On 12/14/2018 10:10 PM, Konstantin Ananyev wrote: > Changes to make ipsec-secgw to utilize librte_ipsec library. > That patch provides: > - changes in the related data structures. > - changes in the initialization code. > - new command-line parameters to enable librte_ipsec codepath > and related features. > > Note that right now by default current (non-librte_ipsec) code-path will > be used. User has to run application with new command-line option ('-l') > to enable new codepath. > The main reason for that: > - current librte_ipsec doesn't support all ipsec algorithms > and features that the app does. > - allow users to run both versions in parallel for some time > to figure out any functional or performance degradation with the > new code. > > It is planned to deprecate and remove non-librte_ipsec code path > in future releases. > > Signed-off-by: Mohammad Abdul Awal <mohammad.abdul.a...@intel.com> > Signed-off-by: Bernard Iremonger <bernard.iremon...@intel.com> > Signed-off-by: Konstantin Ananyev <konstantin.anan...@intel.com> > Acked-by: Radu Nicolau <radu.nico...@intel.com> > --- > examples/ipsec-secgw/ipsec-secgw.c | 50 ++++++- > examples/ipsec-secgw/ipsec.h | 24 ++++ > examples/ipsec-secgw/meson.build | 2 +- > examples/ipsec-secgw/sa.c | 221 ++++++++++++++++++++++++++++- > examples/ipsec-secgw/sp4.c | 25 ++++ > examples/ipsec-secgw/sp6.c | 25 ++++ > 6 files changed, 341 insertions(+), 6 deletions(-) > > diff --git a/examples/ipsec-secgw/ipsec-secgw.c > b/examples/ipsec-secgw/ipsec-secgw.c > index d1da2d5ce..48baa5001 100644 > --- a/examples/ipsec-secgw/ipsec-secgw.c > +++ b/examples/ipsec-secgw/ipsec-secgw.c > @@ -155,6 +155,9 @@ static uint32_t single_sa; > static uint32_t single_sa_idx; > static uint32_t frame_size; > > +/* application wide librte_ipsec/SA parameters */ > +struct app_sa_prm app_sa_prm = {.enable = 0}; > + > struct lcore_rx_queue { > uint16_t port_id; > uint8_t queue_id; > @@ -1063,6 +1066,10 @@ print_usage(const char *prgname) > " [-P]" > " [-u PORTMASK]" > " [-j FRAMESIZE]" > + " [-l]" > + " [-w REPLAY_WINDOW_SIZE]" > + " [-e]" > + " [-a]" > " -f CONFIG_FILE" > " --config (port,queue,lcore)[,(port,queue,lcore)]" > " [--single-sa SAIDX]" > @@ -1073,6 +1080,10 @@ print_usage(const char *prgname) > " -u PORTMASK: Hexadecimal bitmask of unprotected ports\n" > " -j FRAMESIZE: Enable jumbo frame with 'FRAMESIZE' as > maximum\n" > " packet size\n" > + " -l enables code-path that uses librte_ipsec\n" > + " -w REPLAY_WINDOW_SIZE specifies IPsec SQN replay window\n" > + " size for each SA\n" > + " -a enables SA SQN atomic behaviour\n" -e missing > " -f CONFIG_FILE: Configuration file\n" > " --config (port,queue,lcore): Rx queue configuration\n" > " --single-sa SAIDX: Use single SA index for outbound > traffic,\n" > @@ -1169,6 +1180,20 @@ parse_config(const char *q_arg) > return 0; > } > > +static void > +print_app_sa_prm(const struct app_sa_prm *prm) > +{ > + printf("librte_ipsec usage: %s\n", > + (prm->enable == 0) ? "disabled" : "enabled"); > + > + if (prm->enable == 0) > + return; > + > + printf("replay window size: %u\n", prm->window_size); > + printf("ESN: %s\n", (prm->enable_esn == 0) ? "disabled" : "enabled"); > + printf("SA flags: %#" PRIx64 "\n", prm->flags); > +} > + > static int32_t > parse_args(int32_t argc, char **argv) > { > @@ -1180,7 +1205,7 @@ parse_args(int32_t argc, char **argv) > > argvopt = argv; > > - while ((opt = getopt_long(argc, argvopt, "p:Pu:f:j:", > + while ((opt = getopt_long(argc, argvopt, "aelp:Pu:f:j:w:", > lgopts, &option_index)) != EOF) { > > switch (opt) { > @@ -1236,6 +1261,21 @@ parse_args(int32_t argc, char **argv) > } > printf("Enabled jumbo frames size %u\n", frame_size); > break; > + case 'l': > + app_sa_prm.enable = 1; > + break; > + case 'w': > + app_sa_prm.enable = 1; > + app_sa_prm.window_size = parse_decimal(optarg); > + break; > + case 'e': > + app_sa_prm.enable = 1; > + app_sa_prm.enable_esn = 1; > + break; > + case 'a': > + app_sa_prm.enable = 1; > + app_sa_prm.flags |= RTE_IPSEC_SAFLAG_SQN_ATOM; > + break; > case CMD_LINE_OPT_CONFIG_NUM: > ret = parse_config(optarg); > if (ret) { > @@ -1280,6 +1320,8 @@ parse_args(int32_t argc, char **argv) > return -1; > } > > + print_app_sa_prm(&app_sa_prm); > + > if (optind >= 0) > argv[optind-1] = prgname; > > @@ -1923,12 +1965,14 @@ main(int32_t argc, char **argv) > if (socket_ctx[socket_id].mbuf_pool) > continue; > > - sa_init(&socket_ctx[socket_id], socket_id); > - > + /* initilaze SPD */ > sp4_init(&socket_ctx[socket_id], socket_id); > > sp6_init(&socket_ctx[socket_id], socket_id); > > + /* initilaze SAD */ > + sa_init(&socket_ctx[socket_id], socket_id); > + > rt_init(&socket_ctx[socket_id], socket_id); > > pool_init(&socket_ctx[socket_id], socket_id, NB_MBUF); > diff --git a/examples/ipsec-secgw/ipsec.h b/examples/ipsec-secgw/ipsec.h > index 2f04b7d68..b089fe54b 100644 > --- a/examples/ipsec-secgw/ipsec.h > +++ b/examples/ipsec-secgw/ipsec.h > @@ -11,6 +11,7 @@ > #include <rte_crypto.h> > #include <rte_security.h> > #include <rte_flow.h> > +#include <rte_ipsec.h> > > #define RTE_LOGTYPE_IPSEC RTE_LOGTYPE_USER1 > #define RTE_LOGTYPE_IPSEC_ESP RTE_LOGTYPE_USER2 > @@ -70,7 +71,20 @@ struct ip_addr { > > #define MAX_KEY_SIZE 32 > > +/* > + * application wide SA parameters > + */ > +struct app_sa_prm { > + uint32_t enable; /* use librte_ipsec API for ipsec pkt processing */ > + uint32_t window_size; /* replay window size */ > + uint32_t enable_esn; /* enable/disable ESN support */ > + uint64_t flags; /* rte_ipsec_sa_prm.flags */ > +}; > + > +extern struct app_sa_prm app_sa_prm; > + > struct ipsec_sa { > + struct rte_ipsec_session ips; /* one session per sa for now */ > uint32_t spi; > uint32_t cdev_id_qp; > uint64_t seq; > @@ -243,6 +257,16 @@ sp4_init(struct socket_ctx *ctx, int32_t socket_id); > void > sp6_init(struct socket_ctx *ctx, int32_t socket_id); > > +/* > + * Search though SP rules for given SPI. spell check > + * Returns first rule index if found(greater or equal then zero), > + * or -ENOENT otherwise. > + */ > +int > +sp4_spi_present(uint32_t spi, int inbound); > +int > +sp6_spi_present(uint32_t spi, int inbound); > + > void > sa_init(struct socket_ctx *ctx, int32_t socket_id); > > diff --git a/examples/ipsec-secgw/meson.build > b/examples/ipsec-secgw/meson.build > index 77d8b298f..31f68fee2 100644 > --- a/examples/ipsec-secgw/meson.build > +++ b/examples/ipsec-secgw/meson.build > @@ -6,7 +6,7 @@ > # To build this example as a standalone application with an > already-installed > # DPDK instance, use 'make' > > -deps += ['security', 'lpm', 'acl', 'hash'] > +deps += ['security', 'lpm', 'acl', 'hash', 'ipsec'] > allow_experimental_apis = true > sources = files( > 'esp.c', 'ipsec.c', 'ipsec-secgw.c', 'parser.c', > Makefile should also be updated I guess.
..... will be running the application and will come back with issues if any. -Akhil