xref: /dpdk/examples/ipsec-secgw/test/trs_aesgcm_defs.sh (revision 9dbc4e21e752ca98e23205c3d1bac53e03e934b3)
1#! /bin/bash
2# SPDX-License-Identifier: BSD-3-Clause
3
4. ${DIR}/trs_aesgcm_common_defs.sh
5
6SGW_CMD_XPRM="${DPDK_VARS} ${DPDK_MODE} ${SGW_CMD_XPRM}"
7
8config_remote_xfrm_44()
9{
10	ssh ${REMOTE_HOST} ip xfrm policy flush
11	ssh ${REMOTE_HOST} ip xfrm state flush
12
13	ssh ${REMOTE_HOST} ip xfrm policy add \
14src ${REMOTE_IPV4} dst ${LOCAL_IPV4} \
15dir out ptype main action allow \
16tmpl proto esp mode transport reqid 1
17
18	ssh ${REMOTE_HOST} ip xfrm policy add \
19src ${LOCAL_IPV4} dst ${REMOTE_IPV4} \
20dir in ptype main action allow \
21tmpl proto esp mode transport reqid 2
22
23	ssh ${REMOTE_HOST} ip xfrm state add \
24src ${REMOTE_IPV4} dst ${LOCAL_IPV4} \
25proto esp spi 7 reqid 1 mode transport replay-window 64 ${XFRM_ESN} \
26aead "rfc4106\(gcm\(aes\)\)" \
270xdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef 128
28
29	ssh ${REMOTE_HOST} ip xfrm state add \
30src ${LOCAL_IPV4} dst ${REMOTE_IPV4} \
31proto esp spi 7 reqid 2 mode transport replay-window 64 ${XFRM_ESN} \
32aead "rfc4106\(gcm\(aes\)\)" \
330xdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef 128
34
35	ssh ${REMOTE_HOST} ip xfrm policy list
36	ssh ${REMOTE_HOST} ip xfrm state list
37}
38
39config_remote_xfrm_66()
40{
41	ssh ${REMOTE_HOST} ip xfrm policy flush
42	ssh ${REMOTE_HOST} ip xfrm state flush
43
44	ssh ${REMOTE_HOST} ip xfrm policy add \
45src ${REMOTE_IPV6} dst ${LOCAL_IPV6} \
46dir out ptype main action allow \
47tmpl proto esp mode transport reqid 3
48
49	ssh ${REMOTE_HOST} ip xfrm policy add \
50src ${LOCAL_IPV6} dst ${REMOTE_IPV6} \
51dir in ptype main action allow \
52tmpl proto esp mode transport reqid 4
53
54	ssh ${REMOTE_HOST} ip xfrm state add \
55src ${REMOTE_IPV6} dst ${LOCAL_IPV6} \
56proto esp spi 9 reqid 3 mode transport replay-window 64 ${XFRM_ESN} \
57aead "rfc4106\(gcm\(aes\)\)" \
580xdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef 128
59
60	ssh ${REMOTE_HOST} ip xfrm state add \
61src ${LOCAL_IPV6} dst ${REMOTE_IPV6} \
62proto esp spi 9 reqid 4 mode transport replay-window 64 ${XFRM_ESN} \
63aead "rfc4106\(gcm\(aes\)\)" \
640xdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef 128
65
66	ssh ${REMOTE_HOST} ip xfrm policy list
67	ssh ${REMOTE_HOST} ip xfrm state list
68}
69