aboutsummaryrefslogtreecommitdiffstats
path: root/test/test_ipsec_esp.py
AgeCommit message (Expand)AuthorFilesLines
2019-04-16IPSEC: ESP with ESN tests and fixesNeale Ranns1-9/+12
2019-04-14IPSEC-MB: Use random & non-repeating IV (VPP-1642)Neale Ranns1-1/+1
2019-04-10crypto: Intel IPSEC-MB engineNeale Ranns1-2/+2
2019-04-10IPSEC: for each engine and algorithm testsNeale Ranns1-186/+307
2019-04-10Tests Cleanup: Fix missing calls to setUpClass/tearDownClass.Paul Vinciguerra1-0/+17
2019-03-28Typos. A bunch of typos I've been collecting.Paul Vinciguerra1-2/+2
2019-03-21IPSEC: Mutli-tunnel testsNeale Ranns1-12/+7
2019-02-28TEST: IPSEC NAT-T with UDP headerNeale Ranns1-135/+197
2019-02-18IPSEC: move SA counters into the stats segmentNeale Ranns1-22/+26
2019-02-05IPSEC: SPD counters in the stats sgementNeale Ranns1-9/+13
2019-01-31IPSEC: API modernisationNeale Ranns1-8/+19
2019-01-29make test: remove generic importsKlement Sekera1-1/+2
2019-01-25IPSEC: tests use opbject registryNeale Ranns1-228/+106
2019-01-24IPSEC Tests: to per-test setup and tearDownNeale Ranns1-99/+240
2018-12-02IPSEC-AH: anti-replay testingNeale Ranns1-2/+5
2018-11-15ipsec: infra for selecting backendsKlement Sekera1-1/+8
2018-10-03ipsec: add missing ipv6 ah code & ipv6 testsKlement Sekera1-75/+100
2018-06-24Revert "Revert "ipsec: VPP-1316 calculate IP/TCP/UDP inner checksums""Klement Sekera1-291/+113
2018-06-22Revert "ipsec: VPP-1316 calculate IP/TCP/UDP inner checksums"Ole Troan1-113/+291
2018-06-21ipsec: VPP-1316 calculate IP/TCP/UDP inner checksumsKlement Sekera1-291/+113
2018-05-09ipsec: support UDP encap/decap for NAT traversalKlement Sekera1-6/+6
2018-04-17make test: ipsec test cleanupKlement Sekera1-6/+4
2017-12-15ESP_AH_test_automation_scripts rev1“mystarrocks”1-0/+341
{ color: #0066bb; font-weight: bold } /* Name.Function.Magic */ .highlight .vc { color: #336699 } /* Name.Variable.Class */ .highlight .vg { color: #dd7700 } /* Name.Variable.Global */ .highlight .vi { color: #3333bb } /* Name.Variable.Instance */ .highlight .vm { color: #336699 } /* Name.Variable.Magic */ .highlight .il { color: #0000DD; font-weight: bold } /* Literal.Number.Integer.Long */ }
provider "aws" {
  region     = var.region
  access_key = data.vault_aws_access_credentials.creds.access_key
  secret_key = data.vault_aws_access_credentials.creds.secret_key
}

provider "vault" {
  address         = "http://10.30.51.28:8200"
  skip_tls_verify = true
  token           = "s.4z5PsufFwV3sHbCzK9Y2Cojd"
}