When esn is used then high-order 32 bits are included in ICV
calculation however are not transmitted. Update packet length
to be consistent with auth data offset and length before crypto
operation. High-order 32 bits of esn will be removed from packet
length in crypto post processing.

Change-Id: I5ba50e341059a8d6a5e4ce7c626dfe7b9173740b
Signed-off-by: Lukasz Bartosik <lbarto...@marvell.com>
---
 lib/librte_ipsec/esp_inb.c  | 56 +++++++++++++++++++++++++++++++++++++--------
 lib/librte_ipsec/esp_outb.c | 31 +++++++++++++++++++++++++
 lib/librte_ipsec/sa.c       |  4 ++--
 lib/librte_ipsec/sa.h       |  8 +++++++
 4 files changed, 87 insertions(+), 12 deletions(-)

diff --git a/lib/librte_ipsec/esp_inb.c b/lib/librte_ipsec/esp_inb.c
index 4e0e12a..eb899e3 100644
--- a/lib/librte_ipsec/esp_inb.c
+++ b/lib/librte_ipsec/esp_inb.c
@@ -16,7 +16,8 @@
 #include "pad.h"
 
 typedef uint16_t (*esp_inb_process_t)(const struct rte_ipsec_sa *sa,
-       struct rte_mbuf *mb[], uint32_t sqn[], uint32_t dr[], uint16_t num);
+       struct rte_mbuf *mb[], uint32_t sqn[], uint32_t dr[], uint16_t num,
+       uint8_t is_inline);
 
 /*
  * helper function to fill crypto_sym op for cipher+auth algorithms.
@@ -181,6 +182,15 @@ inb_pkt_prepare(const struct rte_ipsec_sa *sa, const 
struct replay_sqn *rsn,
        icv->va = rte_pktmbuf_mtod_offset(ml, void *, icv_ofs);
        icv->pa = rte_pktmbuf_iova_offset(ml, icv_ofs);
 
+       /*
+        * if esn is used then high-order 32 bits are also used in ICV
+        * calculation but are not transmitted, update packet length
+        * to be consistent with auth data length and offset, this will
+        * be subtracted from packet length in post crypto processing
+        */
+       mb->pkt_len += sa->sqh_len;
+       ml->data_len += sa->sqh_len;
+
        inb_pkt_xprepare(sa, sqn, icv);
        return plen;
 }
@@ -373,14 +383,20 @@ tun_process_step3(struct rte_mbuf *mb, uint64_t txof_msk, 
uint64_t txof_val)
  */
 static inline uint16_t
 tun_process(const struct rte_ipsec_sa *sa, struct rte_mbuf *mb[],
-       uint32_t sqn[], uint32_t dr[], uint16_t num)
+       uint32_t sqn[], uint32_t dr[], uint16_t num, uint8_t is_inline)
 {
        uint32_t adj, i, k, tl;
        uint32_t hl[num];
        struct esp_tail espt[num];
        struct rte_mbuf *ml[num];
 
-       const uint32_t tlen = sa->icv_len + sizeof(espt[0]);
+       /*
+        * remove high-order 32 bits of esn from packet length
+        * which was added before crypto processing, this doesn't
+        * apply to inline case
+        */
+       const uint32_t tlen = sa->icv_len + sizeof(espt[0]) +
+                               (is_inline ? 0 : sa->sqh_len);
        const uint32_t cofs = sa->ctp.cipher.offset;
 
        /*
@@ -420,7 +436,7 @@ tun_process(const struct rte_ipsec_sa *sa, struct rte_mbuf 
*mb[],
  */
 static inline uint16_t
 trs_process(const struct rte_ipsec_sa *sa, struct rte_mbuf *mb[],
-       uint32_t sqn[], uint32_t dr[], uint16_t num)
+       uint32_t sqn[], uint32_t dr[], uint16_t num, uint8_t is_inline)
 {
        char *np;
        uint32_t i, k, l2, tl;
@@ -428,7 +444,13 @@ trs_process(const struct rte_ipsec_sa *sa, struct rte_mbuf 
*mb[],
        struct esp_tail espt[num];
        struct rte_mbuf *ml[num];
 
