summaryrefslogtreecommitdiffstats
path: root/src/plugins/stn
AgeCommit message (Expand)AuthorFilesLines
2019-12-07stn: use explicit types in apiOle Troan3-35/+17
2019-09-30stn: remove api boilerplateOle Troan5-242/+16
2019-07-09vat: unload unused vat pluginsDave Barach1-2/+4
2019-05-03plugins: clean up plugin descriptionsDave Wallace1-1/+1
2018-11-14Remove c-11 memcpy checks from perf-critical codeDave Barach1-6/+6
2018-10-23c11 safe string handling supportDave Barach1-1/+1
2018-08-27cmake: Fix plugins .h includesMohsin Kazmi1-0/+5
2018-08-25cmake: handle api_test_plugins in add_vpp_plugin macroDamjan Marion1-3/+1
2018-08-25cmake: improve add_vpp_plugin macroDamjan Marion1-3/+6
2018-08-17CMake as an alternative to autotools (experimental)Damjan Marion1-0/+24
2018-07-19Remove unused argument to vlib_feature_nextDamjan Marion1-1/+1
2018-05-04Fix format for the dst address in the STN traceMilan Lenco1-2/+2
2018-04-25STN: use the punt feature arcsNeale Ranns1-79/+28
2018-03-01STN: Fix stn_rules_dump/details to follow API conventionOle Troan3-8/+8
2018-01-31Improved tracing for the IP[46] not-enabled case.Neale Ranns1-2/+4
2018-01-23VPPAPIGEN: vppapigen replacement in Python PLY.Ole Troan1-0/+1
2018-01-17stn: add vat supportFlorin Coras4-19/+246
2018-01-10Fix stn rules dump api (VPP-1123)Florin Coras1-20/+25
2018-01-09api: refactor vlibmemoryFlorin Coras1-2/+2
2017-11-21stn-plugin: do not assume all punted packets start with L3 header.Andrew Yourtchenko1-0/+12
2017-10-18Plugin for IP-Address to Interface PuntingPierre Pfister4-0/+841
an> tearDownClass(cls): super(IpsecApiTestCase, cls).tearDownClass() def setUp(self): super(IpsecApiTestCase, self).setUp() self.create_pg_interfaces([0]) self.pg0.config_ip4() self.pg0.admin_up() self.vpp_esp_protocol = (VppEnum.vl_api_ipsec_proto_t. IPSEC_API_PROTO_ESP) self.vpp_ah_protocol = (VppEnum.vl_api_ipsec_proto_t. IPSEC_API_PROTO_AH) self.ipv4_params = IPsecIPv4Params() def tearDown(self): self.pg0.unconfig_ip4() self.pg0.admin_down() super(IpsecApiTestCase, self).tearDown() def test_backend_dump(self): """ backend dump """ d = self.vapi.ipsec_backend_dump() self.assert_equal(len(d), 2, "number of ipsec backends in dump") self.assert_equal(d[0].protocol, self.vpp_ah_protocol, "ipsec protocol in dump entry") self.assert_equal(d[0].index, 0, "index in dump entry") self.assert_equal(d[0].active, 1, "active flag in dump entry") self.assert_equal(d[1].protocol, self.vpp_esp_protocol, "ipsec protocol in dump entry") self.assert_equal(d[1].index, 0, "index in dump entry") self.assert_equal(d[1].active, 1, "active flag in dump entry") def test_select_valid_backend(self): """ select valid backend """ self.vapi.ipsec_select_backend(self.vpp_ah_protocol, 0) self.vapi.ipsec_select_backend(self.vpp_esp_protocol, 0) def test_select_invalid_backend(self): """ select invalid backend """ with self.vapi.assert_negative_api_retval(): self.vapi.ipsec_select_backend(self.vpp_ah_protocol, 200) with self.vapi.assert_negative_api_retval(): self.vapi.ipsec_select_backend(self.vpp_esp_protocol, 200) def test_select_backend_in_use(self): """ attempt to change backend while sad configured """ params = self.ipv4_params addr_type = params.addr_type is_ipv6 = params.is_ipv6 scapy_tun_sa_id = params.scapy_tun_sa_id scapy_tun_spi = params.scapy_tun_spi auth_algo_vpp_id = params.auth_algo_vpp_id auth_key = params.auth_key crypt_algo_vpp_id = params.crypt_algo_vpp_id crypt_key = params.crypt_key self.vapi.ipsec_sad_entry_add_del( is_add=1, entry={ 'sad_id': scapy_tun_sa_id, 'spi': scapy_tun_spi, 'integrity_algorithm': auth_algo_vpp_id, 'integrity_key': { 'data': auth_key, 'length': len(auth_key), }, 'crypto_algorithm': crypt_algo_vpp_id, 'crypto_key': { 'data': crypt_key, 'length': len(crypt_key), }, 'protocol': self.vpp_ah_protocol, 'tunnel_src': self.pg0.local_addr[addr_type], 'tunnel_dst': self.pg0.remote_addr[addr_type] }) with self.vapi.assert_negative_api_retval(): self.vapi.ipsec_select_backend( protocol=self.vpp_ah_protocol, index=0) self.vapi.ipsec_sad_entry_add_del( is_add=0, entry={ 'sad_id': scapy_tun_sa_id, 'spi': scapy_tun_spi, 'integrity_algorithm': auth_algo_vpp_id, 'integrity_key': { 'data': auth_key, 'length': len(auth_key), }, 'crypto_algorithm': crypt_algo_vpp_id, 'crypto_key': { 'data': crypt_key, 'length': len(crypt_key), }, 'protocol': self.vpp_ah_protocol, 'tunnel_src': self.pg0.local_addr[addr_type], 'tunnel_dst': self.pg0.remote_addr[addr_type] }) self.vapi.ipsec_select_backend( protocol=self.vpp_ah_protocol, index=0) if __name__ == '__main__': unittest.main(testRunner=VppTestRunner)