From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM01-BY2-obe.outbound.protection.outlook.com (mail-by2nam01on0067.outbound.protection.outlook.com [104.47.34.67]) by dpdk.org (Postfix) with ESMTP id 1FCFE9954 for ; Wed, 2 Aug 2017 15:16:38 +0200 (CEST) Received: from BN6PR03CA0064.namprd03.prod.outlook.com (10.173.137.26) by BLUPR0301MB2114.namprd03.prod.outlook.com (10.164.22.156) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.1.1304.22; Wed, 2 Aug 2017 13:16:36 +0000 Received: from BN1AFFO11FD035.protection.gbl (2a01:111:f400:7c10::191) by BN6PR03CA0064.outlook.office365.com (2603:10b6:404:4c::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.1.1304.22 via Frontend Transport; Wed, 2 Aug 2017 13:16:36 +0000 Authentication-Results: spf=fail (sender IP is 192.88.168.50) smtp.mailfrom=nxp.com; intel.com; dkim=none (message not signed) header.d=none;intel.com; dmarc=fail action=none header.from=nxp.com; Received-SPF: Fail (protection.outlook.com: domain of nxp.com does not designate 192.88.168.50 as permitted sender) receiver=protection.outlook.com; client-ip=192.88.168.50; helo=tx30smr01.am.freescale.net; Received: from tx30smr01.am.freescale.net (192.88.168.50) by BN1AFFO11FD035.mail.protection.outlook.com (10.58.52.159) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.1.1282.16 via Frontend Transport; Wed, 2 Aug 2017 13:16:32 +0000 Received: from [127.0.0.1] (B10814-12.ap.freescale.net [10.232.40.21]) by tx30smr01.am.freescale.net (8.14.3/8.14.0) with ESMTP id v72DGMJ3004832; Wed, 2 Aug 2017 06:16:27 -0700 To: Declan Doherty , Akhil Goyal , , References: <7834b3bd-0800-500c-1c89-3b89e2eb47fa@nxp.com> <20170725112153.29699-1-akhil.goyal@nxp.com> CC: , , , From: Hemant Agrawal Message-ID: <9c0b8bdd-2693-4275-664f-8ccf7b368031@nxp.com> Date: Wed, 2 Aug 2017 18:46:22 +0530 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="windows-1252"; format=flowed Content-Transfer-Encoding: 7bit X-EOPAttributedMessage: 0 X-Matching-Connectors: 131461533959290172; (91ab9b29-cfa4-454e-5278-08d120cd25b8); () X-Forefront-Antispam-Report: CIP:192.88.168.50; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(6009001)(336005)(39400400002)(39410400002)(39380400002)(39850400002)(39860400002)(39840400002)(39450400003)(2980300002)(1110001)(1109001)(339900001)(3190300001)(24454002)(51914003)(199003)(189002)(377454003)(104016004)(356003)(4001350100001)(38730400002)(2201001)(65826007)(8936002)(50466002)(6246003)(5890100001)(230700001)(53936002)(31696002)(229853002)(83506001)(8656003)(64126003)(305945005)(97736004)(85426001)(23746002)(54906002)(498600001