Hi, 
> Adding lookaside IPsec UDP encapsulation support
> for NAT traversal.
> Added --udp-encap option for application to specify
> if UDP encapsulation need to be enabled.
> Example secgw command with UDP encapsultation enabled:
> <secgw> -c 0x1 -- -P -p 0x1 --config "(0,0,0)" -f ep0.cfg --udp-encap

Can we have it not as global, but a per SA option?
Add new keyword for SA/SP into ipsec-secgw config file, etc.
Konstantin  

> 
> Signed-off-by: Tejasree Kondoj <ktejas...@marvell.com>
> ---
>  doc/guides/rel_notes/release_21_05.rst   |  5 ++++
>  doc/guides/sample_app_ug/ipsec_secgw.rst |  5 +++-
>  examples/ipsec-secgw/ipsec-secgw.c       | 33 ++++++++++++++++++++++--
>  examples/ipsec-secgw/ipsec-secgw.h       |  2 ++
>  examples/ipsec-secgw/ipsec.c             |  1 +
>  examples/ipsec-secgw/ipsec.h             |  1 +
>  examples/ipsec-secgw/sad.h               |  5 +++-
>  7 files changed, 48 insertions(+), 4 deletions(-)
> 
> diff --git a/doc/guides/rel_notes/release_21_05.rst 
> b/doc/guides/rel_notes/release_21_05.rst
> index 66e28e21be..2e67038bfe 100644
> --- a/doc/guides/rel_notes/release_21_05.rst
> +++ b/doc/guides/rel_notes/release_21_05.rst
> @@ -75,6 +75,11 @@ New Features
>    * Added command to display Rx queue used descriptor count.
>      ``show port (port_id) rxq (queue_id) desc used count``
> 
> +* **Updated ipsec-secgw sample application.**
> +
> +  * Updated the ``ipsec-secgw`` sample application with UDP encapsulation
> +    support for NAT Traversal.
> +
> 
>  Removed Items
>  -------------
> diff --git a/doc/guides/sample_app_ug/ipsec_secgw.rst 
> b/doc/guides/sample_app_ug/ipsec_secgw.rst
> index 176e292d3f..099f499c18 100644
> --- a/doc/guides/sample_app_ug/ipsec_secgw.rst
> +++ b/doc/guides/sample_app_ug/ipsec_secgw.rst
> @@ -139,6 +139,7 @@ The application has a number of command line options::
>                          --reassemble NUM
>                          --mtu MTU
>                          --frag-ttl FRAG_TTL_NS
> +                        --udp-encap
> 
>  Where:
> 
> @@ -234,6 +235,8 @@ Where:
>      Should be lower for low number of reassembly buckets.
>      Valid values: from 1 ns to 10 s. Default value: 10000000 (10 s).
> 
> +*   ``--udp-encap``: enables IPsec UDP Encapsulation for NAT Traversal.
> +
> 
>  The mapping of lcores to port/queues is similar to other l3fwd applications.
> 
> @@ -1023,4 +1026,4 @@ Available options:
>  *   ``-h`` Show usage.
> 
>  If <ipsec_mode> is specified, only tests for that mode will be invoked. For 
> the
> -list of available modes please refer to run_test.sh.
> \ No newline at end of file
> +list of available modes please refer to run_test.sh.
