aboutsummaryrefslogtreecommitdiffstats
path: root/src/vnet/adj
AgeCommit message (Expand)AuthorFilesLines
2020-02-21ipsec: IPSec protection for multi-point tunnel interfacesNeale Ranns2-4/+3
2020-02-20fib: adjacency midchain teardown (VPP-1841)Neale Ranns3-5/+40
2020-02-03fib: invalid check for adj types.Neale Ranns1-1/+1
2020-02-03fib: refresh adj pointer after fib_walk_sync due to possible reallocSteven Luong1-0/+6
2020-01-30fib: fix typos in doxygenPaul Vinciguerra1-10/+10
2020-01-27ipip: Multi-point interfaceNeale Ranns4-18/+33
2020-01-27fib: Reload the adj after possible realloc (VPP-1822)Neale Ranns1-0/+1
2020-01-22fib: Adjacency realloc during rewrite update walk (VPP-1822)Neale Ranns1-4/+4
2020-01-09misc: fix feature description spellingOle Troan1-2/+1
2020-01-03fib: add adjacency feature.yamlNeale Ranns1-0/+24
2019-12-17ip: Protocol Independent IP NeighborsNeale Ranns5-15/+24
2019-12-17fib: Adjacency walk fix for IPv6Neale Ranns1-1/+1
2019-12-16vppinfra: bihash walk cb typedef and continue/stop controlsNeale Ranns1-3/+6
2019-12-15fib: Adjacency creation notifications for dlegatesNeale Ranns6-1/+29
2019-12-03fib: constify the adjacency in the rewrite nodesNeale Ranns2-4/+4
2019-12-03fib feature: Code mechanics to decouple dependency of feature on adjNeale Ranns2-8/+5
2019-11-26fib: reduce save_rewrite_length to u8Klement Sekera2-7/+9
2019-10-16fib: fix use-after-free for interface adj removalBenoît Ganne1-0/+3
2019-09-25fib: fix some typos in fib/mtrieLijian.Zhang1-6/+6
2019-09-23fib: do not dump no-longer valid adjacenciesBenoît Ganne3-2/+17
2019-08-07fib tests: IP multicast over GRENeale Ranns1-0/+1
2019-07-24fib: remove unused input parameterZhiyong Yang1-5/+2
2019-07-23api: binary api cleanupDave Barach1-1/+1
2019-07-19fib: FIB Entry trackingNeale Ranns1-9/+7
2019-05-16init / exit function orderingDave Barach1-7/+7
2019-05-13remove dead code in rewrite.cNeale Ranns1-26/+0
2019-04-16ADJ: crash in format/show (VPP-1648)Neale Ranns1-1/+1
2019-04-08fixing typosJim Thompson2-3/+3
2019-03-28IPSEC: run encrpyt as a feautre on the tunnelNeale Ranns1-17/+5
2019-03-28Typos. A bunch of typos I've been collecting.Paul Vinciguerra8-27/+27
2019-03-26ADJ: midchain delegate to performing stackingNeale Ranns5-5/+237
2019-03-26Simplify adjacency rewrite codeBenoît Ganne2-142/+26
2019-03-07Honor vnet_rewrite_data_t data_bytes == 0Dave Barach1-1/+15
2019-03-04adj: migrate old MULTIARCH macros to VLIB_NODE_FNFilip Tehlar2-20/+6
2019-02-22Callback functions must have the correct signatureNeale Ranns1-1/+3
2018-12-16IP6-MFIB: replace the radix tree with bihash (VPP-1526)Neale Ranns1-0/+2
2018-12-07FIB recusrion loop checks traverse midchain adjacenciesNeale Ranns4-13/+282
2018-11-15GBP: redirect contractsNeale Ranns1-9/+7
2018-11-14Remove c-11 memcpy checks from perf-critical codeDave Barach1-1/+1
2018-10-30ADJ: init MTU to interface defaultNeale Ranns2-1/+4
2018-10-23c11 safe string handling supportDave Barach3-7/+7
2018-10-01Add adjacency counters to the stats segmentNeale Ranns1-2/+6
2018-09-24Trivial: Clean up some typos.Paul Vinciguerra1-1/+1
2018-08-27Adjacency walks protected by 'walk in progress' flagNeale Ranns1-2/+11
2018-07-30SIXRD: fix post introduction of the directed subnet broadcastNeale Ranns1-1/+2
