3edd1197a6
Add support to run multi-seg inline ipsec test using new test command `inline_ipsec_sg_autotest` Signed-off-by: Nithin Dabilpuram <ndabilpuram@marvell.com> Acked-by: Akhil Goyal <gakhil@marvell.com>
310 lines
6.9 KiB
C
310 lines
6.9 KiB
C
/* SPDX-License-Identifier: BSD-3-Clause
|
|
* Copyright(C) 2021 Marvell.
|
|
*/
|
|
|
|
#ifndef _TEST_CRYPTODEV_SECURITY_IPSEC_H_
|
|
#define _TEST_CRYPTODEV_SECURITY_IPSEC_H_
|
|
|
|
#include <rte_cryptodev.h>
|
|
#include <rte_security.h>
|
|
|
|
#define IPSEC_TEST_PACKETS_MAX 32
|
|
#define IPSEC_TEXT_MAX_LEN 16384u
|
|
|
|
struct ipsec_test_data {
|
|
struct {
|
|
uint8_t data[32];
|
|
} key;
|
|
struct {
|
|
uint8_t data[64];
|
|
} auth_key;
|
|
|
|
struct {
|
|
uint8_t data[IPSEC_TEXT_MAX_LEN];
|
|
unsigned int len;
|
|
} input_text;
|
|
|
|
struct {
|
|
uint8_t data[IPSEC_TEXT_MAX_LEN];
|
|
unsigned int len;
|
|
} output_text;
|
|
|
|
struct {
|
|
uint8_t data[4];
|
|
unsigned int len;
|
|
} salt;
|
|
|
|
struct {
|
|
uint8_t data[16];
|
|
} iv;
|
|
|
|
struct rte_security_ipsec_xform ipsec_xform;
|
|
|
|
bool aead;
|
|
|
|
bool aes_gmac;
|
|
|
|
bool auth_only;
|
|
|
|
/* Antireplay packet */
|
|
bool ar_packet;
|
|
|
|
union {
|
|
struct {
|
|
struct rte_crypto_sym_xform cipher;
|
|
struct rte_crypto_sym_xform auth;
|
|
} chain;
|
|
struct rte_crypto_sym_xform aead;
|
|
} xform;
|
|
};
|
|
|
|
enum df_flags {
|
|
TEST_IPSEC_COPY_DF_INNER_0 = 1,
|
|
TEST_IPSEC_COPY_DF_INNER_1,
|
|
TEST_IPSEC_SET_DF_0_INNER_1,
|
|
TEST_IPSEC_SET_DF_1_INNER_0,
|
|
};
|
|
|
|
#define TEST_IPSEC_DSCP_VAL 0x12
|
|
|
|
enum dscp_flags {
|
|
TEST_IPSEC_COPY_DSCP_INNER_0 = 1,
|
|
TEST_IPSEC_COPY_DSCP_INNER_1,
|
|
TEST_IPSEC_SET_DSCP_0_INNER_1,
|
|
TEST_IPSEC_SET_DSCP_1_INNER_0,
|
|
};
|
|
|
|
#define TEST_IPSEC_FLABEL_VAL 0x1234
|
|
|
|
enum flabel_flags {
|
|
TEST_IPSEC_COPY_FLABEL_INNER_0 = 1,
|
|
TEST_IPSEC_COPY_FLABEL_INNER_1,
|
|
TEST_IPSEC_SET_FLABEL_0_INNER_1,
|
|
TEST_IPSEC_SET_FLABEL_1_INNER_0,
|
|
};
|
|
|
|
struct ipsec_test_flags {
|
|
bool display_alg;
|
|
bool sa_expiry_pkts_soft;
|
|
bool sa_expiry_pkts_hard;
|
|
bool sa_expiry_bytes_soft;
|
|
bool sa_expiry_bytes_hard;
|
|
bool icv_corrupt;
|
|
bool iv_gen;
|
|
uint32_t tunnel_hdr_verify;
|
|
bool udp_encap;
|
|
bool udp_ports_verify;
|
|
bool udp_encap_custom_ports;
|
|
bool ip_csum;
|
|
bool l4_csum;
|
|
bool ipv6;
|
|
bool tunnel_ipv6;
|
|
bool transport;
|
|
bool fragment;
|
|
bool stats_success;
|
|
bool antireplay;
|
|
enum df_flags df;
|
|
enum dscp_flags dscp;
|
|
enum flabel_flags flabel;
|
|
bool dec_ttl_or_hop_limit;
|
|
bool ah;
|
|
uint32_t plaintext_len;
|
|
};
|
|
|
|
struct crypto_param {
|
|
enum rte_crypto_sym_xform_type type;
