From 9fdfcf32741551a0eaf11a27d822a9d8f0607832 Mon Sep 17 00:00:00 2001 From: Neale Ranns Date: Thu, 18 Apr 2019 17:18:12 -0700 Subject: IPSEC: ESP IPv6 transport mode payload length incorrect (VPP-1653) Change-Id: I8977100d7a22b50260858bd1ea9db419b53284ff Signed-off-by: Neale Ranns --- test/template_ipsec.py | 4 ++++ 1 file changed, 4 insertions(+) (limited to 'test') diff --git a/test/template_ipsec.py b/test/template_ipsec.py index efe49f1a01f..b954af1c824 100644 --- a/test/template_ipsec.py +++ b/test/template_ipsec.py @@ -451,6 +451,8 @@ class IpsecTra6(object): recv_pkts = self.send_and_expect(self.tra_if, send_pkts, self.tra_if) for rx in recv_pkts: + self.assertEqual(len(rx) - len(Ether()) - len(IPv6()), + rx[IPv6].plen) try: decrypted = p.vpp_tra_sa.decrypt(rx[IPv6]) self.assert_packet_checksums_valid(decrypted) @@ -648,6 +650,8 @@ class IpsecTun6(object): count=count) recv_pkts = self.send_and_expect(self.pg1, send_pkts, self.tun_if) for recv_pkt in recv_pkts: + self.assertEqual(len(recv_pkt) - len(Ether()) - len(IPv6()), + recv_pkt[IPv6].plen) try: decrypt_pkt = p.vpp_tun_sa.decrypt(recv_pkt[IPv6]) if not decrypt_pkt.haslayer(IPv6): -- cgit 1.2.3-korg