@@ -102,34 +102,34 @@ def gen_sci(macsec_system_identifier: str, macsec_port_identifier: int) -> str:
102
102
103
103
104
104
def gen_sc_key (
105
- seperator : str ,
105
+ separator : str ,
106
106
port_name : str ,
107
107
macsec_system_identifier : str ,
108
108
macsec_port_identifier : int ) -> str :
109
109
sci = gen_sci (macsec_system_identifier , macsec_port_identifier )
110
110
key = "{}{}{}" .format (
111
111
port_name ,
112
- seperator ,
112
+ separator ,
113
113
sci )
114
114
return key
115
115
116
116
117
117
def gen_sa_key (
118
- seperator : str ,
118
+ separator : str ,
119
119
port_name : str ,
120
120
macsec_system_identifier : str ,
121
121
macsec_port_identifier : int ,
122
122
an : int ):
123
123
sc_key = gen_sc_key (
124
- seperator ,
124
+ separator ,
125
125
port_name ,
126
126
macsec_system_identifier ,
127
127
macsec_port_identifier )
128
- key = "{}{}{}" .format (sc_key , seperator , an )
128
+ key = "{}{}{}" .format (sc_key , separator , an )
129
129
return key
130
130
131
131
132
- def macsec_sc (seperator : str = AppDBTable .SEPARATOR ):
132
+ def macsec_sc (separator : str = AppDBTable .SEPARATOR ):
133
133
def inner (func : typing .Callable ) -> typing .Callable :
134
134
@functools .wraps (func )
135
135
def wrap_func (
@@ -140,7 +140,7 @@ def wrap_func(
140
140
* args ,
141
141
** kwargs ) -> typing .Any :
142
142
key = gen_sc_key (
143
- seperator ,
143
+ separator ,
144
144
port_name ,
145
145
macsec_system_identifier ,
146
146
macsec_port_identifier )
@@ -149,7 +149,7 @@ def wrap_func(
149
149
return inner
150
150
151
151
152
- def macsec_sa (seperator : str = AppDBTable .SEPARATOR ):
152
+ def macsec_sa (separator : str = AppDBTable .SEPARATOR ):
153
153
def inner (func : typing .Callable ) -> typing .Callable :
154
154
@functools .wraps (func )
155
155
def wrap_func (
@@ -161,7 +161,7 @@ def wrap_func(
161
161
* args ,
162
162
** kwargs ) -> typing .Any :
163
163
key = gen_sa_key (
164
- seperator ,
164
+ separator ,
165
165
port_name ,
166
166
macsec_system_identifier ,
167
167
macsec_port_identifier ,
@@ -216,8 +216,8 @@ def set_macsec_control(self, port_name: str, enable: bool):
216
216
self .app_port_table [port_name ] = {"enable" : True }
217
217
218
218
@macsec_sc ()
219
- def create_receive_sc (self , sci : str , ssci : int ):
220
- self .app_receive_sc_table [sci ] = {"ssci " : ssci }
219
+ def create_receive_sc (self , sci : str ):
220
+ self .app_receive_sc_table [sci ] = {"NULL " : "NULL" }
221
221
self .state_receive_sc_table .wait (sci )
222
222
223
223
@macsec_sc ()
@@ -226,8 +226,8 @@ def delete_receive_sc(self, sci: str):
226
226
self .state_receive_sc_table .wait_delete (sci )
227
227
228
228
@macsec_sc ()
229
- def create_transmit_sc (self , sci : str , ssci : int ):
230
- self .app_transmit_sc_table [sci ] = {"sci" : sci , " encoding_an" : 0 }
229
+ def create_transmit_sc (self , sci : str ):
230
+ self .app_transmit_sc_table [sci ] = {"encoding_an" : 0 }
231
231
self .state_transmit_sc_table .wait (sci )
232
232
233
233
@macsec_sc ()
@@ -240,6 +240,7 @@ def check_valid_sa_parameter(
240
240
sak : str ,
241
241
auth_key : str ,
242
242
lowest_acceptable_pn : int ,
243
+ ssci : int ,
243
244
salt : str ) -> bool :
244
245
# Check SAK is hex string
245
246
int (sak , 16 )
@@ -268,17 +269,20 @@ def create_receive_sa(
268
269
sak : str ,
269
270
auth_key : str ,
270
271
lowest_acceptable_pn : int ,
272
+ ssci : int ,
271
273
salt : str ):
272
274
assert (
273
275
self .check_valid_sa_parameter (
274
276
sak ,