|
|
union {
|
|
enum rte_crypto_cipher_algorithm cipher;
|
|
enum rte_crypto_auth_algorithm auth;
|
|
enum rte_crypto_aead_algorithm aead;
|
|
} alg;
|
|
uint16_t key_length;
|
|
uint16_t iv_length;
|
|
uint16_t digest_length;
|
|
};
|
|
|
|
static const struct crypto_param aead_list[] = {
|
|
{
|
|
.type = RTE_CRYPTO_SYM_XFORM_AEAD,
|
|
.alg.aead = RTE_CRYPTO_AEAD_AES_GCM,
|
|
.key_length = 16,
|
|
},
|
|
{
|
|
.type = RTE_CRYPTO_SYM_XFORM_AEAD,
|
|
.alg.aead = RTE_CRYPTO_AEAD_AES_GCM,
|
|
.key_length = 24,
|
|
},
|
|
{
|
|
.type = RTE_CRYPTO_SYM_XFORM_AEAD,
|
|
.alg.aead = RTE_CRYPTO_AEAD_AES_GCM,
|
|
.key_length = 32,
|
|
},
|
|
{
|
|
.type = RTE_CRYPTO_SYM_XFORM_AEAD,
|
|
.alg.aead = RTE_CRYPTO_AEAD_AES_CCM,
|
|
.key_length = 32
|
|
},
|
|
};
|
|
|
|
static const struct crypto_param cipher_list[] = {
|
|
{
|
|
.type = RTE_CRYPTO_SYM_XFORM_CIPHER,
|
|
.alg.cipher = RTE_CRYPTO_CIPHER_NULL,
|
|
.key_length = 0,
|
|
.iv_length = 0,
|
|
},
|
|
{
|
|
.type = RTE_CRYPTO_SYM_XFORM_CIPHER,
|
|
.alg.cipher = RTE_CRYPTO_CIPHER_DES_CBC,
|
|
.key_length = 8,
|
|
.iv_length = 8,
|
|
},
|
|
{
|
|
.type = RTE_CRYPTO_SYM_XFORM_CIPHER,
|
|
.alg.cipher = RTE_CRYPTO_CIPHER_3DES_CBC,
|
|
.key_length = 24,
|
|
.iv_length = 8,
|
|
},
|
|
{
|
|
.type = RTE_CRYPTO_SYM_XFORM_CIPHER,
|
|
.alg.cipher = RTE_CRYPTO_CIPHER_AES_CBC,
|
|
.key_length = 16,
|
|
.iv_length = 16,
|
|
},
|
|
{
|
|
.type = RTE_CRYPTO_SYM_XFORM_CIPHER,
|
|
.alg.cipher = RTE_CRYPTO_CIPHER_AES_CTR,
|
|
.key_length = 16,
|
|
.iv_length = 16,
|
|
},
|
|
{
|
|
.type = RTE_CRYPTO_SYM_XFORM_CIPHER,
|
|
.alg.cipher = RTE_CRYPTO_CIPHER_AES_CTR,
|
|
.key_length = 24,
|
|
.iv_length = 16,
|
|
},
|
|
{
|
|
.type = RTE_CRYPTO_SYM_XFORM_CIPHER,
|
|
.alg.cipher = RTE_CRYPTO_CIPHER_AES_CTR,
|
|
.key_length = 32,
|
|
.iv_length = 16,
|
|
},
|
|
};
|
|
|
|
static const struct crypto_param auth_list[] = {
|
|
{
|
|
.type = RTE_CRYPTO_SYM_XFORM_AUTH,
|
|
.alg.auth = RTE_CRYPTO_AUTH_NULL,
|
|
},
|
|
{
|
|
.type = RTE_CRYPTO_SYM_XFORM_AUTH,
|
|
.alg.auth = RTE_CRYPTO_AUTH_MD5_HMAC,
|
|
.key_length = 16,
|
|
.digest_length = 12,
|
|
},
|
|
{
|
|
.type = RTE_CRYPTO_SYM_XFORM_AUTH,
|
|
.alg.auth = RTE_CRYPTO_AUTH_SHA256_HMAC,
|
|
.key_length = 32,
|
|
.digest_length = 16,
|
|
},
|
|
{
|
|
.type = RTE_CRYPTO_SYM_XFORM_AUTH,
|
|
.alg.auth = RTE_CRYPTO_AUTH_SHA384_HMAC,
|
|
.key_length = 48,
|
|
.digest_length = 24,
|
|
},
|
|
{
|
|
.type = RTE_CRYPTO_SYM_XFORM_AUTH,
|
|
.alg.auth = RTE_CRYPTO_AUTH_SHA512_HMAC,
|
|
.key_length = 64,
|
|
.digest_length = 32,
|
|
},
|
|
{
|
|
.type = RTE_CRYPTO_SYM_XFORM_AUTH,
|
|
.alg.auth = RTE_CRYPTO_AUTH_AES_XCBC_MAC,
|
|
.key_length = 16,
|
|
.digest_length = 12,
|
