When esn is used then high-order 32 bits are included in ICV calculation however are not transmitted. Update packet length to be consistent with auth data offset and length before crypto operation. High-order 32 bits of esn will be removed from packet length in crypto post processing.
Change-Id: I5ba50e341059a8d6a5e4ce7c626dfe7b9173740b Signed-off-by: Lukasz Bartosik <lbarto...@marvell.com> --- lib/librte_ipsec/esp_inb.c | 56 +++++++++++++++++++++++++++++++++++++-------- lib/librte_ipsec/esp_outb.c | 31 +++++++++++++++++++++++++ lib/librte_ipsec/sa.c | 4 ++-- lib/librte_ipsec/sa.h | 8 +++++++ 4 files changed, 87 insertions(+), 12 deletions(-) diff --git a/lib/librte_ipsec/esp_inb.c b/lib/librte_ipsec/esp_inb.c index 4e0e12a..eb899e3 100644 --- a/lib/librte_ipsec/esp_inb.c +++ b/lib/librte_ipsec/esp_inb.c @@ -16,7 +16,8 @@ #include "pad.h" typedef uint16_t (*esp_inb_process_t)(const struct rte_ipsec_sa *sa, - struct rte_mbuf *mb[], uint32_t sqn[], uint32_t dr[], uint16_t num); + struct rte_mbuf *mb[], uint32_t sqn[], uint32_t dr[], uint16_t num, + uint8_t is_inline); /* * helper function to fill crypto_sym op for cipher+auth algorithms. @@ -181,6 +182,15 @@ inb_pkt_prepare(const struct rte_ipsec_sa *sa, const struct replay_sqn *rsn, icv->va = rte_pktmbuf_mtod_offset(ml, void *, icv_ofs); icv->pa = rte_pktmbuf_iova_offset(ml, icv_ofs); + /* + * if esn is used then high-order 32 bits are also used in ICV + * calculation but are not transmitted, update packet length + * to be consistent with auth data length and offset, this will + * be subtracted from packet length in post crypto processing + */ + mb->pkt_len += sa->sqh_len; + ml->data_len += sa->sqh_len; + inb_pkt_xprepare(sa, sqn, icv); return plen; } @@ -373,14 +383,20 @@ tun_process_step3(struct rte_mbuf *mb, uint64_t txof_msk, uint64_t txof_val) */ static inline uint16_t tun_process(const struct rte_ipsec_sa *sa, struct rte_mbuf *mb[], - uint32_t sqn[], uint32_t dr[], uint16_t num) + uint32_t sqn[], uint32_t dr[], uint16_t num, uint8_t is_inline) { uint32_t adj, i, k, tl; uint32_t hl[num]; struct esp_tail espt[num]; struct rte_mbuf *ml[num]; - const uint32_t tlen = sa->icv_len + sizeof(espt[0]); + /* + * remove high-order 32 bits of esn from packet length + * which was added before crypto processing, this doesn't + * apply to inline case + */ + const uint32_t tlen = sa->icv_len + sizeof(espt[0]) + + (is_inline ? 0 : sa->sqh_len); const uint32_t cofs = sa->ctp.cipher.offset; /* @@ -420,7 +436,7 @@ tun_process(const struct rte_ipsec_sa *sa, struct rte_mbuf *mb[], */ static inline uint16_t trs_process(const struct rte_ipsec_sa *sa, struct rte_mbuf *mb[], - uint32_t sqn[], uint32_t dr[], uint16_t num) + uint32_t sqn[], uint32_t dr[], uint16_t num, uint8_t is_inline) { char *np; uint32_t i, k, l2, tl; @@ -428,7 +444,13 @@ trs_process(const struct rte_ipsec_sa *sa, struct rte_mbuf *mb[], struct esp_tail espt[num]; struct rte_mbuf *ml[num]; - const uint32_t tlen = sa->icv_len + sizeof(espt[0]); + /* + * remove high-order 32 bits of esn from packet length + * which was added before crypto processing, this doesn't + * apply to inline case + */ + const uint32_t tlen = sa->icv_len + sizeof(espt[0]) + + (is_inline ? 