_CRYPTO_ALG_AES_GCM_192 + ), + "vpp-integ": ( + VppEnum.vl_api_ipsec_integ_alg_t.IPSEC_API_INTEG_ALG_NONE + ), + "scapy-crypto": "AES-GCM", + "scapy-integ": "NULL", + "key": b"JPjyOWBeVEQiMe7h01234567", + "salt": 1010, + }, + "AES-GCM-256/NONE": { + "vpp-crypto": ( + VppEnum.vl_api_ipsec_crypto_alg_t.IPSEC_API_CRYPTO_ALG_AES_GCM_256 + ), + "vpp-integ": ( + VppEnum.vl_api_ipsec_integ_alg_t.IPSEC_API_INTEG_ALG_NONE + ), + "scapy-crypto": "AES-GCM", + "scapy-integ": "NULL", + "key": b"JPjyOWBeVEQiMe7h0123456787654321", + "salt": 2020, + }, + "AES-CBC-128/MD5-96": { + "vpp-crypto": ( + VppEnum.vl_api_ipsec_crypto_alg_t.IPSEC_API_CRYPTO_ALG_AES_CBC_128 + ), + "vpp-integ": ( + VppEnum.vl_api_ipsec_integ_alg_t.IPSEC_API_INTEG_ALG_MD5_96 + ), + "scapy-crypto": "AES-CBC", + "scapy-integ": "HMAC-MD5-96", + "salt": 0, + "key": b"JPjyOWBeVEQiMe7h", + }, + "AES-CBC-192/SHA1-96": { + "vpp-crypto": ( + VppEnum.vl_api_ipsec_crypto_alg_t.IPSEC_API_CRYPTO_ALG_AES_CBC_192 + ), + "vpp-integ": ( + VppEnum.vl_api_ipsec_integ_alg_t.IPSEC_API_INTEG_ALG_SHA1_96 + ), + "scapy-crypto": "AES-CBC", + "scapy-integ": "HMAC-SHA1-96", + "salt": 0, + "key": b"JPjyOWBeVEQiMe7hJPjyOWBe", + }, + "AES-CBC-256/SHA1-96": { + "vpp-crypto": ( + VppEnum.vl_api_ipsec_crypto_alg_t.IPSEC_API_CRYPTO_ALG_AES_CBC_256 + ), + "vpp-integ": ( + VppEnum.vl_api_ipsec_integ_alg_t.IPSEC_API_INTEG_ALG_SHA1_96 + ), + "scapy-crypto": "AES-CBC", + "scapy-integ": "HMAC-SHA1-96", + "salt": 0, + "key": b"JPjyOWBeVEQiMe7hJPjyOWBeVEQiMe7h", + }, + "3DES-CBC/SHA1-96": { + "vpp-crypto": ( + VppEnum.vl_api_ipsec_crypto_alg_t.IPSEC_API_CRYPTO_ALG_3DES_CBC + ), + "vpp-integ": ( + VppEnum.vl_api_ipsec_integ_alg_t.IPSEC_API_INTEG_ALG_SHA1_96 + ), + "scapy-crypto": "3DES", + "scapy-integ": "HMAC-SHA1-96", + "salt": 0, + "key": b"JPjyOWBeVEQiMe7h00112233", + }, + "NONE/SHA1-96": { + "vpp-crypto": ( + VppEnum.vl_api_ipsec_crypto_alg_t.IPSEC_API_CRYPTO_ALG_NONE + ), + "vpp-integ": ( + VppEnum.vl_api_ipsec_integ_alg_t.IPSEC_API_INTEG_ALG_SHA1_96 + ), + "scapy-crypto": "NULL", + "scapy-integ": "HMAC-SHA1-96", + "salt": 0, + "key": b"JPjyOWBeVEQiMe7h00112233", + }, + "AES-CTR-128/SHA1-96": { + "vpp-crypto": ( + VppEnum.vl_api_ipsec_crypto_alg_t.IPSEC_API_CRYPTO_ALG_AES_CTR_128 + ), + "vpp-integ": ( + VppEnum.vl_api_ipsec_integ_alg_t.IPSEC_API_INTEG_ALG_SHA1_96 + ), + "scapy-crypto": "AES-CTR", + "scapy-integ": "HMAC-SHA1-96", + "salt": 0, + "key": b"JPjyOWBeVEQiMe7h", + }, + "AES-CTR-192/SHA1-96": { + "vpp-crypto": ( + VppEnum.vl_api_ipsec_crypto_alg_t.IPSEC_API_CRYPTO_ALG_AES_CTR_192 + ), + "vpp-integ": ( + VppEnum.vl_api_ipsec_integ_alg_t.IPSEC_API_INTEG_ALG_SHA1_96 + ), + "scapy-crypto": "AES-CTR", + "scapy-integ": "HMAC-SHA1-96", + "salt": 1010, + "key": b"JPjyOWBeVEQiMe7hJPjyOWBe", + }, + "AES-CTR-256/SHA1-96": { + "vpp-crypto": ( + VppEnum.vl_api_ipsec_crypto_alg_t.IPSEC_API_CRYPTO_ALG_AES_CTR_256 + ), + "vpp-integ": ( + VppEnum.vl_api_ipsec_integ_alg_t.IPSEC_API_INTEG_ALG_SHA1_96 + ), + "scapy-crypto": "AES-CTR", + "scapy-integ": "HMAC-SHA1-96", + "salt": 2020, + "key": b"JPjyOWBeVEQiMe7hJPjyOWBeVEQiMe7h", + }, + } + + +class RunTestIpsecEspAll(ConfigIpsecESP, IpsecTra4, IpsecTra6, IpsecTun4, IpsecTun6): + """Ipsec ESP all Algos""" @classmethod def setUpConstants(cls): @@ -875,9 +1059,9 @@ class RunTestIpsecEspAll(ConfigIpsecESP, params = MyParameters() self.engine = test_args[0] self.flag = params.flags[0] - if test_args[1] == 'ESNon': + if test_args[1] == "ESNon": self.flag |= params.flags[1] - if test_args[2] == 'ARon': + if test_args[2] == "ARon": self.flag |= params.flags[2] self.algo = params.algos[test_args[3]] @@ -901,18 +1085,18 @@ class RunTestIpsecEspAll(ConfigIpsecESP, self.ipv4_params = IPsecIPv4Params() self.ipv6_params = IPsecIPv6Params() - self.params = {self.ipv4_params.addr_type: - self.ipv4_params, - self.ipv6_params.addr_type: - self.ipv6_params} + self.params = { + self.ipv4_params.addr_type: self.ipv4_params, + self.ipv6_params.addr_type: self.ipv6_params, + } for _, p in self.params.items(): - p.auth_algo_vpp_id = algo['vpp-integ'] - p.crypt_algo_vpp_id = algo['vpp-crypto'] - p.crypt_algo = algo['scapy-crypto'] - p.auth_algo = algo['scapy-integ'] - p.crypt_key = algo['key'] - p.salt = algo['salt'] + p.auth_algo_vpp_id = algo["vpp-integ"] + p.crypt_algo_vpp_id = algo["vpp-crypto"] + p.crypt_algo = algo["scapy-crypto"] + p.auth_algo = algo["scapy-integ"] + p.crypt_key = algo["key"] + p.salt = algo["salt"] p.flags = flag p.outer_flow_label = 243224 p.async_mode = self.async_mode @@ -931,8 +1115,7 @@ class RunTestIpsecEspAll(ConfigIpsecESP, # self.verify_tra_basic6(count=NUM_PKTS) self.verify_tra_basic4(count=NUM_PKTS) - self.verify_tun_66(self.params[socket.AF_INET6], - count=NUM_PKTS) + self.verify_tun_66(self.params[socket.AF_INET6], count=NUM_PKTS) # # Use an odd-byte payload size to check for correct padding. # @@ -940,26 +1123,29 @@ class RunTestIpsecEspAll(ConfigIpsecESP, # to 56 for 8 byte alignment, and +13 to 64 for 64 byte alignment. # This should catch bugs where the code is incorrectly over-padding # for algorithms that don't require it - psz = 49 - len(IP()/ICMP()) if payload_size is None else payload_size - self.verify_tun_44(self.params[socket.AF_INET], - count=NUM_PKTS, payload_size=psz) + psz = 49 - len(IP() / ICMP()) if payload_size is None else payload_size + self.verify_tun_44( + self.params[socket.AF_INET], count=NUM_PKTS, payload_size=psz + ) LARGE_PKT_SZ = [ 1970, # results in 2 chained buffers entering decrypt node - # but leaving as simple buffer due to ICV removal (tra4) + # but leaving as simple buffer due to ICV removal (tra4) 2004, # footer+ICV will be added to 2nd buffer (tun4) 4010, # ICV ends up splitted across 2 buffers in esp_decrypt - # for transport4; transport6 takes normal path + # for transport4; transport6 takes normal path 4020, # same as above but tra4 and tra6 are switched ] if self.engine in engines_supporting_chain_bufs: for sz in LARGE_PKT_SZ: self.verify_tra_basic4(count=NUM_PKTS, payload_size=sz) self.verify_tra_basic6(count=NUM_PKTS, payload_size=sz) - self.verify_tun_66(self.params[socket.AF_INET6], - count=NUM_PKTS, payload_size=sz) - self.verify_tun_44(self.params[socket.AF_INET], - count=NUM_PKTS, payload_size=sz) + self.verify_tun_66( + self.params[socket.AF_INET6], count=NUM_PKTS, payload_size=sz + ) + self.verify_tun_44( + self.params[socket.AF_INET], count=NUM_PKTS, payload_size=sz + ) # # reconfigure the network and SA to run the @@ -990,6 +1176,7 @@ class RunTestIpsecEspAll(ConfigIpsecESP, self.unconfig_network() + # # To generate test classes, do: # grep '# GEN' test_ipsec_esp.py | sed -e 's/# GEN //g' | bash @@ -1026,6 +1213,7 @@ class RunTestIpsecEspAll(ConfigIpsecESP, class Test_native_ESNon_ARon_AES_GCM_128_NONE(RunTestIpsecEspAll): """native ESNon ARon AES-GCM-128/NONE IPSec test""" + def