IPSEC: API modernisation
[vpp.git] / test / test_ipsec_esp.py
1 import socket
2 import unittest
3 from scapy.layers.ipsec import ESP
4
5 from framework import VppTestRunner
6 from template_ipsec import IpsecTraTests, IpsecTunTests
7 from template_ipsec import TemplateIpsec, IpsecTcpTests
8 from vpp_ipsec import VppIpsecSpd, VppIpsecSpdEntry, VppIpsecSA,\
9         VppIpsecSpdItfBinding
10 from vpp_ip_route import VppIpRoute, VppRoutePath
11 from vpp_ip import DpoProto
12 from vpp_papi import VppEnum
13
14
15 class TemplateIpsecEsp(TemplateIpsec):
16     """
17     Basic test for ipsec esp sanity - tunnel and transport modes.
18
19     Below 4 cases are covered as part of this test
20     1) ipsec esp v4 transport basic test  - IPv4 Transport mode
21         scenario using HMAC-SHA1-96 intergrity algo
22     2) ipsec esp v4 transport burst test
23         Above test for 257 pkts
24     3) ipsec esp 4o4 tunnel basic test    - IPv4 Tunnel mode
25         scenario using HMAC-SHA1-96 intergrity algo
26     4) ipsec esp 4o4 tunnel burst test
27         Above test for 257 pkts
28
29     TRANSPORT MODE:
30
31      ---   encrypt   ---
32     |pg2| <-------> |VPP|
33      ---   decrypt   ---
34
35     TUNNEL MODE:
36
37      ---   encrypt   ---   plain   ---
38     |pg0| <-------  |VPP| <------ |pg1|
39      ---             ---           ---
40
41      ---   decrypt   ---   plain   ---
42     |pg0| ------->  |VPP| ------> |pg1|
43      ---             ---           ---
44     """
45
46     def setUp(self):
47         super(TemplateIpsecEsp, self).setUp()
48         self.encryption_type = ESP
49         self.tun_if = self.pg0
50         self.tra_if = self.pg2
51         self.logger.info(self.vapi.ppcli("show int addr"))
52
53         self.tra_spd = VppIpsecSpd(self, self.tra_spd_id)
54         self.tra_spd.add_vpp_config()
55         VppIpsecSpdItfBinding(self, self.tra_spd,
56                               self.tra_if).add_vpp_config()
57
58         for _, p in self.params.items():
59             self.config_esp_tra(p)
60             self.configure_sa_tra(p)
61         self.logger.info(self.vapi.ppcli("show ipsec"))
62
63         self.tun_spd = VppIpsecSpd(self, self.tun_spd_id)
64         self.tun_spd.add_vpp_config()
65         VppIpsecSpdItfBinding(self, self.tun_spd,
66                               self.tun_if).add_vpp_config()
67
68         for _, p in self.params.items():
69             self.config_esp_tun(p)
70         self.logger.info(self.vapi.ppcli("show ipsec"))
71
72         for _, p in self.params.items():
73             d = DpoProto.DPO_PROTO_IP6 if p.is_ipv6 else DpoProto.DPO_PROTO_IP4
74             VppIpRoute(self,  p.remote_tun_if_host, p.addr_len,
75                        [VppRoutePath(self.tun_if.remote_addr[p.addr_type],
76                                      0xffffffff,
77                                      proto=d)],
78                        is_ip6=p.is_ipv6).add_vpp_config()
79
80     def tearDown(self):
81         super(TemplateIpsecEsp, self).tearDown()
82         if not self.vpp_dead:
83             self.vapi.cli("show hardware")
84
85     def config_esp_tun(self, params):
86         addr_type = params.addr_type
87         scapy_tun_sa_id = params.scapy_tun_sa_id
88         scapy_tun_spi = params.scapy_tun_spi
89         vpp_tun_sa_id = params.vpp_tun_sa_id
90         vpp_tun_spi = params.vpp_tun_spi
91         auth_algo_vpp_id = params.auth_algo_vpp_id
92         auth_key = params.auth_key
93         crypt_algo_vpp_id = params.crypt_algo_vpp_id
94         crypt_key = params.crypt_key
95         remote_tun_if_host = params.remote_tun_if_host
96         addr_any = params.addr_any
97         addr_bcast = params.addr_bcast
98         e = VppEnum.vl_api_ipsec_spd_action_t
99
100         VppIpsecSA(self, scapy_tun_sa_id, scapy_tun_spi,
101                    auth_algo_vpp_id, auth_key,
102                    crypt_algo_vpp_id, crypt_key,
103                    self.vpp_esp_protocol,
104                    self.tun_if.local_addr[addr_type],
105                    self.tun_if.remote_addr[addr_type]).add_vpp_config()
106         VppIpsecSA(self, vpp_tun_sa_id, vpp_tun_spi,
107                    auth_algo_vpp_id, auth_key,
108                    crypt_algo_vpp_id, crypt_key,
109                    self.vpp_esp_protocol,
110                    self.tun_if.remote_addr[addr_type],
111                    self.tun_if.local_addr[addr_type]).add_vpp_config()
112
113         VppIpsecSpdEntry(self, self.tun_spd, scapy_tun_sa_id,
114                          addr_any, addr_bcast,
115                          addr_any, addr_bcast,
116                          socket.IPPROTO_ESP).add_vpp_config()
117         VppIpsecSpdEntry(self, self.tun_spd, scapy_tun_sa_id,
118                          addr_any, addr_bcast,
119                          addr_any, addr_bcast,
120                          socket.IPPROTO_ESP,
121                          is_outbound=0).add_vpp_config()
122
123         VppIpsecSpdEntry(self, self.tun_spd, vpp_tun_sa_id,
124                          remote_tun_if_host, remote_tun_if_host,
