Message ID | 1519896103-32479-3-git-send-email-anoob.joseph@caviumnetworks.com (mailing list archive) |
---|---|
State | Superseded, archived |
Headers |
Return-Path: <dev-bounces@dpdk.org> X-Original-To: patchwork@dpdk.org Delivered-To: patchwork@dpdk.org Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id D24295F21; Thu, 1 Mar 2018 10:22:25 +0100 (CET) Received: from NAM01-BY2-obe.outbound.protection.outlook.com (mail-by2nam01on0060.outbound.protection.outlook.com [104.47.34.60]) by dpdk.org (Postfix) with ESMTP id 61F375F16 for <dev@dpdk.org>; Thu, 1 Mar 2018 10:22:23 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=CAVIUMNETWORKS.onmicrosoft.com; s=selector1-cavium-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=NrmPbY0LFtEgULY33iGwgBrH3HYfIVQDd+yumiyrPQM=; b=L5g9jUOVFP5OCcw23oxTbL+8o1lwoiNZWvjqMX6E/iMrIgjosjvdQwwMN7SpKrB0RzhQh3w2fNWPSAskeI6IrEUOWlZYYO9XE4ZAWw6xBFl1yZA8YQelLrbA2WK45yEYMlRW70BNg6oufvkYoTDa7XtD5tPE0dswvjxshHNr6Go= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=Anoob.Joseph@cavium.com; Received: from ajoseph83.caveonetworks.com.caveonetworks.com (115.113.156.2) by DM2PR0701MB1068.namprd07.prod.outlook.com (2a01:111:e400:2472::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.527.15; Thu, 1 Mar 2018 09:22:19 +0000 From: Anoob Joseph <anoob.joseph@caviumnetworks.com> To: Akhil Goyal <akhil.goyal@nxp.com>, Declan Doherty <declan.doherty@intel.com>, Radu Nicolau <radu.nicolau@intel.com> Cc: Anoob Joseph <anoob.joseph@caviumnetworks.com>, Jerin Jacob <jerin.jacob@caviumnetworks.com>, Narayana Prasad <narayanaprasad.athreya@caviumnetworks.com>, Nelio Laranjeiro <nelio.laranjeiro@6wind.com>, dev@dpdk.org Date: Thu, 1 Mar 2018 14:51:40 +0530 Message-Id: <1519896103-32479-3-git-send-email-anoob.joseph@caviumnetworks.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1519896103-32479-1-git-send-email-anoob.joseph@caviumnetworks.com> References: <1519191430-19201-1-git-send-email-anoob.joseph@caviumnetworks.com> <1519896103-32479-1-git-send-email-anoob.joseph@caviumnetworks.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [115.113.156.2] X-ClientProxiedBy: MWHPR06CA0006.namprd06.prod.outlook.com (2603:10b6:301:39::19) To DM2PR0701MB1068.namprd07.prod.outlook.com (2a01:111:e400:2472::21) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 476fffee-4a92-433b-41e7-08d57f55f059 X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(4534165)(7168020)(4627221)(201703031133081)(201702281549075)(5600026)(4604075)(2017052603307)(7153060)(7193020); SRVR:DM2PR0701MB1068; X-Microsoft-Exchange-Diagnostics: 1; DM2PR0701MB1068; 3:wzqXjzT1npi+wCIl45XkYQBWVbkjA2G97rtFiBBrqnvAk9yZglQj7YPYdwoqa3+Na7cvGl19L185PoQt40fX5+K3IvJrTqlV2DjjVB5gw2rxE1ta4fK6aSeP3YrOpY5V6yb7A2gNGdXwpkyPIXttoFjG2StwQlxCQ/DM17Zi8TJQ7NUJoFn1o03RHU2Uq/tCsyAivi65CWr2gRDMqxQuSoQsX461CBC+hpTUGcZUOhv5cwmmewoNq97IZ1qug6n4; 25:+bLYqvWlWwVHghlbjJS6x445VEz3ADSi9fdI5xIfqckIKi9yR/628KtDlrNZjuDnqomAtjDAkCH2uUfn2Q7kUkwU5FN7nU2+veQ89KE1E941T0hyxpPkD1x6Ly8FxbJbOJbPnSU7oP8DTG68ERc6r417HD/BDcaoSKNHKjW5kADgB6iODHyplSragcFXCqSGh4DRtIvzjkp7w8YrAzrkLySnJU9SJqU4uEgSm/tqivyYbssYf1dmipZN0JZtYnJnro7VPoiUWs/oSjy6E0UQ9nMx+yaTkEwsjb3fWJIzDEr8kni0Qn6txtLu5bZxVgLo1YoIQWNuCuBrzBW6+CtVHA==; 31:Z7AMFd4XvOrs2OT98zPGP3XtQ4R0QcvzS9U9NTq4jMIIdJ7fKtxai+J/fivs3qd7mMLJKYNz+W8Q006WhC5WTkXWDtFI2XkQxjqQ8wWQroVLZY2PY0F6tmJSx0naGMFjXVgcXz7vQGp92ckA1LSfnLXG/k7mVZeyQtH+b6g+plWwoMRF03OYSeTz5K3QkSoyt/Kp++t6kpO1XVTsHuYkBKckK3wxrljufUSKvw7bFeY= X-MS-TrafficTypeDiagnostic: DM2PR0701MB1068: X-Microsoft-Exchange-Diagnostics: 1; DM2PR0701MB1068; 20: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; 