summaryrefslogtreecommitdiffstats
path: root/test/test_ipsec_api.py
blob: b5b4adac66b8d995f09afa5af191d7c220c9ed37 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
import unittest

from framework import VppTestCase, VppTestRunner
from template_ipsec import TemplateIpsec, IPsecIPv4Params
from vpp_papi import VppEnum


class IpsecApiTestCase(VppTestCase):
    """ IPSec API tests """

    @classmethod
    def setUpClass(cls):
        super(IpsecApiTestCase, cls).setUpClass()

    @classmethod
    def tearDownClass(cls):
        super(IpsecApiTestCase, cls).tearDownClass()

    def setUp(self):
        super(IpsecApiTestCase, self).setUp()
        self.create_pg_interfaces([0])
        self.pg0.config_ip4()
        self.pg0.admin_up()

        self.vpp_esp_protocol = (VppEnum.vl_api_ipsec_proto_t.
                                 IPSEC_API_PROTO_ESP)
        self.vpp_ah_protocol = (VppEnum.vl_api_ipsec_proto_t.
                                IPSEC_API_PROTO_AH)
        self.ipv4_params = IPsecIPv4Params()

    def tearDown(self):
        self.pg0.unconfig_ip4()
        self.pg0.admin_down()
        super(IpsecApiTestCase, self).tearDown()

    def test_backend_dump(self):
        """ backend dump """
        d = self.vapi.ipsec_backend_dump()
        self.assert_equal(len(d), 2, "number of ipsec backends in dump")
        self.assert_equal(d[0].protocol, self.vpp_ah_protocol,
                          "ipsec protocol in dump entry")
        self.assert_equal(d[0].index, 0, "index in dump entry")
        self.assert_equal(d[0].active, 1, "active flag in dump entry")
        self.assert_equal(d[1].protocol, self.vpp_esp_protocol,
                          "ipsec protocol in dump entry")
        self.assert_equal(d[1].index, 0, "index in dump entry")
        self.assert_equal(d[1].active, 1, "active flag in dump entry")

    def test_select_valid_backend(self):
        """ select valid backend """
        self.vapi.ipsec_select_backend(self.vpp_ah_protocol, 0)
        self.vapi.ipsec_select_backend(self.vpp_esp_protocol, 0)

    def test_select_invalid_backend(self):
        """ select invalid backend """
        with self.vapi.assert_negative_api_retval():
            self.vapi.ipsec_select_backend(self.vpp_ah_protocol, 200)
        with self.vapi.assert_negative_api_retval():
            self.vapi.ipsec_select_backend(self.vpp_esp_protocol, 200)

    def test_select_backend_in_use(self):
        """ attempt to change backend while sad configured """
        params = self.ipv4_params
        addr_type = params.addr_type
        is_ipv6 = params.is_ipv6
        scapy_tun_sa_id = params.scapy_tun_sa_id
        scapy_tun_spi = params.scapy_tun_spi
        auth_algo_vpp_id = params.auth_algo_vpp_id
        auth_key = params.auth_key
        crypt_algo_vpp_id = params.crypt_algo_vpp_id
        crypt_key = params.crypt_key

        self.vapi.ipsec_sad_entry_add_del(
            is_add=1,
            entry={
                'sad_id': scapy_tun_sa_id,
                'spi': scapy_tun_spi,
                'integrity_algorithm': auth_algo_vpp_id,
                'integrity_key': {
                    'data': auth_key,
                    'length': len(auth_key),
                },
                'crypto_algorithm': crypt_algo_vpp_id,
                'crypto_key': {
                    'data': crypt_key,
                    'length': len(crypt_key),
                },
                'protocol': self.vpp_ah_protocol,
                'tunnel_src': self.pg0.local_addr[addr_type],
                'tunnel_dst': self.pg0.remote_addr[addr_type]
            })
        with self.vapi.assert_negative_api_retval():
            self.vapi.ipsec_select_backend(
                protocol=self.vpp_ah_protocol, index=0)