125                          self.pg1.remote_addr[addr_type],
126                          self.pg1.remote_addr[addr_type],
127                          0,
128                          priority=10,
129                          policy=e.IPSEC_API_SPD_ACTION_PROTECT,
130                          is_outbound=0).add_vpp_config()
131         VppIpsecSpdEntry(self, self.tun_spd, scapy_tun_sa_id,
132                          self.pg1.remote_addr[addr_type],
133                          self.pg1.remote_addr[addr_type],
134                          remote_tun_if_host, remote_tun_if_host,
135                          0,
136                          policy=e.IPSEC_API_SPD_ACTION_PROTECT,
137                          priority=10).add_vpp_config()
138
139         VppIpsecSpdEntry(self, self.tun_spd, vpp_tun_sa_id,
140                          remote_tun_if_host, remote_tun_if_host,
141                          self.pg0.local_addr[addr_type],
142                          self.pg0.local_addr[addr_type],
143                          0,
144                          priority=20,
145                          policy=e.IPSEC_API_SPD_ACTION_PROTECT,
146                          is_outbound=0).add_vpp_config()
147         VppIpsecSpdEntry(self, self.tun_spd, scapy_tun_sa_id,
148                          self.pg0.local_addr[addr_type],
149                          self.pg0.local_addr[addr_type],
150                          remote_tun_if_host, remote_tun_if_host,
151                          0,
152                          policy=e.IPSEC_API_SPD_ACTION_PROTECT,
153                          priority=20).add_vpp_config()
154
155     def config_esp_tra(self, params):
156         addr_type = params.addr_type
157         scapy_tra_sa_id = params.scapy_tra_sa_id
158         scapy_tra_spi = params.scapy_tra_spi
159         vpp_tra_sa_id = params.vpp_tra_sa_id
160         vpp_tra_spi = params.vpp_tra_spi
161         auth_algo_vpp_id = params.auth_algo_vpp_id
162         auth_key = params.auth_key
163         crypt_algo_vpp_id = params.crypt_algo_vpp_id
164         crypt_key = params.crypt_key
165         addr_any = params.addr_any
166         addr_bcast = params.addr_bcast
167         flags = (VppEnum.vl_api_ipsec_sad_flags_t.
168                  IPSEC_API_SAD_FLAG_USE_ANTI_REPLAY)
169         e = VppEnum.vl_api_ipsec_spd_action_t
170
171         VppIpsecSA(self, scapy_tra_sa_id, scapy_tra_spi,
172                    auth_algo_vpp_id, auth_key,
173                    crypt_algo_vpp_id, crypt_key,
174                    self.vpp_esp_protocol,
175                    flags=flags).add_vpp_config()
176         VppIpsecSA(self, vpp_tra_sa_id, vpp_tra_spi,
177                    auth_algo_vpp_id, auth_key,
178                    crypt_algo_vpp_id, crypt_key,
179                    self.vpp_esp_protocol,
180                    flags=flags).add_vpp_config()
181
182         VppIpsecSpdEntry(self, self.tra_spd, vpp_tra_sa_id,
183                          addr_any, addr_bcast,
184                          addr_any, addr_bcast,
185                          socket.IPPROTO_ESP).add_vpp_config()
186         VppIpsecSpdEntry(self, self.tra_spd, vpp_tra_sa_id,
187                          addr_any, addr_bcast,
188                          addr_any, addr_bcast,
189                          socket.IPPROTO_ESP,
190                          is_outbound=0).add_vpp_config()
191
192         VppIpsecSpdEntry(self, self.tra_spd, vpp_tra_sa_id,
193                          self.tra_if.local_addr[addr_type],
194                          self.tra_if.local_addr[addr_type],
195                          self.tra_if.remote_addr[addr_type],
196                          self.tra_if.remote_addr[addr_type],
197                          0, priority=10,
198                          policy=e.IPSEC_API_SPD_ACTION_PROTECT,
199                          is_outbound=0).add_vpp_config()
200         VppIpsecSpdEntry(self, self.tra_spd, scapy_tra_sa_id,
201                          self.tra_if.local_addr[addr_type],
202                          self.tra_if.local_addr[addr_type],
203                          self.tra_if.remote_addr[addr_type],
204                          self.tra_if.remote_addr[addr_type],
205                          0, policy=e.IPSEC_API_SPD_ACTION_PROTECT,
206                          priority=10).add_vpp_config()
207
208
209 class TestIpsecEsp1(TemplateIpsecEsp, IpsecTraTests, IpsecTunTests):
210     """ Ipsec ESP - TUN & TRA tests """
211     tra4_encrypt_node_name = "esp4-encrypt"
212     tra4_decrypt_node_name = "esp4-decrypt"
213     tra6_encrypt_node_name = "esp6-encrypt"
214     tra6_decrypt_node_name = "esp6-decrypt"
215     tun4_encrypt_node_name = "esp4-encrypt"
216     tun4_decrypt_node_name = "esp4-decrypt"
217     tun6_encrypt_node_name = "esp6-encrypt"
218     tun6_decrypt_node_name = "esp6-decrypt"
219
220
221 class TestIpsecEsp2(TemplateIpsecEsp, IpsecTcpTests):
222     """ Ipsec ESP - TCP tests """
223     pass
224
225
226 if __name__ == '__main__':
227     unittest.main(testRunner=VppTestRunner)