.. Copyright (c) <2019>, Intel Corporation
   All rights reserved.

   Redistribution and use in source and binary forms, with or without
   modification, are permitted provided that the following conditions
   are met:

   - Redistributions of source code must retain the above copyright
     notice, this list of conditions and the following disclaimer.

   - Redistributions in binary form must reproduce the above copyright
     notice, this list of conditions and the following disclaimer in
     the documentation and/or other materials provided with the
     distribution.

   - Neither the name of Intel Corporation nor the names of its
     contributors may be used to endorse or promote products derived
     from this software without specific prior written permission.

   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
   "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
   FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
   COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
   INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
   (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
   SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
   HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
   STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
   ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
   OF THE POSSIBILITY OF SUCH DAMAGE.

==============================================
IPSec gateway and library test plan
==============================================


Description
===========

This document provides the plan for DPDK IPSec library and gateway sample. DPDK IPsec could leverage CryptoDev API
provides the ability to do encryption/decryption by QAT or AESNI instruction set.

The testing should be tested under either Intel QuickAssist Technology
hardware accelerator or AES-NI library.

AES-NI algorithm table:

The table below contains AES-NI Algorithms with CryptoDev API.
Part of the algorithms are not supported currently.

+-----------+-------------------+---------------------------------------------------------------------------+
| Algorithm | Mode              | Detail                                                                    |
+-----------+-------------------+---------------------------------------------------------------------------+
| AES       | CBC               | Encrypt/Decrypt;Key size: 128, 256 bits                                   |
+-----------+-------------------+---------------------------------------------------------------------------+
| AES       | CTR               | Encrypt/Decrypt;Key size: 128 bits                                        |
+-----------+-------------------+---------------------------------------------------------------------------+
| SHA       |                   | SHA-1                                                                     |
+-----------+-------------------+---------------------------------------------------------------------------+
| HMAC      |                   | Support SHA implementations SHA-1;                                        |
|           |                   |                                                                           |
|           |                   | Key Size versus Block size support: Key Size must be <= block size;       |
|           |                   |                                                                           |
|           |                   | Mac Len Supported SHA-1 10, 12, 16, 20 bytes;                             |
+-----------+-------------------+---------------------------------------------------------------------------+
| 3DES      |  CBC              | Encrypt/Decrypt; Key size: 128 bits                                       |
+-----------+-------------------+---------------------------------------------------------------------------+


QAT algorithm table:

The table below contains Cryptographic Algorithm Validation with CryptoDev API.
Part of the algorithms are not supported currently.

+-----------+-------------------+---------------------------------------------------------------------------+
| Algorithm | Mode              | Detail                                                                    |
+-----------+-------------------+---------------------------------------------------------------------------+
| AES       | CBC               | Encrypt/Decrypt;Key size: 128, 256 bits                                   |
+-----------+-------------------+---------------------------------------------------------------------------+
| AES       | CTR               | Encrypt/Decrypt;Key size: 128 bits                                        |
+-----------+-------------------+---------------------------------------------------------------------------+
| AES       | GCM               | Key Sizes:128, 192 bits;                                                  |
+-----------+-------------------+---------------------------------------------------------------------------+
| SHA       |                   | SHA-1                                                                     |
+-----------+-------------------+---------------------------------------------------------------------------+
| HMAC      |                   | Support SHA implementations SHA-1;                                        |
|           |                   |                                                                           |
|           |                   | Key Size versus Block size support: Key Size must be <= block size;       |
|           |                   |                                                                           |
|           |                   | Mac Len Supported SHA-1 10, 12, 16, 20 bytes;                             |
|           |                   |                                                                           |
+-----------+-------------------+---------------------------------------------------------------------------+
| 3DES      |  CBC              | Encrypt/Decrypt; Key size: 128 bits                                       |
+-----------+-------------------+---------------------------------------------------------------------------+
| NULL      |                   | Encrypt/Decrypt; Key size: 0 b                                            |
+-----------+-------------------+---------------------------------------------------------------------------+

AES-GCM algorithm table:

The table below contains AES-GCM Algorithms with CryptoDev API.
Part of the algorithms are not supported currently.