> diff --git a/examples/ipsec-secgw/ipsec-secgw.c 
> b/examples/ipsec-secgw/ipsec-secgw.c
> index 20d69ba813..57c8973e9d 100644
> --- a/examples/ipsec-secgw/ipsec-secgw.c
> +++ b/examples/ipsec-secgw/ipsec-secgw.c
> @@ -115,6 +115,7 @@ struct flow_info flow_info_tbl[RTE_MAX_ETHPORTS];
>  #define CMD_LINE_OPT_REASSEMBLE              "reassemble"
>  #define CMD_LINE_OPT_MTU             "mtu"
>  #define CMD_LINE_OPT_FRAG_TTL                "frag-ttl"
> +#define CMD_LINE_OPT_UDP_ENCAP               "udp-encap"
> 
>  #define CMD_LINE_ARG_EVENT   "event"
>  #define CMD_LINE_ARG_POLL    "poll"
> @@ -139,6 +140,7 @@ enum {
>       CMD_LINE_OPT_REASSEMBLE_NUM,
>       CMD_LINE_OPT_MTU_NUM,
>       CMD_LINE_OPT_FRAG_TTL_NUM,
> +     CMD_LINE_OPT_UDP_ENCAP_NUM,
>  };
> 
>  static const struct option lgopts[] = {
> @@ -152,6 +154,7 @@ static const struct option lgopts[] = {
>       {CMD_LINE_OPT_REASSEMBLE, 1, 0, CMD_LINE_OPT_REASSEMBLE_NUM},
>       {CMD_LINE_OPT_MTU, 1, 0, CMD_LINE_OPT_MTU_NUM},
>       {CMD_LINE_OPT_FRAG_TTL, 1, 0, CMD_LINE_OPT_FRAG_TTL_NUM},
> +     {CMD_LINE_OPT_UDP_ENCAP, 0, 0, CMD_LINE_OPT_UDP_ENCAP_NUM},
>       {NULL, 0, 0, 0}
>  };
> 
> @@ -360,6 +363,9 @@ prepare_one_packet(struct rte_mbuf *pkt, struct 
> ipsec_traffic *t)
>       const struct rte_ether_hdr *eth;
>       const struct rte_ipv4_hdr *iph4;
>       const struct rte_ipv6_hdr *iph6;
> +     const struct rte_udp_hdr *udp;
> +     uint16_t nat_port;
> +     uint16_t ip4_hdr_len;
> 
>       eth = rte_pktmbuf_mtod(pkt, const struct rte_ether_hdr *);
>       if (eth->ether_type == rte_cpu_to_be_16(RTE_ETHER_TYPE_IPV4)) {
> @@ -368,9 +374,26 @@ prepare_one_packet(struct rte_mbuf *pkt, struct 
> ipsec_traffic *t)
>                       RTE_ETHER_HDR_LEN);
>               adjust_ipv4_pktlen(pkt, iph4, 0);
> 
> -             if (iph4->next_proto_id == IPPROTO_ESP)
> +             switch (iph4->next_proto_id) {
> +             case IPPROTO_ESP:
>                       t->ipsec.pkts[(t->ipsec.num)++] = pkt;
> -             else {
> +                     break;
> +             case IPPROTO_UDP:
> +                     if (app_sa_prm.udp_encap == 1) {
> +                             ip4_hdr_len = ((iph4->version_ihl &
> +                                     RTE_IPV4_HDR_IHL_MASK) *
> +                                     RTE_IPV4_IHL_MULTIPLIER);
> +                             udp = rte_pktmbuf_mtod_offset(pkt,
> +                                     struct rte_udp_hdr *, ip4_hdr_len);
> +                             nat_port = rte_cpu_to_be_16(IPSEC_NAT_T_PORT);
> +                             if (udp->src_port == nat_port ||
> +                                     udp->dst_port == nat_port){
> +                                     t->ipsec.pkts[(t->ipsec.num)++] = pkt;
> +                                     break;
> +                             }
> +                     }
> +             /* Fall through */
> +             default:
>                       t->ip4.data[t->ip4.num] = &iph4->next_proto_id;
>                       t->ip4.pkts[(t->ip4.num)++] = pkt;
>               }
> @@ -1378,6 +1401,7 @@ print_usage(const char *prgname)
>               " [--" CMD_LINE_OPT_TX_OFFLOAD " TX_OFFLOAD_MASK]"
>               " [--" CMD_LINE_OPT_REASSEMBLE " REASSEMBLE_TABLE_SIZE]"
>               " [--" CMD_LINE_OPT_MTU " MTU]"
> +             " [--" CMD_LINE_OPT_UDP_ENCAP "]"
>               "\n\n"
>               "  -p PORTMASK: Hexadecimal bitmask of ports to configure\n"
>               "  -P : Enable promiscuous mode\n"