test_ipsec(self): """native ESNon ARon AES-GCM-128/NONE IPSec test""" self.run_test() @@ -1033,6 +1221,7 @@ class Test_native_ESNon_ARon_AES_GCM_128_NONE(RunTestIpsecEspAll): class Test_native_ESNon_ARon_AES_GCM_192_NONE(RunTestIpsecEspAll): """native ESNon ARon AES-GCM-192/NONE IPSec test""" + def test_ipsec(self): """native ESNon ARon AES-GCM-192/NONE IPSec test""" self.run_test() @@ -1040,6 +1229,7 @@ class Test_native_ESNon_ARon_AES_GCM_192_NONE(RunTestIpsecEspAll): class Test_native_ESNon_ARon_AES_GCM_256_NONE(RunTestIpsecEspAll): """native ESNon ARon AES-GCM-256/NONE IPSec test""" + def test_ipsec(self): """native ESNon ARon AES-GCM-256/NONE IPSec test""" self.run_test() @@ -1047,6 +1237,7 @@ class Test_native_ESNon_ARon_AES_GCM_256_NONE(RunTestIpsecEspAll): class Test_native_ESNon_ARon_AES_CBC_128_MD5_96(RunTestIpsecEspAll): """native ESNon ARon AES-CBC-128/MD5-96 IPSec test""" + def test_ipsec(self): """native ESNon ARon AES-CBC-128/MD5-96 IPSec test""" self.run_test() @@ -1054,6 +1245,7 @@ class Test_native_ESNon_ARon_AES_CBC_128_MD5_96(RunTestIpsecEspAll): class Test_native_ESNon_ARon_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): """native ESNon ARon AES-CBC-192/SHA1-96 IPSec test""" + def test_ipsec(self): """native ESNon ARon AES-CBC-192/SHA1-96 IPSec test""" self.run_test() @@ -1061,6 +1253,7 @@ class Test_native_ESNon_ARon_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): class Test_native_ESNon_ARon_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): """native ESNon ARon AES-CBC-256/SHA1-96 IPSec test""" + def test_ipsec(self): """native ESNon ARon AES-CBC-256/SHA1-96 IPSec test""" self.run_test() @@ -1068,6 +1261,7 @@ class Test_native_ESNon_ARon_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): class Test_native_ESNon_ARon_3DES_CBC_SHA1_96(RunTestIpsecEspAll): """native ESNon ARon 3DES-CBC/SHA1-96 IPSec test""" + def test_ipsec(self): """native ESNon ARon 3DES-CBC/SHA1-96 IPSec test""" self.run_test() @@ -1075,6 +1269,7 @@ class Test_native_ESNon_ARon_3DES_CBC_SHA1_96(RunTestIpsecEspAll): class Test_native_ESNon_ARon_NONE_SHA1_96(RunTestIpsecEspAll): """native ESNon ARon NONE/SHA1-96 IPSec test""" + def test_ipsec(self): """native ESNon ARon NONE/SHA1-96 IPSec test""" self.run_test() @@ -1082,6 +1277,7 @@ class Test_native_ESNon_ARon_NONE_SHA1_96(RunTestIpsecEspAll): class Test_native_ESNon_ARon_AES_CTR_128_SHA1_96(RunTestIpsecEspAll): """native ESNon ARon AES-CTR-128/SHA1-96 IPSec test""" + def test_ipsec(self): """native ESNon ARon AES-CTR-128/SHA1-96 IPSec test""" self.run_test() @@ -1089,6 +1285,7 @@ class Test_native_ESNon_ARon_AES_CTR_128_SHA1_96(RunTestIpsecEspAll): class Test_native_ESNon_ARon_AES_CTR_192_SHA1_96(RunTestIpsecEspAll): """native ESNon ARon AES-CTR-192/SHA1-96 IPSec test""" + def test_ipsec(self): """native ESNon ARon AES-CTR-192/SHA1-96 IPSec test""" self.run_test() @@ -1096,6 +1293,7 @@ class Test_native_ESNon_ARon_AES_CTR_192_SHA1_96(RunTestIpsecEspAll): class Test_native_ESNon_ARon_AES_CTR_256_SHA1_96(RunTestIpsecEspAll): """native ESNon ARon AES-CTR-256/SHA1-96 IPSec test""" + def test_ipsec(self): """native ESNon ARon AES-CTR-256/SHA1-96 IPSec test""" self.run_test() @@ -1103,6 +1301,7 @@ class Test_native_ESNon_ARon_AES_CTR_256_SHA1_96(RunTestIpsecEspAll): class Test_native_ESNon_ARoff_AES_GCM_128_NONE(RunTestIpsecEspAll): """native ESNon ARoff AES-GCM-128/NONE IPSec test""" + def test_ipsec(self): """native ESNon ARoff AES-GCM-128/NONE IPSec test""" self.run_test() @@ -1110,6 +1309,7 @@ class Test_native_ESNon_ARoff_AES_GCM_128_NONE(RunTestIpsecEspAll): class Test_native_ESNon_ARoff_AES_GCM_192_NONE(RunTestIpsecEspAll): """native ESNon ARoff AES-GCM-192/NONE IPSec test""" + def test_ipsec(self): """native ESNon ARoff AES-GCM-192/NONE IPSec test""" self.run_test() @@ -1117,6 +1317,7 @@ class Test_native_ESNon_ARoff_AES_GCM_192_NONE(RunTestIpsecEspAll): class Test_native_ESNon_ARoff_AES_GCM_256_NONE(RunTestIpsecEspAll): """native ESNon ARoff AES-GCM-256/NONE IPSec test""" + def test_ipsec(self): """native ESNon ARoff AES-GCM-256/NONE IPSec test""" self.run_test() @@ -1124,6 +1325,7 @@ class Test_native_ESNon_ARoff_AES_GCM_256_NONE(RunTestIpsecEspAll): class Test_native_ESNon_ARoff_AES_CBC_128_MD5_96(RunTestIpsecEspAll): """native ESNon ARoff AES-CBC-128/MD5-96 IPSec test""" + def test_ipsec(self): """native ESNon ARoff AES-CBC-128/MD5-96 IPSec test""" self.run_test() @@ -1131,6 +1333,7 @@ class Test_native_ESNon_ARoff_AES_CBC_128_MD5_96(RunTestIpsecEspAll): class Test_native_ESNon_ARoff_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): """native ESNon ARoff AES-CBC-192/SHA1-96 IPSec test""" + def test_ipsec(self): """native ESNon ARoff AES-CBC-192/SHA1-96 IPSec test""" self.run_test() @@ -1138,6 +1341,7 @@ class Test_native_ESNon_ARoff_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): class Test_native_ESNon_ARoff_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): """native ESNon ARoff AES-CBC-256/SHA1-96 IPSec test""" + def test_ipsec(self): """native ESNon ARoff AES-CBC-256/SHA1-96 IPSec test""" self.run_test() @@ -1145,6 +1349,7 @@ class Test_native_ESNon_ARoff_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): class Test_native_ESNon_ARoff_3DES_CBC_SHA1_96(RunTestIpsecEspAll): """native ESNon ARoff 3DES-CBC/SHA1-96 IPSec test""" + def test_ipsec(self): """native ESNon ARoff 3DES-CBC/SHA1-96 IPSec test""" self.run_test() @@ -1152,6 +1357,7 @@ class Test_native_ESNon_ARoff_3DES_CBC_SHA1_96(RunTestIpsecEspAll): class Test_native_ESNon_ARoff_NONE_SHA1_96(RunTestIpsecEspAll): """native ESNon ARoff NONE/SHA1-96 IPSec test""" + def test_ipsec(self): """native ESNon ARoff NONE/SHA1-96 IPSec test""" self.run_test() @@ -1159,6 +1365,7 @@ class Test_native_ESNon_ARoff_NONE_SHA1_96(RunTestIpsecEspAll): class Test_native_ESNon_ARoff_AES_CTR_128_SHA1_96(RunTestIpsecEspAll): """native ESNon ARoff AES-CTR-128/SHA1-96 IPSec test""" + def test_ipsec(self): """native ESNon ARoff AES-CTR-128/SHA1-96 IPSec test""" self.run_test() @@ -1166,6 +1373,7 @@ class Test_native_ESNon_ARoff_AES_CTR_128_SHA1_96(RunTestIpsecEspAll): class Test_native_ESNon_ARoff_AES_CTR_192_SHA1_96(RunTestIpsecEspAll): """native ESNon ARoff AES-CTR-192/SHA1-96 IPSec test""" + def test_ipsec(self): """native ESNon ARoff AES-CTR-192/SHA1-96 IPSec test""" self.run_test() @@ -1173,6 +1381,7 @@ class Test_native_ESNon_ARoff_AES_CTR_192_SHA1_96(RunTestIpsecEspAll): class Test_native_ESNon_ARoff_AES_CTR_256_SHA1_96(RunTestIpsecEspAll): """native ESNon ARoff AES-CTR-256/SHA1-96 IPSec test""" + def test_ipsec(self): """native ESNon ARoff AES-CTR-256/SHA1-96 IPSec test""" self.run_test() @@ -1180,6 +1389,7 @@ class Test_native_ESNon_ARoff_AES_CTR_256_SHA1_96(RunTestIpsecEspAll): class Test_native_ESNoff_ARon_AES_GCM_128_NONE(RunTestIpsecEspAll): """native ESNoff ARon AES-GCM-128/NONE