+-----------+-------------------+---------------------------------------------------------------------------+
| Algorithm | Mode              | Detail                                                                    |
+-----------+-------------------+---------------------------------------------------------------------------+
| AES       | GCM               | Encrypt/Decrypt;Key size: 128 bits                                        |
+-----------+-------------------+---------------------------------------------------------------------------+

Prerequisites
=============

To test IPsec, an example ipsec-secgw is added into DPDK.

The test commands of ipsec-secgw is below::

    ./build/ipsec-secgw [EAL options] --
        -p PORTMASK -P -u PORTMASK -j FRAMESIZE
        -l -w REPLAY_WINOW_SIZE -e -a
        --config (port,queue,lcore)[,(port,queue,lcore)]
        --single-sa SAIDX
        --rxoffload MASK
        --txoffload MASK
        -f CONFIG_FILE_PATH

compile the applications::

    make -C ./examples/ipsec-secgw

Configuration File Syntax:

    The ``-f CONFIG_FILE_PATH`` option enables the application read and
    parse the configuration file specified, and configures the application
    with a given set of SP, SA and Routing entries accordingly. The syntax of
    the configuration file will be explained in DPDK code directory
    dpdk/doc/guides/sample_app_ug/ipsec_secgw.rst.


QAT/AES-NI installation
=======================

If CryptoDev needs to use QAT to do encryption/decryption, QAT should be installed
correctly. The steps how to install QAT is described in DPDK code directory
dpdk/doc/guides/cryptodevs/qat.rst.

If CryptoDev needs to use AES-NI to do encryption/decryption, AES-NI library should be install
correctly. The steps how to use AES-NI library is described in DPDK code directory
dpdk/doc/guides/cryptodevs/aesni_mb.rst.


Test cases: IPSec Function test
==================================
Description:
The SUT and DUT are connected through at least 2 NIC ports.

One NIC port is expected to be managed by linux on both machines and will be
used as a control path.

The second NIC port (test-port) should be bound to DPDK on the SUT, and should
be managed by linux on the DUT.

The script starts ``ipsec-secgw`` with 2 NIC devices: ``test-port`` and
``tap vdev``.

It then configures the local tap interface and the remote interface and IPsec
policies in the following way:

Traffic going over the test-port in both directions has to be protected by IPsec.

Traffic going over the TAP port in both directions does not have to be protected.

Test Topology:
---------------

Two servers are connected with one cable, Tester run DPDK ipsec-secgw sample
which includes 1 hardware NIC bind and a virtual device, DUT run linux kernal ipsec stack,
This test will use linux kernal IPSec stack verify DPDK IPSec stack::

                        +----------+                 +----------+
                        |          |                 |          |
        11.11.11.1/24   |   Tester | 11.11.11.2/24   |   DUT    |
    dtap0 ------------> |          | --------------> |          |
                        |          |                 |          |
                        +----------+                 +----------+

Test case: basic functional test
---------------------------------

Cryptodev AES-NI algorithm validation matrix is showed in table below.

+-------------+-------------+-------------+-------------+-------------+-------------+
| Method      | Cipher_algo |  Cipher_op  | Cipher_key  |  Auth_algo  |   Auth_op   |
+-------------+-------------+-------------+-------------+-------------+-------------+
| CIPHER_HASH | AES_CBC     | ENCRYPT     | 128         |  SHA1_HMAC  | GENERATE    |
+-------------+-------------+-------------+-------------+-------------+-------------+
| CIPHER_HASH | AES_CBC     | ENCRYPT     | 256         |  SHA1_HMAC  | GENERATE    |
+-------------+-------------+-------------+-------------+-------------+-------------+
| CIPHER_HASH | AES_CTR     | ENCRYPT     | 128         |  SHA1_HMAC  | GENERATE    |
+-------------+-------------+-------------+-------------+-------------+-------------+
| CIPHER_HASH | 3DES_CBC    | ENCRYPT     | 128         |  SHA1_HMAC  | GENERATE    |
+-------------+-------------+-------------+-------------+-------------+-------------+

