1 /* SPDX-License-Identifier: BSD-3-Clause
2 * Copyright(c) 2018 Intel Corporation
7 #include <rte_common.h>
8 #include <rte_hexdump.h>
10 #include <rte_malloc.h>
11 #include <rte_memcpy.h>
12 #include <rte_cycles.h>
13 #include <rte_bus_vdev.h>
16 #include <rte_crypto.h>
17 #include <rte_cryptodev.h>
18 #include <rte_cryptodev_pmd.h>
19 #include <rte_lcore.h>
20 #include <rte_ipsec.h>
21 #include <rte_random.h>
23 #include <rte_security_driver.h>
26 #include "test_cryptodev.h"
28 #define VDEV_ARGS_SIZE 100
29 #define MAX_NB_SESSIONS 200
31 #define REPLAY_WIN_0 0
32 #define REPLAY_WIN_32 32
33 #define REPLAY_WIN_64 64
34 #define REPLAY_WIN_128 128
35 #define REPLAY_WIN_256 256
36 #define DATA_64_BYTES 64
37 #define DATA_80_BYTES 80
38 #define DATA_100_BYTES 100
40 #define ESN_DISABLED 0
42 #define OUTBOUND_SPI 17
44 #define REORDER_PKTS 1
45 #define DEQUEUE_COUNT 1000
48 enum rte_crypto_sym_xform_type auth;
49 enum rte_crypto_sym_xform_type cipher;
50 enum rte_crypto_sym_xform_type aead;
53 char cipher_algo[128];
57 struct ipsec_testsuite_params {
58 struct rte_mempool *mbuf_pool;
59 struct rte_mempool *cop_mpool;
60 struct rte_cryptodev_config conf;
61 struct rte_cryptodev_qp_conf qp_conf;
64 uint8_t valid_dev_found;
67 struct ipsec_unitest_params {
68 struct rte_crypto_sym_xform cipher_xform;
69 struct rte_crypto_sym_xform auth_xform;
70 struct rte_crypto_sym_xform aead_xform;
71 struct rte_crypto_sym_xform *crypto_xforms;
73 struct rte_security_ipsec_xform ipsec_xform;
75 struct rte_ipsec_sa_prm sa_prm;
76 struct rte_ipsec_session ss[MAX_NB_SAS];
78 struct rte_crypto_op *cop[BURST_SIZE];
80 struct rte_mbuf *obuf[BURST_SIZE], *ibuf[BURST_SIZE],
86 struct ipsec_test_cfg {
87 uint32_t replay_win_sz;
92 uint32_t reorder_pkts;
95 static const struct ipsec_test_cfg test_cfg[] = {
96 {REPLAY_WIN_0, ESN_DISABLED, 0, DATA_64_BYTES, 1, 0},
97 {REPLAY_WIN_0, ESN_DISABLED, 0, DATA_64_BYTES, BURST_SIZE, 0},
98 {REPLAY_WIN_0, ESN_DISABLED, 0, DATA_80_BYTES, BURST_SIZE,
100 {REPLAY_WIN_32, ESN_ENABLED, 0, DATA_100_BYTES, 1, 0},
101 {REPLAY_WIN_32, ESN_ENABLED, 0, DATA_100_BYTES, BURST_SIZE,
103 {REPLAY_WIN_64, ESN_ENABLED, 0, DATA_64_BYTES, 1, 0},
104 {REPLAY_WIN_128, ESN_ENABLED, RTE_IPSEC_SAFLAG_SQN_ATOM,
105 DATA_80_BYTES, 1, 0},
106 {REPLAY_WIN_256, ESN_DISABLED, 0, DATA_100_BYTES, 1, 0},
109 static const int num_cfg = RTE_DIM(test_cfg);
110 static struct ipsec_testsuite_params testsuite_params = { NULL };
111 static struct ipsec_unitest_params unittest_params;
112 static struct user_params uparams;
114 struct supported_cipher_algo {
116 enum rte_crypto_cipher_algorithm algo;
122 struct supported_auth_algo {
124 enum rte_crypto_auth_algorithm algo;
130 const struct supported_cipher_algo cipher_algos[] = {
133 .algo = RTE_CRYPTO_CIPHER_NULL,
140 const struct supported_auth_algo auth_algos[] = {
143 .algo = RTE_CRYPTO_AUTH_NULL,
151 dummy_sec_create(void *device, struct rte_security_session_conf *conf,
152 struct rte_security_session *sess, struct rte_mempool *mp)
154 RTE_SET_USED(device);
158 sess->sess_private_data = NULL;
163 dummy_sec_destroy(void *device, struct rte_security_session *sess)
165 RTE_SET_USED(device);
170 static const struct rte_security_ops dummy_sec_ops = {
171 .session_create = dummy_sec_create,
172 .session_destroy = dummy_sec_destroy,
175 static struct rte_security_ctx dummy_sec_ctx = {
176 .ops = &dummy_sec_ops,
179 static const struct supported_cipher_algo *
180 find_match_cipher_algo(const char *cipher_keyword)
184 for (i = 0; i < RTE_DIM(cipher_algos); i++) {
185 const struct supported_cipher_algo *algo =
188 if (strcmp(cipher_keyword, algo->keyword) == 0)
195 static const struct supported_auth_algo *
196 find_match_auth_algo(const char *auth_keyword)
200 for (i = 0; i < RTE_DIM(auth_algos); i++) {
201 const struct supported_auth_algo *algo =
204 if (strcmp(auth_keyword, algo->keyword) == 0)
212 fill_crypto_xform(struct ipsec_unitest_params *ut_params,
213 const struct supported_auth_algo *auth_algo,
214 const struct supported_cipher_algo *cipher_algo)
216 ut_params->cipher_xform.type = RTE_CRYPTO_SYM_XFORM_CIPHER;
217 ut_params->cipher_xform.cipher.algo = cipher_algo->algo;
218 ut_params->auth_xform.type = RTE_CRYPTO_SYM_XFORM_AUTH;
219 ut_params->auth_xform.auth.algo = auth_algo->algo;
221 if (ut_params->ipsec_xform.direction ==
222 RTE_SECURITY_IPSEC_SA_DIR_INGRESS) {
223 ut_params->cipher_xform.cipher.op =
224 RTE_CRYPTO_CIPHER_OP_DECRYPT;
225 ut_params->auth_xform.auth.op = RTE_CRYPTO_AUTH_OP_VERIFY;
226 ut_params->cipher_xform.next = NULL;
227 ut_params->auth_xform.next = &ut_params->cipher_xform;
228 ut_params->crypto_xforms = &ut_params->auth_xform;
230 ut_params->cipher_xform.cipher.op =
231 RTE_CRYPTO_CIPHER_OP_ENCRYPT;
232 ut_params->auth_xform.auth.op = RTE_CRYPTO_AUTH_OP_GENERATE;
233 ut_params->auth_xform.next = NULL;
234 ut_params->cipher_xform.next = &ut_params->auth_xform;
235 ut_params->crypto_xforms = &ut_params->cipher_xform;
240 check_cryptodev_capability(const struct ipsec_unitest_params *ut,
243 struct rte_cryptodev_sym_capability_idx cap_idx;
244 const struct rte_cryptodev_symmetric_capability *cap;
247 cap_idx.type = RTE_CRYPTO_SYM_XFORM_AUTH;
248 cap_idx.algo.auth = ut->auth_xform.auth.algo;
249 cap = rte_cryptodev_sym_capability_get(dev_id, &cap_idx);
252 rc = rte_cryptodev_sym_capability_check_auth(cap,
253 ut->auth_xform.auth.key.length,
254 ut->auth_xform.auth.digest_length, 0);
256 cap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER;
257 cap_idx.algo.cipher = ut->cipher_xform.cipher.algo;
258 cap = rte_cryptodev_sym_capability_get(
261 rc = rte_cryptodev_sym_capability_check_cipher(
263 ut->cipher_xform.cipher.key.length,
264 ut->cipher_xform.cipher.iv.length);
272 testsuite_setup(void)
274 struct ipsec_testsuite_params *ts_params = &testsuite_params;
275 struct ipsec_unitest_params *ut_params = &unittest_params;
276 const struct supported_auth_algo *auth_algo;
277 const struct supported_cipher_algo *cipher_algo;
278 struct rte_cryptodev_info info;
279 uint32_t i, nb_devs, dev_id;
283 memset(ts_params, 0, sizeof(*ts_params));
284 memset(ut_params, 0, sizeof(*ut_params));
285 memset(&uparams, 0, sizeof(struct user_params));
287 uparams.auth = RTE_CRYPTO_SYM_XFORM_AUTH;
288 uparams.cipher = RTE_CRYPTO_SYM_XFORM_CIPHER;
289 uparams.aead = RTE_CRYPTO_SYM_XFORM_NOT_SPECIFIED;
290 strcpy(uparams.auth_algo, "null");
291 strcpy(uparams.cipher_algo, "null");
293 auth_algo = find_match_auth_algo(uparams.auth_algo);
294 cipher_algo = find_match_cipher_algo(uparams.cipher_algo);
295 fill_crypto_xform(ut_params, auth_algo, cipher_algo);
297 nb_devs = rte_cryptodev_count();
299 RTE_LOG(WARNING, USER1, "No crypto devices found?\n");
303 /* Find first valid crypto device */
304 for (i = 0; i < nb_devs; i++) {
305 rc = check_cryptodev_capability(ut_params, i);
307 ts_params->valid_dev = i;
308 ts_params->valid_dev_found = 1;
313 if (ts_params->valid_dev_found == 0)
316 ts_params->mbuf_pool = rte_pktmbuf_pool_create(
318 NUM_MBUFS, MBUF_CACHE_SIZE, 0, MBUF_SIZE,
320 if (ts_params->mbuf_pool == NULL) {
321 RTE_LOG(ERR, USER1, "Can't create CRYPTO_MBUFPOOL\n");
325 ts_params->cop_mpool = rte_crypto_op_pool_create(
326 "MBUF_CRYPTO_SYM_OP_POOL",
327 RTE_CRYPTO_OP_TYPE_SYMMETRIC,
328 NUM_MBUFS, MBUF_CACHE_SIZE,
330 sizeof(struct rte_crypto_sym_xform) +
333 if (ts_params->cop_mpool == NULL) {
334 RTE_LOG(ERR, USER1, "Can't create CRYPTO_OP_POOL\n");
338 /* Set up all the qps on the first of the valid devices found */
339 dev_id = ts_params->valid_dev;