2018-07-20IP directed broadcastNeale Ranns3-0/+23
2018-07-16Adjacency-BFD: assume BFD down on createNeale Ranns1-8/+16
2018-06-11MTU: Software interface / Per-protocol MTU supportOle Troan7-37/+18
2018-05-25ARP proxy dumpsNeale Ranns4-4/+11
2018-05-17tcp: handle link-local addressesFlorin Coras2-1/+9
/span> \| ${auth_alg} \| | | [Arguments] | ${crypto_alg} | ${integ_alg} | | ${encr_key_len}= | Get Crypto Alg Key Len | ${crypto_alg} | | ${encr_key}= | Generate Random String | ${encr_key_len} | | ${auth_key_len}= | Get Integ Alg Key Len | ${integ_alg} | | ${auth_key}= | Generate Random String | ${auth_key_len} | | Set Test Variable | ${encr_key} | | Set Test Variable | ${auth_key} | Configure path for IPSec test | | [Documentation] | Setup path for IPsec testing TG<-->DUT1. | | ... | | ... | _NOTE:_ This KW sets following test case variable: | | ... | - tg_node - TG node. Type: dictionary | | ... | - tg_if - TG interface connected to DUT. Type: string | | ... | - tg_if_mac - TG interface MAC. Type: string | | ... | - dut_node - DUT node. Type: dictionary | | ... | - dut_if - DUT interface connected to TG. Type: string | | ... | - dut_if_mac - DUT interface MAC. Type: string | | ... | - dut_lo - DUT loopback interface. Type: string | | ... | | ... | *Example:* | | ... | \| Configure path for IPSec test \| | | Append Nodes | ${nodes['TG']} | ${nodes['DUT1']} | | Compute Path | | ${tg_if} | ${tg_node}= | Next Interface | | ${dut_if} | ${dut_node}= | Next Interface | | ${dut_if_mac}= | Get Interface Mac | ${dut_node} | ${dut_if} | | ${tg_if_mac}= | Get Interface Mac | ${tg_node} | ${tg_if} | | ${dut_lo}= | Vpp Create Loopback | ${dut_node} | | Set Interface State | ${dut_node} | ${dut_if} | up | | Set Interface State | ${dut_node} | ${dut_lo} | up | | Vpp Node Interfaces Ready Wait | ${dut_node} | | Set Test Variable | ${tg_node} | | Set Test Variable | ${tg_if} | | Set Test Variable | ${tg_if_mac} | | Set Test Variable | ${dut_node} | | Set Test Variable | ${dut_if} | | Set Test Variable | ${dut_if_mac} | | Set Test Variable | ${dut_lo} | Configure topology for IPv4 IPsec testing | | [Documentation] | Setup topology for IPv4 IPsec testing. | | ... | | ... | _NOTE:_ This KW sets following test case variable: | | ... | - dut_tun_ip - DUT tunnel IP address. Type: string | | ... | - dut_src_ip - DUT source IP address. Type: string | | ... | - tg_tun_ip - TG tunnel IP address. Type: string | | ... | - tg_src_ip - TG source IP address. Type: string | | ... | | ... | *Example:* | | ... | \| Configure topology for IPv4 IPsec testing \| | | Configure path for IPSec test | | Set Interface Address | ${dut_node} | ${dut_if} | ${dut_if_ip4} | | ... | ${ip4_plen} | | Set Interface Address | ${dut_node} | ${dut_lo} | ${dut_lo_ip4} | | ... | ${ip4_plen} | | dut1_v4.Set Arp | ${dut_if} | ${tg_if_ip4} | ${tg_if_mac} | | Vpp Route Add | ${dut_node} | ${tg_lo_ip4} | ${ip4_plen} | ${tg_if_ip4} | | ... | ${dut_if} | | Set Test Variable | ${dut_tun_ip} | ${dut_if_ip4} | | Set Test Variable | ${dut_src_ip} | ${dut_lo_ip4} | | Set Test Variable | ${tg_tun_ip} | ${tg_if_ip4} | | Set Test Variable | ${tg_src_ip} | ${tg_lo_ip4} | Configure topology for IPv6 IPsec testing | | [Documentation] | Setup topology fo IPv6 IPsec testing. | | ... | | ... | _NOTE:_ This KW sets following test case variable: | | ... | - dut_tun_ip - DUT tunnel IP address. Type: string | | ... | - dut_src_ip - DUT source IP address. Type: string | | ... | - tg_tun_ip - TG tunnel IP address. Type: string | | ... | - tg_src_ip - TG source IP address. Type: string | | ... | | ... | *Example:* | | ... | \| Configure topology for IPv6 IPsec testing \| | | Configure path for IPSec test | | VPP Set If IPv6 Addr | ${dut_node} | ${dut_if} | ${dut_if_ip6} | ${ip6_plen} | | VPP Set If IPv6 Addr | ${dut_node} | ${dut_lo} | ${dut_lo_ip6} | ${ip6_plen} | | Add IP Neighbor | ${dut_node} | ${dut_if} | ${tg_if_ip6} | ${tg_if_mac} | | Vpp All RA Suppress Link Layer | ${nodes} | | Vpp Route Add | ${dut_node} | ${tg_lo_ip6} | ${ip6_plen_rt} | ${tg_if_ip6} | | ... | ${dut_if} | | Set Test Variable | ${dut_tun_ip} | ${dut_if_ip6} | | Set Test Variable | ${dut_src_ip} | ${dut_lo_ip6} | | Set Test Variable | ${tg_tun_ip} | ${tg_if_ip6} | | Set Test Variable | ${tg_src_ip} | ${tg_lo_ip6} | Configure manual keyed connection for IPSec | | [Documentation] | Setup IPsec manual keyed connection on VPP node. | | ... | | ... | *Arguments:* | | ... | - node - VPP node to setup IPsec on. Type: dictionary | | ... | - interface - Interface to enable IPsec on. Type: string | | ... | - crypto_alg - Encrytion algorithm. Type: enum | | ... | - crypto_key - Encryption key. Type: string | | ... | - integ_alg - Integrity algorithm. Type: enum | | ... | - integ_key - Integrity key. Type: string | | ... | - l_spi - Local SPI. Type: integer | | ... | - r_spi - Remote SPI. Type: integer | | ... | - l_ip - Local IP address. Type: string | | ... | - r_ip - Remote IP address. Type: string | | ... | - l_tunnel - Local tunnel IP address (optional). Type: string | | ... | - r_tunnel - Remote tunnel IP address (optional). Type: string | | ... | | ... | _NOTE:_ This KW sets following test case variables: | | ... | - l_sa_id | | ... | - r_sa_id | | ... | | ... | *Example:* | | ... | \| ${encr_alg}= \| Crypto Alg AES CBC 128 \| | | ... | \| ${auth_alg}= \| Integ Alg SHA1 96 \| | | ... | \| Configure manual keyed connection for IPSec \| ${nodes['DUT1']} \ | | ... | \| GigabitEthernet0/8/0 \| ${encr_alg} \| sixteenbytes_key \ | | ... | \| ${auth_alg} \| twentybytessecretkey \| ${1000} \| ${1001} \ | | ... | \| 192.168.4.4 \| 192.168.3.3 \| 192.168.100.3 \| 192.168.100.2 \| | | [Arguments] | ${node} | ${interface} | ${crypto_alg} | ${crypto_key} | | ... | ${integ_alg} | ${integ_key} | ${l_spi} | ${r_spi} | ${l_ip} | | ... | ${r_ip} | ${l_tunnel}=${None} | ${r_tunnel}=${None} | | Set Test Variable | ${l_sa_id} | ${10} | | Set Test Variable | ${r_sa_id} | ${20} | | ${spd_id}= | Set Variable | ${1} | | ${p_hi}= | Set Variable | ${100} | | ${p_lo}= | Set Variable | ${10} | | VPP IPsec Add SAD Entry | ${node} | ${l_sa_id} | ${l_spi} | ${crypto_alg} | | ... | ${crypto_key} | ${integ_alg} | ${integ_key} | | ... | ${l_tunnel} | ${r_tunnel} | | VPP IPsec Add SAD Entry | ${node} | ${r_sa_id} | ${r_spi} | ${crypto_alg} | | ... | ${crypto_key} | ${integ_alg} | ${integ_key} | | ... | ${r_tunnel} | ${l_tunnel} | | VPP IPsec Add SPD | ${node} | ${spd_id} | | VPP