IPSec test""" + def test_ipsec(self): """native ESNoff ARon AES-GCM-128/NONE IPSec test""" self.run_test() @@ -1187,6 +1397,7 @@ class Test_native_ESNoff_ARon_AES_GCM_128_NONE(RunTestIpsecEspAll): class Test_native_ESNoff_ARon_AES_GCM_192_NONE(RunTestIpsecEspAll): """native ESNoff ARon AES-GCM-192/NONE IPSec test""" + def test_ipsec(self): """native ESNoff ARon AES-GCM-192/NONE IPSec test""" self.run_test() @@ -1194,6 +1405,7 @@ class Test_native_ESNoff_ARon_AES_GCM_192_NONE(RunTestIpsecEspAll): class Test_native_ESNoff_ARon_AES_GCM_256_NONE(RunTestIpsecEspAll): """native ESNoff ARon AES-GCM-256/NONE IPSec test""" + def test_ipsec(self): """native ESNoff ARon AES-GCM-256/NONE IPSec test""" self.run_test() @@ -1201,6 +1413,7 @@ class Test_native_ESNoff_ARon_AES_GCM_256_NONE(RunTestIpsecEspAll): class Test_native_ESNoff_ARon_AES_CBC_128_MD5_96(RunTestIpsecEspAll): """native ESNoff ARon AES-CBC-128/MD5-96 IPSec test""" + def test_ipsec(self): """native ESNoff ARon AES-CBC-128/MD5-96 IPSec test""" self.run_test() @@ -1208,6 +1421,7 @@ class Test_native_ESNoff_ARon_AES_CBC_128_MD5_96(RunTestIpsecEspAll): class Test_native_ESNoff_ARon_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): """native ESNoff ARon AES-CBC-192/SHA1-96 IPSec test""" + def test_ipsec(self): """native ESNoff ARon AES-CBC-192/SHA1-96 IPSec test""" self.run_test() @@ -1215,6 +1429,7 @@ class Test_native_ESNoff_ARon_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): class Test_native_ESNoff_ARon_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): """native ESNoff ARon AES-CBC-256/SHA1-96 IPSec test""" + def test_ipsec(self): """native ESNoff ARon AES-CBC-256/SHA1-96 IPSec test""" self.run_test() @@ -1222,6 +1437,7 @@ class Test_native_ESNoff_ARon_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): class Test_native_ESNoff_ARon_3DES_CBC_SHA1_96(RunTestIpsecEspAll): """native ESNoff ARon 3DES-CBC/SHA1-96 IPSec test""" + def test_ipsec(self): """native ESNoff ARon 3DES-CBC/SHA1-96 IPSec test""" self.run_test() @@ -1229,6 +1445,7 @@ class Test_native_ESNoff_ARon_3DES_CBC_SHA1_96(RunTestIpsecEspAll): class Test_native_ESNoff_ARon_NONE_SHA1_96(RunTestIpsecEspAll): """native ESNoff ARon NONE/SHA1-96 IPSec test""" + def test_ipsec(self): """native ESNoff ARon NONE/SHA1-96 IPSec test""" self.run_test() @@ -1236,6 +1453,7 @@ class Test_native_ESNoff_ARon_NONE_SHA1_96(RunTestIpsecEspAll): class Test_native_ESNoff_ARon_AES_CTR_128_SHA1_96(RunTestIpsecEspAll): """native ESNoff ARon AES-CTR-128/SHA1-96 IPSec test""" + def test_ipsec(self): """native ESNoff ARon AES-CTR-128/SHA1-96 IPSec test""" self.run_test() @@ -1243,6 +1461,7 @@ class Test_native_ESNoff_ARon_AES_CTR_128_SHA1_96(RunTestIpsecEspAll): class Test_native_ESNoff_ARon_AES_CTR_192_SHA1_96(RunTestIpsecEspAll): """native ESNoff ARon AES-CTR-192/SHA1-96 IPSec test""" + def test_ipsec(self): """native ESNoff ARon AES-CTR-192/SHA1-96 IPSec test""" self.run_test() @@ -1250,6 +1469,7 @@ class Test_native_ESNoff_ARon_AES_CTR_192_SHA1_96(RunTestIpsecEspAll): class Test_native_ESNoff_ARon_AES_CTR_256_SHA1_96(RunTestIpsecEspAll): """native ESNoff ARon AES-CTR-256/SHA1-96 IPSec test""" + def test_ipsec(self): """native ESNoff ARon AES-CTR-256/SHA1-96 IPSec test""" self.run_test() @@ -1257,6 +1477,7 @@ class Test_native_ESNoff_ARon_AES_CTR_256_SHA1_96(RunTestIpsecEspAll): class Test_native_ESNoff_ARoff_AES_GCM_128_NONE(RunTestIpsecEspAll): """native ESNoff ARoff AES-GCM-128/NONE IPSec test""" + def test_ipsec(self): """native ESNoff ARoff AES-GCM-128/NONE IPSec test""" self.run_test() @@ -1264,6 +1485,7 @@ class Test_native_ESNoff_ARoff_AES_GCM_128_NONE(RunTestIpsecEspAll): class Test_native_ESNoff_ARoff_AES_GCM_192_NONE(RunTestIpsecEspAll): """native ESNoff ARoff AES-GCM-192/NONE IPSec test""" + def test_ipsec(self): """native ESNoff ARoff AES-GCM-192/NONE IPSec test""" self.run_test() @@ -1271,6 +1493,7 @@ class Test_native_ESNoff_ARoff_AES_GCM_192_NONE(RunTestIpsecEspAll): class Test_native_ESNoff_ARoff_AES_GCM_256_NONE(RunTestIpsecEspAll): """native ESNoff ARoff AES-GCM-256/NONE IPSec test""" + def test_ipsec(self): """native ESNoff ARoff AES-GCM-256/NONE IPSec test""" self.run_test() @@ -1278,6 +1501,7 @@ class Test_native_ESNoff_ARoff_AES_GCM_256_NONE(RunTestIpsecEspAll): class Test_native_ESNoff_ARoff_AES_CBC_128_MD5_96(RunTestIpsecEspAll): """native ESNoff ARoff AES-CBC-128/MD5-96 IPSec test""" + def test_ipsec(self): """native ESNoff ARoff AES-CBC-128/MD5-96 IPSec test""" self.run_test() @@ -1285,6 +1509,7 @@ class Test_native_ESNoff_ARoff_AES_CBC_128_MD5_96(RunTestIpsecEspAll): class Test_native_ESNoff_ARoff_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): """native ESNoff ARoff AES-CBC-192/SHA1-96 IPSec test""" + def test_ipsec(self): """native ESNoff ARoff AES-CBC-192/SHA1-96 IPSec test""" self.run_test() @@ -1292,6 +1517,7 @@ class Test_native_ESNoff_ARoff_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): class Test_native_ESNoff_ARoff_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): """native ESNoff ARoff AES-CBC-256/SHA1-96 IPSec test""" + def test_ipsec(self): """native ESNoff ARoff AES-CBC-256/SHA1-96 IPSec test""" self.run_test() @@ -1299,6 +1525,7 @@ class Test_native_ESNoff_ARoff_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): class Test_native_ESNoff_ARoff_3DES_CBC_SHA1_96(RunTestIpsecEspAll): """native ESNoff ARoff 3DES-CBC/SHA1-96 IPSec test""" + def test_ipsec(self): """native ESNoff ARoff 3DES-CBC/SHA1-96 IPSec test""" self.run_test() @@ -1306,6 +1533,7 @@ class Test_native_ESNoff_ARoff_3DES_CBC_SHA1_96(RunTestIpsecEspAll): class Test_native_ESNoff_ARoff_NONE_SHA1_96(RunTestIpsecEspAll): """native ESNoff ARoff NONE/SHA1-96 IPSec test""" + def test_ipsec(self): """native ESNoff ARoff NONE/SHA1-96 IPSec test""" self.run_test() @@ -1313,6 +1541,7 @@ class Test_native_ESNoff_ARoff_NONE_SHA1_96(RunTestIpsecEspAll): class Test_native_ESNoff_ARoff_AES_CTR_128_SHA1_96(RunTestIpsecEspAll): """native ESNoff ARoff AES-CTR-128/SHA1-96 IPSec test""" + def test_ipsec(self): """native ESNoff ARoff AES-CTR-128/SHA1-96 IPSec test""" self.run_test() @@ -1320,6 +1549,7 @@ class Test_native_ESNoff_ARoff_AES_CTR_128_SHA1_96(RunTestIpsecEspAll): class Test_native_ESNoff_ARoff_AES_CTR_192_SHA1_96(RunTestIpsecEspAll): """native ESNoff ARoff AES-CTR-192/SHA1-96 IPSec test""" + def test_ipsec(self): """native ESNoff ARoff AES-CTR-192/SHA1-96 IPSec test""" self.run_test() @@ -1327,6 +1557,7 @@ class Test_native_ESNoff_ARoff_AES_CTR_192_SHA1_96(RunTestIpsecEspAll): class Test_native_ESNoff_ARoff_AES_CTR_256_SHA1_96(RunTestIpsecEspAll): """native ESNoff ARoff AES-CTR-256/SHA1-96 IPSec test""" + def test_ipsec(self): """native ESNoff ARoff AES-CTR-256/SHA1-96 IPSec test""" self.run_test() @@ -1334,6 +1565,7 @@ class