        self.vapi.ipsec_sad_entry_add_del(
            is_add=0,
            entry={
                'sad_id': scapy_tun_sa_id,
                'spi': scapy_tun_spi,
                'integrity_algorithm': auth_algo_vpp_id,
                'integrity_key': {
                    'data': auth_key,
                    'length': len(auth_key),
                },
                'crypto_algorithm': crypt_algo_vpp_id,
                'crypto_key': {
                    'data': crypt_key,
                    'length': len(crypt_key),
                },
                'protocol': self.vpp_ah_protocol,
                'tunnel_src': self.pg0.local_addr[addr_type],
                'tunnel_dst': self.pg0.remote_addr[addr_type]
            })
        self.vapi.ipsec_select_backend(
            protocol=self.vpp_ah_protocol, index=0)


if __name__ == '__main__':
    unittest.main(testRunner=VppTestRunner)
ng MLRsearch algorithm.\ | | | | ... | *Arguments:* | | ... | - frame_size - Framesize in Bytes in integer or string (IMIX_v4_1). | | ... | Type: integer, string | | ... | - phy_cores - Number of physical cores. Type: integer | | ... | - rxq - Number of RX queues, default value: ${None}. Type: integer | | | | [Arguments] | ${frame_size} | ${phy_cores} | ${rxq}=${None} | | | | Set Test Variable | \${frame_size} | | | | Given Set Max Rate And Jumbo | | And Add worker threads to all DUTs | ${phy_cores} | ${rxq} | | And Pre-initialize layer driver | ${nic_driver} | | And Apply startup configuration on all VPP DUTs | | When Initialize layer driver | ${nic_driver} | | And Initialize layer interface | | And Initialize IPv4 routing with IPv4 ACLs on DUT1 in circular topology | | ... | ${ip_nr} | | Then Find NDR and PDR intervals using optimized search *** Test Cases *** | 64B-1c-ethip4udp-ip4base-iacl10sf-100kflows-ndrpdr | | [Tags] | 64B | 1C | | frame_size=${64} | phy_cores=${1} | 64B-2c-ethip4udp-ip4base-iacl10sf-100kflows-ndrpdr | | [Tags] | 64B | 2C | | frame_size=${64} | phy_cores=${2} | 64B-4c-ethip4udp-ip4base-iacl10sf-100kflows-ndrpdr | | [Tags] | 64B | 4C | | frame_size=${64} | phy_cores=${4} | 1518B-1c-ethip4udp-ip4base-iacl10sf-100kflows-ndrpdr | | [Tags] | 1518B | 1C | | frame_size=${1518} | phy_cores=${1} | 1518B-2c-ethip4udp-ip4base-iacl10sf-100kflows-ndrpdr | | [Tags] | 1518B | 2C | | frame_size=${1518} | phy_cores=${2} | 1518B-4c-ethip4udp-ip4base-iacl10sf-100kflows-ndrpdr | | [Tags] | 1518B | 4C | | frame_size=${1518} | phy_cores=${4} | 9000B-1c-ethip4udp-ip4base-iacl10sf-100kflows-ndrpdr | | [Tags] | 9000B | 1C | | frame_size=${9000} | phy_cores=${1} | 9000B-2c-ethip4udp-ip4base-iacl10sf-100kflows-ndrpdr | | [Tags] | 9000B | 2C | | frame_size=${9000} | phy_cores=${2} | 9000B-4c-ethip4udp-ip4base-iacl10sf-100kflows-ndrpdr | | [Tags] | 9000B | 4C | | frame_size=${9000} | phy_cores=${4} | IMIX-1c-ethip4udp-ip4base-iacl10sf-100kflows-ndrpdr | | [Tags] | IMIX | 1C | | frame_size=IMIX_v4_1 | phy_cores=${1} | IMIX-2c-ethip4udp-ip4base-iacl10sf-100kflows-ndrpdr | | [Tags] | IMIX | 2C | | frame_size=IMIX_v4_1 | phy_cores=${2} | IMIX-4c-ethip4udp-ip4base-iacl10sf-100kflows-ndrpdr | | [Tags] | IMIX | 4C | | frame_size=IMIX_v4_1 | phy_cores=${4}