341 rte_cryptodev_info_get(dev_id, &info);
343 ts_params->conf.nb_queue_pairs = info.max_nb_queue_pairs;
344 ts_params->conf.socket_id = SOCKET_ID_ANY;
345 ts_params->conf.ff_disable = RTE_CRYPTODEV_FF_ASYMMETRIC_CRYPTO;
347 sess_sz = rte_cryptodev_sym_get_private_session_size(dev_id);
348 sess_sz = RTE_MAX(sess_sz, sizeof(struct rte_security_session));
351 * Create mempools for sessions
353 if (info.sym.max_nb_sessions != 0 &&
354 info.sym.max_nb_sessions < MAX_NB_SESSIONS) {
355 RTE_LOG(ERR, USER1, "Device does not support "
356 "at least %u sessions\n",
361 ts_params->qp_conf.mp_session_private = rte_mempool_create(
365 0, 0, NULL, NULL, NULL,
369 TEST_ASSERT_NOT_NULL(ts_params->qp_conf.mp_session_private,
370 "private session mempool allocation failed");
372 ts_params->qp_conf.mp_session =
373 rte_cryptodev_sym_session_pool_create("test_sess_mp",
374 MAX_NB_SESSIONS, 0, 0, 0, SOCKET_ID_ANY);
376 TEST_ASSERT_NOT_NULL(ts_params->qp_conf.mp_session,
377 "session mempool allocation failed");
379 TEST_ASSERT_SUCCESS(rte_cryptodev_configure(dev_id,
381 "Failed to configure cryptodev %u with %u qps",
382 dev_id, ts_params->conf.nb_queue_pairs);
384 ts_params->qp_conf.nb_descriptors = DEFAULT_NUM_OPS_INFLIGHT;
386 TEST_ASSERT_SUCCESS(rte_cryptodev_queue_pair_setup(
387 dev_id, 0, &ts_params->qp_conf,
388 rte_cryptodev_socket_id(dev_id)),
389 "Failed to setup queue pair %u on cryptodev %u",
396 testsuite_teardown(void)
398 struct ipsec_testsuite_params *ts_params = &testsuite_params;
400 if (ts_params->mbuf_pool != NULL) {
401 RTE_LOG(DEBUG, USER1, "CRYPTO_MBUFPOOL count %u\n",
402 rte_mempool_avail_count(ts_params->mbuf_pool));
403 rte_mempool_free(ts_params->mbuf_pool);
404 ts_params->mbuf_pool = NULL;
407 if (ts_params->cop_mpool != NULL) {
408 RTE_LOG(DEBUG, USER1, "CRYPTO_OP_POOL count %u\n",
409 rte_mempool_avail_count(ts_params->cop_mpool));
410 rte_mempool_free(ts_params->cop_mpool);
411 ts_params->cop_mpool = NULL;
414 /* Free session mempools */
415 if (ts_params->qp_conf.mp_session != NULL) {
416 rte_mempool_free(ts_params->qp_conf.mp_session);
417 ts_params->qp_conf.mp_session = NULL;
420 if (ts_params->qp_conf.mp_session_private != NULL) {
421 rte_mempool_free(ts_params->qp_conf.mp_session_private);
422 ts_params->qp_conf.mp_session_private = NULL;
429 struct ipsec_testsuite_params *ts_params = &testsuite_params;
430 struct ipsec_unitest_params *ut_params = &unittest_params;
432 /* Clear unit test parameters before running test */
433 memset(ut_params, 0, sizeof(*ut_params));
435 /* Reconfigure device to default parameters */
436 ts_params->conf.socket_id = SOCKET_ID_ANY;
438 /* Start the device */
439 TEST_ASSERT_SUCCESS(rte_cryptodev_start(ts_params->valid_dev),
440 "Failed to start cryptodev %u",
441 ts_params->valid_dev);
449 struct ipsec_testsuite_params *ts_params = &testsuite_params;
450 struct ipsec_unitest_params *ut_params = &unittest_params;
453 for (i = 0; i < BURST_SIZE; i++) {
454 /* free crypto operation structure */
455 if (ut_params->cop[i]) {
456 rte_crypto_op_free(ut_params->cop[i]);
457 ut_params->cop[i] = NULL;
461 * free mbuf - both obuf and ibuf are usually the same,
462 * so check if they point at the same address is necessary,
463 * to avoid freeing the mbuf twice.
465 if (ut_params->obuf[i]) {
466 rte_pktmbuf_free(ut_params->obuf[i]);
467 if (ut_params->ibuf[i] == ut_params->obuf[i])
468 ut_params->ibuf[i] = NULL;
469 ut_params->obuf[i] = NULL;
471 if (ut_params->ibuf[i]) {
472 rte_pktmbuf_free(ut_params->ibuf[i]);
473 ut_params->ibuf[i] = NULL;
476 if (ut_params->testbuf[i]) {
477 rte_pktmbuf_free(ut_params->testbuf[i]);
478 ut_params->testbuf[i] = NULL;
482 if (ts_params->mbuf_pool != NULL)
483 RTE_LOG(DEBUG, USER1, "CRYPTO_MBUFPOOL count %u\n",
484 rte_mempool_avail_count(ts_params->mbuf_pool));
486 /* Stop the device */
487 rte_cryptodev_stop(ts_params->valid_dev);
490 #define IPSEC_MAX_PAD_SIZE UINT8_MAX
492 static const uint8_t esp_pad_bytes[IPSEC_MAX_PAD_SIZE] = {
493 1, 2, 3, 4, 5, 6, 7, 8,
494 9, 10, 11, 12, 13, 14, 15, 16,
495 17, 18, 19, 20, 21, 22, 23, 24,
496 25, 26, 27, 28, 29, 30, 31, 32,
497 33, 34, 35, 36, 37, 38, 39, 40,
498 41, 42, 43, 44, 45, 46, 47, 48,
499 49, 50, 51, 52, 53, 54, 55, 56,
500 57, 58, 59, 60, 61, 62, 63, 64,
501 65, 66, 67, 68, 69, 70, 71, 72,
502 73, 74, 75, 76, 77, 78, 79, 80,
503 81, 82, 83, 84, 85, 86, 87, 88,
504 89, 90, 91, 92, 93, 94, 95, 96,
505 97, 98, 99, 100, 101, 102, 103, 104,
506 105, 106, 107, 108, 109, 110, 111, 112,
507 113, 114, 115, 116, 117, 118, 119, 120,
508 121, 122, 123, 124, 125, 126, 127, 128,
509 129, 130, 131, 132, 133, 134, 135, 136,
510 137, 138, 139, 140, 141, 142, 143, 144,
511 145, 146, 147, 148, 149, 150, 151, 152,
512 153, 154, 155, 156, 157, 158, 159, 160,
513 161, 162, 163, 164, 165, 166, 167, 168,
514 169, 170, 171, 172, 173, 174, 175, 176,
515 177, 178, 179, 180, 181, 182, 183, 184,
516 185, 186, 187, 188, 189, 190, 191, 192,
517 193, 194, 195, 196, 197, 198, 199, 200,
518 201, 202, 203, 204, 205, 206, 207, 208,
519 209, 210, 211, 212, 213, 214, 215, 216,
520 217, 218, 219, 220, 221, 222, 223, 224,
521 225, 226, 227, 228, 229, 230, 231, 232,
522 233, 234, 235, 236, 237, 238, 239, 240,
523 241, 242, 243, 244, 245, 246, 247, 248,
524 249, 250, 251, 252, 253, 254, 255,
527 /* ***** data for tests ***** */
529 const char null_plain_data[] =
530 "Network Security People Have A Strange Sense Of Humor unlike Other "
531 "People who have a normal sense of humour";
533 const char null_encrypted_data[] =
534 "Network Security People Have A Strange Sense Of Humor unlike Other "
535 "People who have a normal sense of humour";
537 struct rte_ipv4_hdr ipv4_outer = {
538 .version_ihl = IPVERSION << 4 |
539 sizeof(ipv4_outer) / RTE_IPV4_IHL_MULTIPLIER,
540 .time_to_live = IPDEFTTL,
541 .next_proto_id = IPPROTO_ESP,
542 .src_addr = RTE_IPV4(192, 168, 1, 100),
543 .dst_addr = RTE_IPV4(192, 168, 2, 100),
546 static struct rte_mbuf *
547 setup_test_string(struct rte_mempool *mpool,
548 const char *string, size_t len, uint8_t blocksize)
550 struct rte_mbuf *m = rte_pktmbuf_alloc(mpool);
551 size_t t_len = len - (blocksize ? (len % blocksize) : 0);
554 memset(m->buf_addr, 0, m->buf_len);
555 char *dst = rte_pktmbuf_append(m, t_len);
562 rte_memcpy(dst, string, t_len);
564 memset(dst, 0, t_len);
570 static struct rte_mbuf *
571 setup_test_string_tunneled(struct rte_mempool *mpool, const char *string,
572 size_t len, uint32_t spi, uint32_t seq)
574 struct rte_mbuf *m = rte_pktmbuf_alloc(mpool);
575 uint32_t hdrlen = sizeof(struct rte_ipv4_hdr) +
576 sizeof(struct rte_esp_hdr);
577 uint32_t taillen = sizeof(struct rte_esp_tail);
578 uint32_t t_len = len + hdrlen + taillen;
581 struct rte_esp_hdr esph = {
582 .spi = rte_cpu_to_be_32(spi),
583 .seq = rte_cpu_to_be_32(seq)
586 padlen = RTE_ALIGN(t_len, 4) - t_len;
589 struct rte_esp_tail espt = {
591 .next_proto = IPPROTO_IPIP,
597 memset(m->buf_addr, 0, m->buf_len);
598 char *dst = rte_pktmbuf_append(m, t_len);
604 /* copy outer IP and ESP header */
605 ipv4_outer.total_length = rte_cpu_to_be_16(t_len);
606 ipv4_outer.packet_id = rte_cpu_to_be_16(seq);
607 rte_memcpy(dst, &ipv4_outer, sizeof(ipv4_outer));
608 dst += sizeof(ipv4_outer);
609 m->l3_len = sizeof(ipv4_outer);
610 rte_memcpy(dst, &esph, sizeof(esph));
613 if (string != NULL) {
615 rte_memcpy(dst, string, len);
618 rte_memcpy(dst, esp_pad_bytes, padlen);
620 /* copy ESP tail header */
621 rte_memcpy(dst, &espt, sizeof(espt));
623 memset(dst, 0, t_len);
629 create_dummy_sec_session(struct ipsec_unitest_params *ut,
