test/crypto: add copy and set DSCP cases
[dpdk.git] / app / test / test_cryptodev_security_ipsec.c
index f040630..970d4d4 100644 (file)
@@ -2,11 +2,14 @@
  * Copyright(C) 2021 Marvell.
  */
 
+#ifndef RTE_EXEC_ENV_WINDOWS
+
 #include <rte_common.h>
 #include <rte_cryptodev.h>
 #include <rte_esp.h>
 #include <rte_ip.h>
 #include <rte_security.h>
+#include <rte_tcp.h>
 #include <rte_udp.h>
 
 #include "test.h"
 
 #define IV_LEN_MAX 16
 
-extern struct ipsec_test_data pkt_aes_256_gcm;
+struct crypto_param_comb alg_list[RTE_DIM(aead_list) +
+                                 (RTE_DIM(cipher_list) *
+                                  RTE_DIM(auth_list))];
+
+static bool
+is_valid_ipv4_pkt(const struct rte_ipv4_hdr *pkt)
+{
+       /* The IP version number must be 4 */
+       if (((pkt->version_ihl) >> 4) != 4)
+               return false;
+       /*
+        * The IP header length field must be large enough to hold the
+        * minimum length legal IP datagram (20 bytes = 5 words).
+        */
+       if ((pkt->version_ihl & 0xf) < 5)
+               return false;
+
+       /*
+        * The IP total length field must be large enough to hold the IP
+        * datagram header, whose length is specified in the IP header length
+        * field.
+        */
+       if (rte_cpu_to_be_16(pkt->total_length) < sizeof(struct rte_ipv4_hdr))
+               return false;
+
+       return true;
+}
+
+static bool
+is_valid_ipv6_pkt(const struct rte_ipv6_hdr *pkt)
+{
+       /* The IP version number must be 6 */
+       if ((rte_be_to_cpu_32((pkt->vtc_flow)) >> 28) != 6)
+               return false;
+
+       return true;
+}
+
+void
+test_ipsec_alg_list_populate(void)
+{
+       unsigned long i, j, index = 0;
+
+       for (i = 0; i < RTE_DIM(aead_list); i++) {
+               alg_list[index].param1 = &aead_list[i];
+               alg_list[index].param2 = NULL;
+               index++;
+       }
+
+       for (i = 0; i < RTE_DIM(cipher_list); i++) {
+               for (j = 0; j < RTE_DIM(auth_list); j++) {
+                       alg_list[index].param1 = &cipher_list[i];
+                       alg_list[index].param2 = &auth_list[j];
+                       index++;
+               }
+       }
+}
 
 int
 test_ipsec_sec_caps_verify(struct rte_security_ipsec_xform *ipsec_xform,
@@ -36,6 +95,14 @@ test_ipsec_sec_caps_verify(struct rte_security_ipsec_xform *ipsec_xform,
                return -ENOTSUP;
        }
 
+       if (ipsec_xform->options.udp_ports_verify == 1 &&
+           sec_cap->ipsec.options.udp_ports_verify == 0) {
+               if (!silent)
+                       RTE_LOG(INFO, USER1, "UDP encapsulation ports "
+                               "verification is not supported\n");
+               return -ENOTSUP;
+       }
+
        if (ipsec_xform->options.copy_dscp == 1 &&
            sec_cap->ipsec.options.copy_dscp == 0) {
                if (!silent)
@@ -95,6 +162,22 @@ test_ipsec_sec_caps_verify(struct rte_security_ipsec_xform *ipsec_xform,
                return -ENOTSUP;
        }
 
+       if (ipsec_xform->options.ip_csum_enable == 1 &&
+           sec_cap->ipsec.options.ip_csum_enable == 0) {
+               if (!silent)
+                       RTE_LOG(INFO, USER1,
+                               "Inner IP checksum is not supported\n");
+               return -ENOTSUP;
+       }
+
+       if (ipsec_xform->options.l4_csum_enable == 1 &&
+           sec_cap->ipsec.options.l4_csum_enable == 0) {
+               if (!silent)
+                       RTE_LOG(INFO, USER1,
+                               "Inner L4 checksum is not supported\n");
+               return -ENOTSUP;
+       }
+
        return 0;
 }
 