)(86362001)(4326008)(77096006)(68736007)(81156014)(76176999)(54356999)(81166006)(8676002)(53546010)(561944003)(106466001)(65806001)(65956001)(105606002)(6666003)(626005)(33646002)(5660300001)(2906002)(7246003)(189998001)(7126002)(36756003)(47776003)(50986999)(120886001)(31686004)(2950100002)(217873001); DIR:OUT; SFP:1101; SCL:1; SRVR:BLUPR0301MB2114; H:tx30smr01.am.freescale.net; FPR:; SPF:Fail; PTR:InfoDomainNonexistent; A:1; MX:1; LANG:en; X-Microsoft-Exchange-Diagnostics: 1; BN1AFFO11FD035; 1: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 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: f5405e58-b017-44e5-1bdb-08d4d9a8b3ba X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(300000503095)(300135400095)(2017052603031)(201703131430075)(201703131517081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:BLUPR0301MB2114; X-Microsoft-Exchange-Diagnostics: 1; BLUPR0301MB2114; 3:QLmS2TW+or/7rV0m7pYBZNZ4mXFU/lqgkwuPbbd+PxIG1ff4dDAdB8OtQHdR7bi2hUC6WRx6gbE+9ql7tPPaWG2gwHRH+vdx/yO1EVcmJ331gyhubnjchKdGnNerhKhX35MP2dboFb2ANt2nmB5fna3UvCHl53NwMdkFdzIjuL1PKrgcuHPyrfzgTIxxr92+s5cyzMHTIOGO1+BeAx5d3Yqtth5B48f2E9sPJLUbyuKLUyWuIqI+kiS+ldtIk8c9oVSrzdYnWAQXHJXY2c/onDNiwiL+THBhA1oiI+fiNIMXdmX8WbNfp2Fw7xh2dH98zrdZsKNJ5BHef23NN3dV2oF4AIOtyHwHhvDCbo41yXphVQyU8k9qcfgr8KP443MDy9Hur4scp7quKg6qmbJqWK6seJiFMdP4WT8TAYAKLGa0+9dRQG7Y05lEEWW1Z6V/DYULjo9sgsPOb1TeSeMz++90KQQTvxItyLHMI5mvpuSOVbVghBfEYDoNgONfc/nLN3WH/Bd1OSymyrKwKQpStxBEAV2d1Ihxe5jWSD1mEeuYzcZymMlkGIoQMB3+nyvnRyNvrG7p2FlkorXST7TCslZrQfFNII6SU1HQ/VDkEyf1CSlshwx0IG55JLCYLsUbO7leP7b2uhizR2jtj2EHNcdsvam27YhNDWTd6vpAFX4Pj7fmLqZgCSXe033aZxOg50FHyGy8UC8C4+umw2FC3xi9JLq/t6I8U2HKPhu8wvJs2wmUnhi1WLkKm0GWraJJlo3qci1Gfh/OBRcu2HEwA+rQcWPNT/1BwFbANXXx4yOM14lNLOxSFm5yRIIS9YWyutM8esJr142Rtusx8WQoCWXAI0zW6ZaielCf3w77RrEf9PETyNqB9DM+W44RZ5jy X-MS-TrafficTypeDiagnostic: BLUPR0301MB2114: X-Microsoft-Exchange-Diagnostics: 1; BLUPR0301MB2114; 25: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 X-Microsoft-Exchange-Diagnostics: 1; BLUPR0301MB2114; 31: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 X-Exchange-Antispam-Report-Test: UriScan:(192374486261705)(100405760836317); X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6095135)(601004)(2401047)(13018025)(8121501046)(13016025)(5005006)(100000703101)(100105400095)(93006095)(93001095)(3002001)(10201501046)(6055026)(6096035)(20161123559100)(20161123563025)(20161123556025)(20161123561025)(201703131430075)(201703131448075)(201703131433075)(201703161259150)(201703151042153)(20161123565025)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:BLUPR0301MB2114; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(400006)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:BLUPR0301MB2114; X-Microsoft-Exchange-Diagnostics: =?Windows-1252?Q?1; BLUPR0301MB2114; 4:30/v/k4XH3gqKThaHgMQBLCnvYle/HO1flOf?