630 struct rte_cryptodev_qp_conf *qp, uint32_t j)
632 static struct rte_security_session_conf conf;
634 ut->ss[j].security.ses = rte_security_session_create(&dummy_sec_ctx,
635 &conf, qp->mp_session_private);
637 if (ut->ss[j].security.ses == NULL)
640 ut->ss[j].security.ctx = &dummy_sec_ctx;
641 ut->ss[j].security.ol_flags = 0;
646 create_crypto_session(struct ipsec_unitest_params *ut,
647 struct rte_cryptodev_qp_conf *qp, uint8_t dev_id, uint32_t j)
650 struct rte_cryptodev_sym_session *s;
652 s = rte_cryptodev_sym_session_create(qp->mp_session);
656 /* initiliaze SA crypto session for device */
657 rc = rte_cryptodev_sym_session_init(dev_id, s,
658 ut->crypto_xforms, qp->mp_session_private);
660 ut->ss[j].crypto.ses = s;
663 /* failure, do cleanup */
664 rte_cryptodev_sym_session_clear(dev_id, s);
665 rte_cryptodev_sym_session_free(s);
671 create_session(struct ipsec_unitest_params *ut,
672 struct rte_cryptodev_qp_conf *qp, uint8_t crypto_dev, uint32_t j)
674 if (ut->ss[j].type == RTE_SECURITY_ACTION_TYPE_NONE)
675 return create_crypto_session(ut, qp, crypto_dev, j);
677 return create_dummy_sec_session(ut, qp, j);
681 fill_ipsec_param(uint32_t replay_win_sz, uint64_t flags)
683 struct ipsec_unitest_params *ut_params = &unittest_params;
684 struct rte_ipsec_sa_prm *prm = &ut_params->sa_prm;
685 const struct supported_auth_algo *auth_algo;
686 const struct supported_cipher_algo *cipher_algo;
688 memset(prm, 0, sizeof(*prm));
693 /* setup ipsec xform */
694 prm->ipsec_xform = ut_params->ipsec_xform;
695 prm->ipsec_xform.salt = (uint32_t)rte_rand();
696 prm->ipsec_xform.replay_win_sz = replay_win_sz;
698 /* setup tunnel related fields */
699 prm->tun.hdr_len = sizeof(ipv4_outer);
700 prm->tun.next_proto = IPPROTO_IPIP;
701 prm->tun.hdr = &ipv4_outer;
703 /* setup crypto section */
704 if (uparams.aead != 0) {
705 /* TODO: will need to fill out with other test cases */
707 if (uparams.auth == 0 && uparams.cipher == 0)
710 auth_algo = find_match_auth_algo(uparams.auth_algo);
711 cipher_algo = find_match_cipher_algo(uparams.cipher_algo);
713 fill_crypto_xform(ut_params, auth_algo, cipher_algo);
716 prm->crypto_xform = ut_params->crypto_xforms;
721 create_sa(enum rte_security_session_action_type action_type,
722 uint32_t replay_win_sz, uint64_t flags, uint32_t j)
724 struct ipsec_testsuite_params *ts = &testsuite_params;
725 struct ipsec_unitest_params *ut = &unittest_params;
729 memset(&ut->ss[j], 0, sizeof(ut->ss[j]));
731 rc = fill_ipsec_param(replay_win_sz, flags);
735 /* create rte_ipsec_sa*/
736 sz = rte_ipsec_sa_size(&ut->sa_prm);
737 TEST_ASSERT(sz > 0, "rte_ipsec_sa_size() failed\n");
739 ut->ss[j].sa = rte_zmalloc(NULL, sz, RTE_CACHE_LINE_SIZE);
740 TEST_ASSERT_NOT_NULL(ut->ss[j].sa,
741 "failed to allocate memory for rte_ipsec_sa\n");
743 ut->ss[j].type = action_type;
744 rc = create_session(ut, &ts->qp_conf, ts->valid_dev, j);
748 rc = rte_ipsec_sa_init(ut->ss[j].sa, &ut->sa_prm, sz);
749 rc = (rc > 0 && (uint32_t)rc <= sz) ? 0 : -EINVAL;
751 rc = rte_ipsec_session_prepare(&ut->ss[j]);
757 crypto_dequeue_burst(uint16_t num_pkts)
759 struct ipsec_testsuite_params *ts_params = &testsuite_params;
760 struct ipsec_unitest_params *ut_params = &unittest_params;
764 for (i = 0, pkt_cnt = 0;
765 i < DEQUEUE_COUNT && pkt_cnt != num_pkts; i++) {
766 k = rte_cryptodev_dequeue_burst(ts_params->valid_dev, 0,
767 &ut_params->cop[pkt_cnt], num_pkts - pkt_cnt);
772 if (pkt_cnt != num_pkts) {
773 RTE_LOG(ERR, USER1, "rte_cryptodev_dequeue_burst fail\n");
780 crypto_ipsec(uint16_t num_pkts)
782 struct ipsec_testsuite_params *ts_params = &testsuite_params;
783 struct ipsec_unitest_params *ut_params = &unittest_params;
785 struct rte_ipsec_group grp[1];
787 /* call crypto prepare */
788 k = rte_ipsec_pkt_crypto_prepare(&ut_params->ss[0], ut_params->ibuf,
789 ut_params->cop, num_pkts);
791 RTE_LOG(ERR, USER1, "rte_ipsec_pkt_crypto_prepare fail\n");
795 k = rte_cryptodev_enqueue_burst(ts_params->valid_dev, 0,
796 ut_params->cop, num_pkts);
798 RTE_LOG(ERR, USER1, "rte_cryptodev_enqueue_burst fail\n");
802 if (crypto_dequeue_burst(num_pkts) == TEST_FAILED)
805 ng = rte_ipsec_pkt_crypto_group(
806 (const struct rte_crypto_op **)(uintptr_t)ut_params->cop,
807 ut_params->obuf, grp, num_pkts);
809 grp[0].m[0] != ut_params->obuf[0] ||
810 grp[0].cnt != num_pkts ||
811 grp[0].id.ptr != &ut_params->ss[0]) {
812 RTE_LOG(ERR, USER1, "rte_ipsec_pkt_crypto_group fail\n");
816 /* call crypto process */
817 k = rte_ipsec_pkt_process(grp[0].id.ptr, grp[0].m, grp[0].cnt);
819 RTE_LOG(ERR, USER1, "rte_ipsec_pkt_process fail\n");
827 lksd_proto_ipsec(uint16_t num_pkts)
829 struct ipsec_unitest_params *ut_params = &unittest_params;
831 struct rte_ipsec_group grp[1];
833 /* call crypto prepare */
834 k = rte_ipsec_pkt_crypto_prepare(&ut_params->ss[0], ut_params->ibuf,
835 ut_params->cop, num_pkts);
837 RTE_LOG(ERR, USER1, "rte_ipsec_pkt_crypto_prepare fail\n");
841 /* check crypto ops */
842 for (i = 0; i != num_pkts; i++) {
843 TEST_ASSERT_EQUAL(ut_params->cop[i]->type,
844 RTE_CRYPTO_OP_TYPE_SYMMETRIC,
845 "%s: invalid crypto op type for %u-th packet\n",
847 TEST_ASSERT_EQUAL(ut_params->cop[i]->status,
848 RTE_CRYPTO_OP_STATUS_NOT_PROCESSED,
849 "%s: invalid crypto op status for %u-th packet\n",
851 TEST_ASSERT_EQUAL(ut_params->cop[i]->sess_type,
852 RTE_CRYPTO_OP_SECURITY_SESSION,
853 "%s: invalid crypto op sess_type for %u-th packet\n",
855 TEST_ASSERT_EQUAL(ut_params->cop[i]->sym->m_src,
857 "%s: invalid crypto op m_src for %u-th packet\n",
861 /* update crypto ops, pretend all finished ok */
862 for (i = 0; i != num_pkts; i++)
863 ut_params->cop[i]->status = RTE_CRYPTO_OP_STATUS_SUCCESS;
865 ng = rte_ipsec_pkt_crypto_group(
866 (const struct rte_crypto_op **)(uintptr_t)ut_params->cop,
867 ut_params->obuf, grp, num_pkts);
869 grp[0].m[0] != ut_params->obuf[0] ||
870 grp[0].cnt != num_pkts ||
871 grp[0].id.ptr != &ut_params->ss[0]) {
872 RTE_LOG(ERR, USER1, "rte_ipsec_pkt_crypto_group fail\n");
876 /* call crypto process */
877 k = rte_ipsec_pkt_process(grp[0].id.ptr, grp[0].m, grp[0].cnt);
879 RTE_LOG(ERR, USER1, "rte_ipsec_pkt_process fail\n");
887 dump_grp_pkt(uint32_t i, struct rte_ipsec_group *grp, uint32_t k)
890 "After rte_ipsec_pkt_process grp[%d].cnt=%d k=%d fail\n",
893 "After rte_ipsec_pkt_process grp[%d].m=%p grp[%d].m[%d]=%p\n",
894 i, grp[i].m, i, k, grp[i].m[k]);
896 rte_pktmbuf_dump(stdout, grp[i].m[k], grp[i].m[k]->data_len);
900 crypto_ipsec_2sa(void)
902 struct ipsec_testsuite_params *ts_params = &testsuite_params;
903 struct ipsec_unitest_params *ut_params = &unittest_params;
904 struct rte_ipsec_group grp[BURST_SIZE];
905 uint32_t k, ng, i, r;
907 for (i = 0; i < BURST_SIZE; i++) {
909 /* call crypto prepare */
910 k = rte_ipsec_pkt_crypto_prepare(&ut_params->ss[r],
911 ut_params->ibuf + i, ut_params->cop + i, 1);
914 "rte_ipsec_pkt_crypto_prepare fail\n");
917 k = rte_cryptodev_enqueue_burst(ts_params->valid_dev, 0,
918 ut_params->cop + i, 1);
921 "rte_cryptodev_enqueue_burst fail\n");
926 if (crypto_dequeue_burst(BURST_SIZE) == TEST_FAILED)
929 ng = rte_ipsec_pkt_crypto_group(
930 (const struct rte_crypto_op **)(uintptr_t)ut_params->cop,
931 ut_params->obuf, grp, BURST_SIZE);
932 if (ng != BURST_SIZE) {
933 RTE_LOG(ERR, USER1, "rte_ipsec_pkt_crypto_group fail ng=%d\n",
938 /* call crypto process */
939 for (i = 0; i < ng; i++) {
940 k = rte_ipsec_pkt_process(grp[i].id.ptr, grp[i].m, grp[i].cnt);
941 if (k != grp[i].cnt) {
942 dump_grp_pkt(i, grp, k);