4:/FH6RIS8cqQmRWreXKmbLU9LK2nlitnHwTvzLlWRwfMkRwL7MQVTe5cDJsglOJ4nPrtQV/lxt0nyl0n2ySH8JTEf+LND7cWSEc0FXa8zz1crFwJ8PCZ28H90mQ+CIvam0TUElc+CaAFPEYb4n18IcjtD8p2fatD7n82f05x+h5miTs16p/SAiABhrGxw3/C++vA3LiHwzrEgVjIzChZK4id3n5Ng4ISTnn6cYuMXV7zUHjt2iwqvwJSpv44gBCqN/zPdyLi4Dg11Nk0bageC3kXPqz4/zfzPrYTzxRXfnYYtjy+GKUGxt+xksA3vvvcH X-Microsoft-Antispam-PRVS: <DM2PR0701MB1068FD014AD3CC24772707B1F8C60@DM2PR0701MB1068.namprd07.prod.outlook.com> X-Exchange-Antispam-Report-Test: UriScan:(192374486261705); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040501)(2401047)(8121501046)(5005006)(3002001)(3231220)(944501224)(52105095)(93006095)(10201501046)(6041288)(20161123564045)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(20161123560045)(6072148)(201708071742011); SRVR:DM2PR0701MB1068; BCL:0; PCL:0; RULEID:; SRVR:DM2PR0701MB1068; X-Forefront-PRVS: 05986C03E0 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(39860400002)(366004)(396003)(376002)(39380400002)(346002)(199004)(189003)(76176011)(186003)(8676002)(386003)(6116002)(50226002)(2950100002)(106356001)(6666003)(2906002)(81166006)(52116002)(478600001)(81156014)(3846002)(72206003)(36756003)(97736004)(8656006)(8936002)(54906003)(110136005)(6512007)(25786009)(50466002)(316002)(105586002)(51416003)(5660300001)(42882007)(6486002)(47776003)(16586007)(55236004)(48376002)(26005)(6506007)(66066001)(59450400001)(53936002)(305945005)(68736007)(4326008)(16526019)(15650500001)(7736002); DIR:OUT; SFP:1101; SCL:1; SRVR:DM2PR0701MB1068; H:ajoseph83.caveonetworks.com.caveonetworks.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en; Received-SPF: None (protection.outlook.com: cavium.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; DM2PR0701MB1068; 23:B7HrVwTZnpNQTkMhvYP8fQnVg+f9OhHr+RrKcsL?= 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 X-Microsoft-Exchange-Diagnostics: 1; DM2PR0701MB1068; 6:RVmhk2GHxxMCnuoNV6x7rhwLmMhLbex7aPZ5+egZrMvBrdap42hrXYtz5HEyidIVQnLGPlPA7iXivbbPuwbBUN+gZYmu67IEQ/uhckAvz253D0XUiydBzPIFdoFEsm62JfAvdbxcTjtfWTGT4hSVoq9F2VX3uumNrxqmZT6/qIFrsHm8fPq3ov/403sFoaPKY9FBVEZkWhv94lqoIvEf7MZVQrxlHoYrAErY8n4JYFX+yMv0yN2M4bE7YeYN4R+LrreJPfuMNp2DMwGdAZlEqs56neCjfd9E55yeuslOQQttPEaOv0deA8+3XzGchcDhQx1efPLAPj6vWLC27j5UnvWZPE0FMXud/hrCdmPY0so=; 5:riQE0d11Vyt48UIQIFrVMw3w15u1HgCCMkEc/KB5k+TnNQDYkMt48civ5QUw+ILaS/WnAKdd8lOJVBCKBni+D8+Z2YdpKH0GhnL8e3Gioz2hM5xdz4IF+9SRkvA0ygT4GtorfP4sKMVmhptXVWWmyky3Rz3POKFse93tKNp1mE4=; 24:5tioPxu4RyBQujxWk2xNzJ0cwjpunNiaoHU3wlnUbjbD46saBNV8Df9I0LGY9JHDrbp4e+8XKFZi0OoyUxTisuLPPx/TBs8nNmUZWZTw4xI=; 7:40nvFqv8s/QGCgVH1X3zY+CruVCaIuOE5fdRLFlyttsi/bO1qQdMmX4jvM+qGWCJJM5CvWzJF6xHJPLe8Z7zxcsCFRQSqGhz7i05vsGL4f3C8qZ7nc4MS9/GdBF/ySwoGSNW7EytwgRVbEkiNA5YvJoy0mLHmBIzLaUhRgckmAUFwsV0S6wgBvUCSeOybrVcEVoELhuI4rIe5yWcqPUXLUuK3L6QdOnOW+UV5pC5+NIAb9upo0t1FN6FqnD6rzj8 SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-OriginatorOrg: caviumnetworks.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2018 09:22:19.7091 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 476fffee-4a92-433b-41e7-08d57f55f059 X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 711e4ccf-2e9b-4bcf-a551-4094005b6194 X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM2PR0701MB1068 Subject: [dpdk-dev] [PATCH v2 2/5] lib/security: add ESN soft limit in conf X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions <dev.dpdk.org> List-Unsubscribe: <https://dpdk.org/ml/options/dev>, <mailto:dev-request@dpdk.org?subject=unsubscribe> List-Archive: <http://dpdk.org/ml/archives/dev/> List-Post: <mailto:dev@dpdk.org> List-Help: <mailto:dev-request@dpdk.org?subject=help> List-Subscribe: <https://dpdk.org/ml/listinfo/dev>, <mailto:dev-request@dpdk.org?subject=subscribe> Errors-To: dev-bounces@dpdk.org Sender: "dev" <dev-bounces@dpdk.org> |
