X-Git-Url: http://git.droids-corp.org/?a=blobdiff_plain;f=examples%2Fipsec-secgw%2Ftest%2Ftrs_aesgcm_defs.sh;h=48c2687d06bfebb775c68b827b65aba6ee5db199;hb=cc7f74948817d11b0fd5bdc1b82a936daf23282f;hp=a4d902be05b98e910a7b986789946a14efd3921e;hpb=9297844520945661bdc6747959eed27edb858f53;p=dpdk.git diff --git a/examples/ipsec-secgw/test/trs_aesgcm_defs.sh b/examples/ipsec-secgw/test/trs_aesgcm_defs.sh index a4d902be05..48c2687d06 100644 --- a/examples/ipsec-secgw/test/trs_aesgcm_defs.sh +++ b/examples/ipsec-secgw/test/trs_aesgcm_defs.sh @@ -1,10 +1,11 @@ #! /bin/bash +# SPDX-License-Identifier: BSD-3-Clause . ${DIR}/trs_aesgcm_common_defs.sh -SGW_CMD_XPRM='-w 300' +SGW_CMD_XPRM="${DPDK_VARS} ${DPDK_MODE} ${SGW_CMD_XPRM}" -config_remote_xfrm() +config_remote_xfrm_44() { ssh ${REMOTE_HOST} ip xfrm policy flush ssh ${REMOTE_HOST} ip xfrm state flush @@ -21,28 +22,24 @@ tmpl proto esp mode transport reqid 2 ssh ${REMOTE_HOST} ip xfrm state add \ src ${REMOTE_IPV4} dst ${LOCAL_IPV4} \ -proto esp spi 7 reqid 1 mode transport replay-window 64 \ +proto esp spi 7 reqid 1 mode transport replay-window 64 ${XFRM_ESN} \ aead "rfc4106\(gcm\(aes\)\)" \ 0xdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef 128 ssh ${REMOTE_HOST} ip xfrm state add \ src ${LOCAL_IPV4} dst ${REMOTE_IPV4} \ -proto esp spi 7 reqid 2 mode transport replay-window 64 \ +proto esp spi 7 reqid 2 mode transport replay-window 64 ${XFRM_ESN} \ aead "rfc4106\(gcm\(aes\)\)" \ 0xdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef 128 ssh ${REMOTE_HOST} ip xfrm policy list ssh ${REMOTE_HOST} ip xfrm state list - - # to overcome problem with ipsec-secgw for inline mode, - # when first packet(s) will be always dropped. - # note that ping will fail here - ssh ${REMOTE_HOST} ping -c 1 ${LOCAL_IPV4} } -config6_remote_xfrm() +config_remote_xfrm_66() { - config_remote_xfrm + ssh ${REMOTE_HOST} ip xfrm policy flush + ssh ${REMOTE_HOST} ip xfrm state flush ssh ${REMOTE_HOST} ip xfrm policy add \ src ${REMOTE_IPV6} dst ${LOCAL_IPV6} \ @@ -56,21 +53,16 @@ tmpl proto esp mode transport reqid 4 ssh ${REMOTE_HOST} ip xfrm state add \ src ${REMOTE_IPV6} dst ${LOCAL_IPV6} \ -proto esp spi 9 reqid 3 mode transport replay-window 64 \ +proto esp spi 9 reqid 3 mode transport replay-window 64 ${XFRM_ESN} \ aead "rfc4106\(gcm\(aes\)\)" \ 0xdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef 128 ssh ${REMOTE_HOST} ip xfrm state add \ src ${LOCAL_IPV6} dst ${REMOTE_IPV6} \ -proto esp spi 9 reqid 4 mode transport replay-window 64 \ +proto esp spi 9 reqid 4 mode transport replay-window 64 ${XFRM_ESN} \ aead "rfc4106\(gcm\(aes\)\)" \ 0xdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef 128 ssh ${REMOTE_HOST} ip xfrm policy list ssh ${REMOTE_HOST} ip xfrm state list - - # to overcome problem with ipsec-secgw for inline mode, - # when first packet(s) will be always dropped. - # note that ping will fail here - ssh ${REMOTE_HOST} ping -c 1 ${LOCAL_IPV6} }