AESNI_MB device start cmd::

    ./examples/ipsec-secgw/build/ipsec-secgw --socket-mem 2048,0 --legacy-mem -w 0000:60:00.0
    --vdev=net_tap0,mac=fixed --vdev crypto_aesni_mb_pmd_1 --vdev=crypto_aesni_mb_pmd_2 -l 9,10,11 -n 6  -- -P  --config "(0,0,10),(1,0,11)"
    -u 0x1 -p 0x3 -f /root/dts/local_conf/ipsec_test.cfg

Cryptodev QAT algorithm validation matrix is showed in table below.

+-------------+-------------+-------------+-------------+-------------+-------------+
| Method      | Cipher_algo |  Cipher_op  | Cipher_key  |  Auth_algo  |   Auth_op   |
+-------------+-------------+-------------+-------------+-------------+-------------+
| CIPHER_HASH | AES_CBC     | ENCRYPT     | 128         |  SHA1_HMAC  | GENERATE    |
+-------------+-------------+-------------+-------------+-------------+-------------+
| CIPHER_HASH | AES_CBC     | ENCRYPT     | 256         |  SHA1_HMAC  | GENERATE    |
+-------------+-------------+-------------+-------------+-------------+-------------+
| CIPHER_HASH | AES_CTR     | ENCRYPT     | 128         |  SHA1_HMAC  | GENERATE    |
+-------------+-------------+-------------+-------------+-------------+-------------+
| CIPHER_HASH | 3DES_CBC    | ENCRYPT     | 128         |  SHA1_HMAC  | GENERATE    |
+-------------+-------------+-------------+-------------+-------------+-------------+
| CIPHER_HASH | NULL        | ENCRYPT     | 0           |  NULL       | GENERATE    |
+-------------+-------------+-------------+-------------+-------------+-------------+

+-------------+-------------+-------------+-------------+
| Method      | Aead_algo   |  Aead_op    | Aead_key    |
+-------------+-------------+-------------+-------------+
| AEAD        | AES_GCM     | ENCRYPT     | 128         |
+-------------+-------------+-------------+-------------+

QAT device start cmd::

    ./examples/ipsec-secgw/build/ipsec-secgw --socket-mem 2048,0 --legacy-mem --vdev=net_tap0,mac=fixed -w 0000:60:00.0
    -w 0000:1a:01.0 -l 9,10,11 -n 6  -- -P  --config "(0,0,10),(1,0,11)" -u 0x1 -p 0x3
    -f /root/dts/local_conf/ipsec_test.cfg

AES_GCM_PMD algorithm validation matrix is showed in table below.

+-------------+-------------+-------------+-------------+
| Method      | Aead_algo   |  Aead_op    | Aead_key    |
+-------------+-------------+-------------+-------------+
| AEAD        | AES_GCM     | ENCRYPT     | 128         |
+-------------+-------------+-------------+-------------+

AESNI_GCM device start cmd::

    ./examples/ipsec-secgw/build/ipsec-secgw --socket-mem 2048,0 --legacy-mem -w 0000:60:00.0 --vdev=net_tap0,mac=fixed
    --vdev crypto_aesni_gcm_pmd_1 --vdev=crypto_aesni_gcm_pmd_2 -l 9,10,11 -n 6  -- -P  --config "(0,0,10),(1,0,11)"
    -u 0x1 -p 0x3 -f /root/dts/local_conf/ipsec_test.cfg

Steps::

    1. start ipsec-secgw sample;
    2. config tester kernal IPSec;
    3. ping from DUT
    # ping 11.11.11.1

Expected result::

    the ping command should be get response normally.

Test Case: Packet reassemble Test
---------------------------------
Description::

    This Case is used to verify that ipsec-secgw could handle fragmented packets.

Steps::

    1. start ipsec-secgw sample;
    2. config tester kernal IPSec;
    3. ping from DUT with a packets exceeds MTU
    # ping 11.11.11.1 -s 3000