Checks
Context | Check | Description |
---|---|---|
ci/checkpatch | success | coding style OK |
ci/Intel-compilation | success | Compilation OK |
Commit Message
Anoob Joseph
March 1, 2018, 9:21 a.m. UTC
Adding ESN soft limit in conf. This will be used in case of protocol
offload. Per SA, application could specify for what ESN the security
device need to notify application. In case of eth dev(inline protocol),
rte_eth_event framework would raise an IPsec event.
Signed-off-by: Anoob Joseph <anoob.joseph@caviumnetworks.com>
---
v2:
* No change
lib/librte_security/rte_security.h | 2 ++
1 file changed, 2 insertions(+)
Comments
Hi Anoob, Just a minor comment. On 3/1/2018 2:51 PM, Anoob Joseph wrote: > Adding ESN soft limit in conf. This will be used in case of protocol > offload. Per SA, application could specify for what ESN the security > device need to notify application. In case of eth dev(inline protocol), > rte_eth_event framework would raise an IPsec event. > > Signed-off-by: Anoob Joseph <anoob.joseph@caviumnetworks.com> > --- > v2: > * No change > > lib/librte_security/rte_security.h | 2 ++ > 1 file changed, 2 insertions(+) > > diff --git a/lib/librte_security/rte_security.h b/lib/librte_security/rte_security.h > index c75c121..a71ff6f 100644 > --- a/lib/librte_security/rte_security.h > +++ b/lib/librte_security/rte_security.h > @@ -222,6 +222,8 @@ struct rte_security_ipsec_xform { > /**< IPsec SA Mode - transport/tunnel */ > struct rte_security_ipsec_tunnel_param tunnel; > /**< Tunnel parameters, NULL for transport mode */ > + uint64_t esn_soft_limit; > + /**< ESN for which the overflow event need to be raised by eth dev */ eth/crypto dev > }; > > /** >
Hi Akhil, Will revise the patch with the mentioned change. Thanks, Anoob On 13/03/18 17:49, Akhil Goyal wrote: > Hi Anoob, > > Just a minor comment. > On 3/1/2018 2:51 PM, Anoob Joseph wrote: >> Adding ESN soft limit in conf. This will be used in case of protocol >> offload. Per SA, application could specify for what ESN the security >> device need to notify application. In case of eth dev(inline protocol), >> rte_eth_event framework would raise an IPsec event. >> >> Signed-off-by: Anoob Joseph <anoob.joseph@caviumnetworks.com> >> --- >> v2: >> * No change >> >> lib/librte_security/rte_security.h | 2 ++ >> 1 file changed, 2 insertions(+) >> >> diff --git a/lib/librte_security/rte_security.h >> b/lib/librte_security/rte_security.h >> index c75c121..a71ff6f 100644 >> --- a/lib/librte_security/rte_security.h >> +++ b/lib/librte_security/rte_security.h >> @@ -222,6 +222,8 @@ struct rte_security_ipsec_xform { >> /**< IPsec SA Mode - transport/tunnel */ >> struct rte_security_ipsec_tunnel_param tunnel; >> /**< Tunnel parameters, NULL for transport mode */ >> + uint64_t esn_soft_limit; >> + /**< ESN for which the overflow event need to be raised by eth >> dev */ > > eth/crypto dev > >> }; >> /** >> >
diff --git a/lib/librte_security/rte_security.h b/lib/librte_security/rte_security.h index c75c121..a71ff6f 100644 --- a/lib/librte_security/rte_security.h +++ b/lib/librte_security/rte_security.h @@ -222,6 +222,8 @@ struct rte_security_ipsec_xform { /**< IPsec SA Mode - transport/tunnel */ struct rte_security_ipsec_tunnel_param tunnel; /**< Tunnel parameters, NULL for transport mode */ + uint64_t esn_soft_limit; + /**< ESN for which the overflow event need to be raised by eth dev */ }; /**