IPsec SPD Add If | ${node} | ${spd_id} | ${interface} | | ${action}= | Policy Action Bypass | | VPP IPsec SPD Add Entry | ${node} | ${spd_id} | ${p_hi} | ${action} | | ... | inbound=${TRUE} | proto=${ESP_PROTO} | | VPP IPsec SPD Add Entry | ${node} | ${spd_id} | ${p_hi} | ${action} | | ... | inbound=${FALSE} | proto=${ESP_PROTO} | | ${action}= | Policy Action Protect | | VPP IPsec SPD Add Entry | ${node} | ${spd_id} | ${p_lo} | ${action} | | ... | sa_id=${r_sa_id} | laddr_range=${l_ip} | | ... | raddr_range=${r_ip} | inbound=${TRUE} | | VPP IPsec SPD Add Entry | ${node} | ${spd_id} | ${p_lo} | ${action} | | ... | sa_id=${l_sa_id} | laddr_range=${l_ip} | | ... | raddr_range=${r_ip} | inbound=${FALSE} | Update IPSec SA keys | | [Documentation] | Update IPsec SA keys on VPP node. | | ... | | ... | *Arguments:* | | ... | - node - VPP node to update SA keys. Type: dictionary | | ... | - l_sa_id - Local SA ID. Type: string | | ... | - r_sa_id - Remote SA ID. Type: string | | ... | - crypto_key - Encryption key. Type: string | | ... | - integ_key - Integrity key. Type: string | | ... | | ... | *Example:* | | ... | \| Update IPSec SA keys \| ${nodes['DUT1']} \ | | ... | \| 10 \| 20 \| sixteenbytes_key \| twentybytessecretkey \| | | [Arguments] | ${node} | ${l_sa_id} | ${r_sa_id} | ${crypto_key} | | ... | ${integ_key} | | VPP IPsec SA Set Key | ${dut_node} | ${l_sa_id} | ${crypto_key} | | ... | ${integ_key} | | VPP IPsec SA Set Key | ${dut_node} | ${r_sa_id} | ${crypto_key} | | ... | ${integ_key} | Send IPsec Packet and verify ESP encapsulation in received packet | | [Documentation] | Send IPsec packet from TG to DUT. Receive IPsec packet\ | | ... | from DUT on TG and verify ESP encapsulation. | | ... | | ... | *Arguments:* | | ... | - node - TG node. Type: dictionary | | ... | - interface - TG Interface. Type: string | | ... | - dst_mac - Destination MAC. Type: string | | ... | - crypto_alg - Encrytion algorithm. Type: enum | | ... | - crypto_key - Encryption key. Type: string | | ... | - integ_alg - Integrity algorithm. Type: enum | | ... | - integ_key - Integrity key. Type: string | | ... | - l_spi - Local SPI. Type: integer | | ... | - r_spi - Remote SPI. Type: integer | | ... | - l_ip - Local IP address. Type: string | | ... | - r_ip - Remote IP address. Type: string | | ... | - l_tunnel - Local tunnel IP address (optional). Type: string | | ... | - r_tunnel - Remote tunnel IP address (optional). Type: string | | ... | | ... | *Example:* | | ... | \| ${encr_alg}= \| Crypto Alg AES CBC 128 \| | | ... | \| ${auth_alg}= \| Integ Alg SHA1 96 \| | | ... | \| Send IPsec Packet and verify ESP encapsulation in received packet\ | | ... | \| ${nodes['TG']} \| eth1 \ | | ... | \| 52:54:00:d4:d8:22 \| ${encr_alg} \| sixteenbytes_key \ | | ... | \| ${auth_alg} \| twentybytessecretkey \| ${1001} \| ${1000} \ | | ... | \| 192.168.3.3 \| 192.168.4.4 \| 192.168.100.2 \| 192.168.100.3 \| | | [Arguments] | ${node} | ${interface} | ${dst_mac} | ${crypto_alg} | | ... | ${crypto_key} | ${integ_alg} | ${integ_key} | ${l_spi} | | ... | ${r_spi} | ${l_ip} | ${r_ip} | ${l_tunnel}=${None} | | ... | ${r_tunnel}=${None} | | ${src_mac}= | Get Interface Mac | ${node} | ${interface} | | ${if_name}= | Get