Code Review
/
vpp.git
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
review
|
tree
raw
|
inline
| side by side
Add an ip6 local hop-by-hop protocol demux table
[vpp.git]
/
test
/
template_ipsec.py
diff --git
a/test/template_ipsec.py
b/test/template_ipsec.py
index
c623d6a
..
84b8784
100644
(file)
--- a/
test/template_ipsec.py
+++ b/
test/template_ipsec.py
@@
-293,7
+293,7
@@
class IpsecTra4(object):
# replayed packets are dropped
self.send_and_assert_no_replies(self.tra_if, pkt * 3)
# replayed packets are dropped
self.send_and_assert_no_replies(self.tra_if, pkt * 3)
- self.assert_
packet
_counter_equal(
+ self.assert_
error
_counter_equal(
'/err/%s/SA replayed packet' % self.tra4_decrypt_node_name, 3)
# the window size is 64 packets
'/err/%s/SA replayed packet' % self.tra4_decrypt_node_name, 3)
# the window size is 64 packets
@@
-321,7
+321,7
@@
class IpsecTra4(object):
seq_num=350))
self.send_and_assert_no_replies(self.tra_if, pkt * 17)
seq_num=350))
self.send_and_assert_no_replies(self.tra_if, pkt * 17)
- self.assert_
packet
_counter_equal(
+ self.assert_
error
_counter_equal(
'/err/%s/Integrity check failed' % self.tra4_decrypt_node_name, 17)
# a malformed 'runt' packet
'/err/%s/Integrity check failed' % self.tra4_decrypt_node_name, 17)
# a malformed 'runt' packet
@@
-337,7
+337,7
@@
class IpsecTra4(object):
seq_num=350))
self.send_and_assert_no_replies(self.tra_if, pkt * 17)
seq_num=350))
self.send_and_assert_no_replies(self.tra_if, pkt * 17)
- self.assert_
packet
_counter_equal(
+ self.assert_
error
_counter_equal(
'/err/%s/undersized packet' % self.tra4_decrypt_node_name, 17)
# which we can determine since this packet is still in the window
'/err/%s/undersized packet' % self.tra4_decrypt_node_name, 17)
# which we can determine since this packet is still in the window
@@
-361,12
+361,12
@@
class IpsecTra4(object):
if use_esn:
# an out of window error with ESN looks like a high sequence
# wrap. but since it isn't then the verify will fail.
if use_esn:
# an out of window error with ESN looks like a high sequence
# wrap. but since it isn't then the verify will fail.
- self.assert_
packet
_counter_equal(
+ self.assert_
error
_counter_equal(
'/err/%s/Integrity check failed' %
self.tra4_decrypt_node_name, 34)
else:
'/err/%s/Integrity check failed' %
self.tra4_decrypt_node_name, 34)
else:
- self.assert_
packet
_counter_equal(
+ self.assert_
error
_counter_equal(
'/err/%s/SA replayed packet' %
self.tra4_decrypt_node_name, 20)
'/err/%s/SA replayed packet' %
self.tra4_decrypt_node_name, 20)
@@
-411,7
+411,7
@@
class IpsecTra4(object):
decrypted = p.vpp_tra_sa.decrypt(rx[0][IP])
else:
self.send_and_assert_no_replies(self.tra_if, [pkt])
decrypted = p.vpp_tra_sa.decrypt(rx[0][IP])
else:
self.send_and_assert_no_replies(self.tra_if, [pkt])
- self.assert_
packet
_counter_equal(
+ self.assert_
error
_counter_equal(
'/err/%s/sequence number cycled' %
self.tra4_encrypt_node_name, 1)
'/err/%s/sequence number cycled' %
self.tra4_encrypt_node_name, 1)
@@
-442,7
+442,7
@@
class IpsecTra4(object):
raise
finally:
self.logger.info(self.vapi.ppcli("show error"))
raise
finally:
self.logger.info(self.vapi.ppcli("show error"))
- self.logger.info(self.vapi.ppcli("show ipsec"))
+ self.logger.info(self.vapi.ppcli("show ipsec
all
"))
pkts = p.tra_sa_in.get_stats()['packets']
self.assertEqual(pkts, count,
pkts = p.tra_sa_in.get_stats()['packets']
self.assertEqual(pkts, count,
@@
-495,7
+495,7
@@
class IpsecTra6(object):
raise
finally:
self.logger.info(self.vapi.ppcli("show error"))
raise
finally:
self.logger.info(self.vapi.ppcli("show error"))
- self.logger.info(self.vapi.ppcli("show ipsec"))
+ self.logger.info(self.vapi.ppcli("show ipsec
all
"))
pkts = p.tra_sa_in.get_stats()['packets']
self.assertEqual(pkts, count,
pkts = p.tra_sa_in.get_stats()['packets']
self.assertEqual(pkts, count,
@@
-598,7
+598,7
@@
class IpsecTun4(object):
finally:
self.logger.info(self.vapi.ppcli("show error"))
finally:
self.logger.info(self.vapi.ppcli("show error"))
- self.logger.info(self.vapi.ppcli("show ipsec"))
+ self.logger.info(self.vapi.ppcli("show ipsec
all
"))
self.verify_counters(p, count)
self.verify_counters(p, count)
@@
-636,7
+636,7
@@
class IpsecTun4(object):
raise
finally:
self.logger.info(self.vapi.ppcli("show error"))
raise
finally:
self.logger.info(self.vapi.ppcli("show error"))
- self.logger.info(self.vapi.ppcli("show ipsec"))
+ self.logger.info(self.vapi.ppcli("show ipsec
all
"))
self.verify_counters(p, count)
self.verify_counters(p, count)
@@
-705,7
+705,7
@@
class IpsecTun6(object):
raise
finally:
self.logger.info(self.vapi.ppcli("show error"))
raise
finally:
self.logger.info(self.vapi.ppcli("show error"))
- self.logger.info(self.vapi.ppcli("show ipsec"))
+ self.logger.info(self.vapi.ppcli("show ipsec
all
"))
self.verify_counters(p, count)
def verify_tun_46(self, p, count=1):
self.verify_counters(p, count)
def verify_tun_46(self, p, count=1):
@@
-744,7
+744,7
@@
class IpsecTun6(object):
raise
finally:
self.logger.info(self.vapi.ppcli("show error"))
raise
finally:
self.logger.info(self.vapi.ppcli("show error"))
- self.logger.info(self.vapi.ppcli("show ipsec"))
+ self.logger.info(self.vapi.ppcli("show ipsec
all
"))
self.verify_counters(p, count)
self.verify_counters(p, count)