Test_native_ESNoff_ARoff_AES_CTR_256_SHA1_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNon_ARon_AES_GCM_128_NONE(RunTestIpsecEspAll): """ipsecmb ESNon ARon AES-GCM-128/NONE IPSec test""" + def test_ipsec(self): """ipsecmb ESNon ARon AES-GCM-128/NONE IPSec test""" self.run_test() @@ -1341,6 +1573,7 @@ class Test_ipsecmb_ESNon_ARon_AES_GCM_128_NONE(RunTestIpsecEspAll): class Test_ipsecmb_ESNon_ARon_AES_GCM_192_NONE(RunTestIpsecEspAll): """ipsecmb ESNon ARon AES-GCM-192/NONE IPSec test""" + def test_ipsec(self): """ipsecmb ESNon ARon AES-GCM-192/NONE IPSec test""" self.run_test() @@ -1348,6 +1581,7 @@ class Test_ipsecmb_ESNon_ARon_AES_GCM_192_NONE(RunTestIpsecEspAll): class Test_ipsecmb_ESNon_ARon_AES_GCM_256_NONE(RunTestIpsecEspAll): """ipsecmb ESNon ARon AES-GCM-256/NONE IPSec test""" + def test_ipsec(self): """ipsecmb ESNon ARon AES-GCM-256/NONE IPSec test""" self.run_test() @@ -1355,6 +1589,7 @@ class Test_ipsecmb_ESNon_ARon_AES_GCM_256_NONE(RunTestIpsecEspAll): class Test_ipsecmb_ESNon_ARon_AES_CBC_128_MD5_96(RunTestIpsecEspAll): """ipsecmb ESNon ARon AES-CBC-128/MD5-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNon ARon AES-CBC-128/MD5-96 IPSec test""" self.run_test() @@ -1362,6 +1597,7 @@ class Test_ipsecmb_ESNon_ARon_AES_CBC_128_MD5_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNon_ARon_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): """ipsecmb ESNon ARon AES-CBC-192/SHA1-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNon ARon AES-CBC-192/SHA1-96 IPSec test""" self.run_test() @@ -1369,6 +1605,7 @@ class Test_ipsecmb_ESNon_ARon_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNon_ARon_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): """ipsecmb ESNon ARon AES-CBC-256/SHA1-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNon ARon AES-CBC-256/SHA1-96 IPSec test""" self.run_test() @@ -1376,6 +1613,7 @@ class Test_ipsecmb_ESNon_ARon_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNon_ARon_3DES_CBC_SHA1_96(RunTestIpsecEspAll): """ipsecmb ESNon ARon 3DES-CBC/SHA1-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNon ARon 3DES-CBC/SHA1-96 IPSec test""" self.run_test() @@ -1383,6 +1621,7 @@ class Test_ipsecmb_ESNon_ARon_3DES_CBC_SHA1_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNon_ARon_NONE_SHA1_96(RunTestIpsecEspAll): """ipsecmb ESNon ARon NONE/SHA1-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNon ARon NONE/SHA1-96 IPSec test""" self.run_test() @@ -1390,6 +1629,7 @@ class Test_ipsecmb_ESNon_ARon_NONE_SHA1_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNon_ARon_AES_CTR_128_SHA1_96(RunTestIpsecEspAll): """ipsecmb ESNon ARon AES-CTR-128/SHA1-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNon ARon AES-CTR-128/SHA1-96 IPSec test""" self.run_test() @@ -1397,6 +1637,7 @@ class Test_ipsecmb_ESNon_ARon_AES_CTR_128_SHA1_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNon_ARon_AES_CTR_192_SHA1_96(RunTestIpsecEspAll): """ipsecmb ESNon ARon AES-CTR-192/SHA1-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNon ARon AES-CTR-192/SHA1-96 IPSec test""" self.run_test() @@ -1404,6 +1645,7 @@ class Test_ipsecmb_ESNon_ARon_AES_CTR_192_SHA1_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNon_ARon_AES_CTR_256_SHA1_96(RunTestIpsecEspAll): """ipsecmb ESNon ARon AES-CTR-256/SHA1-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNon ARon AES-CTR-256/SHA1-96 IPSec test""" self.run_test() @@ -1411,6 +1653,7 @@ class Test_ipsecmb_ESNon_ARon_AES_CTR_256_SHA1_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNon_ARoff_AES_GCM_128_NONE(RunTestIpsecEspAll): """ipsecmb ESNon ARoff AES-GCM-128/NONE IPSec test""" + def test_ipsec(self): """ipsecmb ESNon ARoff AES-GCM-128/NONE IPSec test""" self.run_test() @@ -1418,6 +1661,7 @@ class Test_ipsecmb_ESNon_ARoff_AES_GCM_128_NONE(RunTestIpsecEspAll): class Test_ipsecmb_ESNon_ARoff_AES_GCM_192_NONE(RunTestIpsecEspAll): """ipsecmb ESNon ARoff AES-GCM-192/NONE IPSec test""" + def test_ipsec(self): """ipsecmb ESNon ARoff AES-GCM-192/NONE IPSec test""" self.run_test() @@ -1425,6 +1669,7 @@ class Test_ipsecmb_ESNon_ARoff_AES_GCM_192_NONE(RunTestIpsecEspAll): class Test_ipsecmb_ESNon_ARoff_AES_GCM_256_NONE(RunTestIpsecEspAll): """ipsecmb ESNon ARoff AES-GCM-256/NONE IPSec test""" + def test_ipsec(self): """ipsecmb ESNon ARoff AES-GCM-256/NONE IPSec test""" self.run_test() @@ -1432,6 +1677,7 @@ class Test_ipsecmb_ESNon_ARoff_AES_GCM_256_NONE(RunTestIpsecEspAll): class Test_ipsecmb_ESNon_ARoff_AES_CBC_128_MD5_96(RunTestIpsecEspAll): """ipsecmb ESNon ARoff AES-CBC-128/MD5-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNon ARoff AES-CBC-128/MD5-96 IPSec test""" self.run_test() @@ -1439,6 +1685,7 @@ class Test_ipsecmb_ESNon_ARoff_AES_CBC_128_MD5_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNon_ARoff_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): """ipsecmb ESNon ARoff AES-CBC-192/SHA1-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNon ARoff AES-CBC-192/SHA1-96 IPSec test""" self.run_test() @@ -1446,6 +1693,7 @@ class Test_ipsecmb_ESNon_ARoff_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNon_ARoff_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): """ipsecmb ESNon ARoff AES-CBC-256/SHA1-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNon ARoff AES-CBC-256/SHA1-96 IPSec test""" self.run_test() @@ -1453,6 +1701,7 @@ class Test_ipsecmb_ESNon_ARoff_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNon_ARoff_3DES_CBC_SHA1_96(RunTestIpsecEspAll): """ipsecmb ESNon ARoff 3DES-CBC/SHA1-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNon ARoff 3DES-CBC/SHA1-96 IPSec test""" self.run_test() @@ -1460,6 +1709,7 @@ class Test_ipsecmb_ESNon_ARoff_3DES_CBC_SHA1_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNon_ARoff_NONE_SHA1_96(RunTestIpsecEspAll): """ipsecmb ESNon ARoff NONE/SHA1-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNon ARoff NONE/SHA1-96 IPSec test""" self.run_test() @@ -1467,6 +1717,7 @@ class Test_ipsecmb_ESNon_ARoff_NONE_SHA1_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNon_ARoff_AES_CTR_128_SHA1_96(RunTestIpsecEspAll): """ipsecmb ESNon ARoff AES-CTR-128/SHA1-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNon ARoff AES-CTR-128/SHA1-96 IPSec test""" self.run_test() @@ -1474,6 +1725,7 @@ class Test_ipsecmb_ESNon_ARoff_AES_CTR_128_SHA1_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNon_ARoff_AES_CTR_192_SHA1_96(RunTestIpsecEspAll): """ipsecmb ESNon ARoff AES-CTR-192/SHA1-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNon ARoff AES-CTR-192/SHA1-96 IPSec test""" self.run_test() @@ -1481,6 +1733,7 @@ class Test_ipsecmb_ESNon_ARoff_AES_CTR_192_SHA1_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNon_ARoff_AES_CTR_256_SHA1_96(RunTestIpsecEspAll): """ipsecmb ESNon ARoff AES-CTR-256/SHA1-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNon ARoff AES-CTR-256/SHA1-96 