Hi, > Adding lookaside IPsec UDP encapsulation support > for NAT traversal. > Added --udp-encap option for application to specify > if UDP encapsulation need to be enabled. > Example secgw command with UDP encapsultation enabled: > <secgw> -c 0x1 -- -P -p 0x1 --config "(0,0,0)" -f ep0.cfg --udp-encap
Can we have it not as global, but a per SA option? Add new keyword for SA/SP into ipsec-secgw config file, etc. Konstantin > > Signed-off-by: Tejasree Kondoj <ktejas...@marvell.com> > --- > doc/guides/rel_notes/release_21_05.rst | 5 ++++ > doc/guides/sample_app_ug/ipsec_secgw.rst | 5 +++- > examples/ipsec-secgw/ipsec-secgw.c | 33 ++++++++++++++++++++++-- > examples/ipsec-secgw/ipsec-secgw.h | 2 ++ > examples/ipsec-secgw/ipsec.c | 1 + > examples/ipsec-secgw/ipsec.h | 1 + > examples/ipsec-secgw/sad.h | 5 +++- > 7 files changed, 48 insertions(+), 4 deletions(-) > > diff --git a/doc/guides/rel_notes/release_21_05.rst > b/doc/guides/rel_notes/release_21_05.rst > index 66e28e21be..2e67038bfe 100644 > --- a/doc/guides/rel_notes/release_21_05.rst > +++ b/doc/guides/rel_notes/release_21_05.rst > @@ -75,6 +75,11 @@ New Features > * Added command to display Rx queue used descriptor count. > ``show port (port_id) rxq (queue_id) desc used count`` > > +* **Updated ipsec-secgw sample application.** > + > + * Updated the ``ipsec-secgw`` sample application with UDP encapsulation > + support for NAT Traversal. > + > > Removed Items > ------------- > diff --git a/doc/guides/sample_app_ug/ipsec_secgw.rst > b/doc/guides/sample_app_ug/ipsec_secgw.rst > index 176e292d3f..099f499c18 100644 > --- a/doc/guides/sample_app_ug/ipsec_secgw.rst > +++ b/doc/guides/sample_app_ug/ipsec_secgw.rst > @@ -139,6 +139,7 @@ The application has a number of command line options:: > --reassemble NUM > --mtu MTU > --frag-ttl FRAG_TTL_NS > + --udp-encap > > Where: > > @@ -234,6 +235,8 @@ Where: > Should be lower for low number of reassembly buckets. > Valid values: from 1 ns to 10 s. Default value: 10000000 (10 s). > > +* ``--udp-encap``: enables IPsec UDP Encapsulation for NAT Traversal. > + > > The mapping of lcores to port/queues is similar to other l3fwd applications. > > @@ -1023,4 +1026,4 @@ Available options: > * ``-h`` Show usage. > > If <ipsec_mode> is specified, only tests for that mode will be invoked. For > the > -list of available modes please refer to run_test.sh. > \ No newline at end of file > +list of available modes please refer to run_test.sh. > diff --git a/examples/ipsec-secgw/ipsec-secgw.c > b/examples/ipsec-secgw/ipsec-secgw.c > index 20d69ba813..57c8973e9d 100644 > --- a/examples/ipsec-secgw/ipsec-secgw.c > +++ b/examples/ipsec-secgw/ipsec-secgw.c > @@ -115,6 +115,7 @@ struct flow_info