Interface Name | ${node} | ${interface} | | ${args}= | Traffic Script Gen Arg | ${if_name} | ${if_name} | ${src_mac} | | ... | ${dst_mac} | ${l_ip} | ${r_ip} | | ${crypto_alg_str}= | Get Crypto Alg Scapy Name | ${crypto_alg} | | ${integ_alg_str}= | Get Integ Alg Scapy Name | ${integ_alg} | | ${args}= | Catenate | ${args} | --crypto_alg ${crypto_alg_str} | | ... | --crypto_key ${crypto_key} | --integ_alg ${integ_alg_str} | | ... | --integ_key ${integ_key} | --l_spi ${l_spi} | --r_spi ${r_spi} | | ${args}= | Set Variable If | "${l_tunnel}" == "${None}" | ${args} | | ... | ${args} --src_tun ${l_tunnel} | | ${args}= | Set Variable If | "${r_tunnel}" == "${None}" | ${args} | | ... | ${args} --dst_tun ${r_tunnel} | | Run Traffic Script On Node | ipsec.py | ${node} | ${args} | Set up IPv4 IPSec functional test | | [Documentation] | | ... | Set up IPv4 IPSec functional test. | | ... | | Set up functional test | | Configure topology for IPv4 IPsec testing | Set up IPv6 IPSec functional test | | [Documentation] | | ... | Set up IPv6 IPSec functional test. | | ... | | Set up functional test | | Configure topology for IPv6 IPsec testing | Tear down IPSec functional test | | [Documentation] | | ... | Tear down IPSec functional test. | | ... | | ... | *Example:* | | ... | | ... | \| Tear down IPSec functional test \| ${dut_node} \| | | ... | | [Arguments] | ${dut_node} | | ... | | VPP IPsec Show | ${dut_node} | | Tear down functional test | Set up IPSec SW device functional test | | [Documentation] | | ... | Set up IPSec SW device functional test for required IP version. | | ... | | ... | *Arguments:* | | ... | - ${ip_version} - IP version: IPv4 or IPv6. Type: string | | ... | | ... | *Example:* | | ... | | ... | \| Set up IPSec SW device functional test \| IPv4 \| | | ... | | [Arguments] | ${ip_version} | | ... | | ${duts}= | Get Matches | ${nodes} | DUT* | | :FOR | ${dut} | IN | @{duts} | | | Import Library | resources.libraries.python.VppConfigGenerator | | | ... | WITH NAME | ${dut} | | | Run keyword | ${dut}.Set Node | ${nodes['${dut}']} | | | Run keyword | ${dut}.Set Vpp Startup Conf Backup | | | Run keyword | ${dut}.Set Vpp Logfile | /tmp/vpp.log | | | Run keyword | ${dut}.Add Unix Nodaemon | | | Run keyword | ${dut}.Add Unix Log | | | Run keyword | ${dut}.Add Unix Coredump | | | Run keyword | ${dut}.Add Unix CLI Listen | /run/vpp/cli.sock | | | Run keyword | ${dut}.Add Unix Gid | | | Run keyword | ${dut}.Add Api Segment Gid | | | ${socket_id}= | Set Variable | ${0} | | | ${sw_dev_count}= | Set Variable | ${1} | | | Run keyword | ${dut}.Add DPDK SW Cryptodev | aesni_mb | ${socket_id} | | | ... | ${sw_dev_count} | | | Run keyword | ${dut}.Add DPDK SW Cryptodev | aesni_gcm | ${socket_id} | | | ... | ${sw_dev_count} | | Apply startup configuration on all VPP DUTs | restart_vpp=${FALSE} | | Set up functional test | | Run Keyword | Configure topology for ${ip_version} IPsec testing | Tear down IPSec SW device functional test | | [Documentation] | | ... | Tear down IPSec SW device functional test. | | ... | | ${duts}= | Get Matches | ${nodes} | DUT* | | :FOR | ${dut} | IN | @{duts} | | | VPP IPsec Show | ${nodes['${dut}']} | | | Run keyword | ${dut}.Restore Config | | Tear down functional test