954 crypto_ipsec_4grp(uint32_t pkt_num)
958 /* group packets in 4 different size groups groups, 2 per SA */
961 else if (pkt_num < PKT_12)
963 else if (pkt_num < PKT_21)
972 crypto_ipsec_4grp_check_mbufs(uint32_t grp_ind, struct rte_ipsec_group *grp)
974 struct ipsec_unitest_params *ut_params = &unittest_params;
979 for (i = 0, j = 0; i < PKT_4; i++, j++)
980 if (grp[grp_ind].m[i] != ut_params->obuf[j]) {
984 } else if (grp_ind == 1) {
985 for (i = 0, j = PKT_4; i < (PKT_12 - PKT_4); i++, j++) {
986 if (grp[grp_ind].m[i] != ut_params->obuf[j]) {
991 } else if (grp_ind == 2) {
992 for (i = 0, j = PKT_12; i < (PKT_21 - PKT_12); i++, j++)
993 if (grp[grp_ind].m[i] != ut_params->obuf[j]) {
997 } else if (grp_ind == 3) {
998 for (i = 0, j = PKT_21; i < (BURST_SIZE - PKT_21); i++, j++)
999 if (grp[grp_ind].m[i] != ut_params->obuf[j]) {
1010 crypto_ipsec_4grp_check_cnt(uint32_t grp_ind, struct rte_ipsec_group *grp)
1015 if (grp[grp_ind].cnt != PKT_4)
1017 } else if (grp_ind == 1) {
1018 if (grp[grp_ind].cnt != PKT_12 - PKT_4)
1020 } else if (grp_ind == 2) {
1021 if (grp[grp_ind].cnt != PKT_21 - PKT_12)
1023 } else if (grp_ind == 3) {
1024 if (grp[grp_ind].cnt != BURST_SIZE - PKT_21)
1033 crypto_ipsec_2sa_4grp(void)
1035 struct ipsec_testsuite_params *ts_params = &testsuite_params;
1036 struct ipsec_unitest_params *ut_params = &unittest_params;
1037 struct rte_ipsec_group grp[BURST_SIZE];
1038 uint32_t k, ng, i, j;
1041 for (i = 0; i < BURST_SIZE; i++) {
1042 j = crypto_ipsec_4grp(i);
1044 /* call crypto prepare */
1045 k = rte_ipsec_pkt_crypto_prepare(&ut_params->ss[j],
1046 ut_params->ibuf + i, ut_params->cop + i, 1);
1049 "rte_ipsec_pkt_crypto_prepare fail\n");
1052 k = rte_cryptodev_enqueue_burst(ts_params->valid_dev, 0,
1053 ut_params->cop + i, 1);
1056 "rte_cryptodev_enqueue_burst fail\n");
1061 if (crypto_dequeue_burst(BURST_SIZE) == TEST_FAILED)
1064 ng = rte_ipsec_pkt_crypto_group(
1065 (const struct rte_crypto_op **)(uintptr_t)ut_params->cop,
1066 ut_params->obuf, grp, BURST_SIZE);
1068 RTE_LOG(ERR, USER1, "rte_ipsec_pkt_crypto_group fail ng=%d\n",
1073 /* call crypto process */
1074 for (i = 0; i < ng; i++) {
1075 k = rte_ipsec_pkt_process(grp[i].id.ptr, grp[i].m, grp[i].cnt);
1076 if (k != grp[i].cnt) {
1077 dump_grp_pkt(i, grp, k);
1080 rc = crypto_ipsec_4grp_check_cnt(i, grp);
1083 "crypto_ipsec_4grp_check_cnt fail\n");
1086 rc = crypto_ipsec_4grp_check_mbufs(i, grp);
1089 "crypto_ipsec_4grp_check_mbufs fail\n");
1093 return TEST_SUCCESS;
1097 test_ipsec_reorder_inb_pkt_burst(uint16_t num_pkts)
1099 struct ipsec_unitest_params *ut_params = &unittest_params;
1100 struct rte_mbuf *ibuf_tmp[BURST_SIZE];
1103 /* reorder packets and create gaps in sequence numbers */
1104 static const uint32_t reorder[BURST_SIZE] = {
1105 24, 25, 26, 27, 28, 29, 30, 31,
1106 16, 17, 18, 19, 20, 21, 22, 23,
1107 8, 9, 10, 11, 12, 13, 14, 15,
1108 0, 1, 2, 3, 4, 5, 6, 7,
1111 if (num_pkts != BURST_SIZE)
1114 for (j = 0; j != BURST_SIZE; j++)
1115 ibuf_tmp[j] = ut_params->ibuf[reorder[j]];
1117 memcpy(ut_params->ibuf, ibuf_tmp, sizeof(ut_params->ibuf));
1121 test_ipsec_crypto_op_alloc(uint16_t num_pkts)
1123 struct ipsec_testsuite_params *ts_params = &testsuite_params;
1124 struct ipsec_unitest_params *ut_params = &unittest_params;
1128 for (j = 0; j < num_pkts && rc == 0; j++) {
1129 ut_params->cop[j] = rte_crypto_op_alloc(ts_params->cop_mpool,
1130 RTE_CRYPTO_OP_TYPE_SYMMETRIC);
1131 if (ut_params->cop[j] == NULL) {
1133 "Failed to allocate symmetric crypto op\n");
1142 test_ipsec_dump_buffers(struct ipsec_unitest_params *ut_params, int i)
1144 uint16_t j = ut_params->pkt_index;
1146 printf("\ntest config: num %d\n", i);
1147 printf(" replay_win_sz %u\n", test_cfg[i].replay_win_sz);
1148 printf(" esn %u\n", test_cfg[i].esn);
1149 printf(" flags 0x%" PRIx64 "\n", test_cfg[i].flags);
1150 printf(" pkt_sz %zu\n", test_cfg[i].pkt_sz);
1151 printf(" num_pkts %u\n\n", test_cfg[i].num_pkts);
1153 if (ut_params->ibuf[j]) {
1154 printf("ibuf[%u] data:\n", j);
1155 rte_pktmbuf_dump(stdout, ut_params->ibuf[j],
1156 ut_params->ibuf[j]->data_len);
1158 if (ut_params->obuf[j]) {
1159 printf("obuf[%u] data:\n", j);
1160 rte_pktmbuf_dump(stdout, ut_params->obuf[j],
1161 ut_params->obuf[j]->data_len);
1163 if (ut_params->testbuf[j]) {
1164 printf("testbuf[%u] data:\n", j);
1165 rte_pktmbuf_dump(stdout, ut_params->testbuf[j],
1166 ut_params->testbuf[j]->data_len);
1171 destroy_dummy_sec_session(struct ipsec_unitest_params *ut,
1174 rte_security_session_destroy(&dummy_sec_ctx,
1175 ut->ss[j].security.ses);
1176 ut->ss[j].security.ctx = NULL;
1180 destroy_crypto_session(struct ipsec_unitest_params *ut,
1181 uint8_t crypto_dev, uint32_t j)
1183 rte_cryptodev_sym_session_clear(crypto_dev, ut->ss[j].crypto.ses);
1184 rte_cryptodev_sym_session_free(ut->ss[j].crypto.ses);
1185 memset(&ut->ss[j], 0, sizeof(ut->ss[j]));
1189 destroy_session(struct ipsec_unitest_params *ut,
1190 uint8_t crypto_dev, uint32_t j)
1192 if (ut->ss[j].type == RTE_SECURITY_ACTION_TYPE_NONE)
1193 return destroy_crypto_session(ut, crypto_dev, j);
1195 return destroy_dummy_sec_session(ut, j);
1199 destroy_sa(uint32_t j)
1201 struct ipsec_unitest_params *ut = &unittest_params;
1202 struct ipsec_testsuite_params *ts = &testsuite_params;
1204 rte_ipsec_sa_fini(ut->ss[j].sa);
1205 rte_free(ut->ss[j].sa);
1207 destroy_session(ut, ts->valid_dev, j);
1211 crypto_inb_burst_null_null_check(struct ipsec_unitest_params *ut_params, int i,
1216 for (j = 0; j < num_pkts && num_pkts <= BURST_SIZE; j++) {
1217 ut_params->pkt_index = j;
1219 /* compare the data buffers */
1220 TEST_ASSERT_BUFFERS_ARE_EQUAL(null_plain_data,
1221 rte_pktmbuf_mtod(ut_params->obuf[j], void *),
1223 "input and output data does not match\n");
1224 TEST_ASSERT_EQUAL(ut_params->obuf[j]->data_len,
1225 ut_params->obuf[j]->pkt_len,
1226 "data_len is not equal to pkt_len");
1227 TEST_ASSERT_EQUAL(ut_params->obuf[j]->data_len,
1229 "data_len is not equal to input data");
1236 test_ipsec_crypto_inb_burst_null_null(int i)
1238 struct ipsec_testsuite_params *ts_params = &testsuite_params;
1239 struct ipsec_unitest_params *ut_params = &unittest_params;
1240 uint16_t num_pkts = test_cfg[i].num_pkts;
1244 /* create rte_ipsec_sa */
1245 rc = create_sa(RTE_SECURITY_ACTION_TYPE_NONE,
1246 test_cfg[i].replay_win_sz, test_cfg[i].flags, 0);
1248 RTE_LOG(ERR, USER1, "create_sa failed, cfg %d\n", i);
1252 /* Generate test mbuf data */
1253 for (j = 0; j < num_pkts && rc == 0; j++) {
1254 /* packet with sequence number 0 is invalid */
1255 ut_params->ibuf[j] = setup_test_string_tunneled(
1256 ts_params->mbuf_pool, null_encrypted_data,
1257 test_cfg[i].pkt_sz, INBOUND_SPI, j + 1);
1258 if (ut_params->ibuf[j] == NULL)
1263 if (test_cfg[i].reorder_pkts)
1264 test_ipsec_reorder_inb_pkt_burst(num_pkts);
1265 rc = test_ipsec_crypto_op_alloc(num_pkts);
1269 /* call ipsec library api */
1270 rc = crypto_ipsec(num_pkts);
1272 rc = crypto_inb_burst_null_null_check(
1273 ut_params, i, num_pkts);
1275 RTE_LOG(ERR, USER1, "crypto_ipsec failed, cfg %d\n",
1281 if (rc == TEST_FAILED)
1282 test_ipsec_dump_buffers(ut_params, i);
1289 test_ipsec_crypto_inb_burst_null_null_wrapper(void)
1293 struct ipsec_unitest_params *ut_params = &unittest_params;
1295 ut_params->ipsec_xform.spi = INBOUND_SPI;
1296 ut_params->ipsec_xform.direction = RTE_SECURITY_IPSEC_SA_DIR_INGRESS;
1297 ut_params->ipsec_xform.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP;
1298 ut_params->ipsec_xform.mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL;
