a829b13986
ipsec: drop runts in esp-decrypt
...
Change-Id: Id7fcaf8590f9f2dcccdebea0ad31c7ecd1cbc8af
Signed-off-by: Damjan Marion <damarion@cisco.com >
2019-04-25 08:32:28 +00:00
1b582b8e92
IPSEC: IPv6 ESP transport mode incorrect packet length and checksum (VPP-1654)
...
Change-Id: Ia3474e5bfea5764eae9b2987bf78296535df6778
Signed-off-by: Neale Ranns <nranns@cisco.com >
2019-04-19 18:29:19 +00:00
d207fd7e25
IPSEC: ESP IPv6 transport mode payload length incorrect (VPP-1653)
...
Change-Id: I8977100d7a22b50260858bd1ea9db419b53284ff
Signed-off-by: Neale Ranns <nranns@cisco.com >
2019-04-19 03:58:34 +00:00
80f6fd53fe
IPSEC: Pass the algorithm salt (used in GCM) over the API
...
Change-Id: Ia8cea13f7b937294e6a080a55fb2ceff30063acf
Signed-off-by: Neale Ranns <nranns@cisco.com >
2019-04-17 13:05:07 +00:00
47feb1146e
IPSEC: support GCM in ESP
...
Change-Id: Id2ddb77b4ec3dd543d6e638bc882923f2bac011d
Signed-off-by: Neale Ranns <nranns@cisco.com >
2019-04-16 15:54:31 +00:00
90cf21b5d8
Tests: Refactor tearDown show command logging, add lifecycle markers.
...
This change adds a consistent interface for adding test-specific show commands to
log.txt.
It also adds log markers for the execution of setUp[Class], tearDown[Class]
in the logs.
Change-Id: I7d42e396e594a59e866a7d55dac0af25548e657a
Signed-off-by: Paul Vinciguerra <pvinci@vinciconsulting.com >
2019-04-11 07:23:11 +00:00
3f86ca3eec
make test: fix redundant setUp() in template_ipsec.py
...
Change-Id: I81b3888816b064bd6bf0f38f5380dae93d7bb349
Signed-off-by: Dave Wallace <dwallacelf@gmail.com >
2019-04-10 19:03:35 +00:00
4f33c80c5d
IPSEC: for each engine and algorithm tests
...
refactor the IPSEC tests a bit so we can parameterise
the setup.
Change-Id: I777e5eb8f29ca1dce3dd273ebd05dae5846790af
Signed-off-by: Neale Ranns <nranns@cisco.com >
2019-04-10 17:00:35 +00:00
7f9b7f9f49
Tests Cleanup: Fix missing calls to setUpClass/tearDownClass.
...
Continuation/Part 2 of https://gerrit.fd.io/r/#/c/17092/
Change-Id: Id0122d84eaf2c05d29e5be63a594d5e528ee7c9a
Signed-off-by: Paul Vinciguerra <pvinci@vinciconsulting.com >
2019-04-10 14:37:40 +00:00
1091c4aa9b
IPSEC TEST: various hash alogrithms
...
Change-Id: I925aa5bf9472e81f98072d63df499b19e6ddf43d
Signed-off-by: Neale Ranns <nranns@cisco.com >
2019-04-08 21:52:04 +00:00
f05e732e4a
IPSEC-GRE; tests
...
failing test disabled on ARM
Change-Id: I6b7535cd8f51fdaf9786ba77f9f61a7d8d049bbd
Signed-off-by: Neale Ranns <nranns@cisco.com >
2019-04-02 14:10:28 +00:00
d7603d97e0
IPSEC: tunnel fragmentation
...
Change-Id: I63741a22bc82f5f861e1c0f26a93b5569cc52061
Signed-off-by: Neale Ranns <nranns@cisco.com >
2019-03-29 11:10:33 +00:00
1e3aa5e213
ipsec: USE_EXTENDED_SEQ_NUM -> USE_ESN
...
Change-Id: Ib828ea5106f3ae280e4ce233f2462dee363580b7
Signed-off-by: Damjan Marion <damarion@cisco.com >
2019-03-28 22:23:08 +00:00
987aea8ec1
IPSEC: 4o6 and 6o4 for tunnel interfaces
...
Change-Id: I4d3ba18ab5205317219989de55b6e50d3b1d8a79
Signed-off-by: Neale Ranns <nranns@cisco.com >
2019-03-28 12:53:37 +00:00
8feeaff56f
Typos. A bunch of typos I've been collecting.
...
Change-Id: I53ab8d17914e6563110354e4052109ac02bf8f3b
Signed-off-by: Paul Vinciguerra <pvinci@vinciconsulting.com >
2019-03-28 06:36:04 +00:00
3833ffd6c6
IPSEC tests fnd fix or Extended Sequence Numbers
...
Change-Id: Iad6c4b867961ec8036110a4e15a829ddb93193ed
Signed-off-by: Neale Ranns <nranns@cisco.com >
2019-03-25 20:03:24 +00:00
00a442068d
IPSEC: test for packet drop on sequence number wrap
...
Change-Id: Id546c56a4904d13d4278055f3c5a5e4548e2efd0
Signed-off-by: Neale Ranns <nranns@cisco.com >
2019-03-22 13:05:39 +00:00
2ac885c665
IPSEC: Mutli-tunnel tests
...