@@ -125,6 +208,57 @@ test_ipsec_crypto_caps_aead_verify(
        return -ENOTSUP;
 }
 
+int
+test_ipsec_crypto_caps_cipher_verify(
+               const struct rte_security_capability *sec_cap,
+               struct rte_crypto_sym_xform *cipher)
+{
+       const struct rte_cryptodev_symmetric_capability *sym_cap;
+       const struct rte_cryptodev_capabilities *cap;
+       int j = 0;
+
+       while ((cap = &sec_cap->crypto_capabilities[j++])->op !=
+                       RTE_CRYPTO_OP_TYPE_UNDEFINED) {
+               if (cap->op == RTE_CRYPTO_OP_TYPE_SYMMETRIC &&
+                               cap->sym.xform_type == cipher->type &&
+                               cap->sym.cipher.algo == cipher->cipher.algo) {
+                       sym_cap = &cap->sym;
+                       if (rte_cryptodev_sym_capability_check_cipher(sym_cap,
+                                       cipher->cipher.key.length,
+                                       cipher->cipher.iv.length) == 0)
+                               return 0;
+               }
+       }
+
+       return -ENOTSUP;
+}
+
+int
+test_ipsec_crypto_caps_auth_verify(
+               const struct rte_security_capability *sec_cap,
+               struct rte_crypto_sym_xform *auth)
+{
+       const struct rte_cryptodev_symmetric_capability *sym_cap;
+       const struct rte_cryptodev_capabilities *cap;
+       int j = 0;
+
+       while ((cap = &sec_cap->crypto_capabilities[j++])->op !=
+                       RTE_CRYPTO_OP_TYPE_UNDEFINED) {
+               if (cap->op == RTE_CRYPTO_OP_TYPE_SYMMETRIC &&
+                               cap->sym.xform_type == auth->type &&
+                               cap->sym.auth.algo == auth->auth.algo) {
+                       sym_cap = &cap->sym;
+                       if (rte_cryptodev_sym_capability_check_auth(sym_cap,
+                                       auth->auth.key.length,
+                                       auth->auth.digest_length,
+                                       auth->auth.iv.length) == 0)
+                               return 0;
+               }
+       }
+
+       return -ENOTSUP;
+}
+
 void
 test_ipsec_td_in_from_out(const struct ipsec_test_data *td_out,
                          struct ipsec_test_data *td_in)
@@ -152,6 +286,56 @@ test_ipsec_td_in_from_out(const struct ipsec_test_data *td_out,
        }
 }
 
+static bool
+is_ipv4(void *ip)
+{
+       struct rte_ipv4_hdr *ipv4 = ip;
+       uint8_t ip_ver;
+
+       ip_ver = (ipv4->version_ihl & 0xf0) >> RTE_IPV4_IHL_MULTIPLIER;
+       if (ip_ver == IPVERSION)
+               return true;
+       else
+               return false;
+}
+
+static void
+test_ipsec_csum_init(void *ip, bool l3, bool l4)
+{
+       struct rte_ipv4_hdr *ipv4;
+       struct rte_tcp_hdr *tcp;
+       struct rte_udp_hdr *udp;
+       uint8_t next_proto;
+       uint8_t size;
+
+       if (is_ipv4(ip)) {
+               ipv4 = ip;
+               size = sizeof(struct rte_ipv4_hdr);
+               next_proto = ipv4->next_proto_id;
+
+               if (l3)
+                       ipv4->hdr_checksum = 0;
+       } else {
+               size = sizeof(struct rte_ipv6_hdr);
+               next_proto = ((struct rte_ipv6_hdr *)ip)->proto;
+       }
+
+       if (l4) {
+               switch (next_proto) {
+               case IPPROTO_TCP:
+                       tcp = (struct rte_tcp_hdr *)RTE_PTR_ADD(ip, size);
+                       tcp->cksum = 0;
+                       break;
+               case IPPROTO_UDP:
+                       udp = (struct rte_udp_hdr *)RTE_PTR_ADD(ip, size);
+                       udp->dgram_cksum = 0;
+                       break;
+               default:
+                       return;
+               }
+       }
+}
+
 void
 test_ipsec_td_prepare(const struct crypto_param *param1,
                      const struct crypto_param *param2,
@@ -167,18 +351,41 @@ test_ipsec_td_prepare(const struct crypto_param *param1,
 