> @@ -1431,6 +1455,8 @@ print_usage(const char *prgname)
>               "  --" CMD_LINE_OPT_FRAG_TTL " FRAG_TTL_NS"
>               ": fragments lifetime in nanoseconds, default\n"
>               "    and maximum value is 10.000.000.000 ns (10 s)\n"
> +             "  --" CMD_LINE_OPT_UDP_ENCAP
> +             ": enables UDP Encapsulation for NAT Traversal\n"
>               "\n",
>               prgname);
>  }
> @@ -1780,6 +1806,9 @@ parse_args(int32_t argc, char **argv, struct eh_conf 
> *eh_conf)
>                       }
>                       frag_ttl_ns = ret;
>                       break;
> +             case CMD_LINE_OPT_UDP_ENCAP_NUM:
> +                     app_sa_prm.udp_encap = 1;
> +                     break;
>               default:
>                       print_usage(prgname);
>                       return -1;
> diff --git a/examples/ipsec-secgw/ipsec-secgw.h 
> b/examples/ipsec-secgw/ipsec-secgw.h
> index f2281e73cf..6887d752ab 100644
> --- a/examples/ipsec-secgw/ipsec-secgw.h
> +++ b/examples/ipsec-secgw/ipsec-secgw.h
> @@ -47,6 +47,8 @@
> 
>  #define ETHADDR(a, b, c, d, e, f) (__BYTES_TO_UINT64(a, b, c, d, e, f, 0, 0))
> 
> +#define IPSEC_NAT_T_PORT 4500
> +
>  struct traffic_type {
>       const uint8_t *data[MAX_PKT_BURST * 2];
>       struct rte_mbuf *pkts[MAX_PKT_BURST * 2];
> diff --git a/examples/ipsec-secgw/ipsec.c b/examples/ipsec-secgw/ipsec.c
> index 6baeeb342f..6e0caa198d 100644
> --- a/examples/ipsec-secgw/ipsec.c
> +++ b/examples/ipsec-secgw/ipsec.c
> @@ -52,6 +52,7 @@ set_ipsec_conf(struct ipsec_sa *sa, struct 
> rte_security_ipsec_xform *ipsec)
>       ipsec->esn_soft_limit = IPSEC_OFFLOAD_ESN_SOFTLIMIT;
>       ipsec->replay_win_sz = app_sa_prm.window_size;
>       ipsec->options.esn = app_sa_prm.enable_esn;
> +     ipsec->options.udp_encap = app_sa_prm.udp_encap;
>  }
> 
>  int
> diff --git a/examples/ipsec-secgw/ipsec.h b/examples/ipsec-secgw/ipsec.h
> index 7031e28c46..430afea688 100644
> --- a/examples/ipsec-secgw/ipsec.h
> +++ b/examples/ipsec-secgw/ipsec.h
> @@ -75,6 +75,7 @@ struct app_sa_prm {
>       uint32_t window_size; /* replay window size */
>       uint32_t enable_esn;  /* enable/disable ESN support */
>       uint32_t cache_sz;      /* per lcore SA cache size */
> +     uint32_t udp_encap;   /* enable/disable UDP Encapsulation */
>       uint64_t flags;       /* rte_ipsec_sa_prm.flags */
>  };
> 
> diff --git a/examples/ipsec-secgw/sad.h b/examples/ipsec-secgw/sad.h
> index 473aaa938e..89b50488ec 100644
> --- a/examples/ipsec-secgw/sad.h
> +++ b/examples/ipsec-secgw/sad.h
> @@ -77,6 +77,7 @@ sad_lookup(struct ipsec_sad *sad, struct rte_mbuf *pkts[],
>       uint32_t spi, cache_idx;
>       struct ipsec_sad_cache *cache;
>       struct ipsec_sa *cached_sa;
> +     uint16_t udp_hdr_len = 0;
>       int is_ipv4;
> 
>       cache  = &RTE_PER_LCORE(sad_cache);
> @@ -85,8 +86,10 @@ sad_lookup(struct ipsec_sad *sad, struct rte_mbuf *pkts[],
>       for (i = 0; i < nb_pkts; i++) {
>               ipv4 = rte_pktmbuf_mtod(pkts[i], struct rte_ipv4_hdr *);
>               ipv6 = rte_pktmbuf_mtod(pkts[i], struct rte_ipv6_hdr *);
> +             if (app_sa_prm.udp_encap == 1)
> +                     udp_hdr_len = sizeof(struct rte_udp_hdr);
>               esp = rte_pktmbuf_mtod_offset(pkts[i], struct rte_esp_hdr *,
> -                             pkts[i]->l3_len);
> +                             pkts[i]->l3_len + udp_hdr_len);
> 
>               is_ipv4 = pkts[i]->packet_type & RTE_PTYPE_L3_IPV4;
>               spi = rte_be_to_cpu_32(esp->spi);
> --
> 2.27.0

Reply via email to