1299 ut_params->ipsec_xform.tunnel.type = RTE_SECURITY_IPSEC_TUNNEL_IPV4;
1301 for (i = 0; i < num_cfg && rc == 0; i++) {
1302 ut_params->ipsec_xform.options.esn = test_cfg[i].esn;
1303 rc = test_ipsec_crypto_inb_burst_null_null(i);
1310 crypto_outb_burst_null_null_check(struct ipsec_unitest_params *ut_params,
1317 for (j = 0; j < num_pkts && num_pkts <= BURST_SIZE; j++) {
1318 ut_params->pkt_index = j;
1320 testbuf_data = rte_pktmbuf_mtod(ut_params->testbuf[j], void *);
1321 obuf_data = rte_pktmbuf_mtod(ut_params->obuf[j], void *);
1322 /* compare the buffer data */
1323 TEST_ASSERT_BUFFERS_ARE_EQUAL(testbuf_data, obuf_data,
1324 ut_params->obuf[j]->pkt_len,
1325 "test and output data does not match\n");
1326 TEST_ASSERT_EQUAL(ut_params->obuf[j]->data_len,
1327 ut_params->testbuf[j]->data_len,
1328 "obuf data_len is not equal to testbuf data_len");
1329 TEST_ASSERT_EQUAL(ut_params->obuf[j]->pkt_len,
1330 ut_params->testbuf[j]->pkt_len,
1331 "obuf pkt_len is not equal to testbuf pkt_len");
1338 test_ipsec_crypto_outb_burst_null_null(int i)
1340 struct ipsec_testsuite_params *ts_params = &testsuite_params;
1341 struct ipsec_unitest_params *ut_params = &unittest_params;
1342 uint16_t num_pkts = test_cfg[i].num_pkts;
1346 /* create rte_ipsec_sa*/
1347 rc = create_sa(RTE_SECURITY_ACTION_TYPE_NONE,
1348 test_cfg[i].replay_win_sz, test_cfg[i].flags, 0);
1350 RTE_LOG(ERR, USER1, "create_sa failed, cfg %d\n", i);
1354 /* Generate input mbuf data */
1355 for (j = 0; j < num_pkts && rc == 0; j++) {
1356 ut_params->ibuf[j] = setup_test_string(ts_params->mbuf_pool,
1357 null_plain_data, test_cfg[i].pkt_sz, 0);
1358 if (ut_params->ibuf[j] == NULL)
1361 /* Generate test mbuf data */
1362 /* packet with sequence number 0 is invalid */
1363 ut_params->testbuf[j] = setup_test_string_tunneled(
1364 ts_params->mbuf_pool,
1365 null_plain_data, test_cfg[i].pkt_sz,
1366 OUTBOUND_SPI, j + 1);
1367 if (ut_params->testbuf[j] == NULL)
1373 rc = test_ipsec_crypto_op_alloc(num_pkts);
1376 /* call ipsec library api */
1377 rc = crypto_ipsec(num_pkts);
1379 rc = crypto_outb_burst_null_null_check(ut_params,
1382 RTE_LOG(ERR, USER1, "crypto_ipsec failed, cfg %d\n",
1386 if (rc == TEST_FAILED)
1387 test_ipsec_dump_buffers(ut_params, i);
1394 test_ipsec_crypto_outb_burst_null_null_wrapper(void)
1398 struct ipsec_unitest_params *ut_params = &unittest_params;
1400 ut_params->ipsec_xform.spi = OUTBOUND_SPI;
1401 ut_params->ipsec_xform.direction = RTE_SECURITY_IPSEC_SA_DIR_EGRESS;
1402 ut_params->ipsec_xform.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP;
1403 ut_params->ipsec_xform.mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL;
1404 ut_params->ipsec_xform.tunnel.type = RTE_SECURITY_IPSEC_TUNNEL_IPV4;
1406 for (i = 0; i < num_cfg && rc == 0; i++) {
1407 ut_params->ipsec_xform.options.esn = test_cfg[i].esn;
1408 rc = test_ipsec_crypto_outb_burst_null_null(i);
1415 inline_inb_burst_null_null_check(struct ipsec_unitest_params *ut_params, int i,
1422 for (j = 0; j < num_pkts && num_pkts <= BURST_SIZE; j++) {
1423 ut_params->pkt_index = j;
1425 /* compare the buffer data */
1426 ibuf_data = rte_pktmbuf_mtod(ut_params->ibuf[j], void *);
1427 obuf_data = rte_pktmbuf_mtod(ut_params->obuf[j], void *);
1429 TEST_ASSERT_BUFFERS_ARE_EQUAL(ibuf_data, obuf_data,
1430 ut_params->ibuf[j]->data_len,
1431 "input and output data does not match\n");
1432 TEST_ASSERT_EQUAL(ut_params->ibuf[j]->data_len,
1433 ut_params->obuf[j]->data_len,
1434 "ibuf data_len is not equal to obuf data_len");
1435 TEST_ASSERT_EQUAL(ut_params->ibuf[j]->pkt_len,
1436 ut_params->obuf[j]->pkt_len,
1437 "ibuf pkt_len is not equal to obuf pkt_len");
1438 TEST_ASSERT_EQUAL(ut_params->ibuf[j]->data_len,
1440 "data_len is not equal input data");
1446 test_ipsec_inline_crypto_inb_burst_null_null(int i)
1448 struct ipsec_testsuite_params *ts_params = &testsuite_params;
1449 struct ipsec_unitest_params *ut_params = &unittest_params;
1450 uint16_t num_pkts = test_cfg[i].num_pkts;
1455 /* create rte_ipsec_sa*/
1456 rc = create_sa(RTE_SECURITY_ACTION_TYPE_INLINE_CRYPTO,
1457 test_cfg[i].replay_win_sz, test_cfg[i].flags, 0);
1459 RTE_LOG(ERR, USER1, "create_sa failed, cfg %d\n", i);
1463 /* Generate inbound mbuf data */
1464 for (j = 0; j < num_pkts && rc == 0; j++) {
1465 ut_params->ibuf[j] = setup_test_string_tunneled(
1466 ts_params->mbuf_pool,
1467 null_plain_data, test_cfg[i].pkt_sz,
1468 INBOUND_SPI, j + 1);
1469 if (ut_params->ibuf[j] == NULL)
1472 /* Generate test mbuf data */
1473 ut_params->obuf[j] = setup_test_string(
1474 ts_params->mbuf_pool,
1475 null_plain_data, test_cfg[i].pkt_sz, 0);
1476 if (ut_params->obuf[j] == NULL)
1482 n = rte_ipsec_pkt_process(&ut_params->ss[0], ut_params->ibuf,
1485 rc = inline_inb_burst_null_null_check(ut_params, i,
1489 "rte_ipsec_pkt_process failed, cfg %d\n",
1495 if (rc == TEST_FAILED)
1496 test_ipsec_dump_buffers(ut_params, i);
1503 test_ipsec_inline_crypto_inb_burst_null_null_wrapper(void)
1507 struct ipsec_unitest_params *ut_params = &unittest_params;
1509 ut_params->ipsec_xform.spi = INBOUND_SPI;
1510 ut_params->ipsec_xform.direction = RTE_SECURITY_IPSEC_SA_DIR_INGRESS;
1511 ut_params->ipsec_xform.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP;
1512 ut_params->ipsec_xform.mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL;
1513 ut_params->ipsec_xform.tunnel.type = RTE_SECURITY_IPSEC_TUNNEL_IPV4;
1515 for (i = 0; i < num_cfg && rc == 0; i++) {
1516 ut_params->ipsec_xform.options.esn = test_cfg[i].esn;
1517 rc = test_ipsec_inline_crypto_inb_burst_null_null(i);
1524 test_ipsec_inline_proto_inb_burst_null_null(int i)
1526 struct ipsec_testsuite_params *ts_params = &testsuite_params;
1527 struct ipsec_unitest_params *ut_params = &unittest_params;
1528 uint16_t num_pkts = test_cfg[i].num_pkts;
1533 /* create rte_ipsec_sa*/
1534 rc = create_sa(RTE_SECURITY_ACTION_TYPE_INLINE_PROTOCOL,
1535 test_cfg[i].replay_win_sz, test_cfg[i].flags, 0);
1537 RTE_LOG(ERR, USER1, "create_sa failed, cfg %d\n", i);
1541 /* Generate inbound mbuf data */
1542 for (j = 0; j < num_pkts && rc == 0; j++) {
1543 ut_params->ibuf[j] = setup_test_string(
1544 ts_params->mbuf_pool,
1545 null_plain_data, test_cfg[i].pkt_sz, 0);
1546 if (ut_params->ibuf[j] == NULL)
1549 /* Generate test mbuf data */
1550 ut_params->obuf[j] = setup_test_string(
1551 ts_params->mbuf_pool,
1552 null_plain_data, test_cfg[i].pkt_sz, 0);
1553 if (ut_params->obuf[j] == NULL)
1559 n = rte_ipsec_pkt_process(&ut_params->ss[0], ut_params->ibuf,
1562 rc = inline_inb_burst_null_null_check(ut_params, i,
1566 "rte_ipsec_pkt_process failed, cfg %d\n",
1572 if (rc == TEST_FAILED)
1573 test_ipsec_dump_buffers(ut_params, i);
1580 test_ipsec_inline_proto_inb_burst_null_null_wrapper(void)
1584 struct ipsec_unitest_params *ut_params = &unittest_params;
1586 ut_params->ipsec_xform.spi = INBOUND_SPI;
1587 ut_params->ipsec_xform.direction = RTE_SECURITY_IPSEC_SA_DIR_INGRESS;
1588 ut_params->ipsec_xform.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP;
1589 ut_params->ipsec_xform.mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL;
1590 ut_params->ipsec_xform.tunnel.type = RTE_SECURITY_IPSEC_TUNNEL_IPV4;
1592 for (i = 0; i < num_cfg && rc == 0; i++) {
1593 ut_params->ipsec_xform.options.esn = test_cfg[i].esn;
1594 rc = test_ipsec_inline_proto_inb_burst_null_null(i);
1601 inline_outb_burst_null_null_check(struct ipsec_unitest_params *ut_params,
1608 for (j = 0; j < num_pkts && num_pkts <= BURST_SIZE; j++) {
1609 ut_params->pkt_index = j;
1611 /* compare the buffer data */
