From b7986bde8e2159b75b45ff92579d9ba19bda4c1b Mon Sep 17 00:00:00 2001 From: Tejasree Kondoj Date: Mon, 6 Dec 2021 16:37:53 +0530 Subject: [PATCH] test/crypto: add IPsec fragmented packet known vectors Added fragmented plain packet known vector test case in IPsec outbound. The test case sends a fragmented packet and ensures that the IPsec packet generated has correct fragmentation fields (ie, the IPsec packet is not fragmented) by comparing against the known vector. Signed-off-by: Tejasree Kondoj Acked-by: Akhil Goyal --- app/test/test_cryptodev.c | 22 ++++ app/test/test_cryptodev_security_ipsec.c | 10 ++ app/test/test_cryptodev_security_ipsec.h | 1 + ...st_cryptodev_security_ipsec_test_vectors.h | 104 ++++++++++++++++++ 4 files changed, 137 insertions(+) diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c index 7f121dc645..c108eb52e7 100644 --- a/app/test/test_cryptodev.c +++ b/app/test/test_cryptodev.c @@ -9382,6 +9382,23 @@ test_ipsec_proto_known_vec_inb(const void *test_data) return test_ipsec_proto_process(&td_inb, NULL, 1, false, &flags); } +static int +test_ipsec_proto_known_vec_fragmented(const void *test_data) +{ + struct ipsec_test_data td_outb; + struct ipsec_test_flags flags; + + memset(&flags, 0, sizeof(flags)); + flags.fragment = true; + + memcpy(&td_outb, test_data, sizeof(td_outb)); + + /* Disable IV gen to be able to test with known vectors */ + td_outb.ipsec_xform.options.iv_gen_disable = 1; + + return test_ipsec_proto_process(&td_outb, NULL, 1, false, &flags); +} + static int test_ipsec_proto_all(const struct ipsec_test_flags *flags) { @@ -14513,6 +14530,11 @@ static struct unit_test_suite ipsec_proto_testsuite = { ut_setup_security, ut_teardown, test_ipsec_proto_known_vec, &pkt_aes_128_cbc_hmac_sha256_v6), + TEST_CASE_NAMED_WITH_DATA( + "Outbound fragmented packet", + ut_setup_security, ut_teardown, + test_ipsec_proto_known_vec_fragmented, + &pkt_aes_128_gcm_frag), TEST_CASE_NAMED_WITH_DATA( "Inbound known vector (ESP tunnel mode IPv4 AES-GCM 128)", ut_setup_security, ut_teardown, diff --git a/app/test/test_cryptodev_security_ipsec.c b/app/test/test_cryptodev_security_ipsec.c index 12031d3b2b..ccce63f0ad 100644 --- a/app/test/test_cryptodev_security_ipsec.c +++ b/app/test/test_cryptodev_security_ipsec.c @@ -659,6 +659,16 @@ test_ipsec_td_verify(struct rte_mbuf *m, const struct ipsec_test_data *td, return TEST_FAILED; } + if ((td->ipsec_xform.direction == RTE_SECURITY_IPSEC_SA_DIR_EGRESS) && + flags->fragment) { + const struct rte_ipv4_hdr *iph4; + iph4 = (const struct rte_ipv4_hdr *)output_text; + if (iph4->fragment_offset) { + printf("Output packet is fragmented"); + return TEST_FAILED; + } + } + skip = test_ipsec_tunnel_hdr_len_get(td); len -= skip; diff --git a/app/test/test_cryptodev_security_ipsec.h b/app/test/test_cryptodev_security_ipsec.h index d74eee72c8..884a79537f 100644 --- a/app/test/test_cryptodev_security_ipsec.h +++ b/app/test/test_cryptodev_security_ipsec.h @@ -63,6 +63,7 @@ struct ipsec_test_flags { bool l4_csum; bool ipv6; bool tunnel_ipv6; + bool fragment; }; struct crypto_param { diff --git a/app/test/test_cryptodev_security_ipsec_test_vectors.h