        for (i = 0; i < nb_td; i++) {
                td = &td_array[i];
-               /* Copy template for packet & key fields */
-               memcpy(td, &pkt_aes_256_gcm, sizeof(*td));
 
-               /* Override fields based on param */
+               /* Prepare fields based on param */
+
+               if (param1->type == RTE_CRYPTO_SYM_XFORM_AEAD) {
+                       /* Copy template for packet & key fields */
+                       if (flags->ipv6)
+                               memcpy(td, &pkt_aes_256_gcm_v6, sizeof(*td));
+                       else
+                               memcpy(td, &pkt_aes_256_gcm, sizeof(*td));
 
-               if (param1->type == RTE_CRYPTO_SYM_XFORM_AEAD)
                        td->aead = true;
-               else
+                       td->xform.aead.aead.algo = param1->alg.aead;
+                       td->xform.aead.aead.key.length = param1->key_length;
+               } else {
+                       /* Copy template for packet & key fields */
+                       if (flags->ipv6)
+                               memcpy(td, &pkt_aes_128_cbc_hmac_sha256_v6,
+                                       sizeof(*td));
+                       else
+                               memcpy(td, &pkt_aes_128_cbc_hmac_sha256,
+                                       sizeof(*td));
+
                        td->aead = false;
+                       td->xform.chain.cipher.cipher.algo = param1->alg.cipher;
+                       td->xform.chain.cipher.cipher.key.length =
+                                       param1->key_length;
+                       td->xform.chain.cipher.cipher.iv.length =
+                                       param1->iv_length;
+                       td->xform.chain.auth.auth.algo = param2->alg.auth;
+                       td->xform.chain.auth.auth.key.length =
+                                       param2->key_length;
+                       td->xform.chain.auth.auth.digest_length =
+                                       param2->digest_length;
 
-               td->xform.aead.aead.algo = param1->alg.aead;
-               td->xform.aead.aead.key.length = param1->key_length;
+               }
 
                if (flags->iv_gen)
                        td->ipsec_xform.options.iv_gen_disable = 0;
@@ -186,9 +393,50 @@ test_ipsec_td_prepare(const struct crypto_param *param1,
                if (flags->sa_expiry_pkts_soft)
                        td->ipsec_xform.life.packets_soft_limit =
                                        IPSEC_TEST_PACKETS_MAX - 1;
-       }
 
-       RTE_SET_USED(param2);
+               if (flags->ip_csum) {
+                       td->ipsec_xform.options.ip_csum_enable = 1;
+                       test_ipsec_csum_init(&td->input_text.data, true, false);
+               }
+
+               if (flags->l4_csum) {
+                       td->ipsec_xform.options.l4_csum_enable = 1;
+                       test_ipsec_csum_init(&td->input_text.data, false, true);
+               }
+
+               if (flags->transport) {
+                       td->ipsec_xform.mode =
+                                       RTE_SECURITY_IPSEC_SA_MODE_TRANSPORT;
+               } else {
+                       td->ipsec_xform.mode =
+                                       RTE_SECURITY_IPSEC_SA_MODE_TUNNEL;
+
+                       if (flags->tunnel_ipv6)
+                               td->ipsec_xform.tunnel.type =
+                                               RTE_SECURITY_IPSEC_TUNNEL_IPV6;
+                       else
+                               td->ipsec_xform.tunnel.type =
+                                               RTE_SECURITY_IPSEC_TUNNEL_IPV4;
+               }
+
+               if (flags->stats_success)
+                       td->ipsec_xform.options.stats = 1;
+
+               if (flags->fragment) {
+                       struct rte_ipv4_hdr *ip;
+                       ip = (struct rte_ipv4_hdr *)&td->input_text.data;
+                       ip->fragment_offset = 4;
+                       ip->hdr_checksum = rte_ipv4_cksum(ip);
+               }
+
+               if (flags->df == TEST_IPSEC_COPY_DF_INNER_0 ||
+                   flags->df == TEST_IPSEC_COPY_DF_INNER_1)
+                       td->ipsec_xform.options.copy_df = 1;
+
+               if (flags->dscp == TEST_IPSEC_COPY_DSCP_INNER_0 ||
+                   flags->dscp == TEST_IPSEC_COPY_DSCP_INNER_1)
+                       td->ipsec_xform.options.copy_dscp = 1;
+       }
 }
 