IPSec test""" self.run_test() @@ -1488,6 +1741,7 @@ class Test_ipsecmb_ESNon_ARoff_AES_CTR_256_SHA1_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNoff_ARon_AES_GCM_128_NONE(RunTestIpsecEspAll): """ipsecmb ESNoff ARon AES-GCM-128/NONE IPSec test""" + def test_ipsec(self): """ipsecmb ESNoff ARon AES-GCM-128/NONE IPSec test""" self.run_test() @@ -1495,6 +1749,7 @@ class Test_ipsecmb_ESNoff_ARon_AES_GCM_128_NONE(RunTestIpsecEspAll): class Test_ipsecmb_ESNoff_ARon_AES_GCM_192_NONE(RunTestIpsecEspAll): """ipsecmb ESNoff ARon AES-GCM-192/NONE IPSec test""" + def test_ipsec(self): """ipsecmb ESNoff ARon AES-GCM-192/NONE IPSec test""" self.run_test() @@ -1502,6 +1757,7 @@ class Test_ipsecmb_ESNoff_ARon_AES_GCM_192_NONE(RunTestIpsecEspAll): class Test_ipsecmb_ESNoff_ARon_AES_GCM_256_NONE(RunTestIpsecEspAll): """ipsecmb ESNoff ARon AES-GCM-256/NONE IPSec test""" + def test_ipsec(self): """ipsecmb ESNoff ARon AES-GCM-256/NONE IPSec test""" self.run_test() @@ -1509,6 +1765,7 @@ class Test_ipsecmb_ESNoff_ARon_AES_GCM_256_NONE(RunTestIpsecEspAll): class Test_ipsecmb_ESNoff_ARon_AES_CBC_128_MD5_96(RunTestIpsecEspAll): """ipsecmb ESNoff ARon AES-CBC-128/MD5-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNoff ARon AES-CBC-128/MD5-96 IPSec test""" self.run_test() @@ -1516,6 +1773,7 @@ class Test_ipsecmb_ESNoff_ARon_AES_CBC_128_MD5_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNoff_ARon_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): """ipsecmb ESNoff ARon AES-CBC-192/SHA1-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNoff ARon AES-CBC-192/SHA1-96 IPSec test""" self.run_test() @@ -1523,6 +1781,7 @@ class Test_ipsecmb_ESNoff_ARon_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNoff_ARon_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): """ipsecmb ESNoff ARon AES-CBC-256/SHA1-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNoff ARon AES-CBC-256/SHA1-96 IPSec test""" self.run_test() @@ -1530,6 +1789,7 @@ class Test_ipsecmb_ESNoff_ARon_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNoff_ARon_3DES_CBC_SHA1_96(RunTestIpsecEspAll): """ipsecmb ESNoff ARon 3DES-CBC/SHA1-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNoff ARon 3DES-CBC/SHA1-96 IPSec test""" self.run_test() @@ -1537,6 +1797,7 @@ class Test_ipsecmb_ESNoff_ARon_3DES_CBC_SHA1_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNoff_ARon_NONE_SHA1_96(RunTestIpsecEspAll): """ipsecmb ESNoff ARon NONE/SHA1-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNoff ARon NONE/SHA1-96 IPSec test""" self.run_test() @@ -1544,6 +1805,7 @@ class Test_ipsecmb_ESNoff_ARon_NONE_SHA1_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNoff_ARon_AES_CTR_128_SHA1_96(RunTestIpsecEspAll): """ipsecmb ESNoff ARon AES-CTR-128/SHA1-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNoff ARon AES-CTR-128/SHA1-96 IPSec test""" self.run_test() @@ -1551,6 +1813,7 @@ class Test_ipsecmb_ESNoff_ARon_AES_CTR_128_SHA1_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNoff_ARon_AES_CTR_192_SHA1_96(RunTestIpsecEspAll): """ipsecmb ESNoff ARon AES-CTR-192/SHA1-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNoff ARon AES-CTR-192/SHA1-96 IPSec test""" self.run_test() @@ -1558,6 +1821,7 @@ class Test_ipsecmb_ESNoff_ARon_AES_CTR_192_SHA1_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNoff_ARon_AES_CTR_256_SHA1_96(RunTestIpsecEspAll): """ipsecmb ESNoff ARon AES-CTR-256/SHA1-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNoff ARon AES-CTR-256/SHA1-96 IPSec test""" self.run_test() @@ -1565,6 +1829,7 @@ class Test_ipsecmb_ESNoff_ARon_AES_CTR_256_SHA1_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNoff_ARoff_AES_GCM_128_NONE(RunTestIpsecEspAll): """ipsecmb ESNoff ARoff AES-GCM-128/NONE IPSec test""" + def test_ipsec(self): """ipsecmb ESNoff ARoff AES-GCM-128/NONE IPSec test""" self.run_test() @@ -1572,6 +1837,7 @@ class Test_ipsecmb_ESNoff_ARoff_AES_GCM_128_NONE(RunTestIpsecEspAll): class Test_ipsecmb_ESNoff_ARoff_AES_GCM_192_NONE(RunTestIpsecEspAll): """ipsecmb ESNoff ARoff AES-GCM-192/NONE IPSec test""" + def test_ipsec(self): """ipsecmb ESNoff ARoff AES-GCM-192/NONE IPSec test""" self.run_test() @@ -1579,6 +1845,7 @@ class Test_ipsecmb_ESNoff_ARoff_AES_GCM_192_NONE(RunTestIpsecEspAll): class Test_ipsecmb_ESNoff_ARoff_AES_GCM_256_NONE(RunTestIpsecEspAll): """ipsecmb ESNoff ARoff AES-GCM-256/NONE IPSec test""" + def test_ipsec(self): """ipsecmb ESNoff ARoff AES-GCM-256/NONE IPSec test""" self.run_test() @@ -1586,6 +1853,7 @@ class Test_ipsecmb_ESNoff_ARoff_AES_GCM_256_NONE(RunTestIpsecEspAll): class Test_ipsecmb_ESNoff_ARoff_AES_CBC_128_MD5_96(RunTestIpsecEspAll): """ipsecmb ESNoff ARoff AES-CBC-128/MD5-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNoff ARoff AES-CBC-128/MD5-96 IPSec test""" self.run_test() @@ -1593,6 +1861,7 @@ class Test_ipsecmb_ESNoff_ARoff_AES_CBC_128_MD5_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNoff_ARoff_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): """ipsecmb ESNoff ARoff AES-CBC-192/SHA1-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNoff ARoff AES-CBC-192/SHA1-96 IPSec test""" self.run_test() @@ -1600,6 +1869,7 @@ class Test_ipsecmb_ESNoff_ARoff_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNoff_ARoff_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): """ipsecmb ESNoff ARoff AES-CBC-256/SHA1-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNoff ARoff AES-CBC-256/SHA1-96 IPSec test""" self.run_test() @@ -1607,6 +1877,7 @@ class Test_ipsecmb_ESNoff_ARoff_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNoff_ARoff_3DES_CBC_SHA1_96(RunTestIpsecEspAll): """ipsecmb ESNoff ARoff 3DES-CBC/SHA1-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNoff ARoff 3DES-CBC/SHA1-96 IPSec test""" self.run_test() @@ -1614,6 +1885,7 @@ class Test_ipsecmb_ESNoff_ARoff_3DES_CBC_SHA1_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNoff_ARoff_NONE_SHA1_96(RunTestIpsecEspAll): """ipsecmb ESNoff ARoff NONE/SHA1-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNoff ARoff NONE/SHA1-96 IPSec test""" self.run_test() @@ -1621,6 +1893,7 @@ class Test_ipsecmb_ESNoff_ARoff_NONE_SHA1_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNoff_ARoff_AES_CTR_128_SHA1_96(RunTestIpsecEspAll): """ipsecmb ESNoff ARoff AES-CTR-128/SHA1-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNoff ARoff AES-CTR-128/SHA1-96 IPSec test""" self.run_test() @@ -1628,6 +1901,7 @@ class Test_ipsecmb_ESNoff_ARoff_AES_CTR_128_SHA1_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNoff_ARoff_AES_CTR_192_SHA1_96(RunTestIpsecEspAll): """ipsecmb ESNoff ARoff AES-CTR-192/SHA1-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNoff ARoff AES-CTR-192/SHA1-96 IPSec test""" self.run_test() @@ -1635,6 +1909,7 @@ class Test_ipsecmb_ESNoff_ARoff_AES_CTR_192_SHA1_96(RunTestIpsecEspAll): class