-       const uint32_t tlen = sa->icv_len + sizeof(espt[0]);
+       /*
+        * remove high-order 32 bits of esn from packet length
+        * which was added before crypto processing, this doesn't
+        * apply to inline case
+        */
+       const uint32_t tlen = sa->icv_len + sizeof(espt[0]) +
+                               (is_inline ? 0 : sa->sqh_len);
        const uint32_t cofs = sa->ctp.cipher.offset;
 
        /*
@@ -496,8 +518,8 @@ esp_inb_rsn_update(struct rte_ipsec_sa *sa, const uint32_t 
sqn[],
  * process group of ESP inbound packets.
  */
 static inline uint16_t
-esp_inb_pkt_process(const struct rte_ipsec_session *ss,
-       struct rte_mbuf *mb[], uint16_t num, esp_inb_process_t process)
+esp_inb_pkt_process(const struct rte_ipsec_session *ss, struct rte_mbuf *mb[],
+       uint16_t num, uint8_t is_inline, esp_inb_process_t process)
 {
        uint32_t k, n;
        struct rte_ipsec_sa *sa;
@@ -507,7 +529,7 @@ esp_inb_pkt_process(const struct rte_ipsec_session *ss,
        sa = ss->sa;
 
        /* process packets, extract seq numbers */
-       k = process(sa, mb, sqn, dr, num);
+       k = process(sa, mb, sqn, dr, num, is_inline);
 
        /* handle unprocessed mbufs */
        if (k != num && k != 0)
@@ -533,7 +555,14 @@ uint16_t
 esp_inb_tun_pkt_process(const struct rte_ipsec_session *ss,
        struct rte_mbuf *mb[], uint16_t num)
 {
-       return esp_inb_pkt_process(ss, mb, num, tun_process);
+       return esp_inb_pkt_process(ss, mb, num, 0, tun_process);
+}
+
+uint16_t
+inline_inb_tun_pkt_process(const struct rte_ipsec_session *ss,
+       struct rte_mbuf *mb[], uint16_t num)
+{
+       return esp_inb_pkt_process(ss, mb, num, 1, tun_process);
 }
 
 /*
@@ -543,5 +572,12 @@ uint16_t
 esp_inb_trs_pkt_process(const struct rte_ipsec_session *ss,
        struct rte_mbuf *mb[], uint16_t num)
 {
-       return esp_inb_pkt_process(ss, mb, num, trs_process);
+       return esp_inb_pkt_process(ss, mb, num, 0, trs_process);
+}
+
+uint16_t
+inline_inb_trs_pkt_process(const struct rte_ipsec_session *ss,
+       struct rte_mbuf *mb[], uint16_t num)
+{
+       return esp_inb_pkt_process(ss, mb, num, 1, trs_process);
 }
diff --git a/lib/librte_ipsec/esp_outb.c b/lib/librte_ipsec/esp_outb.c
index c798bc4..71a595e 100644
--- a/lib/librte_ipsec/esp_outb.c
+++ b/lib/librte_ipsec/esp_outb.c
@@ -221,6 +221,7 @@ esp_outb_tun_prepare(const struct rte_ipsec_session *ss, 
struct rte_mbuf *mb[],
        uint32_t i, k, n;
        uint64_t sqn;
        rte_be64_t sqc;
+       struct rte_mbuf *ml;
        struct rte_ipsec_sa *sa;
        struct rte_cryptodev_sym_session *cs;
        union sym_op_data icv;
@@ -246,6 +247,19 @@ esp_outb_tun_prepare(const struct rte_ipsec_session *ss, 
struct rte_mbuf *mb[],
 
                /* success, setup crypto op */
                if (rc >= 0) {
+                       /*
+                        * if esn is used then high-order 32 bits are also
+                        * used in ICV calculation but are not transmitted,
+                        * update packet length to be consistent with auth
+                        * data length and offset, this will be subtracted
+                        * from packet length in post crypto processing
+                        */
+                       if (sa->sqh_len) {
+                               mb[i]->pkt_len += sa->sqh_len;
+                               ml = rte_pktmbuf_lastseg(mb[i]);
+                               ml->data_len += sa->sqh_len;
+                       }
+
                        outb_pkt_xprepare(sa, sqc, &icv);
                        lksd_none_cop_prepare(cop[k], cs, mb[i]);
                        outb_cop_prepare(cop[k], sa, iv, &icv, 0, rc);
@@ -356,6 +370,7 @@ esp_outb_trs_prepare(const struct rte_ipsec_session *ss, 
struct rte_mbuf *mb[],
        uint32_t i, k, n, l2, l3;
        uint64_t sqn;
        rte_be64_t sqc;
+       struct rte_mbuf *ml;
        struct rte_ipsec_sa *sa;
        struct rte_cryptodev_sym_session *cs;
        union sym_op_data icv;
@@ -384,6 +399,19 @@ esp_outb_trs_prepare(const struct rte_ipsec_session *ss, 
struct rte_mbuf *mb[],
 
