The purpose of these scripts is to automate ipsec-secgw functional testing. The scripts require two machines (SUT and DUT) connected through at least 2 NICs and running linux (so far tested only on Ubuntu 18.04). Introduced test-cases for the following scenarios: - Transport/Tunnel modes - AES-CBC SHA1 - AES-GCM - ESN on/off - legacy/librte_ipsec code path Signed-off-by: Konstantin Ananyev <konstantin.ananyev@intel.com> Acked-by: Radu Nicolau <radu.nicolau@intel.com> Acked-by: Akhil Goyal <akhil.goyal@nxp.com>
67 lines
1.9 KiB
Bash
67 lines
1.9 KiB
Bash
#! /bin/bash
|
|
|
|
. ${DIR}/trs_aesgcm_common_defs.sh
|
|
|
|
SGW_CMD_XPRM='-e -w 300'
|
|
|
|
config_remote_xfrm()
|
|
{
|
|
ssh ${REMOTE_HOST} ip xfrm policy flush
|
|
ssh ${REMOTE_HOST} ip xfrm state flush
|
|
|
|
ssh ${REMOTE_HOST} ip xfrm policy add \
|
|
src ${REMOTE_IPV4} dst ${LOCAL_IPV4} \
|
|
dir out ptype main action allow \
|
|
tmpl proto esp mode transport reqid 1
|
|
|
|
ssh ${REMOTE_HOST} ip xfrm policy add \
|
|
src ${LOCAL_IPV4} dst ${REMOTE_IPV4} \
|
|
dir in ptype main action allow \
|
|
tmpl proto esp mode transport reqid 2
|
|
|
|
ssh ${REMOTE_HOST} ip xfrm state add \
|
|
src ${REMOTE_IPV4} dst ${LOCAL_IPV4} \
|
|
proto esp spi 7 reqid 1 mode transport replay-window 64 flag esn \
|
|
aead "rfc4106\(gcm\(aes\)\)" \
|
|
0xdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef 128
|
|
|
|
ssh ${REMOTE_HOST} ip xfrm state add \
|
|
src ${LOCAL_IPV4} dst ${REMOTE_IPV4} \
|
|
proto esp spi 7 reqid 2 mode transport replay-window 64 flag esn \
|
|
aead "rfc4106\(gcm\(aes\)\)" \
|
|
0xdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef 128
|
|
|
|
ssh ${REMOTE_HOST} ip xfrm policy list
|
|
ssh ${REMOTE_HOST} ip xfrm state list
|
|
}
|
|
|
|
config6_remote_xfrm()
|
|
{
|
|
config_remote_xfrm
|
|
|
|
ssh ${REMOTE_HOST} ip xfrm policy add \
|
|
src ${REMOTE_IPV6} dst ${LOCAL_IPV6} \
|
|
dir out ptype main action allow \
|
|
tmpl proto esp mode transport reqid 3
|
|
|
|
ssh ${REMOTE_HOST} ip xfrm policy add \
|
|
src ${LOCAL_IPV6} dst ${REMOTE_IPV6} \
|
|
dir in ptype main action allow \
|
|
tmpl proto esp mode transport reqid 4
|
|
|
|
ssh ${REMOTE_HOST} ip xfrm state add \
|
|
src ${REMOTE_IPV6} dst ${LOCAL_IPV6} \
|
|
proto esp spi 9 reqid 3 mode transport replay-window 64 flag esn \
|
|
aead "rfc4106\(gcm\(aes\)\)" \
|
|
0xdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef 128
|
|
|
|
ssh ${REMOTE_HOST} ip xfrm state add \
|
|
src ${LOCAL_IPV6} dst ${REMOTE_IPV6} \
|
|
proto esp spi 9 reqid 4 mode transport replay-window 64 flag esn \
|
|
aead "rfc4106\(gcm\(aes\)\)" \
|
|
0xdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef 128
|
|
|
|
ssh ${REMOTE_HOST} ip xfrm policy list
|
|
ssh ${REMOTE_HOST} ip xfrm state list
|
|
}
|