aboutsummaryrefslogtreecommitdiffstats
path: root/MAINTAINERS
AgeCommit message (Expand)AuthorFilesLines
2020-04-28gomemif: introduce gomemifJakub Grajciar1-0/+5
2020-04-22gso: add vxlan tunnel supportMohsin Kazmi1-1/+1
2020-04-14urpf: Unicast reverse Path Forwarding (plugin)Neale Ranns1-0/+5
2020-03-12policer: API cleanupJakub Grajciar1-0/+5
2020-02-26span: API cleanupJakub Grajciar1-0/+5
2020-02-18misc: deprecating the pluginFlorin Coras1-4/+0
2020-02-13vrrp: add plugin providing vrrp supportMatthew Smith1-0/+5
2020-02-04teib: Rename NHRP to TEIBNeale Ranns1-3/+3
2020-01-30misc: deprecate netmap and ixge driversDamjan Marion1-6/+0
2020-01-28crypto-native: rename crypto_ia32 to crypto_nativeDamjan Marion1-3/+3
2020-01-27tunnel: Common types for IP tunnelsNeale Ranns1-0/+5
2020-01-15quic: add FEATURE.yamlAloys Augustin1-0/+1
2020-01-03tls: add features.yamlFlorin Coras1-0/+1
2020-01-03tcp: add FEATURE.yamlFlorin Coras1-0/+1
2020-01-03udp: add features.yamlFlorin Coras1-0/+1
2020-01-03session: add feature.yamlFlorin Coras1-0/+1
2020-01-03vcl: add feature.yamlFlorin Coras1-0/+1
2020-01-03lisp: add feature.yamlFlorin Coras1-0/+2
2019-12-24unittest: test_bihash call clib_time_init(...)Dave Barach1-0/+6
2019-12-17perfmon: fix per-worker data initializationBenoƮt Ganne1-0/+5
2019-12-17nhrp: mGREv6Neale Ranns1-0/+5
2019-12-17ip: Protocol Independent IP NeighborsNeale Ranns1-1/+17
2019-12-04gre: Multi-point interfacesNeale Ranns1-0/+5
2019-12-04build: Add Jon Loeliger as plugin/MAP maintainer.Jon Loeliger1-0/+1
2019-12-03build: Separate ip and ip6 maintainersJon Loeliger1-1/+7
2019-12-03classify: API cleanupJakub Grajciar1-0/+5
2019-11-20bash: vpp-make-test bash functionDave Wallace1-0/+5
2019-11-19srv6-mobileTetsuya Murakami1-0/+6
2019-11-17nsim: add FEATURE.yamlDave Barach1-0/+1
2019-11-13virtio: feature arc have higher priority than redirectDamjan Marion1-0/+1
2019-11-07pmalloc: always lock pagesDamjan Marion1-0/+5
2019-10-31misc: Use tabs in MAINTAINERSVratko Polak1-10/+10
2019-10-30vpp_config: fix typos in templatesPaul Vinciguerra1-0/+5
2019-10-30misc: MAINTAINERS clean up typosPaul Vinciguerra1-2/+2
2019-10-30docs: devices-- add FEATURES.yamlPaul Vinciguerra1-3/+8
2019-10-25mdata: buffer metadata change tracker pluginDave Barach1-0/+5
2019-10-16flow: Add 'drop' and 'redirect-to-queue' actions supportChenmin Sun1-0/+5
2019-10-14gso: Add gso feature arcMohsin Kazmi1-0/+1
2019-10-14ping: Move to pluginMohsin Kazmi1-0/+5
2019-10-11papi: harden socket handlingVratko Polak1-1/+0
2019-10-10geneve: API cleanupJakub Grajciar1-0/+5
2019-10-09ioam: remove api boilerplateOle Troan1-0/+4
2019-10-07dhcp: Move to pluginNeale Ranns1-6/+6
2019-10-03oddbuf: remove api boilerplateOle Troan1-0/+4
2019-09-30stn: remove api boilerplateOle Troan1-0/+4
2019-09-30ct6: remove api boilerplateOle Troan1-0/+5
2019-09-30l2e: remove api boilerplateOle Troan1-0/+5
2019-09-27svs: remove api boilerplateOle Troan1-0/+5
2019-09-27cdp: remove api boilerplateOle Troan1-0/+4
2019-09-20classify: remove includes from classifier header fileDamjan Marion1-0/+5
b) b = VppIpsecSpdItfBinding(self, self.tun_spd, self.tun_if) b.add_vpp_config() self.net_objs.append(b) for p in params: self.config_ah_tra(p) config_tra_params(p, self.encryption_type) for p in params: self.config_ah_tun(p) config_tun_params(p, self.encryption_type, self.tun_if) for p in params: d = DpoProto.DPO_PROTO_IP6 if p.is_ipv6 else DpoProto.DPO_PROTO_IP4 r = VppIpRoute(self, p.remote_tun_if_host, p.addr_len, [VppRoutePath(self.tun_if.remote_addr[p.addr_type], 0xffffffff, proto=d)]) r.add_vpp_config() self.net_objs.append(r) self.logger.info(self.vapi.ppcli("show