summaryrefslogtreecommitdiffstats
path: root/test/test_ipip.py
AgeCommit message (Expand)AuthorFilesLines
2020-02-21ipsec: IPSec protection for multi-point tunnel interfacesNeale Ranns1-4/+4
2020-02-04teib: Rename NHRP to TEIBNeale Ranns1-5/+5
2020-01-27ipip: Multi-point interfaceNeale Ranns1-0/+111
2020-01-27tunnel: Common types for IP tunnelsNeale Ranns1-16/+24
2019-12-03ipip: Tunnel flags controlling copying data to/from payload/encapNeale Ranns1-81/+539
2019-11-05misc: Fix python scripts shebang lineRenato Botelho do Couto1-1/+1
2019-11-05ip: Fragmentation fixesNeale Ranns1-4/+21
2019-06-18fib: fib api updatesNeale Ranns1-5/+5
2019-05-27IPIP tunnel: use address types on APINeale Ranns1-21/+25
2019-05-22stats: support multiple works for error countersOle Troan1-5/+5
2019-05-20reassembly: prevent long chain attackKlement Sekera1-0/+10
2019-04-10Tests Cleanup: Fix missing calls to setUpClass/tearDownClass.Paul Vinciguerra1-0/+8
2019-03-28Typos. A bunch of typos I've been collecting.Paul Vinciguerra1-1/+1
2019-03-06test framework: vpp_papi_provider.py - further cleanupOle Troan1-12/+12
2019-02-04VTL Cleanup: Fix missing calls to setUpClass/tearDownClass, fix numerous Type...Paul Vinciguerra1-0/+1
2018-12-10Test framework: StringIO fixes for Python3Ole Troan1-20/+6
2018-11-29Trivial: test/test_ipip.pyPaul Vinciguerra1-3/+3
2018-09-27IPIP and IPv6 fragmentationOle Troan1-19/+206
2018-09-17STATS: Dynamically mapped shared memory segmentOle Troan1-7/+9
2018-09-11GBP Endpoint UpdatesNeale Ranns1-1/+2
2018-09-02STATS: Python binding to access VPP statistics and counters.Ole Troan1-0/+10
2018-08-22IPIP and SIXRD tunnels create API needs table-IDs not fib-indexesNeale Ranns1-1/+13
2018-08-10IP fragmentation buffer chains, part 2.Ole Troan1-12/+54
2018-08-10IP fragmentation to handle buffer chains.Ole Troan1-0/+51
2018-05-25VPP-1277: IPIP - Copy TOS/TC from inner packet to outer.Ole Troan1-16/+19
2018-04-13Revert "MTU: Setting of MTU on software interface (instead of hardware interf...Damjan Marion1-64/+6
2018-04-13MTU: Setting of MTU on software interface (instead of hardware interface)Ole Troan1-6/+64
2018-03-15IPIP: Linter on test_*.pyOle Troan1-63/+30
2018-03-14IPIP: Add IP{v4,v6} over IP{v4,v6} configured tunnel support.Ole Troan1-0/+248
cket.AF_INET, cls.remote_tun_if_host) cls.vapi.ip_add_del_route(src4, 32, cls.tun_if.remote_ip4n) @classmethod def config_ah_tun(cls): cls.vapi.ipsec_sad_add_del_entry(cls.scapy_tun_sa_id, cls.scapy_tun_spi, cls.auth_algo_vpp_id, cls.auth_key, cls.crypt_algo_vpp_id, cls.crypt_key, cls.vpp_ah_protocol, cls.tun_if.local_ip4n, cls.tun_if.remote_ip4n) cls.vapi.ipsec_sad_add_del_entry(cls.vpp_tun_sa_id, cls.vpp_tun_spi, cls.auth_algo_vpp_id, cls.auth_key, cls.crypt_algo_vpp_id, cls.crypt_key, cls.vpp_ah_protocol, cls.tun_if.remote_ip4n, cls.tun_if.local_ip4n) cls.vapi.ipsec_spd_add_del(cls.tun_spd_id) cls.vapi.ipsec_interface_add_del_spd(cls.tun_spd_id, cls.tun_if.sw_if_index) l_startaddr = r_startaddr = socket.inet_pton(socket.AF_INET, "0.0.0.0") l_stopaddr = r_stopaddr = socket.inet_pton(socket.AF_INET, "255.255.255.255") cls.vapi.ipsec_spd_add_del_entry(cls.tun_spd_id, cls.vpp_tun_sa_id, l_startaddr, l_stopaddr, r_startaddr, r_stopaddr, protocol=socket.IPPROTO_AH) cls.vapi.ipsec_spd_add_del_entry(cls.tun_spd_id, cls.vpp_tun_sa_id, l_startaddr, l_stopaddr, r_startaddr, r_stopaddr, is_outbound=0, protocol=socket.IPPROTO_AH) l_startaddr = l_stopaddr = socket.inet_pton(socket.AF_INET, cls.remote_tun_if_host) r_startaddr = r_stopaddr = cls.pg1.remote_ip4n cls.vapi.ipsec_spd_add_del_entry(cls.tun_spd_id, cls.vpp_tun_sa_id, l_startaddr, l_stopaddr, r_startaddr, r_stopaddr, priority=10, policy=3, is_outbound=0) cls.vapi.ipsec_spd_add_del_entry(cls.tun_spd_id, cls.scapy_tun_sa_id, r_startaddr, r_stopaddr, l_startaddr, l_stopaddr, priority=10, policy=3) r_startaddr = r_stopaddr = cls.pg0.local_ip4n cls.vapi.ipsec_spd_add_del_entry(cls.tun_spd_id, cls.vpp_tun_sa_id, l_startaddr, l_stopaddr, r_startaddr, r_stopaddr, priority=20, policy=3, is_outbound=0) cls.vapi.ipsec_spd_add_del_entry(cls.tun_spd_id, cls.scapy_tun_sa_id, r_startaddr, r_stopaddr, l_startaddr, l_stopaddr, priority=20, policy=3) @classmethod def config_ah_tra(cls): cls.vapi.ipsec_sad_add_del_entry(cls.scapy_tra_sa_id, cls.scapy_tra_spi, cls.auth_algo_vpp_id, cls.auth_key, cls.crypt_algo_vpp_id, cls.crypt_key, cls.vpp_ah_protocol, is_tunnel=0) cls.vapi.ipsec_sad_add_del_entry(cls.vpp_tra_sa_id, cls.vpp_tra_spi, cls.auth_algo_vpp_id, cls.auth_key, cls.crypt_algo_vpp_id, cls.crypt_key, cls.vpp_ah_protocol, is_tunnel=0) cls.vapi.ipsec_spd_add_del(cls.tra_spd_id) cls.vapi.ipsec_interface_add_del_spd(cls.tra_spd_id, cls.tra_if.sw_if_index) l_startaddr = r_startaddr = socket.inet_pton(socket.AF_INET, "0.0.0.0") l_stopaddr = r_stopaddr = socket.inet_pton(socket.AF_INET, "255.255.255.255") cls.vapi.ipsec_spd_add_del_entry(cls.tra_spd_id, cls.vpp_tra_sa_id, l_startaddr, l_stopaddr, r_startaddr, r_stopaddr, protocol=socket.IPPROTO_AH) cls.vapi.ipsec_spd_add_del_entry(cls.tra_spd_id, cls.scapy_tra_sa_id, l_startaddr, l_stopaddr, r_startaddr, r_stopaddr, is_outbound=0, protocol=socket.IPPROTO_AH) l_startaddr = l_stopaddr = cls.tra_if.local_ip4n r_startaddr = r_stopaddr = cls.tra_if.remote_ip4n cls.vapi.ipsec_spd_add_del_entry(cls.tra_spd_id, cls.vpp_tra_sa_id, l_startaddr, l_stopaddr, r_startaddr, r_stopaddr, priority=10, policy=3, is_outbound=0) cls.vapi.ipsec_spd_add_del_entry(cls.tra_spd_id, cls.scapy_tra_sa_id, l_startaddr, l_stopaddr, r_startaddr, r_stopaddr, priority=10, policy=3) def tearDown(self): super(TemplateIpsecAh, self).tearDown() if not self.vpp_dead: self.vapi.cli("show hardware") class TestIpsecAh1(TemplateIpsecAh, IpsecTraTests, IpsecTunTests): """ Ipsec AH - TUN & TRA tests """ pass class TestIpsecAh2(TemplateIpsecAh, IpsecTcpTests): """ Ipsec AH - TCP tests """ pass if __name__ == '__main__': unittest.main(testRunner=VppTestRunner)