From d207fd7e25f1f0b27acf3dc57c93b1339eb6efff Mon Sep 17 00:00:00 2001 From: Neale Ranns Date: Thu, 18 Apr 2019 17:18:12 -0700 Subject: IPSEC: ESP IPv6 transport mode payload length incorrect (VPP-1653) Change-Id: I8977100d7a22b50260858bd1ea9db419b53284ff Signed-off-by: Neale Ranns --- test/template_ipsec.py | 4 ++++ 1 file changed, 4 insertions(+) (limited to 'test') diff --git a/test/template_ipsec.py b/test/template_ipsec.py index d6641c45dd1..17470d93e3a 100644 --- a/test/template_ipsec.py +++ b/test/template_ipsec.py @@ -463,6 +463,8 @@ class IpsecTra6(object): recv_pkts = self.send_and_expect(self.tra_if, send_pkts, self.tra_if) for rx in recv_pkts: + self.assertEqual(len(rx) - len(Ether()) - len(IPv6()), + rx[IPv6].plen) try: decrypted = p.vpp_tra_sa.decrypt(rx[IPv6]) self.assert_packet_checksums_valid(decrypted) @@ -660,6 +662,8 @@ class IpsecTun6(object): count=count) recv_pkts = self.send_and_expect(self.pg1, send_pkts, self.tun_if) for recv_pkt in recv_pkts: + self.assertEqual(len(recv_pkt) - len(Ether()) - len(IPv6()), + recv_pkt[IPv6].plen) try: decrypt_pkt = p.vpp_tun_sa.decrypt(recv_pkt[IPv6]) if not decrypt_pkt.haslayer(IPv6): -- cgit 1.2.3-korg