                /* success, setup crypto op */
                if (rc >= 0) {
+                       /*
+                        * if esn is used then high-order 32 bits are also
+                        * used in ICV calculation but are not transmitted,
+                        * update packet length to be consistent with auth
+                        * data length and offset, this will be subtracted
+                        * from packet length in post crypto processing
+                        */
+                       if (sa->sqh_len) {
+                               mb[i]->pkt_len += sa->sqh_len;
+                               ml = rte_pktmbuf_lastseg(mb[i]);
+                               ml->data_len += sa->sqh_len;
+                       }
+
                        outb_pkt_xprepare(sa, sqc, &icv);
                        lksd_none_cop_prepare(cop[k], cs, mb[i]);
                        outb_cop_prepare(cop[k], sa, iv, &icv, l2 + l3, rc);
@@ -425,6 +453,9 @@ esp_outb_sqh_process(const struct rte_ipsec_session *ss, 
struct rte_mbuf *mb[],
        for (i = 0; i != num; i++) {
                if ((mb[i]->ol_flags & PKT_RX_SEC_OFFLOAD_FAILED) == 0) {
                        ml = rte_pktmbuf_lastseg(mb[i]);
+                       /* remove high-order 32 bits of esn from packet len */
+                       mb[i]->pkt_len -= sa->sqh_len;
+                       ml->data_len -= sa->sqh_len;
                        icv = rte_pktmbuf_mtod_offset(ml, void *,
                                ml->data_len - icv_len);
                        remove_sqh(icv, icv_len);
diff --git a/lib/librte_ipsec/sa.c b/lib/librte_ipsec/sa.c
index 846e317..ff01358 100644
--- a/lib/librte_ipsec/sa.c
+++ b/lib/librte_ipsec/sa.c
@@ -610,10 +610,10 @@ inline_crypto_pkt_func_select(const struct rte_ipsec_sa 
*sa,
        switch (sa->type & msk) {
        case (RTE_IPSEC_SATP_DIR_IB | RTE_IPSEC_SATP_MODE_TUNLV4):
        case (RTE_IPSEC_SATP_DIR_IB | RTE_IPSEC_SATP_MODE_TUNLV6):
-               pf->process = esp_inb_tun_pkt_process;
+               pf->process = inline_inb_tun_pkt_process;
                break;
        case (RTE_IPSEC_SATP_DIR_IB | RTE_IPSEC_SATP_MODE_TRANS):
-               pf->process = esp_inb_trs_pkt_process;
+               pf->process = inline_inb_trs_pkt_process;
                break;
        case (RTE_IPSEC_SATP_DIR_OB | RTE_IPSEC_SATP_MODE_TUNLV4):
        case (RTE_IPSEC_SATP_DIR_OB | RTE_IPSEC_SATP_MODE_TUNLV6):
diff --git a/lib/librte_ipsec/sa.h b/lib/librte_ipsec/sa.h
index ffb5fb4..20c0a65 100644
--- a/lib/librte_ipsec/sa.h
+++ b/lib/librte_ipsec/sa.h
@@ -143,9 +143,17 @@ esp_inb_tun_pkt_process(const struct rte_ipsec_session *ss,
        struct rte_mbuf *mb[], uint16_t num);
 
 uint16_t
+inline_inb_tun_pkt_process(const struct rte_ipsec_session *ss,
+       struct rte_mbuf *mb[], uint16_t num);
+
+uint16_t
 esp_inb_trs_pkt_process(const struct rte_ipsec_session *ss,
        struct rte_mbuf *mb[], uint16_t num);
 
+uint16_t
+inline_inb_trs_pkt_process(const struct rte_ipsec_session *ss,
+       struct rte_mbuf *mb[], uint16_t num);
+
 /* outbound processing */
 
 uint16_t
-- 
2.7.4

Reply via email to