flow_info_tbl[RTE_MAX_ETHPORTS]; > #define CMD_LINE_OPT_REASSEMBLE "reassemble" > #define CMD_LINE_OPT_MTU "mtu" > #define CMD_LINE_OPT_FRAG_TTL "frag-ttl" > +#define CMD_LINE_OPT_UDP_ENCAP "udp-encap" > > #define CMD_LINE_ARG_EVENT "event" > #define CMD_LINE_ARG_POLL "poll" > @@ -139,6 +140,7 @@ enum { > CMD_LINE_OPT_REASSEMBLE_NUM, > CMD_LINE_OPT_MTU_NUM, > CMD_LINE_OPT_FRAG_TTL_NUM, > + CMD_LINE_OPT_UDP_ENCAP_NUM, > }; > > static const struct option lgopts[] = { > @@ -152,6 +154,7 @@ static const struct option lgopts[] = { > {CMD_LINE_OPT_REASSEMBLE, 1, 0, CMD_LINE_OPT_REASSEMBLE_NUM}, > {CMD_LINE_OPT_MTU, 1, 0, CMD_LINE_OPT_MTU_NUM}, > {CMD_LINE_OPT_FRAG_TTL, 1, 0, CMD_LINE_OPT_FRAG_TTL_NUM}, > + {CMD_LINE_OPT_UDP_ENCAP, 0, 0, CMD_LINE_OPT_UDP_ENCAP_NUM}, > {NULL, 0, 0, 0} > }; > > @@ -360,6 +363,9 @@ prepare_one_packet(struct rte_mbuf *pkt, struct > ipsec_traffic *t) > const struct rte_ether_hdr *eth; > const struct rte_ipv4_hdr *iph4; > const struct rte_ipv6_hdr *iph6; > + const struct rte_udp_hdr *udp; > + uint16_t nat_port; > + uint16_t ip4_hdr_len; > > eth = rte_pktmbuf_mtod(pkt, const struct rte_ether_hdr *); > if (eth->ether_type == rte_cpu_to_be_16(RTE_ETHER_TYPE_IPV4)) { > @@ -368,9 +374,26 @@ prepare_one_packet(struct rte_mbuf *pkt, struct > ipsec_traffic *t) > RTE_ETHER_HDR_LEN); > adjust_ipv4_pktlen(pkt, iph4, 0); > > - if (iph4->next_proto_id == IPPROTO_ESP) > + switch (iph4->next_proto_id) { > + case IPPROTO_ESP: > t->ipsec.pkts[(t->ipsec.num)++] = pkt; > - else { > + break; > + case IPPROTO_UDP: > + if (app_sa_prm.udp_encap == 1) { > + ip4_hdr_len = ((iph4->version_ihl & > + RTE_IPV4_HDR_IHL_MASK) * > + RTE_IPV4_IHL_MULTIPLIER); > + udp = rte_pktmbuf_mtod_offset(pkt, > + struct rte_udp_hdr *, ip4_hdr_len); > + nat_port = rte_cpu_to_be_16(IPSEC_NAT_T_PORT); > + if (udp->src_port == nat_port || > + udp->dst_port == nat_port){ > + t->ipsec.pkts[(t->ipsec.num)++] = pkt; > + break; > + } > + } > + /* Fall through */ > + default: > t->ip4.data[t->ip4.num] = &iph4->next_proto_id; > t->ip4.pkts[(t->ip4.num)++] = pkt; > } > @@ -1378,6 +1401,7 @@ print_usage(const char *prgname) > " [--" CMD_LINE_OPT_TX_OFFLOAD " TX_OFFLOAD_MASK]" > " [--" CMD_LINE_OPT_REASSEMBLE " REASSEMBLE_TABLE_SIZE]" > " [--" CMD_LINE_OPT_MTU " MTU]" > + " [--" CMD_LINE_OPT_UDP_ENCAP "]" > "\n\n" > " -p PORTMASK: Hexadecimal bitmask of ports to configure\n" > " -P : Enable promiscuous mode\n" > @@ -1431,6 +1455,8 @@ print_usage(const char *prgname) > " --" CMD_LINE_OPT_FRAG_TTL " FRAG_TTL_NS" > ": fragments lifetime in nanoseconds, default\n" > " and maximum value is 10.000.000.000 ns (10 s)\n" > + " --" CMD_LINE_OPT_UDP_ENCAP > + ": enables UDP Encapsulation for NAT