|
},
|
|
{
|
|
.type = RTE_CRYPTO_SYM_XFORM_AUTH,
|
|
.alg.auth = RTE_CRYPTO_AUTH_AES_GMAC,
|
|
.key_length = 16,
|
|
.digest_length = 16,
|
|
.iv_length = 12,
|
|
},
|
|
};
|
|
|
|
struct crypto_param_comb {
|
|
const struct crypto_param *param1;
|
|
const struct crypto_param *param2;
|
|
};
|
|
|
|
extern struct ipsec_test_data pkt_aes_256_gcm;
|
|
extern struct ipsec_test_data pkt_aes_256_gcm_v6;
|
|
extern struct ipsec_test_data pkt_aes_128_cbc_hmac_sha256;
|
|
extern struct ipsec_test_data pkt_aes_128_cbc_hmac_sha256_v6;
|
|
|
|
extern struct crypto_param_comb alg_list[RTE_DIM(aead_list) +
|
|
(RTE_DIM(cipher_list) *
|
|
RTE_DIM(auth_list))];
|
|
|
|
extern struct crypto_param_comb ah_alg_list[2 * (RTE_DIM(auth_list) - 1)];
|
|
|
|
void test_ipsec_alg_list_populate(void);
|
|
|
|
void test_ipsec_ah_alg_list_populate(void);
|
|
|
|
int test_ipsec_sec_caps_verify(struct rte_security_ipsec_xform *ipsec_xform,
|
|
const struct rte_security_capability *sec_cap,
|
|
bool silent);
|
|
|
|
int test_ipsec_crypto_caps_aead_verify(
|
|
const struct rte_security_capability *sec_cap,
|
|
struct rte_crypto_sym_xform *aead);
|
|
|
|
int test_ipsec_crypto_caps_cipher_verify(
|
|
const struct rte_security_capability *sec_cap,
|
|
struct rte_crypto_sym_xform *cipher);
|
|
|
|
int test_ipsec_crypto_caps_auth_verify(
|
|
const struct rte_security_capability *sec_cap,
|
|
struct rte_crypto_sym_xform *auth);
|
|
|
|
void test_ipsec_td_in_from_out(const struct ipsec_test_data *td_out,
|
|
struct ipsec_test_data *td_in);
|
|
|
|
void test_ipsec_td_prepare(const struct crypto_param *param1,
|
|
const struct crypto_param *param2,
|
|
const struct ipsec_test_flags *flags,
|
|
struct ipsec_test_data *td_array,
|
|
int nb_td);
|
|
|
|
void test_ipsec_td_update(struct ipsec_test_data td_inb[],
|
|
const struct ipsec_test_data td_outb[],
|
|
int nb_td,
|
|
const struct ipsec_test_flags *flags);
|
|
|
|
void test_ipsec_display_alg(const struct crypto_param *param1,
|
|
const struct crypto_param *param2);
|
|
|
|
int test_ipsec_post_process(struct rte_mbuf *m,
|
|
const struct ipsec_test_data *td,
|
|
struct ipsec_test_data *res_d, bool silent,
|
|
const struct ipsec_test_flags *flags);
|
|
|
|
int test_ipsec_status_check(const struct ipsec_test_data *td,
|
|
struct rte_crypto_op *op,
|
|
const struct ipsec_test_flags *flags,
|
|
enum rte_security_ipsec_sa_direction dir,
|
|
int pkt_num);
|
|
|
|
int test_ipsec_stats_verify(struct rte_security_ctx *ctx,
|
|
void *sess,
|
|
const struct ipsec_test_flags *flags,
|
|
enum rte_security_ipsec_sa_direction dir);
|
|
|
|
int test_ipsec_pkt_update(uint8_t *pkt, const struct ipsec_test_flags *flags);
|
|
|
|
#endif
|