Test_ipsecmb_ESNoff_ARoff_AES_CTR_256_SHA1_96(RunTestIpsecEspAll): """ipsecmb ESNoff ARoff AES-CTR-256/SHA1-96 IPSec test""" + def test_ipsec(self): """ipsecmb ESNoff ARoff AES-CTR-256/SHA1-96 IPSec test""" self.run_test() @@ -1642,6 +1917,7 @@ class Test_ipsecmb_ESNoff_ARoff_AES_CTR_256_SHA1_96(RunTestIpsecEspAll): class Test_openssl_ESNon_ARon_AES_GCM_128_NONE(RunTestIpsecEspAll): """openssl ESNon ARon AES-GCM-128/NONE IPSec test""" + def test_ipsec(self): """openssl ESNon ARon AES-GCM-128/NONE IPSec test""" self.run_test() @@ -1649,6 +1925,7 @@ class Test_openssl_ESNon_ARon_AES_GCM_128_NONE(RunTestIpsecEspAll): class Test_openssl_ESNon_ARon_AES_GCM_192_NONE(RunTestIpsecEspAll): """openssl ESNon ARon AES-GCM-192/NONE IPSec test""" + def test_ipsec(self): """openssl ESNon ARon AES-GCM-192/NONE IPSec test""" self.run_test() @@ -1656,6 +1933,7 @@ class Test_openssl_ESNon_ARon_AES_GCM_192_NONE(RunTestIpsecEspAll): class Test_openssl_ESNon_ARon_AES_GCM_256_NONE(RunTestIpsecEspAll): """openssl ESNon ARon AES-GCM-256/NONE IPSec test""" + def test_ipsec(self): """openssl ESNon ARon AES-GCM-256/NONE IPSec test""" self.run_test() @@ -1663,6 +1941,7 @@ class Test_openssl_ESNon_ARon_AES_GCM_256_NONE(RunTestIpsecEspAll): class Test_openssl_ESNon_ARon_AES_CBC_128_MD5_96(RunTestIpsecEspAll): """openssl ESNon ARon AES-CBC-128/MD5-96 IPSec test""" + def test_ipsec(self): """openssl ESNon ARon AES-CBC-128/MD5-96 IPSec test""" self.run_test() @@ -1670,6 +1949,7 @@ class Test_openssl_ESNon_ARon_AES_CBC_128_MD5_96(RunTestIpsecEspAll): class Test_openssl_ESNon_ARon_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): """openssl ESNon ARon AES-CBC-192/SHA1-96 IPSec test""" + def test_ipsec(self): """openssl ESNon ARon AES-CBC-192/SHA1-96 IPSec test""" self.run_test() @@ -1677,6 +1957,7 @@ class Test_openssl_ESNon_ARon_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): class Test_openssl_ESNon_ARon_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): """openssl ESNon ARon AES-CBC-256/SHA1-96 IPSec test""" + def test_ipsec(self): """openssl ESNon ARon AES-CBC-256/SHA1-96 IPSec test""" self.run_test() @@ -1684,6 +1965,7 @@ class Test_openssl_ESNon_ARon_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): class Test_openssl_ESNon_ARon_3DES_CBC_SHA1_96(RunTestIpsecEspAll): """openssl ESNon ARon 3DES-CBC/SHA1-96 IPSec test""" + def test_ipsec(self): """openssl ESNon ARon 3DES-CBC/SHA1-96 IPSec test""" self.run_test() @@ -1691,6 +1973,7 @@ class Test_openssl_ESNon_ARon_3DES_CBC_SHA1_96(RunTestIpsecEspAll): class Test_openssl_ESNon_ARon_NONE_SHA1_96(RunTestIpsecEspAll): """openssl ESNon ARon NONE/SHA1-96 IPSec test""" + def test_ipsec(self): """openssl ESNon ARon NONE/SHA1-96 IPSec test""" self.run_test() @@ -1698,6 +1981,7 @@ class Test_openssl_ESNon_ARon_NONE_SHA1_96(RunTestIpsecEspAll): class Test_openssl_ESNon_ARon_AES_CTR_128_SHA1_96(RunTestIpsecEspAll): """openssl ESNon ARon AES-CTR-128/SHA1-96 IPSec test""" + def test_ipsec(self): """openssl ESNon ARon AES-CTR-128/SHA1-96 IPSec test""" self.run_test() @@ -1705,6 +1989,7 @@ class Test_openssl_ESNon_ARon_AES_CTR_128_SHA1_96(RunTestIpsecEspAll): class Test_openssl_ESNon_ARon_AES_CTR_192_SHA1_96(RunTestIpsecEspAll): """openssl ESNon ARon AES-CTR-192/SHA1-96 IPSec test""" + def test_ipsec(self): """openssl ESNon ARon AES-CTR-192/SHA1-96 IPSec test""" self.run_test() @@ -1712,6 +1997,7 @@ class Test_openssl_ESNon_ARon_AES_CTR_192_SHA1_96(RunTestIpsecEspAll): class Test_openssl_ESNon_ARon_AES_CTR_256_SHA1_96(RunTestIpsecEspAll): """openssl ESNon ARon AES-CTR-256/SHA1-96 IPSec test""" + def test_ipsec(self): """openssl ESNon ARon AES-CTR-256/SHA1-96 IPSec test""" self.run_test() @@ -1719,6 +2005,7 @@ class Test_openssl_ESNon_ARon_AES_CTR_256_SHA1_96(RunTestIpsecEspAll): class Test_openssl_ESNon_ARoff_AES_GCM_128_NONE(RunTestIpsecEspAll): """openssl ESNon ARoff AES-GCM-128/NONE IPSec test""" + def test_ipsec(self): """openssl ESNon ARoff AES-GCM-128/NONE IPSec test""" self.run_test() @@ -1726,6 +2013,7 @@ class Test_openssl_ESNon_ARoff_AES_GCM_128_NONE(RunTestIpsecEspAll): class Test_openssl_ESNon_ARoff_AES_GCM_192_NONE(RunTestIpsecEspAll): """openssl ESNon ARoff AES-GCM-192/NONE IPSec test""" + def test_ipsec(self): """openssl ESNon ARoff AES-GCM-192/NONE IPSec test""" self.run_test() @@ -1733,6 +2021,7 @@ class Test_openssl_ESNon_ARoff_AES_GCM_192_NONE(RunTestIpsecEspAll): class Test_openssl_ESNon_ARoff_AES_GCM_256_NONE(RunTestIpsecEspAll): """openssl ESNon ARoff AES-GCM-256/NONE IPSec test""" + def test_ipsec(self): """openssl ESNon ARoff AES-GCM-256/NONE IPSec test""" self.run_test() @@ -1740,6 +2029,7 @@ class Test_openssl_ESNon_ARoff_AES_GCM_256_NONE(RunTestIpsecEspAll): class Test_openssl_ESNon_ARoff_AES_CBC_128_MD5_96(RunTestIpsecEspAll): """openssl ESNon ARoff AES-CBC-128/MD5-96 IPSec test""" + def test_ipsec(self): """openssl ESNon ARoff AES-CBC-128/MD5-96 IPSec test""" self.run_test() @@ -1747,6 +2037,7 @@ class Test_openssl_ESNon_ARoff_AES_CBC_128_MD5_96(RunTestIpsecEspAll): class Test_openssl_ESNon_ARoff_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): """openssl ESNon ARoff AES-CBC-192/SHA1-96 IPSec test""" + def test_ipsec(self): """openssl ESNon ARoff AES-CBC-192/SHA1-96 IPSec test""" self.run_test() @@ -1754,6 +2045,7 @@ class Test_openssl_ESNon_ARoff_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): class Test_openssl_ESNon_ARoff_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): """openssl ESNon ARoff AES-CBC-256/SHA1-96 IPSec test""" + def test_ipsec(self): """openssl ESNon ARoff AES-CBC-256/SHA1-96 IPSec test""" self.run_test() @@ -1761,6 +2053,7 @@ class Test_openssl_ESNon_ARoff_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): class Test_openssl_ESNon_ARoff_3DES_CBC_SHA1_96(RunTestIpsecEspAll): """openssl ESNon ARoff 3DES-CBC/SHA1-96 IPSec test""" + def test_ipsec(self): """openssl ESNon ARoff 3DES-CBC/SHA1-96 IPSec test""" self.run_test() @@ -1768,6 +2061,7 @@ class Test_openssl_ESNon_ARoff_3DES_CBC_SHA1_96(RunTestIpsecEspAll): class Test_openssl_ESNon_ARoff_NONE_SHA1_96(RunTestIpsecEspAll): """openssl ESNon ARoff NONE/SHA1-96 IPSec test""" + def test_ipsec(self): """openssl ESNon ARoff NONE/SHA1-96 IPSec test""" self.run_test() @@ -1775,6 +2069,7 @@ class Test_openssl_ESNon_ARoff_NONE_SHA1_96(RunTestIpsecEspAll): class Test_openssl_ESNon_ARoff_AES_CTR_128_SHA1_96(RunTestIpsecEspAll): """openssl ESNon ARoff AES-CTR-128/SHA1-96 IPSec test""" + def test_ipsec(self): """openssl ESNon ARoff AES-CTR-128/SHA1-96 IPSec test""" self.run_test() @@ -1782,6 +2077,7 @@ class Test_openssl_ESNon_ARoff_AES_CTR_128_SHA1_96(RunTestIpsecEspAll): class Test_openssl_ESNon_ARoff_AES_CTR_192_SHA1_96(RunTestIpsecEspAll): """openssl ESNon ARoff AES-CTR-192/SHA1-96 IPSec test""" + def test_ipsec(self): """openssl ESNon ARoff AES-CTR-192/SHA1-96 IPSec