 void
@@ -216,9 +464,18 @@ test_ipsec_td_update(struct ipsec_test_data td_inb[],
                if (flags->udp_encap)
                        td_inb[i].ipsec_xform.options.udp_encap = 1;
 
+               if (flags->udp_ports_verify)
+                       td_inb[i].ipsec_xform.options.udp_ports_verify = 1;
+
                td_inb[i].ipsec_xform.options.tunnel_hdr_verify =
                        flags->tunnel_hdr_verify;
 
+               if (flags->ip_csum)
+                       td_inb[i].ipsec_xform.options.ip_csum_enable = 1;
+
+               if (flags->l4_csum)
+                       td_inb[i].ipsec_xform.options.l4_csum_enable = 1;
+
                /* Clear outbound specific flags */
                td_inb[i].ipsec_xform.options.iv_gen_disable = 0;
        }
@@ -228,12 +485,21 @@ void
 test_ipsec_display_alg(const struct crypto_param *param1,
                       const struct crypto_param *param2)
 {
-       if (param1->type == RTE_CRYPTO_SYM_XFORM_AEAD)
-               printf("\t%s [%d]\n",
+       if (param1->type == RTE_CRYPTO_SYM_XFORM_AEAD) {
+               printf("\t%s [%d]",
                       rte_crypto_aead_algorithm_strings[param1->alg.aead],
-                      param1->key_length);
-
-       RTE_SET_USED(param2);
+                      param1->key_length * 8);
+       } else {
+               printf("\t%s",
+                      rte_crypto_cipher_algorithm_strings[param1->alg.cipher]);
+               if (param1->alg.cipher != RTE_CRYPTO_CIPHER_NULL)
+                       printf(" [%d]", param1->key_length * 8);
+               printf(" %s",
+                      rte_crypto_auth_algorithm_strings[param2->alg.auth]);
+               if (param2->alg.auth != RTE_CRYPTO_AUTH_NULL)
+                       printf(" [%dB ICV]", param2->digest_length);
+       }
+       printf("\n");
 }
 
 static int
@@ -294,12 +560,97 @@ test_ipsec_iv_verify_push(struct rte_mbuf *m, const struct ipsec_test_data *td)
        return TEST_SUCCESS;
 }
 
