examples/ipsec-secgw: add scripts for functional test
authorKonstantin Ananyev <konstantin.ananyev@intel.com>
Thu, 10 Jan 2019 21:09:12 +0000 (21:09 +0000)
committerPablo de Lara <pablo.de.lara.guarch@intel.com>
Thu, 10 Jan 2019 15:57:22 +0000 (16:57 +0100)
commit9297844520945661bdc6747959eed27edb858f53
tree72194fb9ca776ee15767b9748e6c77ffb9cbca09
parent3e5f4625dc17064e5e44d7fddaf57d9d9afb7ae4
examples/ipsec-secgw: add scripts for functional test

The purpose of these scripts is to automate ipsec-secgw functional testing.
The scripts require two machines (SUT and DUT) connected through
at least 2 NICs and running linux (so far tested only on Ubuntu 18.04).
Introduced test-cases for the following scenarios:
- Transport/Tunnel modes
- AES-CBC SHA1
- AES-GCM
- ESN on/off
- legacy/librte_ipsec code path

Signed-off-by: Konstantin Ananyev <konstantin.ananyev@intel.com>
Acked-by: Radu Nicolau <radu.nicolau@intel.com>
Acked-by: Akhil Goyal <akhil.goyal@nxp.com>
29 files changed:
examples/ipsec-secgw/test/common_defs.sh [new file with mode: 0644]
examples/ipsec-secgw/test/data_rxtx.sh [new file with mode: 0644]
examples/ipsec-secgw/test/linux_test4.sh [new file with mode: 0644]
examples/ipsec-secgw/test/linux_test6.sh [new file with mode: 0644]
examples/ipsec-secgw/test/run_test.sh [new file with mode: 0644]
examples/ipsec-secgw/test/trs_aescbc_sha1_common_defs.sh [new file with mode: 0644]
examples/ipsec-secgw/test/trs_aescbc_sha1_defs.sh [new file with mode: 0644]
examples/ipsec-secgw/test/trs_aescbc_sha1_esn_atom_defs.sh [new file with mode: 0644]
examples/ipsec-secgw/test/trs_aescbc_sha1_esn_defs.sh [new file with mode: 0644]
examples/ipsec-secgw/test/trs_aescbc_sha1_old_defs.sh [new file with mode: 0644]
examples/ipsec-secgw/test/trs_aesgcm_common_defs.sh [new file with mode: 0644]
examples/ipsec-secgw/test/trs_aesgcm_defs.sh [new file with mode: 0644]
examples/ipsec-secgw/test/trs_aesgcm_esn_atom_defs.sh [new file with mode: 0644]
examples/ipsec-secgw/test/trs_aesgcm_esn_defs.sh [new file with mode: 0644]
examples/ipsec-secgw/test/trs_aesgcm_inline_crypto_defs.sh [new file with mode: 0644]
examples/ipsec-secgw/test/trs_aesgcm_inline_crypto_old_defs.sh [new file with mode: 0644]
examples/ipsec-secgw/test/trs_aesgcm_old_defs.sh [new file with mode: 0644]
examples/ipsec-secgw/test/tun_aescbc_sha1_common_defs.sh [new file with mode: 0644]
examples/ipsec-secgw/test/tun_aescbc_sha1_defs.sh [new file with mode: 0644]
examples/ipsec-secgw/test/tun_aescbc_sha1_esn_atom_defs.sh [new file with mode: 0644]
examples/ipsec-secgw/test/tun_aescbc_sha1_esn_defs.sh [new file with mode: 0644]
examples/ipsec-secgw/test/tun_aescbc_sha1_old_defs.sh [new file with mode: 0644]
examples/ipsec-secgw/test/tun_aesgcm_common_defs.sh [new file with mode: 0644]
examples/ipsec-secgw/test/tun_aesgcm_defs.sh [new file with mode: 0644]
examples/ipsec-secgw/test/tun_aesgcm_esn_atom_defs.sh [new file with mode: 0644]
examples/ipsec-secgw/test/tun_aesgcm_esn_defs.sh [new file with mode: 0644]
examples/ipsec-secgw/test/tun_aesgcm_inline_crypto_defs.sh [new file with mode: 0644]
examples/ipsec-secgw/test/tun_aesgcm_inline_crypto_old_defs.sh [new file with mode: 0644]
examples/ipsec-secgw/test/tun_aesgcm_old_defs.sh [new file with mode: 0644]