test""" self.run_test() @@ -1789,6 +2085,7 @@ class Test_openssl_ESNon_ARoff_AES_CTR_192_SHA1_96(RunTestIpsecEspAll): class Test_openssl_ESNon_ARoff_AES_CTR_256_SHA1_96(RunTestIpsecEspAll): """openssl ESNon ARoff AES-CTR-256/SHA1-96 IPSec test""" + def test_ipsec(self): """openssl ESNon ARoff AES-CTR-256/SHA1-96 IPSec test""" self.run_test() @@ -1796,6 +2093,7 @@ class Test_openssl_ESNon_ARoff_AES_CTR_256_SHA1_96(RunTestIpsecEspAll): class Test_openssl_ESNoff_ARon_AES_GCM_128_NONE(RunTestIpsecEspAll): """openssl ESNoff ARon AES-GCM-128/NONE IPSec test""" + def test_ipsec(self): """openssl ESNoff ARon AES-GCM-128/NONE IPSec test""" self.run_test() @@ -1803,6 +2101,7 @@ class Test_openssl_ESNoff_ARon_AES_GCM_128_NONE(RunTestIpsecEspAll): class Test_openssl_ESNoff_ARon_AES_GCM_192_NONE(RunTestIpsecEspAll): """openssl ESNoff ARon AES-GCM-192/NONE IPSec test""" + def test_ipsec(self): """openssl ESNoff ARon AES-GCM-192/NONE IPSec test""" self.run_test() @@ -1810,6 +2109,7 @@ class Test_openssl_ESNoff_ARon_AES_GCM_192_NONE(RunTestIpsecEspAll): class Test_openssl_ESNoff_ARon_AES_GCM_256_NONE(RunTestIpsecEspAll): """openssl ESNoff ARon AES-GCM-256/NONE IPSec test""" + def test_ipsec(self): """openssl ESNoff ARon AES-GCM-256/NONE IPSec test""" self.run_test() @@ -1817,6 +2117,7 @@ class Test_openssl_ESNoff_ARon_AES_GCM_256_NONE(RunTestIpsecEspAll): class Test_openssl_ESNoff_ARon_AES_CBC_128_MD5_96(RunTestIpsecEspAll): """openssl ESNoff ARon AES-CBC-128/MD5-96 IPSec test""" + def test_ipsec(self): """openssl ESNoff ARon AES-CBC-128/MD5-96 IPSec test""" self.run_test() @@ -1824,6 +2125,7 @@ class Test_openssl_ESNoff_ARon_AES_CBC_128_MD5_96(RunTestIpsecEspAll): class Test_openssl_ESNoff_ARon_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): """openssl ESNoff ARon AES-CBC-192/SHA1-96 IPSec test""" + def test_ipsec(self): """openssl ESNoff ARon AES-CBC-192/SHA1-96 IPSec test""" self.run_test() @@ -1831,6 +2133,7 @@ class Test_openssl_ESNoff_ARon_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): class Test_openssl_ESNoff_ARon_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): """openssl ESNoff ARon AES-CBC-256/SHA1-96 IPSec test""" + def test_ipsec(self): """openssl ESNoff ARon AES-CBC-256/SHA1-96 IPSec test""" self.run_test() @@ -1838,6 +2141,7 @@ class Test_openssl_ESNoff_ARon_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): class Test_openssl_ESNoff_ARon_3DES_CBC_SHA1_96(RunTestIpsecEspAll): """openssl ESNoff ARon 3DES-CBC/SHA1-96 IPSec test""" + def test_ipsec(self): """openssl ESNoff ARon 3DES-CBC/SHA1-96 IPSec test""" self.run_test() @@ -1845,6 +2149,7 @@ class Test_openssl_ESNoff_ARon_3DES_CBC_SHA1_96(RunTestIpsecEspAll): class Test_openssl_ESNoff_ARon_NONE_SHA1_96(RunTestIpsecEspAll): """openssl ESNoff ARon NONE/SHA1-96 IPSec test""" + def test_ipsec(self): """openssl ESNoff ARon NONE/SHA1-96 IPSec test""" self.run_test() @@ -1852,6 +2157,7 @@ class Test_openssl_ESNoff_ARon_NONE_SHA1_96(RunTestIpsecEspAll): class Test_openssl_ESNoff_ARon_AES_CTR_128_SHA1_96(RunTestIpsecEspAll): """openssl ESNoff ARon AES-CTR-128/SHA1-96 IPSec test""" + def test_ipsec(self): """openssl ESNoff ARon AES-CTR-128/SHA1-96 IPSec test""" self.run_test() @@ -1859,6 +2165,7 @@ class Test_openssl_ESNoff_ARon_AES_CTR_128_SHA1_96(RunTestIpsecEspAll): class Test_openssl_ESNoff_ARon_AES_CTR_192_SHA1_96(RunTestIpsecEspAll): """openssl ESNoff ARon AES-CTR-192/SHA1-96 IPSec test""" + def test_ipsec(self): """openssl ESNoff ARon AES-CTR-192/SHA1-96 IPSec test""" self.run_test() @@ -1866,6 +2173,7 @@ class Test_openssl_ESNoff_ARon_AES_CTR_192_SHA1_96(RunTestIpsecEspAll): class Test_openssl_ESNoff_ARon_AES_CTR_256_SHA1_96(RunTestIpsecEspAll): """openssl ESNoff ARon AES-CTR-256/SHA1-96 IPSec test""" + def test_ipsec(self): """openssl ESNoff ARon AES-CTR-256/SHA1-96 IPSec test""" self.run_test() @@ -1873,6 +2181,7 @@ class Test_openssl_ESNoff_ARon_AES_CTR_256_SHA1_96(RunTestIpsecEspAll): class Test_openssl_ESNoff_ARoff_AES_GCM_128_NONE(RunTestIpsecEspAll): """openssl ESNoff ARoff AES-GCM-128/NONE IPSec test""" + def test_ipsec(self): """openssl ESNoff ARoff AES-GCM-128/NONE IPSec test""" self.run_test() @@ -1880,6 +2189,7 @@ class Test_openssl_ESNoff_ARoff_AES_GCM_128_NONE(RunTestIpsecEspAll): class Test_openssl_ESNoff_ARoff_AES_GCM_192_NONE(RunTestIpsecEspAll): """openssl ESNoff ARoff AES-GCM-192/NONE IPSec test""" + def test_ipsec(self): """openssl ESNoff ARoff AES-GCM-192/NONE IPSec test""" self.run_test() @@ -1887,6 +2197,7 @@ class Test_openssl_ESNoff_ARoff_AES_GCM_192_NONE(RunTestIpsecEspAll): class Test_openssl_ESNoff_ARoff_AES_GCM_256_NONE(RunTestIpsecEspAll): """openssl ESNoff ARoff AES-GCM-256/NONE IPSec test""" + def test_ipsec(self): """openssl ESNoff ARoff AES-GCM-256/NONE IPSec test""" self.run_test() @@ -1894,6 +2205,7 @@ class Test_openssl_ESNoff_ARoff_AES_GCM_256_NONE(RunTestIpsecEspAll): class Test_openssl_ESNoff_ARoff_AES_CBC_128_MD5_96(RunTestIpsecEspAll): """openssl ESNoff ARoff AES-CBC-128/MD5-96 IPSec test""" + def test_ipsec(self): """openssl ESNoff ARoff AES-CBC-128/MD5-96 IPSec test""" self.run_test() @@ -1901,6 +2213,7 @@ class Test_openssl_ESNoff_ARoff_AES_CBC_128_MD5_96(RunTestIpsecEspAll): class Test_openssl_ESNoff_ARoff_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): """openssl ESNoff ARoff AES-CBC-192/SHA1-96 IPSec test""" + def test_ipsec(self): """openssl ESNoff ARoff AES-CBC-192/SHA1-96 IPSec test""" self.run_test() @@ -1908,6 +2221,7 @@ class Test_openssl_ESNoff_ARoff_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): class Test_openssl_ESNoff_ARoff_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): """openssl ESNoff ARoff AES-CBC-256/SHA1-96 IPSec test""" + def test_ipsec(self): """openssl ESNoff ARoff AES-CBC-256/SHA1-96 IPSec test""" self.run_test() @@ -1915,6 +2229,7 @@ class Test_openssl_ESNoff_ARoff_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): class Test_openssl_ESNoff_ARoff_3DES_CBC_SHA1_96(RunTestIpsecEspAll): """openssl ESNoff ARoff 3DES-CBC/SHA1-96 IPSec test""" + def test_ipsec(self): """openssl ESNoff ARoff 3DES-CBC/SHA1-96 IPSec test""" self.run_test() @@ -1922,6 +2237,7 @@ class Test_openssl_ESNoff_ARoff_3DES_CBC_SHA1_96(RunTestIpsecEspAll): class Test_openssl_ESNoff_ARoff_NONE_SHA1_96(RunTestIpsecEspAll): """openssl ESNoff ARoff NONE/SHA1-96 IPSec test""" + def test_ipsec(self): """openssl ESNoff ARoff NONE/SHA1-96 IPSec test""" self.run_test() @@ -1929,6 +2245,7 @@ class Test_openssl_ESNoff_ARoff_NONE_SHA1_96(RunTestIpsecEspAll): class Test_openssl_ESNoff_ARoff_AES_CTR_128_SHA1_96(RunTestIpsecEspAll): """openssl ESNoff ARoff AES-CTR-128/SHA1-96 IPSec test""" + def test_ipsec(self): """openssl ESNoff ARoff AES-CTR-128/SHA1-96 IPSec test""" self.run_test() @@ -1936,6 +2253,7 @@ class Test_openssl_ESNoff_ARoff_AES_CTR_128_SHA1_96(RunTestIpsecEspAll): class