examples/ipsec-secgw: add offload fallback tests
Add tests for offload fallback feature; add inbound config modificator SGW_CFG_XPRM_IN (offload fallback setting can be set only for inbound SAs). Tests are using cryptodev for outbound SA. To test fragmentation with QAT set: MULTI_SEG_TEST="--reassemble=4096 --cryptodev_mask=0x5555" Signed-off-by: Marcin Smoczynski <marcinx.smoczynski@intel.com> Acked-by: Konstantin Ananyev <konstantin.ananyev@intel.com> Acked-by: Akhil Goyal <akhil.goyal@nxp.com> Tested-by: Bernard Iremonger <bernard.iremonger@intel.com>
This commit is contained in:
parent
bba1db3520
commit
403e9d914b
@ -753,6 +753,11 @@ Also the user can optionally setup:
|
||||
* ``CRYPTO_DEV``: crypto device to be used ('-w <pci-id>'). If none specified
|
||||
appropriate vdevs will be created by the script
|
||||
|
||||
* ``MULTI_SEG_TEST``: ipsec-secgw option to enable reassembly support and
|
||||
specify size of reassembly table (e.g.
|
||||
``MULTI_SEG_TEST='--reassemble 128'``). This option must be set for
|
||||
fallback session tests.
|
||||
|
||||
Note that most of the tests require the appropriate crypto PMD/device to be
|
||||
available.
|
||||
|
||||
|
@ -29,11 +29,11 @@ sp ipv6 out esp bypass pri 1 sport 0:65535 dport 0:65535
|
||||
#SA in rules
|
||||
sa in 7 aead_algo aes-128-gcm \
|
||||
aead_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \
|
||||
mode transport ${SGW_CFG_XPRM}
|
||||
mode transport ${SGW_CFG_XPRM} ${SGW_CFG_XPRM_IN}
|
||||
|
||||
sa in 9 aead_algo aes-128-gcm \
|
||||
aead_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \
|
||||
mode transport ${SGW_CFG_XPRM}
|
||||
mode transport ${SGW_CFG_XPRM} ${SGW_CFG_XPRM_IN}
|
||||
|
||||
#SA out rules
|
||||
sa out 7 aead_algo aes-128-gcm \
|
||||
|
@ -0,0 +1,5 @@
|
||||
#! /bin/bash
|
||||
|
||||
. ${DIR}/trs_aesgcm_defs.sh
|
||||
|
||||
SGW_CFG_XPRM_IN='port_id 0 type inline-crypto-offload fallback lookaside-none'
|
@ -29,11 +29,13 @@ sp ipv6 out esp bypass pri 1 sport 0:65535 dport 0:65535
|
||||
#SA in rules
|
||||
sa in 7 aead_algo aes-128-gcm \
|
||||
aead_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \
|
||||
mode ipv4-tunnel src ${REMOTE_IPV4} dst ${LOCAL_IPV4} ${SGW_CFG_XPRM}
|
||||
mode ipv4-tunnel src ${REMOTE_IPV4} dst ${LOCAL_IPV4} ${SGW_CFG_XPRM} \
|
||||
${SGW_CFG_XPRM_IN}
|
||||
|
||||
sa in 9 aead_algo aes-128-gcm \
|
||||
aead_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \
|
||||
mode ipv6-tunnel src ${REMOTE_IPV6} dst ${LOCAL_IPV6} ${SGW_CFG_XPRM}
|
||||
mode ipv6-tunnel src ${REMOTE_IPV6} dst ${LOCAL_IPV6} ${SGW_CFG_XPRM} \
|
||||
${SGW_CFG_XPRM_IN}
|
||||
|
||||
#SA out rules
|
||||
sa out 7 aead_algo aes-128-gcm \
|
||||
|
@ -0,0 +1,5 @@
|
||||
#! /bin/bash
|
||||
|
||||
. ${DIR}/tun_aesgcm_defs.sh
|
||||
|
||||
SGW_CFG_XPRM_IN='port_id 0 type inline-crypto-offload fallback lookaside-none'
|
Loading…
Reference in New Issue
Block a user