Traversal\n" > "\n", > prgname); > } > @@ -1780,6 +1806,9 @@ parse_args(int32_t argc, char **argv, struct eh_conf > *eh_conf) > } > frag_ttl_ns = ret; > break; > + case CMD_LINE_OPT_UDP_ENCAP_NUM: > + app_sa_prm.udp_encap = 1; > + break; > default: > print_usage(prgname); > return -1; > diff --git a/examples/ipsec-secgw/ipsec-secgw.h > b/examples/ipsec-secgw/ipsec-secgw.h > index f2281e73cf..6887d752ab 100644 > --- a/examples/ipsec-secgw/ipsec-secgw.h > +++ b/examples/ipsec-secgw/ipsec-secgw.h > @@ -47,6 +47,8 @@ > > #define ETHADDR(a, b, c, d, e, f) (__BYTES_TO_UINT64(a, b, c, d, e, f, 0, 0)) > > +#define IPSEC_NAT_T_PORT 4500 > + > struct traffic_type { > const uint8_t *data[MAX_PKT_BURST * 2]; > struct rte_mbuf *pkts[MAX_PKT_BURST * 2]; > diff --git a/examples/ipsec-secgw/ipsec.c b/examples/ipsec-secgw/ipsec.c > index 6baeeb342f..6e0caa198d 100644 > --- a/examples/ipsec-secgw/ipsec.c > +++ b/examples/ipsec-secgw/ipsec.c > @@ -52,6 +52,7 @@ set_ipsec_conf(struct ipsec_sa *sa, struct > rte_security_ipsec_xform *ipsec) > ipsec->esn_soft_limit = IPSEC_OFFLOAD_ESN_SOFTLIMIT; > ipsec->replay_win_sz = app_sa_prm.window_size; > ipsec->options.esn = app_sa_prm.enable_esn; > + ipsec->options.udp_encap = app_sa_prm.udp_encap; > } > > int > diff --git a/examples/ipsec-secgw/ipsec.h b/examples/ipsec-secgw/ipsec.h > index 7031e28c46..430afea688 100644 > --- a/examples/ipsec-secgw/ipsec.h > +++ b/examples/ipsec-secgw/ipsec.h > @@ -75,6 +75,7 @@ struct app_sa_prm { > uint32_t window_size; /* replay window size */ > uint32_t enable_esn; /* enable/disable ESN support */ > uint32_t cache_sz; /* per lcore SA cache size */ > + uint32_t udp_encap; /* enable/disable UDP Encapsulation */ > uint64_t flags; /* rte_ipsec_sa_prm.flags */ > }; > > diff --git a/examples/ipsec-secgw/sad.h b/examples/ipsec-secgw/sad.h > index 473aaa938e..89b50488ec 100644 > --- a/examples/ipsec-secgw/sad.h > +++ b/examples/ipsec-secgw/sad.h > @@ -77,6 +77,7 @@ sad_lookup(struct ipsec_sad *sad, struct rte_mbuf *pkts[], > uint32_t spi, cache_idx; > struct ipsec_sad_cache *cache; > struct ipsec_sa *cached_sa; > + uint16_t udp_hdr_len = 0; > int is_ipv4; > > cache = &RTE_PER_LCORE(sad_cache); > @@ -85,8 +86,10 @@ sad_lookup(struct ipsec_sad *sad, struct rte_mbuf *pkts[], > for (i = 0; i < nb_pkts; i++) { > ipv4 = rte_pktmbuf_mtod(pkts[i], struct rte_ipv4_hdr *); > ipv6 = rte_pktmbuf_mtod(pkts[i], struct rte_ipv6_hdr *); > + if (app_sa_prm.udp_encap == 1) > + udp_hdr_len = sizeof(struct rte_udp_hdr); > esp = rte_pktmbuf_mtod_offset(pkts[i], struct rte_esp_hdr *, > - pkts[i]->l3_len); > + pkts[i]->l3_len + udp_hdr_len); > > is_ipv4 = pkts[i]->packet_type & RTE_PTYPE_L3_IPV4; > spi = rte_be_to_cpu_32(esp->spi); > -- > 2.27.0