Test_openssl_ESNoff_ARoff_AES_CTR_192_SHA1_96(RunTestIpsecEspAll): """openssl ESNoff ARoff AES-CTR-192/SHA1-96 IPSec test""" + def test_ipsec(self): """openssl ESNoff ARoff AES-CTR-192/SHA1-96 IPSec test""" self.run_test() @@ -1943,6 +2261,7 @@ class Test_openssl_ESNoff_ARoff_AES_CTR_192_SHA1_96(RunTestIpsecEspAll): class Test_openssl_ESNoff_ARoff_AES_CTR_256_SHA1_96(RunTestIpsecEspAll): """openssl ESNoff ARoff AES-CTR-256/SHA1-96 IPSec test""" + def test_ipsec(self): """openssl ESNoff ARoff AES-CTR-256/SHA1-96 IPSec test""" self.run_test() @@ -1950,6 +2269,7 @@ class Test_openssl_ESNoff_ARoff_AES_CTR_256_SHA1_96(RunTestIpsecEspAll): class Test_async_ESNon_ARon_AES_GCM_128_NONE(RunTestIpsecEspAll): """async ESNon ARon AES-GCM-128/NONE IPSec test""" + def test_ipsec(self): """async ESNon ARon AES-GCM-128/NONE IPSec test""" self.run_test() @@ -1957,6 +2277,7 @@ class Test_async_ESNon_ARon_AES_GCM_128_NONE(RunTestIpsecEspAll): class Test_async_ESNon_ARon_AES_GCM_192_NONE(RunTestIpsecEspAll): """async ESNon ARon AES-GCM-192/NONE IPSec test""" + def test_ipsec(self): """async ESNon ARon AES-GCM-192/NONE IPSec test""" self.run_test() @@ -1964,6 +2285,7 @@ class Test_async_ESNon_ARon_AES_GCM_192_NONE(RunTestIpsecEspAll): class Test_async_ESNon_ARon_AES_GCM_256_NONE(RunTestIpsecEspAll): """async ESNon ARon AES-GCM-256/NONE IPSec test""" + def test_ipsec(self): """async ESNon ARon AES-GCM-256/NONE IPSec test""" self.run_test() @@ -1971,6 +2293,7 @@ class Test_async_ESNon_ARon_AES_GCM_256_NONE(RunTestIpsecEspAll): class Test_async_ESNon_ARon_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): """async ESNon ARon AES-CBC-192/SHA1-96 IPSec test""" + def test_ipsec(self): """async ESNon ARon AES-CBC-192/SHA1-96 IPSec test""" self.run_test() @@ -1978,6 +2301,7 @@ class Test_async_ESNon_ARon_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): class Test_async_ESNon_ARon_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): """async ESNon ARon AES-CBC-256/SHA1-96 IPSec test""" + def test_ipsec(self): """async ESNon ARon AES-CBC-256/SHA1-96 IPSec test""" self.run_test() @@ -1985,6 +2309,7 @@ class Test_async_ESNon_ARon_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): class Test_async_ESNon_ARoff_AES_GCM_128_NONE(RunTestIpsecEspAll): """async ESNon ARoff AES-GCM-128/NONE IPSec test""" + def test_ipsec(self): """async ESNon ARoff AES-GCM-128/NONE IPSec test""" self.run_test() @@ -1992,6 +2317,7 @@ class Test_async_ESNon_ARoff_AES_GCM_128_NONE(RunTestIpsecEspAll): class Test_async_ESNon_ARoff_AES_GCM_192_NONE(RunTestIpsecEspAll): """async ESNon ARoff AES-GCM-192/NONE IPSec test""" + def test_ipsec(self): """async ESNon ARoff AES-GCM-192/NONE IPSec test""" self.run_test() @@ -1999,6 +2325,7 @@ class Test_async_ESNon_ARoff_AES_GCM_192_NONE(RunTestIpsecEspAll): class Test_async_ESNon_ARoff_AES_GCM_256_NONE(RunTestIpsecEspAll): """async ESNon ARoff AES-GCM-256/NONE IPSec test""" + def test_ipsec(self): """async ESNon ARoff AES-GCM-256/NONE IPSec test""" self.run_test() @@ -2006,6 +2333,7 @@ class Test_async_ESNon_ARoff_AES_GCM_256_NONE(RunTestIpsecEspAll): class Test_async_ESNon_ARoff_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): """async ESNon ARoff AES-CBC-192/SHA1-96 IPSec test""" + def test_ipsec(self): """async ESNon ARoff AES-CBC-192/SHA1-96 IPSec test""" self.run_test() @@ -2013,6 +2341,7 @@ class Test_async_ESNon_ARoff_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): class Test_async_ESNon_ARoff_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): """async ESNon ARoff AES-CBC-256/SHA1-96 IPSec test""" + def test_ipsec(self): """async ESNon ARoff AES-CBC-256/SHA1-96 IPSec test""" self.run_test() @@ -2020,6 +2349,7 @@ class Test_async_ESNon_ARoff_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): class Test_async_ESNoff_ARon_AES_GCM_128_NONE(RunTestIpsecEspAll): """async ESNoff ARon AES-GCM-128/NONE IPSec test""" + def test_ipsec(self): """async ESNoff ARon AES-GCM-128/NONE IPSec test""" self.run_test() @@ -2027,6 +2357,7 @@ class Test_async_ESNoff_ARon_AES_GCM_128_NONE(RunTestIpsecEspAll): class Test_async_ESNoff_ARon_AES_GCM_192_NONE(RunTestIpsecEspAll): """async ESNoff ARon AES-GCM-192/NONE IPSec test""" + def test_ipsec(self): """async ESNoff ARon AES-GCM-192/NONE IPSec test""" self.run_test() @@ -2034,6 +2365,7 @@ class Test_async_ESNoff_ARon_AES_GCM_192_NONE(RunTestIpsecEspAll): class Test_async_ESNoff_ARon_AES_GCM_256_NONE(RunTestIpsecEspAll): """async ESNoff ARon AES-GCM-256/NONE IPSec test""" + def test_ipsec(self): """async ESNoff ARon AES-GCM-256/NONE IPSec test""" self.run_test() @@ -2041,6 +2373,7 @@ class Test_async_ESNoff_ARon_AES_GCM_256_NONE(RunTestIpsecEspAll): class Test_async_ESNoff_ARon_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): """async ESNoff ARon AES-CBC-192/SHA1-96 IPSec test""" + def test_ipsec(self): """async ESNoff ARon AES-CBC-192/SHA1-96 IPSec test""" self.run_test() @@ -2048,6 +2381,7 @@ class Test_async_ESNoff_ARon_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): class Test_async_ESNoff_ARon_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): """async ESNoff ARon AES-CBC-256/SHA1-96 IPSec test""" + def test_ipsec(self): """async ESNoff ARon AES-CBC-256/SHA1-96 IPSec test""" self.run_test() @@ -2055,6 +2389,7 @@ class Test_async_ESNoff_ARon_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): class Test_async_ESNoff_ARoff_AES_GCM_128_NONE(RunTestIpsecEspAll): """async ESNoff ARoff AES-GCM-128/NONE IPSec test""" + def test_ipsec(self): """async ESNoff ARoff AES-GCM-128/NONE IPSec test""" self.run_test() @@ -2062,6 +2397,7 @@ class Test_async_ESNoff_ARoff_AES_GCM_128_NONE(RunTestIpsecEspAll): class Test_async_ESNoff_ARoff_AES_GCM_192_NONE(RunTestIpsecEspAll): """async ESNoff ARoff AES-GCM-192/NONE IPSec test""" + def test_ipsec(self): """async ESNoff ARoff AES-GCM-192/NONE IPSec test""" self.run_test() @@ -2069,6 +2405,7 @@ class Test_async_ESNoff_ARoff_AES_GCM_192_NONE(RunTestIpsecEspAll): class Test_async_ESNoff_ARoff_AES_GCM_256_NONE(RunTestIpsecEspAll): """async ESNoff ARoff AES-GCM-256/NONE IPSec test""" + def test_ipsec(self): """async ESNoff ARoff AES-GCM-256/NONE IPSec test""" self.run_test() @@ -2076,6 +2413,7 @@ class Test_async_ESNoff_ARoff_AES_GCM_256_NONE(RunTestIpsecEspAll): class Test_async_ESNoff_ARoff_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): """async ESNoff ARoff AES-CBC-192/SHA1-96 IPSec test""" + def test_ipsec(self): """async ESNoff ARoff AES-CBC-192/SHA1-96 IPSec test""" self.run_test() @@ -2083,6 +2421,7 @@ class Test_async_ESNoff_ARoff_AES_CBC_192_SHA1_96(RunTestIpsecEspAll): class Test_async_ESNoff_ARoff_AES_CBC_256_SHA1_96(RunTestIpsecEspAll): """async ESNoff ARoff AES-CBC-256/SHA1-96 IPSec test""" + def test_ipsec(self): """async ESNoff ARoff AES-CBC-256/SHA1-96 IPSec test""" self.run_test() |