+static int
+test_ipsec_l3_csum_verify(struct rte_mbuf *m)
+{
+       uint16_t actual_cksum, expected_cksum;
+       struct rte_ipv4_hdr *ip;
+
+       ip = rte_pktmbuf_mtod(m, struct rte_ipv4_hdr *);
+
+       if (!is_ipv4((void *)ip))
+               return TEST_SKIPPED;
+
+       actual_cksum = ip->hdr_checksum;
+
+       ip->hdr_checksum = 0;
+
+       expected_cksum = rte_ipv4_cksum(ip);
+
+       if (actual_cksum != expected_cksum)
+               return TEST_FAILED;
+
+       return TEST_SUCCESS;
+}
+
+static int
+test_ipsec_l4_csum_verify(struct rte_mbuf *m)
+{
+       uint16_t actual_cksum = 0, expected_cksum = 0;
+       struct rte_ipv4_hdr *ipv4;
+       struct rte_ipv6_hdr *ipv6;
+       struct rte_tcp_hdr *tcp;
+       struct rte_udp_hdr *udp;
+       void *ip, *l4;
+
+       ip = rte_pktmbuf_mtod(m, void *);
+
+       if (is_ipv4(ip)) {
+               ipv4 = ip;
+               l4 = RTE_PTR_ADD(ipv4, sizeof(struct rte_ipv4_hdr));
+
+               switch (ipv4->next_proto_id) {
+               case IPPROTO_TCP:
+                       tcp = (struct rte_tcp_hdr *)l4;
+                       actual_cksum = tcp->cksum;
+                       tcp->cksum = 0;
+                       expected_cksum = rte_ipv4_udptcp_cksum(ipv4, l4);
+                       break;
+               case IPPROTO_UDP:
+                       udp = (struct rte_udp_hdr *)l4;
+                       actual_cksum = udp->dgram_cksum;
+                       udp->dgram_cksum = 0;
+                       expected_cksum = rte_ipv4_udptcp_cksum(ipv4, l4);
+                       break;
+               default:
+                       break;
+               }
+       } else {
+               ipv6 = ip;
+               l4 = RTE_PTR_ADD(ipv6, sizeof(struct rte_ipv6_hdr));
+
+               switch (ipv6->proto) {
+               case IPPROTO_TCP:
+                       tcp = (struct rte_tcp_hdr *)l4;
+                       actual_cksum = tcp->cksum;
+                       tcp->cksum = 0;
+                       expected_cksum = rte_ipv6_udptcp_cksum(ipv6, l4);
+                       break;
+               case IPPROTO_UDP:
+                       udp = (struct rte_udp_hdr *)l4;
+                       actual_cksum = udp->dgram_cksum;
+                       udp->dgram_cksum = 0;
+                       expected_cksum = rte_ipv6_udptcp_cksum(ipv6, l4);
+                       break;
+               default:
+                       break;
+               }
+       }
+
+       if (actual_cksum != expected_cksum)
+               return TEST_FAILED;
+
+       return TEST_SUCCESS;
+}
+
 static int
 test_ipsec_td_verify(struct rte_mbuf *m, const struct ipsec_test_data *td,
                     bool silent, const struct ipsec_test_flags *flags)
 {
        uint8_t *output_text = rte_pktmbuf_mtod(m, uint8_t *);
        uint32_t skip, len = rte_pktmbuf_pkt_len(m);
+       uint8_t td_output_text[4096];
+       int ret;
 
        /* For tests with status as error for test success, skip verification */
        if (td->ipsec_xform.direction == RTE_SECURITY_IPSEC_SA_DIR_INGRESS &&
@@ -338,20 +689,62 @@ test_ipsec_td_verify(struct rte_mbuf *m, const struct ipsec_test_data *td,
                return TEST_FAILED;
        }
 
+       if ((td->ipsec_xform.direction == RTE_SECURITY_IPSEC_SA_DIR_EGRESS) &&
+                               flags->fragment) {
+               const struct rte_ipv4_hdr *iph4;
+               iph4 = (const struct rte_ipv4_hdr *)output_text;
+               if (iph4->fragment_offset) {
+                       printf("Output packet is fragmented");
+                       return TEST_FAILED;
+               }
+       }
+
        skip = test_ipsec_tunnel_hdr_len_get(td);
 
        len -= skip;
        output_text += skip;
 