1612 ibuf_data = rte_pktmbuf_mtod(ut_params->ibuf[j], void *);
1613 obuf_data = rte_pktmbuf_mtod(ut_params->obuf[j], void *);
1614 TEST_ASSERT_BUFFERS_ARE_EQUAL(ibuf_data, obuf_data,
1615 ut_params->ibuf[j]->data_len,
1616 "input and output data does not match\n");
1617 TEST_ASSERT_EQUAL(ut_params->ibuf[j]->data_len,
1618 ut_params->obuf[j]->data_len,
1619 "ibuf data_len is not equal to obuf data_len");
1620 TEST_ASSERT_EQUAL(ut_params->ibuf[j]->pkt_len,
1621 ut_params->obuf[j]->pkt_len,
1622 "ibuf pkt_len is not equal to obuf pkt_len");
1624 /* check mbuf ol_flags */
1625 TEST_ASSERT(ut_params->ibuf[j]->ol_flags & PKT_TX_SEC_OFFLOAD,
1626 "ibuf PKT_TX_SEC_OFFLOAD is not set");
1632 test_ipsec_inline_crypto_outb_burst_null_null(int i)
1634 struct ipsec_testsuite_params *ts_params = &testsuite_params;
1635 struct ipsec_unitest_params *ut_params = &unittest_params;
1636 uint16_t num_pkts = test_cfg[i].num_pkts;
1641 /* create rte_ipsec_sa */
1642 rc = create_sa(RTE_SECURITY_ACTION_TYPE_INLINE_CRYPTO,
1643 test_cfg[i].replay_win_sz, test_cfg[i].flags, 0);
1645 RTE_LOG(ERR, USER1, "create_sa failed, cfg %d\n", i);
1649 /* Generate test mbuf data */
1650 for (j = 0; j < num_pkts && rc == 0; j++) {
1651 ut_params->ibuf[j] = setup_test_string(ts_params->mbuf_pool,
1652 null_plain_data, test_cfg[i].pkt_sz, 0);
1653 if (ut_params->ibuf[0] == NULL)
1657 /* Generate test tunneled mbuf data for comparison */
1658 ut_params->obuf[j] = setup_test_string_tunneled(
1659 ts_params->mbuf_pool,
1660 null_plain_data, test_cfg[i].pkt_sz,
1661 OUTBOUND_SPI, j + 1);
1662 if (ut_params->obuf[j] == NULL)
1668 n = rte_ipsec_pkt_process(&ut_params->ss[0], ut_params->ibuf,
1671 rc = inline_outb_burst_null_null_check(ut_params,
1675 "rte_ipsec_pkt_process failed, cfg %d\n",
1681 if (rc == TEST_FAILED)
1682 test_ipsec_dump_buffers(ut_params, i);
1689 test_ipsec_inline_crypto_outb_burst_null_null_wrapper(void)
1693 struct ipsec_unitest_params *ut_params = &unittest_params;
1695 ut_params->ipsec_xform.spi = OUTBOUND_SPI;
1696 ut_params->ipsec_xform.direction = RTE_SECURITY_IPSEC_SA_DIR_EGRESS;
1697 ut_params->ipsec_xform.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP;
1698 ut_params->ipsec_xform.mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL;
1699 ut_params->ipsec_xform.tunnel.type = RTE_SECURITY_IPSEC_TUNNEL_IPV4;
1701 for (i = 0; i < num_cfg && rc == 0; i++) {
1702 ut_params->ipsec_xform.options.esn = test_cfg[i].esn;
1703 rc = test_ipsec_inline_crypto_outb_burst_null_null(i);
1710 test_ipsec_inline_proto_outb_burst_null_null(int i)
1712 struct ipsec_testsuite_params *ts_params = &testsuite_params;
1713 struct ipsec_unitest_params *ut_params = &unittest_params;
1714 uint16_t num_pkts = test_cfg[i].num_pkts;
1719 /* create rte_ipsec_sa */
1720 rc = create_sa(RTE_SECURITY_ACTION_TYPE_INLINE_PROTOCOL,
1721 test_cfg[i].replay_win_sz, test_cfg[i].flags, 0);
1723 RTE_LOG(ERR, USER1, "create_sa failed, cfg %d\n", i);
1727 /* Generate test mbuf data */
1728 for (j = 0; j < num_pkts && rc == 0; j++) {
1729 ut_params->ibuf[j] = setup_test_string(ts_params->mbuf_pool,
1730 null_plain_data, test_cfg[i].pkt_sz, 0);
1731 if (ut_params->ibuf[0] == NULL)
1735 /* Generate test tunneled mbuf data for comparison */
1736 ut_params->obuf[j] = setup_test_string(
1737 ts_params->mbuf_pool,
1738 null_plain_data, test_cfg[i].pkt_sz, 0);
1739 if (ut_params->obuf[j] == NULL)
1745 n = rte_ipsec_pkt_process(&ut_params->ss[0], ut_params->ibuf,
1748 rc = inline_outb_burst_null_null_check(ut_params,
1752 "rte_ipsec_pkt_process failed, cfg %d\n",
1758 if (rc == TEST_FAILED)
1759 test_ipsec_dump_buffers(ut_params, i);
1766 test_ipsec_inline_proto_outb_burst_null_null_wrapper(void)
1770 struct ipsec_unitest_params *ut_params = &unittest_params;
1772 ut_params->ipsec_xform.spi = OUTBOUND_SPI;
1773 ut_params->ipsec_xform.direction = RTE_SECURITY_IPSEC_SA_DIR_EGRESS;
1774 ut_params->ipsec_xform.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP;
1775 ut_params->ipsec_xform.mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL;
1776 ut_params->ipsec_xform.tunnel.type = RTE_SECURITY_IPSEC_TUNNEL_IPV4;
1778 for (i = 0; i < num_cfg && rc == 0; i++) {
1779 ut_params->ipsec_xform.options.esn = test_cfg[i].esn;
1780 rc = test_ipsec_inline_proto_outb_burst_null_null(i);
1787 test_ipsec_lksd_proto_inb_burst_null_null(int i)
1789 struct ipsec_testsuite_params *ts_params = &testsuite_params;
1790 struct ipsec_unitest_params *ut_params = &unittest_params;
1791 uint16_t num_pkts = test_cfg[i].num_pkts;
1795 /* create rte_ipsec_sa */
1796 rc = create_sa(RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,
1797 test_cfg[i].replay_win_sz, test_cfg[i].flags, 0);
1799 RTE_LOG(ERR, USER1, "create_sa failed, cfg %d\n", i);
1803 /* Generate test mbuf data */
1804 for (j = 0; j < num_pkts && rc == 0; j++) {
1805 /* packet with sequence number 0 is invalid */
1806 ut_params->ibuf[j] = setup_test_string(ts_params->mbuf_pool,
1807 null_encrypted_data, test_cfg[i].pkt_sz, 0);
1808 if (ut_params->ibuf[j] == NULL)
1813 if (test_cfg[i].reorder_pkts)
1814 test_ipsec_reorder_inb_pkt_burst(num_pkts);
1815 rc = test_ipsec_crypto_op_alloc(num_pkts);
1819 /* call ipsec library api */
1820 rc = lksd_proto_ipsec(num_pkts);
1822 rc = crypto_inb_burst_null_null_check(ut_params, i,
1825 RTE_LOG(ERR, USER1, "%s failed, cfg %d\n",
1831 if (rc == TEST_FAILED)
1832 test_ipsec_dump_buffers(ut_params, i);
1839 test_ipsec_lksd_proto_inb_burst_null_null_wrapper(void)
1843 struct ipsec_unitest_params *ut_params = &unittest_params;
1845 ut_params->ipsec_xform.spi = INBOUND_SPI;
1846 ut_params->ipsec_xform.direction = RTE_SECURITY_IPSEC_SA_DIR_INGRESS;
1847 ut_params->ipsec_xform.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP;
1848 ut_params->ipsec_xform.mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL;
1849 ut_params->ipsec_xform.tunnel.type = RTE_SECURITY_IPSEC_TUNNEL_IPV4;
1851 for (i = 0; i < num_cfg && rc == 0; i++) {
1852 ut_params->ipsec_xform.options.esn = test_cfg[i].esn;
1853 rc = test_ipsec_lksd_proto_inb_burst_null_null(i);
1860 test_ipsec_lksd_proto_outb_burst_null_null_wrapper(void)
1864 struct ipsec_unitest_params *ut_params = &unittest_params;
1866 ut_params->ipsec_xform.spi = INBOUND_SPI;
1867 ut_params->ipsec_xform.direction = RTE_SECURITY_IPSEC_SA_DIR_EGRESS;
1868 ut_params->ipsec_xform.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP;
1869 ut_params->ipsec_xform.mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL;
1870 ut_params->ipsec_xform.tunnel.type = RTE_SECURITY_IPSEC_TUNNEL_IPV4;
1872 for (i = 0; i < num_cfg && rc == 0; i++) {
1873 ut_params->ipsec_xform.options.esn = test_cfg[i].esn;
1874 rc = test_ipsec_lksd_proto_inb_burst_null_null(i);
1881 replay_inb_null_null_check(struct ipsec_unitest_params *ut_params, int i,
1886 for (j = 0; j < num_pkts; j++) {
1887 /* compare the buffer data */
1888 TEST_ASSERT_BUFFERS_ARE_EQUAL(null_plain_data,
1889 rte_pktmbuf_mtod(ut_params->obuf[j], void *),
1891 "input and output data does not match\n");
1893 TEST_ASSERT_EQUAL(ut_params->obuf[j]->data_len,
1894 ut_params->obuf[j]->pkt_len,
1895 "data_len is not equal to pkt_len");
1902 test_ipsec_replay_inb_inside_null_null(int i)
1904 struct ipsec_testsuite_params *ts_params = &testsuite_params;
1905 struct ipsec_unitest_params *ut_params = &unittest_params;
1908 /* create rte_ipsec_sa*/
1909 rc = create_sa(RTE_SECURITY_ACTION_TYPE_NONE,
1910 test_cfg[i].replay_win_sz, test_cfg[i].flags, 0);
1912 RTE_LOG(ERR, USER1, "create_sa failed, cfg %d\n", i);