b/app/test/test_cryptodev_security_ipsec_test_vectors.h index b8661f7571..b6d48adcaa 100644 --- a/app/test/test_cryptodev_security_ipsec_test_vectors.h +++ b/app/test/test_cryptodev_security_ipsec_test_vectors.h @@ -958,4 +958,108 @@ struct ipsec_test_data pkt_aes_128_cbc_hmac_sha256_v6 = { }, }; +struct ipsec_test_data pkt_aes_128_gcm_frag = { + .key = { + .data = { + 0xde, 0xad, 0xbe, 0xef, 0xde, 0xad, 0xbe, 0xef, + 0xde, 0xad, 0xbe, 0xef, 0xde, 0xad, 0xbe, 0xef, + }, + }, + .input_text = { + .data = { + 0x45, 0x00, 0x00, 0x6e, 0x00, 0x01, 0x00, 0x17, + 0x40, 0x06, 0xed, 0x48, 0xc6, 0x12, 0x00, 0x00, + 0xc6, 0x12, 0x01, 0x05, 0x00, 0x14, 0x00, 0x50, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x50, 0x00, 0x00, 0x00, 0x55, 0x05, 0x00, 0x00, + 0x00, 0x01, 0x02, 0x03, 0xf2, 0xf6, 0xe9, 0x21, + 0xf9, 0xf2, 0xf6, 0xe9, 0x21, 0xf9, 0xf2, 0xf6, + 0xe9, 0x21, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + }, + .len = 110, + }, + .output_text = { + .data = { + 0x45, 0x00, 0x00, 0xa4, 0x00, 0x01, 0x00, 0x00, + 0x40, 0x32, 0xf6, 0x0c, 0xc0, 0xa8, 0x01, 0x70, + 0xc0, 0xa8, 0x01, 0x5a, 0x00, 0x00, 0x00, 0x34, + 0x00, 0x00, 0x00, 0x01, 0x45, 0xad, 0xfe, 0x23, + 0x78, 0x56, 0x12, 0x00, 0x49, 0x26, 0xac, 0x4e, + 0x8d, 0xf3, 0x74, 0x26, 0x18, 0x3f, 0x65, 0x94, + 0x73, 0x2e, 0xe4, 0xcf, 0x84, 0x6d, 0x03, 0x8a, + 0x4c, 0xdd, 0x2d, 0xef, 0xcd, 0x9f, 0x84, 0x76, + 0x93, 0xe1, 0xee, 0x21, 0x92, 0x8b, 0xf7, 0x7a, + 0xb1, 0x6a, 0x7f, 0xd6, 0x10, 0x66, 0xdd, 0xa1, + 0x8b, 0x17, 0x56, 0x99, 0x9a, 0x40, 0xd0, 0x6b, + 0x2d, 0xe0, 0x55, 0x40, 0x2f, 0xb8, 0x38, 0xe3, + 0x08, 0x46, 0xe2, 0x69, 0xc9, 0xa1, 0x85, 0x9d, + 0x7b, 0xec, 0x33, 0x2a, 0x2d, 0x1d, 0x1f, 0x1a, + 0x9e, 0xf0, 0x1e, 0xc3, 0x33, 0x64, 0x35, 0x82, + 0xbb, 0xb5, 0x7a, 0x91, 0x2e, 0x8d, 0xd5, 0x5b, + 0x3a, 0xbe, 0x95, 0x94, 0xba, 0x40, 0x73, 0x4e, + 0xa4, 0x15, 0xe4, 0x4a, 0xf9, 0x14, 0x2c, 0x4f, + 0x63, 0x2e, 0x23, 0x6e, 0xeb, 0x06, 0xe7, 0x52, + 0xe1, 0xc7, 0x91, 0x7f, 0x19, 0xc0, 0x4a, 0xd2, + 0xd5, 0x3e, 0x84, 0xa8, + }, + .len = 164, + }, + .salt = { + .data = { + 0xde, 0xad, 0xbe, 0xef, + }, + .len = 4, + }, + + .iv = { + .data = { + 0x45, 0xad, 0xfe, 0x23, 0x78, 0x56, 0x12, 0x00, + }, + }, + + .ipsec_xform = { + .spi = 52, + .options.esn = 0, + .options.udp_encap = 0, + .options.copy_dscp = 0, + .options.copy_flabel = 0, + .options.copy_df = 0, + .options.dec_ttl = 0, + .options.ecn = 0, + .options.stats = 0, + .options.tunnel_hdr_verify = 0, + .options.ip_csum_enable = 0, + .options.l4_csum_enable = 0, + .direction = RTE_SECURITY_IPSEC_SA_DIR_EGRESS, + .proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP, + .mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL, + .tunnel.type = RTE_SECURITY_IPSEC_TUNNEL_IPV4, + .replay_win_sz = 0, + }, + + .aead = true, + + .xform = { + .aead = { + .next = NULL, + .type = RTE_CRYPTO_SYM_XFORM_AEAD, + .aead = { + .op = RTE_CRYPTO_AEAD_OP_ENCRYPT, + .algo = RTE_CRYPTO_AEAD_AES_GCM, + .key.length = 16, + .iv.length = 12, + .iv.offset = IV_OFFSET, + .digest_length = 16, + .aad_length = 12, + }, + }, + }, +}; + #endif /* TEST_CRYPTODEV_SECURITY_IPSEC_TEST_VECTORS_H_ */ -- 2.39.5