-       if (memcmp(output_text, td->output_text.data + skip, len)) {
+       if ((td->ipsec_xform.direction == RTE_SECURITY_IPSEC_SA_DIR_INGRESS) &&
+                               flags->ip_csum) {
+               if (m->ol_flags & RTE_MBUF_F_RX_IP_CKSUM_GOOD)
+                       ret = test_ipsec_l3_csum_verify(m);
+               else
+                       ret = TEST_FAILED;
+
+               if (ret == TEST_FAILED)
+                       printf("Inner IP checksum test failed\n");
+
+               return ret;
+       }
+
+       if ((td->ipsec_xform.direction == RTE_SECURITY_IPSEC_SA_DIR_INGRESS) &&
+                               flags->l4_csum) {
+               if (m->ol_flags & RTE_MBUF_F_RX_L4_CKSUM_GOOD)
+                       ret = test_ipsec_l4_csum_verify(m);
+               else
+                       ret = TEST_FAILED;
+
+               if (ret == TEST_FAILED)
+                       printf("Inner L4 checksum test failed\n");
+
+               return ret;
+       }
+
+       memcpy(td_output_text, td->output_text.data + skip, len);
+
+       if (test_ipsec_pkt_update(td_output_text, flags)) {
+               printf("Could not update expected vector");
+               return TEST_FAILED;
+       }
+
+       if (memcmp(output_text, td_output_text, len)) {
                if (silent)
                        return TEST_FAILED;
 
                printf("TestCase %s line %d: %s\n", __func__, __LINE__,
                        "output text not as expected\n");
 
-               rte_hexdump(stdout, "expected", td->output_text.data + skip,
-                           len);
+               rte_hexdump(stdout, "expected", td_output_text, len);
                rte_hexdump(stdout, "actual", output_text, len);
                return TEST_FAILED;
        }
@@ -374,25 +767,140 @@ test_ipsec_res_d_prepare(struct rte_mbuf *m, const struct ipsec_test_data *td,
        if (res_d->aead) {
                res_d->xform.aead.aead.op = RTE_CRYPTO_AEAD_OP_DECRYPT;
        } else {
-               printf("Only AEAD supported\n");
-               return TEST_SKIPPED;
+               res_d->xform.chain.cipher.cipher.op =
+                               RTE_CRYPTO_CIPHER_OP_DECRYPT;
+               res_d->xform.chain.auth.auth.op = RTE_CRYPTO_AUTH_OP_VERIFY;
        }
 
        return TEST_SUCCESS;
 }
 
+static int
+test_ipsec_iph4_hdr_validate(const struct rte_ipv4_hdr *iph4,
+                            const struct ipsec_test_flags *flags)
+{
+       uint8_t tos, dscp;
+       uint16_t f_off;
+
+       if (!is_valid_ipv4_pkt(iph4)) {
+               printf("Tunnel outer header is not IPv4\n");
+               return -1;
+       }
+
+       f_off = rte_be_to_cpu_16(iph4->fragment_offset);
+       if (flags->df == TEST_IPSEC_COPY_DF_INNER_1 ||
+           flags->df == TEST_IPSEC_SET_DF_1_INNER_0) {
+               if (!(f_off & RTE_IPV4_HDR_DF_FLAG)) {
+                       printf("DF bit is not set\n");
+                       return -1;
+               }
+       } else {
+               if (f_off & RTE_IPV4_HDR_DF_FLAG) {
+                       printf("DF bit is set\n");
+                       return -1;
+               }
+       }
+
+       tos = iph4->type_of_service;
+       dscp = (tos & RTE_IPV4_HDR_DSCP_MASK) >> 2;
+
+       if (flags->dscp == TEST_IPSEC_COPY_DSCP_INNER_1 ||
+           flags->dscp == TEST_IPSEC_SET_DSCP_1_INNER_0) {
+               if (dscp != TEST_IPSEC_DSCP_VAL) {
+                       printf("DSCP value is not matching [exp: %x, actual: %x]\n",
+                              TEST_IPSEC_DSCP_VAL, dscp);
+                       return -1;
+               }
+       } else {
+               if (dscp != 0) {
+                       printf("DSCP value is set [exp: 0, actual: %x]\n",
+                              dscp);
+                       return -1;
+               }
+       }
+
+       return 0;
+}
+
+static int
+test_ipsec_iph6_hdr_validate(const struct rte_ipv6_hdr *iph6,
+                            const struct ipsec_test_flags *flags)
+{
+       uint32_t vtc_flow;
+       uint8_t dscp;
+
+       if (!is_valid_ipv6_pkt(iph6)) {
+               printf("Tunnel outer header is not IPv6\n");
+               return -1;
+       }
+
+       vtc_flow = rte_be_to_cpu_32(iph6->vtc_flow);
+       dscp = (vtc_flow & RTE_IPV6_HDR_DSCP_MASK) >>
+              (RTE_IPV6_HDR_TC_SHIFT + 2);
+
+       if (flags->dscp == TEST_IPSEC_COPY_DSCP_INNER_1 ||
+           flags->dscp == TEST_IPSEC_SET_DSCP_1_INNER_0) {
+               if (dscp != TEST_IPSEC_DSCP_VAL) {
+                       printf("DSCP value is not matching [exp: %x, actual: %x]\n",
+                              TEST_IPSEC_DSCP_VAL, dscp);
+                       return -1;
+               }
+       } else {
+               if (dscp != 0) {
+                       printf("DSCP value is set [exp: 0, actual: %x]\n",
+                              dscp);
+                       return -1;
+               }
+       }
+
+       return 0;
+}
+
 int
 test_ipsec_post_process(struct rte_mbuf *m, const struct ipsec_test_data *td,
                        struct ipsec_test_data *res_d, bool silent,
                        const struct ipsec_test_flags *flags)
 {
+       uint8_t *output_text = rte_pktmbuf_mtod(m, uint8_t *);
        int ret;
 