0 : sa->sqh_len); const uint32_t cofs = sa->ctp.cipher.offset; /* @@ -496,8 +518,8 @@ esp_inb_rsn_update(struct rte_ipsec_sa *sa, const uint32_t sqn[], * process group of ESP inbound packets. */ static inline uint16_t -esp_inb_pkt_process(const struct rte_ipsec_session *ss, - struct rte_mbuf *mb[], uint16_t num, esp_inb_process_t process) +esp_inb_pkt_process(const struct rte_ipsec_session *ss, struct rte_mbuf *mb[], + uint16_t num, uint8_t is_inline, esp_inb_process_t process) { uint32_t k, n; struct rte_ipsec_sa *sa; @@ -507,7 +529,7 @@ esp_inb_pkt_process(const struct rte_ipsec_session *ss, sa = ss->sa; /* process packets, extract seq numbers */ - k = process(sa, mb, sqn, dr, num); + k = process(sa, mb, sqn, dr, num, is_inline); /* handle unprocessed mbufs */ if (k != num && k != 0) @@ -533,7 +555,14 @@ uint16_t esp_inb_tun_pkt_process(const struct rte_ipsec_session *ss, struct rte_mbuf *mb[], uint16_t num) { - return esp_inb_pkt_process(ss, mb, num, tun_process); + return esp_inb_pkt_process(ss, mb, num, 0, tun_process); +} + +uint16_t +inline_inb_tun_pkt_process(const struct rte_ipsec_session *ss, + struct rte_mbuf *mb[], uint16_t num) +{ + return esp_inb_pkt_process(ss, mb, num, 1, tun_process); } /* @@ -543,5 +572,12 @@ uint16_t esp_inb_trs_pkt_process(const struct rte_ipsec_session *ss, struct rte_mbuf *mb[], uint16_t num) { - return esp_inb_pkt_process(ss, mb, num, trs_process); + return esp_inb_pkt_process(ss, mb, num, 0, trs_process); +} + +uint16_t +inline_inb_trs_pkt_process(const struct rte_ipsec_session *ss, + struct rte_mbuf *mb[], uint16_t num) +{ + return esp_inb_pkt_process(ss, mb, num, 1, trs_process); } diff --git a/lib/librte_ipsec/esp_outb.c b/lib/librte_ipsec/esp_outb.c index c798bc4..71a595e 100644 --- a/lib/librte_ipsec/esp_outb.c +++ b/lib/librte_ipsec/esp_outb.c @@ -221,6 +221,7 @@ esp_outb_tun_prepare(const struct rte_ipsec_session *ss, struct rte_mbuf *mb[], uint32_t i, k, n; uint64_t sqn; rte_be64_t sqc; + struct rte_mbuf *ml; struct rte_ipsec_sa *sa; struct rte_cryptodev_sym_session *cs; union sym_op_data icv; @@ -246,6 +247,19 @@ esp_outb_tun_prepare(const struct rte_ipsec_session *ss, struct rte_mbuf *mb[], /* success, setup crypto op */ if (rc >= 0) { + /* + * if esn is used then high-order 32 bits are also + * used in ICV calculation but are not transmitted, + * update packet length to be consistent with auth + * data length and offset, this will be subtracted + * from packet length in post crypto processing + */ + if (sa->sqh_len) { + mb[i]->pkt_len += sa->sqh_len; + ml = rte_pktmbuf_lastseg(mb[i]); + ml->data_len += sa->sqh_len; + } + outb_pkt_xprepare(sa, sqc, &icv); lksd_none_cop_prepare(cop[k], cs, mb[i]); outb_cop_prepare(cop[k], sa, iv, &icv, 0, rc); @@ -356,6 +370,7 @@ esp_outb_trs_prepare(const struct rte_ipsec_session *ss, struct rte_mbuf *mb[], uint32_t i, k, n, l2, l3; uint64_t sqn; rte_be64_t sqc; + struct rte_mbuf *ml; struct rte_ipsec_sa *sa; struct rte_cryptodev_sym_session *cs; union sym_op_data icv; @@ -384,6 +399,19 @@ esp_outb_trs_prepare(const struct rte_ipsec_session *ss, struct rte_mbuf *mb[], /* success, setup crypto op */ if (rc >= 0) { + /* + * if esn is used then high-order 32 bits are also + * used in ICV calculation but are not transmitted, + * update packet length to be consistent with auth + * data length and offset, this will be subtracted + * from packet length in post crypto processing + */ + if (sa->sqh_len) { + mb[i]->pkt_len += sa->sqh_len; + ml = rte_pktmbuf_lastseg(mb[i]); + ml->data_len += sa->sqh_len; + } + outb_pkt_xprepare(sa, sqc, &icv); lksd_none_cop_prepare(cop[k], cs, mb[i]); outb_cop_prepare(cop[k], sa, iv, &icv, l2 + l3, rc); @@ -425,6 +453,9 @@ esp_outb_sqh_process(const struct rte_ipsec_session *ss, struct rte_mbuf *mb[], for (i = 0; i != num; i++) { if ((mb[i]->ol_flags & PKT_RX_SEC_OFFLOAD_FAILED) == 0) { ml = rte_pktmbuf_lastseg(mb[i]); + /* remove high-order 32 bits of esn from packet len */ + mb[i]->pkt_len -= sa->sqh_len; + ml->data_len -= sa->sqh_len; icv = rte_pktmbuf_mtod_offset(ml, void *, ml->data_len - icv_len); remove_sqh(icv, icv_len); diff --git a/lib/librte_ipsec/sa.c b/lib/librte_ipsec/sa.c index 846e317..ff01358 100644 --- a/lib/librte_ipsec/sa.c +++ b/lib/librte_ipsec/sa.c @@ -610,10 +610,10 @@ inline_crypto_pkt_func_select(const struct rte_ipsec_sa *sa, switch (sa->type & msk) { case (RTE_IPSEC_SATP_DIR_IB | RTE_IPSEC_SATP_MODE_TUNLV4): case (RTE_IPSEC_SATP_DIR_IB | RTE_IPSEC_SATP_MODE_TUNLV6): - pf->process = esp_inb_tun_pkt_process; + pf->process = inline_inb_tun_pkt_process; break; case (RTE_IPSEC_SATP_DIR_IB | RTE_IPSEC_SATP_MODE_TRANS): - pf->process = esp_inb_trs_pkt_process; + pf->process = inline_inb_trs_pkt_process; break; case (RTE_IPSEC_SATP_DIR_OB | RTE_IPSEC_SATP_MODE_TUNLV4): case (RTE_IPSEC_SATP_DIR_OB | RTE_IPSEC_SATP_MODE_TUNLV6): diff --git a/lib/librte_ipsec/sa.h b/lib/librte_ipsec/sa.h index ffb5fb4..20c0a65 100644 --- a/lib/librte_ipsec/sa.h +++ b/lib/librte_ipsec/sa.h @@ -143,9 +143,17 @@ esp_inb_tun_pkt_process(const struct rte_ipsec_session *ss, struct rte_mbuf *mb[], uint16_t num); uint16_t +inline_inb_tun_pkt_process(const struct rte_ipsec_session *ss, + struct rte_mbuf *mb[], uint16_t num); + +uint16_t esp_inb_trs_pkt_process(const struct rte_ipsec_session *ss, struct rte_mbuf *mb[], uint16_t num); +uint16_t +inline_inb_trs_pkt_process(const struct rte_ipsec_session *ss, + struct rte_mbuf *mb[], uint16_t num); + /* outbound processing */ uint16_t -- 2.7.4