1916 /* Generate inbound mbuf data */
1917 ut_params->ibuf[0] = setup_test_string_tunneled(ts_params->mbuf_pool,
1918 null_encrypted_data, test_cfg[i].pkt_sz, INBOUND_SPI, 1);
1919 if (ut_params->ibuf[0] == NULL)
1922 rc = test_ipsec_crypto_op_alloc(1);
1925 /* call ipsec library api */
1926 rc = crypto_ipsec(1);
1928 rc = replay_inb_null_null_check(ut_params, i, 1);
1930 RTE_LOG(ERR, USER1, "crypto_ipsec failed, cfg %d\n",
1936 if ((rc == 0) && (test_cfg[i].replay_win_sz != 0)) {
1937 /* generate packet with seq number inside the replay window */
1938 if (ut_params->ibuf[0]) {
1939 rte_pktmbuf_free(ut_params->ibuf[0]);
1940 ut_params->ibuf[0] = 0;
1943 ut_params->ibuf[0] = setup_test_string_tunneled(
1944 ts_params->mbuf_pool, null_encrypted_data,
1945 test_cfg[i].pkt_sz, INBOUND_SPI,
1946 test_cfg[i].replay_win_sz);
1947 if (ut_params->ibuf[0] == NULL)
1950 rc = test_ipsec_crypto_op_alloc(1);
1953 /* call ipsec library api */
1954 rc = crypto_ipsec(1);
1956 rc = replay_inb_null_null_check(
1959 RTE_LOG(ERR, USER1, "crypto_ipsec failed\n");
1965 if (rc == TEST_FAILED)
1966 test_ipsec_dump_buffers(ut_params, i);
1974 test_ipsec_replay_inb_inside_null_null_wrapper(void)
1978 struct ipsec_unitest_params *ut_params = &unittest_params;
1980 ut_params->ipsec_xform.spi = INBOUND_SPI;
1981 ut_params->ipsec_xform.direction = RTE_SECURITY_IPSEC_SA_DIR_INGRESS;
1982 ut_params->ipsec_xform.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP;
1983 ut_params->ipsec_xform.mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL;
1984 ut_params->ipsec_xform.tunnel.type = RTE_SECURITY_IPSEC_TUNNEL_IPV4;
1986 for (i = 0; i < num_cfg && rc == 0; i++) {
1987 ut_params->ipsec_xform.options.esn = test_cfg[i].esn;
1988 rc = test_ipsec_replay_inb_inside_null_null(i);
1995 test_ipsec_replay_inb_outside_null_null(int i)
1997 struct ipsec_testsuite_params *ts_params = &testsuite_params;
1998 struct ipsec_unitest_params *ut_params = &unittest_params;
2001 /* create rte_ipsec_sa */
2002 rc = create_sa(RTE_SECURITY_ACTION_TYPE_NONE,
2003 test_cfg[i].replay_win_sz, test_cfg[i].flags, 0);
2005 RTE_LOG(ERR, USER1, "create_sa failed, cfg %d\n", i);
2009 /* Generate test mbuf data */
2010 ut_params->ibuf[0] = setup_test_string_tunneled(ts_params->mbuf_pool,
2011 null_encrypted_data, test_cfg[i].pkt_sz, INBOUND_SPI,
2012 test_cfg[i].replay_win_sz + 2);
2013 if (ut_params->ibuf[0] == NULL)
2016 rc = test_ipsec_crypto_op_alloc(1);
2019 /* call ipsec library api */
2020 rc = crypto_ipsec(1);
2022 rc = replay_inb_null_null_check(ut_params, i, 1);
2024 RTE_LOG(ERR, USER1, "crypto_ipsec failed, cfg %d\n",
2030 if ((rc == 0) && (test_cfg[i].replay_win_sz != 0)) {
2031 /* generate packet with seq number outside the replay window */
2032 if (ut_params->ibuf[0]) {
2033 rte_pktmbuf_free(ut_params->ibuf[0]);
2034 ut_params->ibuf[0] = 0;
2036 ut_params->ibuf[0] = setup_test_string_tunneled(
2037 ts_params->mbuf_pool, null_encrypted_data,
2038 test_cfg[i].pkt_sz, INBOUND_SPI, 1);
2039 if (ut_params->ibuf[0] == NULL)
2042 rc = test_ipsec_crypto_op_alloc(1);
2045 /* call ipsec library api */
2046 rc = crypto_ipsec(1);
2048 if (test_cfg[i].esn == 0) {
2050 "packet is not outside the replay window, cfg %d pkt0_seq %u pkt1_seq %u\n",
2052 test_cfg[i].replay_win_sz + 2,
2058 "packet is outside the replay window, cfg %d pkt0_seq %u pkt1_seq %u\n",
2059 i, test_cfg[i].replay_win_sz + 2, 1);
2065 if (rc == TEST_FAILED)
2066 test_ipsec_dump_buffers(ut_params, i);
2074 test_ipsec_replay_inb_outside_null_null_wrapper(void)
2078 struct ipsec_unitest_params *ut_params = &unittest_params;
2080 ut_params->ipsec_xform.spi = INBOUND_SPI;
2081 ut_params->ipsec_xform.direction = RTE_SECURITY_IPSEC_SA_DIR_INGRESS;
2082 ut_params->ipsec_xform.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP;
2083 ut_params->ipsec_xform.mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL;
2084 ut_params->ipsec_xform.tunnel.type = RTE_SECURITY_IPSEC_TUNNEL_IPV4;
2086 for (i = 0; i < num_cfg && rc == 0; i++) {
2087 ut_params->ipsec_xform.options.esn = test_cfg[i].esn;
2088 rc = test_ipsec_replay_inb_outside_null_null(i);
2095 test_ipsec_replay_inb_repeat_null_null(int i)
2097 struct ipsec_testsuite_params *ts_params = &testsuite_params;
2098 struct ipsec_unitest_params *ut_params = &unittest_params;
2101 /* create rte_ipsec_sa */
2102 rc = create_sa(RTE_SECURITY_ACTION_TYPE_NONE,
2103 test_cfg[i].replay_win_sz, test_cfg[i].flags, 0);
2105 RTE_LOG(ERR, USER1, "create_sa failed, cfg %d\n", i);
2109 /* Generate test mbuf data */
2110 ut_params->ibuf[0] = setup_test_string_tunneled(ts_params->mbuf_pool,
2111 null_encrypted_data, test_cfg[i].pkt_sz, INBOUND_SPI, 1);
2112 if (ut_params->ibuf[0] == NULL)
2115 rc = test_ipsec_crypto_op_alloc(1);
2118 /* call ipsec library api */
2119 rc = crypto_ipsec(1);
2121 rc = replay_inb_null_null_check(ut_params, i, 1);
2123 RTE_LOG(ERR, USER1, "crypto_ipsec failed, cfg %d\n",
2129 if ((rc == 0) && (test_cfg[i].replay_win_sz != 0)) {
2131 * generate packet with repeat seq number in the replay
2134 if (ut_params->ibuf[0]) {
2135 rte_pktmbuf_free(ut_params->ibuf[0]);
2136 ut_params->ibuf[0] = 0;
2139 ut_params->ibuf[0] = setup_test_string_tunneled(
2140 ts_params->mbuf_pool, null_encrypted_data,
2141 test_cfg[i].pkt_sz, INBOUND_SPI, 1);
2142 if (ut_params->ibuf[0] == NULL)
2145 rc = test_ipsec_crypto_op_alloc(1);
2148 /* call ipsec library api */
2149 rc = crypto_ipsec(1);
2152 "packet is not repeated in the replay window, cfg %d seq %u\n",
2157 "packet is repeated in the replay window, cfg %d seq %u\n",
2164 if (rc == TEST_FAILED)
2165 test_ipsec_dump_buffers(ut_params, i);
2173 test_ipsec_replay_inb_repeat_null_null_wrapper(void)
2177 struct ipsec_unitest_params *ut_params = &unittest_params;
2179 ut_params->ipsec_xform.spi = INBOUND_SPI;
2180 ut_params->ipsec_xform.direction = RTE_SECURITY_IPSEC_SA_DIR_INGRESS;
2181 ut_params->ipsec_xform.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP;
2182 ut_params->ipsec_xform.mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL;
2183 ut_params->ipsec_xform.tunnel.type = RTE_SECURITY_IPSEC_TUNNEL_IPV4;
2185 for (i = 0; i < num_cfg && rc == 0; i++) {
2186 ut_params->ipsec_xform.options.esn = test_cfg[i].esn;
2187 rc = test_ipsec_replay_inb_repeat_null_null(i);
2194 test_ipsec_replay_inb_inside_burst_null_null(int i)
2196 struct ipsec_testsuite_params *ts_params = &testsuite_params;
2197 struct ipsec_unitest_params *ut_params = &unittest_params;
2198 uint16_t num_pkts = test_cfg[i].num_pkts;
2202 /* create rte_ipsec_sa*/
2203 rc = create_sa(RTE_SECURITY_ACTION_TYPE_NONE,
2204 test_cfg[i].replay_win_sz, test_cfg[i].flags, 0);
2206 RTE_LOG(ERR, USER1, "create_sa failed, cfg %d\n", i);
2210 /* Generate inbound mbuf data */
2211 ut_params->ibuf[0] = setup_test_string_tunneled(ts_params->mbuf_pool,
2212 null_encrypted_data, test_cfg[i].pkt_sz, INBOUND_SPI, 1);
2213 if (ut_params->ibuf[0] == NULL)
2216 rc = test_ipsec_crypto_op_alloc(1);
2219 /* call ipsec library api */
2220 rc = crypto_ipsec(1);
2222 rc = replay_inb_null_null_check(ut_params, i, 1);
2224 RTE_LOG(ERR, USER1, "crypto_ipsec failed, cfg %d\n",
2230 if ((rc == 0) && (test_cfg[i].replay_win_sz != 0)) {
2232 * generate packet(s) with seq number(s) inside the
2235 if (ut_params->ibuf[0]) {
2236 rte_pktmbuf_free(ut_params->ibuf[0]);
2237 ut_params->ibuf[0] = 0;
2240 for (j = 0; j < num_pkts && rc == 0; j++) {
2241 /* packet with sequence number 1 already processed */
2242 ut_params->ibuf[j] = setup_test_string_tunneled(