Change-Id: I46f1db6579835c6613fdbb2b726246cc62b135fe
Signed-off-by: Neale Ranns <nranns@cisco.com >
2019-03-21 13:44:31 +00:00
1ba5bc8d88
ipsec: add ipv6 support for ipsec tunnel interface
...
Change-Id: I6a76907dc7bed2a81282b63669bea2219d6903c9
Signed-off-by: Kingwel Xie <kingwel.xie@ericsson.com >
Signed-off-by: Neale Ranns <neale.ranns@cisco.com >
2019-03-21 07:42:09 +00:00
53f526b680
TEST: IPSEC NAT-T with UDP header
...
Change-Id: I5ef8b3f4be40a7a0b0f1cb90dc0e15a4711e8664
Signed-off-by: Neale Ranns <nranns@cisco.com >
2019-02-28 07:59:03 +00:00
eba31ecebe
IPSEC: move SA counters into the stats segment
...
1) stats are accessed via the stat segment which is more condusive to
monitoring
2) stats are accurate in the presence of multiple threads. There's no
guarantee that an SA is access from only one worker.
Change-Id: Id5e217ea253ddfc9480aaedb0d008dea031b1148
Signed-off-by: Neale Ranns <nranns@cisco.com >
2019-02-18 13:05:17 +00:00
a09c1ff5b6
IPSEC: SPD counters in the stats sgement
...
- return the stats_index of each SPD in the create API call
- no ip_any in the API as this creates 2 SPD entries. client must add both v4 and v6 explicitly
- only one pool of SPD entries (rhter than one per-SPD) to support this
- no packets/bytes in the dump API. Polling the stats segment is much more efficient
(if the SA lifetime is based on packet/bytes)
- emit the policy index in the packet trace and CLI commands.
Change-Id: I7eaf52c9d0495fa24450facf55229941279b8569
Signed-off-by: Neale Ranns <nranns@cisco.com >
2019-02-05 14:59:44 +00:00
17dcec0b94
IPSEC: API modernisation
...
- use enums to enumerate the algoritms and protocols that are supported
- use address_t types to simplify encode/deocde
- use typedefs of entry objects to get consistency between add/del API and dump
Change-Id: I7e7c58c06a150e2439633ba9dca58bc1049677ee
Signed-off-by: Neale Ranns <nranns@cisco.com >
2019-01-31 20:44:22 +00:00
8e4a89bf42
IPSEC Tests: to per-test setup and tearDown
...
don't do the setup and teardown in class methods so that with
each test the config is added and deleted. that way we test that
delete actually removes state.
more helpful error codes from VPP for existing IPSEC state.
Change-Id: I5de1578f73b935b420d4cdd85aa98d5fdcc682f6
Signed-off-by: Neale Ranns <nranns@cisco.com >
2019-01-24 19:51:37 +00:00
14d7e90788
VPP-1522: harden reassembly code
...
Change-Id: Ib5a20bff7d8a340ecf50bcd4a023d6bf36382ba3
Signed-off-by: Klement Sekera <ksekera@cisco.com >
2018-12-13 14:42:50 +00:00
de847277c9
IPSEC-AH: anti-replay testing
...
Change-Id: Ia5d45db73e4bdb32214ed4f365d5eec8e28115f3
Signed-off-by: Neale Ranns <nranns@cisco.com >
2018-12-02 20:43:32 +00:00
10d066eade
make test: verify packet counters in ipsec tests
...
Change-Id: Ia15b40f9d91daf3a325cb8d707b22a1dbc68d9cc
Signed-off-by: Klement Sekera <ksekera@cisco.com >
2018-11-29 21:56:23 +00:00
b4d3053445
ipsec: infra for selecting backends
...
Change-Id: Ifa6d8391b1b2413a88b7720fc434e0bc849a149a
Signed-off-by: Klement Sekera <ksekera@cisco.com >
Signed-off-by: Andrew Yourtchenko <ayourtch@gmail.com >
2018-11-15 12:57:18 +00:00
611864f4bd
ipsec: add missing ipv6 ah code & ipv6 tests
...
Change-Id: I89e90193ded1beb6cb0950c15737f9467efac1c3
Signed-off-by: Klement Sekera <ksekera@cisco.com >
2018-10-03 17:38:41 +00:00
31da2e3031
Revert "Revert "ipsec: VPP-1316 calculate IP/TCP/UDP inner checksums""
...
This reverts commit e0d2bd6bd7
.
Change-Id: If491e16f9ea66b2493a6a7c7f3c684ed585f8f51
Signed-off-by: Klement Sekera <ksekera@cisco.com >
2018-06-24 22:53:37 +02:00
e0d2bd6bd7
Revert "ipsec: VPP-1316 calculate IP/TCP/UDP inner checksums"
...
This reverts commit a98346f664
.
Change-Id: Iee5b3a5ddff0e8fd3a30fe5973cee24de434fe12
Signed-off-by: Ole Troan <ot@cisco.com >
2018-06-22 22:37:55 +02:00
a98346f664
ipsec: VPP-1316 calculate IP/TCP/UDP inner checksums
...
Calculate IP/TCP/UDP checksums in software before adding authentication.
Change-Id: I3e121cb00aeba667764f39ade8d62170f18f8b6b
Signed-off-by: Klement Sekera <ksekera@cisco.com >
2018-06-21 14:50:10 +00:00