X-Git-Url: https://gerrit.fd.io/r/gitweb?a=blobdiff_plain;f=test%2Ftest_ipsec_esp.py;h=15ce4a9687892f54f9bf2911b8f9b7b13d0a6d73;hb=c4f2ef7d7e315e183e3994630209471c5362163a;hp=78f51501f9b8ac31822d762d27d7caa68b5300a9;hpb=23f0c4515f62b18ef6f1ff7cab537838f0f65457;p=vpp.git diff --git a/test/test_ipsec_esp.py b/test/test_ipsec_esp.py index 78f51501f9b..15ce4a96878 100644 --- a/test/test_ipsec_esp.py +++ b/test/test_ipsec_esp.py @@ -1,13 +1,11 @@ import socket +import unittest from scapy.layers.inet import IP, ICMP from scapy.layers.l2 import Ether -from scapy.layers.ipsec import * +from scapy.layers.ipsec import SecurityAssociation, ESP -from framework import VppTestCase -from vpp_ip_route import VppIpRoute - -from util import ppp +from framework import VppTestCase, VppTestRunner class TestIpsecEsp(VppTestCase): @@ -33,11 +31,11 @@ class TestIpsecEsp(VppTestCase): TUNNEL MODE: --- encrypt --- plain --- - |pg0| -------> |VPP| ------> |pg1| + |pg0| <------- |VPP| <------ |pg1| --- --- --- --- decrypt --- plain --- - |pg0| <------- |VPP| <------ |pg1| + |pg0| -------> |VPP| ------> |pg1| --- --- --- Note : IPv6 is not covered @@ -105,14 +103,14 @@ class TestIpsecEsp(VppTestCase): l_stopaddr, r_startaddr, r_stopaddr, - protocol=50) + protocol=socket.IPPROTO_ESP) cls.vapi.ipsec_spd_add_del_entry( spd_id, l_startaddr, l_stopaddr, r_startaddr, r_stopaddr, - protocol=50, + protocol=socket.IPPROTO_ESP, is_outbound=0) l_startaddr = l_stopaddr = socket.inet_pton( socket.AF_INET, cls.remote_pg0_lb_addr) @@ -174,14 +172,14 @@ class TestIpsecEsp(VppTestCase): l_stopaddr, r_startaddr, r_stopaddr, - protocol=50) + protocol=socket.IPPROTO_ESP) cls.vapi.ipsec_spd_add_del_entry( spd_id, l_startaddr, l_stopaddr, r_startaddr, r_stopaddr, - protocol=50, + protocol=socket.IPPROTO_ESP, is_outbound=0) l_startaddr = l_stopaddr = cls.pg2.local_ip4n r_startaddr = r_stopaddr = cls.pg2.remote_ip4n @@ -283,7 +281,7 @@ class TestIpsecEsp(VppTestCase): self.pg2, send_pkts, self.pg2, count=count) # ESP TRA VPP encryption/decryption verification for Pkts in recv_pkts: - decrypt_pkt = self.local_tra_sa.decrypt(Pkts[IP]) + self.local_tra_sa.decrypt(Pkts[IP]) finally: self.logger.info(self.vapi.ppcli("show error")) self.logger.info(self.vapi.ppcli("show ipsec"))