2243 ts_params->mbuf_pool, null_encrypted_data,
2244 test_cfg[i].pkt_sz, INBOUND_SPI, j + 2);
2245 if (ut_params->ibuf[j] == NULL)
2250 if (test_cfg[i].reorder_pkts)
2251 test_ipsec_reorder_inb_pkt_burst(num_pkts);
2252 rc = test_ipsec_crypto_op_alloc(num_pkts);
2256 /* call ipsec library api */
2257 rc = crypto_ipsec(num_pkts);
2259 rc = replay_inb_null_null_check(
2260 ut_params, i, num_pkts);
2262 RTE_LOG(ERR, USER1, "crypto_ipsec failed\n");
2268 if (rc == TEST_FAILED)
2269 test_ipsec_dump_buffers(ut_params, i);
2277 test_ipsec_replay_inb_inside_burst_null_null_wrapper(void)
2281 struct ipsec_unitest_params *ut_params = &unittest_params;
2283 ut_params->ipsec_xform.spi = INBOUND_SPI;
2284 ut_params->ipsec_xform.direction = RTE_SECURITY_IPSEC_SA_DIR_INGRESS;
2285 ut_params->ipsec_xform.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP;
2286 ut_params->ipsec_xform.mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL;
2287 ut_params->ipsec_xform.tunnel.type = RTE_SECURITY_IPSEC_TUNNEL_IPV4;
2289 for (i = 0; i < num_cfg && rc == 0; i++) {
2290 ut_params->ipsec_xform.options.esn = test_cfg[i].esn;
2291 rc = test_ipsec_replay_inb_inside_burst_null_null(i);
2299 crypto_inb_burst_2sa_null_null_check(struct ipsec_unitest_params *ut_params,
2304 for (j = 0; j < BURST_SIZE; j++) {
2305 ut_params->pkt_index = j;
2307 /* compare the data buffers */
2308 TEST_ASSERT_BUFFERS_ARE_EQUAL(null_plain_data,
2309 rte_pktmbuf_mtod(ut_params->obuf[j], void *),
2311 "input and output data does not match\n");
2312 TEST_ASSERT_EQUAL(ut_params->obuf[j]->data_len,
2313 ut_params->obuf[j]->pkt_len,
2314 "data_len is not equal to pkt_len");
2315 TEST_ASSERT_EQUAL(ut_params->obuf[j]->data_len,
2317 "data_len is not equal to input data");
2324 test_ipsec_crypto_inb_burst_2sa_null_null(int i)
2326 struct ipsec_testsuite_params *ts_params = &testsuite_params;
2327 struct ipsec_unitest_params *ut_params = &unittest_params;
2328 uint16_t num_pkts = test_cfg[i].num_pkts;
2332 if (num_pkts != BURST_SIZE)
2335 /* create rte_ipsec_sa */
2336 rc = create_sa(RTE_SECURITY_ACTION_TYPE_NONE,
2337 test_cfg[i].replay_win_sz, test_cfg[i].flags, 0);
2339 RTE_LOG(ERR, USER1, "create_sa 0 failed, cfg %d\n", i);
2343 /* create second rte_ipsec_sa */
2344 ut_params->ipsec_xform.spi = INBOUND_SPI + 1;
2345 rc = create_sa(RTE_SECURITY_ACTION_TYPE_NONE,
2346 test_cfg[i].replay_win_sz, test_cfg[i].flags, 1);
2348 RTE_LOG(ERR, USER1, "create_sa 1 failed, cfg %d\n", i);
2353 /* Generate test mbuf data */
2354 for (j = 0; j < num_pkts && rc == 0; j++) {
2356 /* packet with sequence number 0 is invalid */
2357 ut_params->ibuf[j] = setup_test_string_tunneled(
2358 ts_params->mbuf_pool, null_encrypted_data,
2359 test_cfg[i].pkt_sz, INBOUND_SPI + r, j + 1);
2360 if (ut_params->ibuf[j] == NULL)
2365 rc = test_ipsec_crypto_op_alloc(num_pkts);
2368 /* call ipsec library api */
2369 rc = crypto_ipsec_2sa();
2371 rc = crypto_inb_burst_2sa_null_null_check(
2374 RTE_LOG(ERR, USER1, "crypto_ipsec failed, cfg %d\n",
2380 if (rc == TEST_FAILED)
2381 test_ipsec_dump_buffers(ut_params, i);
2389 test_ipsec_crypto_inb_burst_2sa_null_null_wrapper(void)
2393 struct ipsec_unitest_params *ut_params = &unittest_params;
2395 ut_params->ipsec_xform.spi = INBOUND_SPI;
2396 ut_params->ipsec_xform.direction = RTE_SECURITY_IPSEC_SA_DIR_INGRESS;
2397 ut_params->ipsec_xform.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP;
2398 ut_params->ipsec_xform.mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL;
2399 ut_params->ipsec_xform.tunnel.type = RTE_SECURITY_IPSEC_TUNNEL_IPV4;
2401 for (i = 0; i < num_cfg && rc == 0; i++) {
2402 ut_params->ipsec_xform.options.esn = test_cfg[i].esn;
2403 rc = test_ipsec_crypto_inb_burst_2sa_null_null(i);
2410 test_ipsec_crypto_inb_burst_2sa_4grp_null_null(int i)
2412 struct ipsec_testsuite_params *ts_params = &testsuite_params;
2413 struct ipsec_unitest_params *ut_params = &unittest_params;
2414 uint16_t num_pkts = test_cfg[i].num_pkts;
2418 if (num_pkts != BURST_SIZE)
2421 /* create rte_ipsec_sa */
2422 rc = create_sa(RTE_SECURITY_ACTION_TYPE_NONE,
2423 test_cfg[i].replay_win_sz, test_cfg[i].flags, 0);
2425 RTE_LOG(ERR, USER1, "create_sa 0 failed, cfg %d\n", i);
2429 /* create second rte_ipsec_sa */
2430 ut_params->ipsec_xform.spi = INBOUND_SPI + 1;
2431 rc = create_sa(RTE_SECURITY_ACTION_TYPE_NONE,
2432 test_cfg[i].replay_win_sz, test_cfg[i].flags, 1);
2434 RTE_LOG(ERR, USER1, "create_sa 1 failed, cfg %d\n", i);
2439 /* Generate test mbuf data */
2440 for (j = 0; j < num_pkts && rc == 0; j++) {
2441 k = crypto_ipsec_4grp(j);
2443 /* packet with sequence number 0 is invalid */
2444 ut_params->ibuf[j] = setup_test_string_tunneled(
2445 ts_params->mbuf_pool, null_encrypted_data,
2446 test_cfg[i].pkt_sz, INBOUND_SPI + k, j + 1);
2447 if (ut_params->ibuf[j] == NULL)
2452 rc = test_ipsec_crypto_op_alloc(num_pkts);
2455 /* call ipsec library api */
2456 rc = crypto_ipsec_2sa_4grp();
2458 rc = crypto_inb_burst_2sa_null_null_check(
2461 RTE_LOG(ERR, USER1, "crypto_ipsec failed, cfg %d\n",
2467 if (rc == TEST_FAILED)
2468 test_ipsec_dump_buffers(ut_params, i);
2476 test_ipsec_crypto_inb_burst_2sa_4grp_null_null_wrapper(void)
2480 struct ipsec_unitest_params *ut_params = &unittest_params;
2482 ut_params->ipsec_xform.spi = INBOUND_SPI;
2483 ut_params->ipsec_xform.direction = RTE_SECURITY_IPSEC_SA_DIR_INGRESS;
2484 ut_params->ipsec_xform.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP;
2485 ut_params->ipsec_xform.mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL;
2486 ut_params->ipsec_xform.tunnel.type = RTE_SECURITY_IPSEC_TUNNEL_IPV4;
2488 for (i = 0; i < num_cfg && rc == 0; i++) {
2489 ut_params->ipsec_xform.options.esn = test_cfg[i].esn;
2490 rc = test_ipsec_crypto_inb_burst_2sa_4grp_null_null(i);
2496 static struct unit_test_suite ipsec_testsuite = {
2497 .suite_name = "IPsec NULL Unit Test Suite",
2498 .setup = testsuite_setup,
2499 .teardown = testsuite_teardown,
2500 .unit_test_cases = {
2501 TEST_CASE_ST(ut_setup, ut_teardown,
2502 test_ipsec_crypto_inb_burst_null_null_wrapper),
2503 TEST_CASE_ST(ut_setup, ut_teardown,
2504 test_ipsec_crypto_outb_burst_null_null_wrapper),
2505 TEST_CASE_ST(ut_setup, ut_teardown,
2506 test_ipsec_inline_crypto_inb_burst_null_null_wrapper),
2507 TEST_CASE_ST(ut_setup, ut_teardown,
2508 test_ipsec_inline_crypto_outb_burst_null_null_wrapper),
2509 TEST_CASE_ST(ut_setup, ut_teardown,
2510 test_ipsec_inline_proto_inb_burst_null_null_wrapper),
2511 TEST_CASE_ST(ut_setup, ut_teardown,
2512 test_ipsec_inline_proto_outb_burst_null_null_wrapper),
2513 TEST_CASE_ST(ut_setup, ut_teardown,
2514 test_ipsec_lksd_proto_inb_burst_null_null_wrapper),
2515 TEST_CASE_ST(ut_setup, ut_teardown,
2516 test_ipsec_lksd_proto_outb_burst_null_null_wrapper),
2517 TEST_CASE_ST(ut_setup, ut_teardown,
2518 test_ipsec_replay_inb_inside_null_null_wrapper),
2519 TEST_CASE_ST(ut_setup, ut_teardown,
2520 test_ipsec_replay_inb_outside_null_null_wrapper),
2521 TEST_CASE_ST(ut_setup, ut_teardown,
2522 test_ipsec_replay_inb_repeat_null_null_wrapper),
2523 TEST_CASE_ST(ut_setup, ut_teardown,
2524 test_ipsec_replay_inb_inside_burst_null_null_wrapper),
2525 TEST_CASE_ST(ut_setup, ut_teardown,
2526 test_ipsec_crypto_inb_burst_2sa_null_null_wrapper),
2527 TEST_CASE_ST(ut_setup, ut_teardown,
2528 test_ipsec_crypto_inb_burst_2sa_4grp_null_null_wrapper),
2529 TEST_CASES_END() /**< NULL terminate unit test array */
2536 return unit_test_suite_runner(&ipsec_testsuite);
2539 REGISTER_TEST_COMMAND(ipsec_autotest, test_ipsec);