ipsec all")) def unconfig_network(self): for o in reversed(self.net_objs): o.remove_vpp_config() self.net_objs = [] def config_ah_tun(self, params): addr_type = params.addr_type scapy_tun_sa_id = params.scapy_tun_sa_id scapy_tun_spi = params.scapy_tun_spi vpp_tun_sa_id = params.vpp_tun_sa_id vpp_tun_spi = params.vpp_tun_spi auth_algo_vpp_id = params.auth_algo_vpp_id auth_key = params.auth_key crypt_algo_vpp_id = params.crypt_algo_vpp_id crypt_key = params.crypt_key remote_tun_if_host = params.remote_tun_if_host addr_any = params.addr_any addr_bcast = params.addr_bcast flags = params.flags e = VppEnum.vl_api_ipsec_spd_action_t objs = [] params.tun_sa_in = VppIpsecSA(self, scapy_tun_sa_id, scapy_tun_spi, auth_algo_vpp_id, auth_key, crypt_algo_vpp_id, crypt_key, self.vpp_ah_protocol, self.tun_if.local_addr[addr_type], self.tun_if.remote_addr[addr_type], flags=flags) params.tun_sa_out = VppIpsecSA(self, vpp_tun_sa_id, vpp_tun_spi, auth_algo_vpp_id, auth_key, crypt_algo_vpp_id, crypt_key, self.vpp_ah_protocol, self.tun_if.remote_addr[addr_type], self.tun_if.local_addr[addr_type], flags=flags) objs.append(params.tun_sa_in) objs.append(params.tun_sa_out) params.spd_policy_in_any = VppIpsecSpdEntry(self, self.tun_spd, vpp_tun_sa_id, addr_any, addr_bcast, addr_any, addr_bcast, socket.IPPROTO_AH) params.spd_policy_out_any = VppIpsecSpdEntry(self, self.tun_spd, vpp_tun_sa_id, addr_any, addr_bcast, addr_any, addr_bcast, socket.IPPROTO_AH, is_outbound=0) objs.append(params.spd_policy_out_any) objs.append(params.spd_policy_in_any) e1 = VppIpsecSpdEntry(self, self.tun_spd, vpp_tun_sa_id, remote_tun_if_host, remote_tun_if_host, self.pg1.remote_addr[addr_type], self.pg1.remote_addr[addr_type], 0, priority=10, policy=e.IPSEC_API_SPD_ACTION_PROTECT, is_outbound=0) e2 = VppIpsecSpdEntry(self, self.tun_spd, scapy_tun_sa_id, self.pg1.remote_addr[addr_type], self.pg1.remote_addr[addr_type], remote_tun_if_host, remote_tun_if_host, 0, policy=e.IPSEC_API_SPD_ACTION_PROTECT, priority=10) e3 = VppIpsecSpdEntry(self, self.tun_spd, vpp_tun_sa_id, remote_tun_if_host, remote_tun_if_host, self.pg0.local_addr[addr_type], self.pg0.local_addr[addr_type], 0, priority=20, policy=e.IPSEC_API_SPD_ACTION_PROTECT, is_outbound=0) e4 = VppIpsecSpdEntry(self, self.tun_spd, scapy_tun_sa_id, self.pg0.local_addr[addr_type], self.pg0.local_addr[addr_type], remote_tun_if_host, remote_tun_if_host, 0, policy=e.IPSEC_API_SPD_ACTION_PROTECT, priority=20) objs = objs + [e1, e2, e3, e4] for o in objs: o.add_vpp_config() self.net_objs = self.net_objs + objs def config_ah_tra(self, params): addr_type = params.addr_type scapy_tra_sa_id = params.scapy_tra_sa_id scapy_tra_spi = params.scapy_tra_spi vpp_tra_sa_id = params.vpp_tra_sa_id vpp_tra_spi = params.vpp_tra_spi auth_algo_vpp_id = params.auth_algo_vpp_id auth_key = params.auth_key crypt_algo_vpp_id = params.crypt_algo_vpp_id crypt_key = params.crypt_key addr_any = params.addr_any addr_bcast = params.addr_bcast flags = params.flags | (VppEnum.vl_api_ipsec_sad_flags_t. IPSEC_API_SAD_FLAG_USE_ANTI_REPLAY) e = VppEnum.vl_api_ipsec_spd_action_t objs = [] params.tra_sa_in = VppIpsecSA(self, scapy_tra_sa_id, scapy_tra_spi, auth_algo_vpp_id, auth_key, crypt_algo_vpp_id, crypt_key, self.vpp_ah_protocol, flags=flags) params.tra_sa_out = VppIpsecSA(self, vpp_tra_sa_id, vpp_tra_spi, auth_algo_vpp_id, auth_key, crypt_algo_vpp_id, crypt_key, self.vpp_ah_protocol, flags=flags) objs.append(params.tra_sa_in) objs.append(params.tra_sa_out) objs.append(VppIpsecSpdEntry(self, self.tra_spd, vpp_tra_sa_id, addr_any, addr_bcast, addr_any, addr_bcast, socket.IPPROTO_AH)) objs.append(VppIpsecSpdEntry(self, self.tra_spd, scapy_tra_sa_id, addr_any, addr_bcast, addr_any, addr_bcast, socket.IPPROTO_AH, is_outbound=0)) objs.append(VppIpsecSpdEntry(self, self.tra_spd, vpp_tra_sa_id, self.tra_if.local_addr[addr_type], self.tra_if.local_addr[addr_type], self.tra_if.remote_addr[addr_type], self.tra_if.remote_addr[addr_type], 0, priority=10, policy=e.IPSEC_API_SPD_ACTION_PROTECT, is_outbound=0)) objs.append(VppIpsecSpdEntry(self, self.tra_spd, scapy_tra_sa_id, self.tra_if.local_addr[addr_type], self.tra_if.local_addr[addr_type], self.tra_if.remote_addr[addr_type], self.tra_if.remote_addr[addr_type], 0, policy=e.IPSEC_API_SPD_ACTION_PROTECT, priority=10)) for o in objs: o.add_vpp_config() self.net_objs = self.net_objs + objs class TemplateIpsecAh(ConfigIpsecAH): """ Basic test for IPSEC using AH transport and Tunnel mode TRANSPORT MODE: --- encrypt --- |pg2| <-------> |VPP| --- decrypt --- TUNNEL MODE: --- encrypt --- plain --- |pg0| <------- |VPP| <------ |pg1| --- --- --- --- decrypt --- plain --- |pg0| -------> |VPP| ------> |pg1| --- --- --- """ @classmethod def setUpClass(cls): super(TemplateIpsecAh, cls).setUpClass() @classmethod def tearDownClass(cls): super(TemplateIpsecAh, cls).tearDownClass() def setUp(self): super(TemplateIpsecAh, self).setUp() self.config_network(self.params.values()) def tearDown(self): self.unconfig_network() super(TemplateIpsecAh, self).tearDown() class TestIpsecAh1(TemplateIpsecAh, IpsecTcpTests): """ Ipsec AH - TCP tests """ pass class TestIpsecAh2(TemplateIpsecAh, IpsecTra46Tests, IpsecTun46Tests): """ Ipsec AH w/ SHA1 """ pass class TestIpsecAhHandoff(TemplateIpsecAh, IpsecTun6HandoffTests, IpsecTun4HandoffTests): """ Ipsec AH Handoff """ pass class TestIpsecAhAll(ConfigIpsecAH, IpsecTra4, IpsecTra6, IpsecTun4, IpsecTun6): """ Ipsec AH all Algos """ def setUp(self): super(TestIpsecAhAll, self).setUp() def tearDown(self): super(TestIpsecAhAll, self).tearDown() def test_integ_algs(self): """All Engines SHA[1_96, 256, 384, 512] w/ & w/o ESN""" # foreach VPP crypto engine engines = ["ia32", "ipsecmb", "openssl"] algos = [{'vpp': VppEnum.vl_api_ipsec_integ_alg_t. IPSEC_API_INTEG_ALG_SHA1_96, 'scapy': "HMAC-SHA1-96"}, {'vpp': VppEnum.vl_api_ipsec_integ_alg_t. IPSEC_API_INTEG_ALG_SHA_256_128, 'scapy': "SHA2-256-128"}, {'vpp': VppEnum.vl_api_ipsec_integ_alg_t. IPSEC_API_INTEG_ALG_SHA_384_192, 'scapy': "SHA2-384-192"}, {'vpp': VppEnum.vl_api_ipsec_integ_alg_t. IPSEC_API_INTEG_ALG_SHA_512_256, 'scapy': "SHA2-512-256"}] flags = [0, (VppEnum.vl_api_ipsec_sad_flags_t. IPSEC_API_SAD_FLAG_USE_ESN)] # # loop through the VPP engines # for engine in engines: self.vapi.cli("set crypto handler all %s" % engine) # # loop through each of the algorithms # for algo in algos: # with self.subTest(algo=algo['scapy']): for flag in flags: # # setup up the config paramters # self.ipv4_params = IPsecIPv4Params() self.ipv6_params = IPsecIPv6Params() self.params = {self.ipv4_params.addr_type: self.ipv4_params, self.ipv6_params.addr_type: self.ipv6_params} for _, p in self.params.items(): p.auth_algo_vpp_id = algo['vpp'] p.auth_algo = algo['scapy'] p.flags = p.flags | flag # # configure the SPDs. SAs, etc # self.config_network(self.params.values()) # # run some traffic. # An exhautsive 4o6, 6o4 is not necessary for each algo # self.verify_tra_basic6(count=17) self.verify_tra_basic4(count=17) self.verify_tun_66(self.params[socket.AF_INET6], count=17) self.verify_tun_44(self.params[socket.AF_INET], count=17) # # remove the SPDs, SAs, etc # self.unconfig_network() if __name__ == '__main__': unittest.main(testRunner=VppTestRunner)