275
277
auth_key ,
276
278
lowest_acceptable_pn ,
279
+ ssci ,
277
280
salt ),
278
281
"Wrong parameter to MACsec receive SA" )
279
282
self .app_receive_sa_table [sai ] = {
280
283
"active" : False , "sak" : sak , "auth_key" : auth_key ,
281
- "lowest_acceptable_pn" : lowest_acceptable_pn , "salt" : salt }
284
+ "lowest_acceptable_pn" : lowest_acceptable_pn ,
285
+ "ssci" : ssci , "salt" : salt }
282
286
283
287
@macsec_sa ()
284
288
def delete_receive_sa (self , sai : str ):
@@ -298,17 +302,19 @@ def create_transmit_sa(
298
302
sak : str ,
299
303
auth_key : str ,
300
304
init_pn : int ,
305
+ ssci : int ,
301
306
salt : str ):
302
307
assert (
303
308
self .check_valid_sa_parameter (
304
309
sak ,
305
310
auth_key ,
306
311
init_pn ,
312
+ ssci ,
307
313
salt ),
308
314
"Wrong parameter to MACsec receive SA" )
309
315
self .app_transmit_sa_table [sai ] = {
310
316
"sak" : sak , "auth_key" : auth_key ,
311
- "next_pn" : init_pn , "salt" : salt }
317
+ "next_pn" : init_pn , "ssci" : ssci , " salt" : salt }
312
318
313
319
@macsec_sa ()
314
320
def delete_transmit_sa (self , sai : str ):
@@ -388,8 +394,7 @@ def init_macsec(
388
394
wpa : WPASupplicantMock ,
389
395
port_name : str ,
390
396
local_mac_address : str ,
391
- macsec_port_identifier : int ,
392
- ssci : int ):
397
+ macsec_port_identifier : int ):
393
398
wpa .init_macsec_port (port_name )
394
399
wpa .config_macsec_port (port_name , {"enable_protect" : True })
395
400
wpa .config_macsec_port (port_name , {"enable_encrypt" : True })
@@ -403,8 +408,7 @@ def init_macsec(
403
408
wpa .create_transmit_sc (
404
409
port_name ,
405
410
local_mac_address ,
406
- macsec_port_identifier ,
407
- ssci )
411
+ macsec_port_identifier )
408
412
409
413
def establish_macsec (
410
414
self ,
@@ -422,8 +426,7 @@ def establish_macsec(
422
426
wpa .create_receive_sc (
423
427
port_name ,
424
428
peer_mac_address ,
425
- macsec_port_identifier ,
426
- ssci )
429
+ macsec_port_identifier )
427
430
wpa .create_receive_sa (
428
431
port_name ,
429
432
peer_mac_address ,
@@ -432,6 +435,7 @@ def establish_macsec(
432
435
sak ,
433
436
auth_key ,
434
437
packet_number ,
438
+ ssci ,
435
439
salt )
436
440
wpa .create_transmit_sa (
437
441
port_name ,
@@ -441,6 +445,7 @@ def establish_macsec(
441
445
sak ,
442
446
auth_key ,
443
447
packet_number ,
448
+ ssci ,
444
449
salt )
445
450
wpa .set_enable_receive_sa (
446
451
port_name ,
@@ -468,6 +473,7 @@ def rekey_macsec(
468
473
sak : str ,
469
474
packet_number : int ,
470
475
auth_key : str ,
476
+ ssci : int ,
471
477
salt : str ):
472
478
wpa .create_receive_sa (
473
479
port_name ,
@@ -477,6 +483,7 @@ def rekey_macsec(
477
483
sak ,
478
484
auth_key ,
479
485
packet_number ,
486
+ ssci ,
480
487
salt )
481
488
wpa .create_transmit_sa (
482
489
port_name ,
@@ -486,6 +493,7 @@ def rekey_macsec(
486
493
sak ,
487
494
auth_key ,
488
495
packet_number ,
496
+ ssci ,
489
497
salt )
490
498
wpa .set_enable_receive_sa (
491
499
port_name ,
@@ -606,8 +614,7 @@ def test_macsec_term_orch(self, dvs: conftest.DockerVirtualSwitch, testlog):
606
614
wpa ,
607
615
port_name ,
608
616
local_mac_address ,
609
- macsec_port_identifier ,
610
- ssci )
617
+ macsec_port_identifier )
611
618
self .establish_macsec (
612
619
wpa ,
613
620
port_name ,
@@ -654,6 +661,7 @@ def test_macsec_term_orch(self, dvs: conftest.DockerVirtualSwitch, testlog):
654
661
sak ,
655
662
packet_number ,
656
663
auth_key ,
664
+ ssci ,
657
665
salt )
658
666
assert (
659
667
inspector .get_macsec_sa (
0 commit comments