From a6dfd061ef2010269805ba0eaa71bcceaa11ac6e Mon Sep 17 00:00:00 2001 From: Aakash Sasidharan Date: Mon, 31 May 2021 12:03:29 +0530 Subject: validation: ipsec: create separate default queue Current validation test configures IPsec default queue with the same destination queue used for IPsec SAs. Introduce separate default queue to verify that the IPsec SA lookup failure packets are actually received via the configured default queue. Signed-off-by: Aakash Sasidharan Reviewed-by: Janne Peltonen --- test/validation/api/ipsec/ipsec_inline_out.c | 3 +++ 1 file changed, 3 insertions(+) (limited to 'test/validation/api/ipsec/ipsec_inline_out.c') diff --git a/test/validation/api/ipsec/ipsec_inline_out.c b/test/validation/api/ipsec/ipsec_inline_out.c index 5cda43b74..937d7dad0 100644 --- a/test/validation/api/ipsec/ipsec_inline_out.c +++ b/test/validation/api/ipsec/ipsec_inline_out.c @@ -20,6 +20,9 @@ static int ipsec_sync_init(odp_instance_t *inst) suite_context.queue = odp_queue_lookup("ipsec-out"); if (suite_context.queue == ODP_QUEUE_INVALID) return -1; + suite_context.default_queue = odp_queue_lookup("ipsec-default"); + if (suite_context.default_queue == ODP_QUEUE_INVALID) + return -1; suite_context.pktio = odp_pktio_lookup("loop"); if (suite_context.pktio == ODP_PKTIO_INVALID) return -1; -- cgit v1.2.3 From 7a56c3c2fee8027970414618b4e5047482aa4760 Mon Sep 17 00:00:00 2001 From: Aakash Sasidharan Date: Mon, 31 May 2021 12:03:29 +0530 Subject: validation: ipsec: check dest queue capability Create destination queue based on the queue type supported. Add separate suites for plain and schedule type queues. Signed-off-by: Aakash Sasidharan Reviewed-by: Anoob Joseph Reviewed-by: Janne Peltonen --- test/validation/api/ipsec/ipsec_inline_out.c | 17 +++++++---------- 1 file changed, 7 insertions(+), 10 deletions(-) (limited to 'test/validation/api/ipsec/ipsec_inline_out.c') diff --git a/test/validation/api/ipsec/ipsec_inline_out.c b/test/validation/api/ipsec/ipsec_inline_out.c index 937d7dad0..3da19892b 100644 --- a/test/validation/api/ipsec/ipsec_inline_out.c +++ b/test/validation/api/ipsec/ipsec_inline_out.c @@ -10,6 +10,9 @@ static int ipsec_sync_init(odp_instance_t *inst) { int rc; + suite_context.inbound_op_mode = ODP_IPSEC_OP_MODE_ASYNC; + suite_context.outbound_op_mode = ODP_IPSEC_OP_MODE_INLINE; + rc = ipsec_init(inst, ODP_IPSEC_OP_MODE_INLINE); if (rc != 0) return rc; @@ -17,24 +20,18 @@ static int ipsec_sync_init(odp_instance_t *inst) suite_context.pool = odp_pool_lookup("packet_pool"); if (suite_context.pool == ODP_POOL_INVALID) return -1; - suite_context.queue = odp_queue_lookup("ipsec-out"); - if (suite_context.queue == ODP_QUEUE_INVALID) - return -1; - suite_context.default_queue = odp_queue_lookup("ipsec-default"); - if (suite_context.default_queue == ODP_QUEUE_INVALID) - return -1; suite_context.pktio = odp_pktio_lookup("loop"); if (suite_context.pktio == ODP_PKTIO_INVALID) return -1; - suite_context.inbound_op_mode = ODP_IPSEC_OP_MODE_ASYNC; - suite_context.outbound_op_mode = ODP_IPSEC_OP_MODE_INLINE; - return ipsec_config(*inst); } odp_suiteinfo_t ipsec_suites[] = { - {"IPsec-out", ipsec_suite_init, ipsec_out_term, ipsec_out_suite}, + {"IPsec-plain-out", ipsec_suite_plain_init, ipsec_suite_term, + ipsec_out_suite}, + {"IPsec-sched-out", ipsec_suite_sched_init, ipsec_suite_term, + ipsec_out_suite}, ODP_SUITE_INFO_NULL, }; -- cgit v1.2.3