-       if (flags->iv_gen &&
-           td->ipsec_xform.direction == RTE_SECURITY_IPSEC_SA_DIR_EGRESS) {
-               ret = test_ipsec_iv_verify_push(m, td);
-               if (ret != TEST_SUCCESS)
-                       return ret;
+       if (td->ipsec_xform.direction == RTE_SECURITY_IPSEC_SA_DIR_EGRESS) {
+               const struct rte_ipv4_hdr *iph4;
+               const struct rte_ipv6_hdr *iph6;
+
+               if (flags->iv_gen) {
+                       ret = test_ipsec_iv_verify_push(m, td);
+                       if (ret != TEST_SUCCESS)
+                               return ret;
+               }
+
+               iph4 = (const struct rte_ipv4_hdr *)output_text;
+
+               if (td->ipsec_xform.mode ==
+                               RTE_SECURITY_IPSEC_SA_MODE_TRANSPORT) {
+                       if (flags->ipv6) {
+                               iph6 = (const struct rte_ipv6_hdr *)output_text;
+                               if (is_valid_ipv6_pkt(iph6) == false) {
+                                       printf("Transport packet is not IPv6\n");
+                                       return TEST_FAILED;
+                               }
+                       } else {
+                               if (is_valid_ipv4_pkt(iph4) == false) {
+                                       printf("Transport packet is not IPv4\n");
+                                       return TEST_FAILED;
+                               }
+                       }
+               } else {
+                       if (td->ipsec_xform.tunnel.type ==
+                                       RTE_SECURITY_IPSEC_TUNNEL_IPV4) {
+                               if (test_ipsec_iph4_hdr_validate(iph4, flags))
+                                       return TEST_FAILED;
+                       } else {
+                               iph6 = (const struct rte_ipv6_hdr *)output_text;
+                               if (test_ipsec_iph6_hdr_validate(iph6, flags))
+                                       return TEST_FAILED;
+                       }
+               }
        }
 
