summaryrefslogtreecommitdiffstats
path: root/src/vppinfra/macros.h
blob: 1b2064add34e9ab56167955cfd7897537429e5a2 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
/*
 * macros.h - definitions for a simple macro expander
 *
 *  Copyright (c) 2010-2020 Cisco and/or its affiliates.
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at:
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
*/

#ifndef included_macros_h
#define included_macros_h

#include <vppinfra/vec.h>
#include <vppinfra/hash.h>
#include <vppinfra/format.h>

#ifdef CLIB_UNIX
#include <stdlib.h>
#include <unistd.h>
#endif

typedef struct
{
  uword *the_builtin_eval_hash;
  uword *the_value_table_hash;
} clib_macro_main_t;

int clib_macro_unset (clib_macro_main_t * mm, char *name);
int clib_macro_set_value (clib_macro_main_t * mm, char *name, char *value);
void clib_macro_add_builtin (clib_macro_main_t * mm, char *name,
			     void *eval_fn);
i8 *clib_macro_get_value (clib_macro_main_t * mm, char *name);
i8 *clib_macro_eval (clib_macro_main_t * mm, i8 * s, i32 complain,
		     u16 level, u16 max_level);
i8 *clib_macro_eval_dollar (clib_macro_main_t * mm, i8 * s, i32 complain);
void clib_macro_init (clib_macro_main_t * mm);
void clib_macro_free (clib_macro_main_t * mm);

format_function_t format_clib_macro_main;

#endif /* included_macros_h */

/*
 * fd.io coding-style-patch-verification: ON
 *
 * Local Variables:
 * eval: (c-set-style "gnu")
 * End:
 */
s="p">(d), 2, "number of ipsec backends in dump") self.assert_equal( d[0].protocol, self.vpp_ah_protocol, "ipsec protocol in dump entry" ) self.assert_equal(d[0].index, 0, "index in dump entry") self.assert_equal(d[0].active, 1, "active flag in dump entry") self.assert_equal( d[1].protocol, self.vpp_esp_protocol, "ipsec protocol in dump entry" ) self.assert_equal(d[1].index, 0, "index in dump entry") self.assert_equal(d[1].active, 1, "active flag in dump entry") def test_select_valid_backend(self): """select valid backend""" self.vapi.ipsec_select_backend(self.vpp_ah_protocol, 0) self.vapi.ipsec_select_backend(self.vpp_esp_protocol, 0) def test_select_invalid_backend(self): """select invalid backend""" with self.vapi.assert_negative_api_retval(): self.vapi.ipsec_select_backend(self.vpp_ah_protocol, 200) with self.vapi.assert_negative_api_retval(): self.vapi.ipsec_select_backend(self.vpp_esp_protocol, 200) def test_select_backend_in_use(self): """attempt to change backend while sad configured""" params = self.ipv4_params addr_type = params.addr_type is_ipv6 = params.is_ipv6 scapy_tun_sa_id = params.scapy_tun_sa_id scapy_tun_spi = params.scapy_tun_spi auth_algo_vpp_id = params.auth_algo_vpp_id auth_key = params.auth_key crypt_algo_vpp_id = params.crypt_algo_vpp_id crypt_key = params.crypt_key self.vapi.ipsec_sad_entry_add_del( is_add=1, entry={ "sad_id": scapy_tun_sa_id, "spi": scapy_tun_spi, "integrity_algorithm": auth_algo_vpp_id, "integrity_key": { "data": auth_key, "length": len(auth_key), }, "crypto_algorithm": crypt_algo_vpp_id, "crypto_key": { "data": crypt_key, "length": len(crypt_key), }, "protocol": self.vpp_ah_protocol, "tunnel_src": self.pg0.local_addr[addr_type], "tunnel_dst": self.pg0.remote_addr[addr_type], }, ) with self.vapi.assert_negative_api_retval(): self.vapi.ipsec_select_backend(protocol=self.vpp_ah_protocol, index=0) self.vapi.ipsec_sad_entry_add_del( is_add=0, entry={ "sad_id": scapy_tun_sa_id, "spi": scapy_tun_spi, "integrity_algorithm": auth_algo_vpp_id, "integrity_key": { "data": auth_key, "length": len(auth_key), }, "crypto_algorithm": crypt_algo_vpp_id, "crypto_key": { "data": crypt_key, "length": len(crypt_key), }, "protocol": self.vpp_ah_protocol, "tunnel_src": self.pg0.local_addr[addr_type], "tunnel_dst": self.pg0.remote_addr[addr_type], }, ) self.vapi.ipsec_select_backend(protocol=self.vpp_ah_protocol, index=0) if __name__ == "__main__": unittest.main(testRunner=VppTestRunner)