        /*
@@ -466,3 +974,107 @@ test_ipsec_status_check(struct rte_crypto_op *op,
 
        return ret;
 }
+
+int
+test_ipsec_stats_verify(struct rte_security_ctx *ctx,
+                       struct rte_security_session *sess,
+                       const struct ipsec_test_flags *flags,
+                       enum rte_security_ipsec_sa_direction dir)
+{
+       struct rte_security_stats stats = {0};
+       int ret = TEST_SUCCESS;
+
+       if (flags->stats_success) {
+               if (rte_security_session_stats_get(ctx, sess, &stats) < 0)
+                       return TEST_FAILED;
+
+               if (dir == RTE_SECURITY_IPSEC_SA_DIR_EGRESS) {
+                       if (stats.ipsec.opackets != 1 ||
+                           stats.ipsec.oerrors != 0)
+                               ret = TEST_FAILED;
+               } else {
+                       if (stats.ipsec.ipackets != 1 ||
+                           stats.ipsec.ierrors != 0)
+                               ret = TEST_FAILED;
+               }
+       }
+
+       return ret;
+}
+
+int
+test_ipsec_pkt_update(uint8_t *pkt, const struct ipsec_test_flags *flags)
+{
+       struct rte_ipv4_hdr *iph4;
+       struct rte_ipv6_hdr *iph6;
+       bool cksum_dirty = false;
+
+       iph4 = (struct rte_ipv4_hdr *)pkt;
+
+       if (flags->df == TEST_IPSEC_COPY_DF_INNER_1 ||
+           flags->df == TEST_IPSEC_SET_DF_0_INNER_1 ||
+           flags->df == TEST_IPSEC_COPY_DF_INNER_0 ||
+           flags->df == TEST_IPSEC_SET_DF_1_INNER_0) {
+               uint16_t frag_off;
+
+               if (!is_ipv4(iph4)) {
+                       printf("Invalid packet type\n");
+                       return -1;
+               }
+
+               frag_off = rte_be_to_cpu_16(iph4->fragment_offset);
+
+               if (flags->df == TEST_IPSEC_COPY_DF_INNER_1 ||
+                   flags->df == TEST_IPSEC_SET_DF_0_INNER_1)
+                       frag_off |= RTE_IPV4_HDR_DF_FLAG;
+               else
+                       frag_off &= ~RTE_IPV4_HDR_DF_FLAG;
+
+               iph4->fragment_offset = rte_cpu_to_be_16(frag_off);
+               cksum_dirty = true;
+       }
+
+       if (flags->dscp == TEST_IPSEC_COPY_DSCP_INNER_1 ||
+           flags->dscp == TEST_IPSEC_SET_DSCP_0_INNER_1 ||
+           flags->dscp == TEST_IPSEC_COPY_DSCP_INNER_0 ||
+           flags->dscp == TEST_IPSEC_SET_DSCP_1_INNER_0) {
+
+               if (is_ipv4(iph4)) {
+                       uint8_t tos;
+
+                       tos = iph4->type_of_service;
+                       if (flags->dscp == TEST_IPSEC_COPY_DSCP_INNER_1 ||
+                           flags->dscp == TEST_IPSEC_SET_DSCP_0_INNER_1)
+                               tos |= (RTE_IPV4_HDR_DSCP_MASK &
+                                       (TEST_IPSEC_DSCP_VAL << 2));
+                       else
+                               tos &= ~RTE_IPV4_HDR_DSCP_MASK;
+
+                       iph4->type_of_service = tos;
+                       cksum_dirty = true;
+               } else {
+                       uint32_t vtc_flow;
+
+                       iph6 = (struct rte_ipv6_hdr *)pkt;
+
+                       vtc_flow = rte_be_to_cpu_32(iph6->vtc_flow);
+                       if (flags->dscp == TEST_IPSEC_COPY_DSCP_INNER_1 ||
+                           flags->dscp == TEST_IPSEC_SET_DSCP_0_INNER_1)
+                               vtc_flow |= (RTE_IPV6_HDR_DSCP_MASK &
+                                            (TEST_IPSEC_DSCP_VAL << (RTE_IPV6_HDR_TC_SHIFT + 2)));
+                       else
+                               vtc_flow &= ~RTE_IPV6_HDR_DSCP_MASK;
+
+                       iph6->vtc_flow = rte_cpu_to_be_32(vtc_flow);
+               }
+       }
+
+       if (cksum_dirty && is_ipv4(iph4)) {
+               iph4->hdr_checksum = 0;
+               iph4->hdr_checksum = rte_ipv4_cksum(iph4);
+       }
+
+       return 0;
+}
+
+#endif /* !RTE_EXEC_ENV_WINDOWS */