= =?Windows-1252?Q?yS11D5EPFYMqSMOHpRVO5qb22kROf82jfdXy6ibXkMDRZRXitx02KclE?= =?Windows-1252?Q?WCbEs632dnaae+nLz0FzY8rNCeyWDKvEqZ0PdiAeXbNEjvQYewC0ZURL?= =?Windows-1252?Q?sKSf5DY4+rYqbdZRUfqdLlOg04GPldliy6f4H9Al834bGm3vir591ACt?= =?Windows-1252?Q?oHhpmGXGJHX0anJ9nFWIdYUKb1Vwpx+4hq1GPa7jZe3apCOqbjIFoMVJ?= =?Windows-1252?Q?BEYTfoCrIPFY5zHPeHT6Jtujh/kKOVptz9z1xPhwQsRqK84iOxddQPPJ?= =?Windows-1252?Q?Xf8TfTRbegttWbBOHlnqcGHC7y6tZI5nwv9VUkEQH6zdpgM1LmHrNxhg?= =?Windows-1252?Q?BsGpCUN158S/Eu17IKS7tl5tZaTGin4P3hauzn07Nk9DvqhDyFRY1O1E?= =?Windows-1252?Q?JmR+4LlYjvYPlpRCBbF+lThJvvXt5X8qyMwvBV86Nkb5UJ4Z+8t40RSS?= =?Windows-1252?Q?5x8OofZObWrh0DtkxTmEXccefyJTgAhRBZ8ElcdEGEgc76xB62sjputl?= =?Windows-1252?Q?q/Fxcspm8wGp8N7D9+ZTOFpZkFgcqt55SqxJ6EDohq+NQlpD9ZN0rOYV?= =?Windows-1252?Q?MiASXOf7fms9caPGoKYJy8it2EfI+vSaThMDg7w2AFTXg03YBdMHwMeT?= =?Windows-1252?Q?1gxE5nqX/sPMJxRcJ6hcv/c9QbTexBbkuYKF+tZwalZk0gyjOYBs0rq7?= =?Windows-1252?Q?MGnHbU0kSshWhfNTzwRtkDTt1i7R93Wvfkm5TuQoBl1Er75VNy90doXB?= =?Windows-1252?Q?RC/wzrZL+5PcuWjlDnu4+mpQLs9qnLrO+phuUC61g8YWyhtZw3SBGYaG?= =?Windows-1252?Q?4Ivm5+U8JxxaeiVcyyZF/W+m59y13bbQaNjOOakLiBrM43JCHxY05WLG?= =?Windows-1252?Q?2AQqUmm33ZNCwzj0La5cqAQaFfszsgj3Iq/OUQ3r1LBhpV0bWmktoSK+?= =?Windows-1252?Q?TJvFyCAMvVphuvQw/wc39s5WDEkTkWuKNj9vok+mPYWttvqFWzboDqm2?= =?Windows-1252?Q?xul55OXDHj7RMwfFuz5bcb0LXc5fB9e51x7kaHv+vgPRGiUUsaLKfuvm?= =?Windows-1252?Q?E6k6a53z0utV0jKrzq3Q6i9QWfCygA6Af/ZW84KgHRKj3ns5MRVvSlfX?= =?Windows-1252?Q?NX0U0GtFdKCrbgnYCqKo0WQlVZU42fXudFA5XJ6//+FiEZVTJrzaMvBk?= =?Windows-1252?Q?kdEcb4vXV5dzxf23a1oZbdX7SloJD8qBzVVpQeN3NdU2wiJP+gbeAVmc?= =?Windows-1252?Q?KExXiq6VGmTVXZ6sRb5OIe+6uKNgxoLiax7QyJtTHZyIrnWRt8Npf9Uz?= =?Windows-1252?Q?9Q7/0IMfN3rgc6ZH9F8+SA4IEaJWk9FEfQ=3D=3D?= X-Forefront-PRVS: 0387D64A71 X-Microsoft-Exchange-Diagnostics: =?Windows-1252?Q?1; BLUPR0301MB2114; 23:GYVc6JEWSQPnhe4tvrpW1yiFZTJpULyPmc1?= =?Windows-1252?Q?HY2Usgnb1lr5sdKWCibXgtPtcAF5IuI7jR2OcegmmrA2UlP3jYRo9yHU?= =?Windows-1252?Q?zUx69WuirMPMzySsuK91G24fgxnf6OhN5n69NZ0K18/SI5R4SdVJvVLU?= =?Windows-1252?Q?+R/xhoGzqlPnohxkmjE/eqpDfJXQbipDbi4cCzBO1irPMgfN/0wXmRuZ?= =?Windows-1252?Q?0HGu9VIrAvZdzbbSsLoCM0wZuUAHiIFY0Hz3Tv0esVkWpLuvroXHAPsZ?= =?Windows-1252?Q?eRORMDSHxEDg0102QNnEmEqZ6T6hEmGnWKOjrVfeF4zxQxxd990lhPYn?= =?Windows-1252?Q?F8AGu0181czXjs6yhLCwDNzpih6m534asWYsLYZbv0VIZ2HDb69daexu?= =?Windows-1252?Q?yEoZZuYRajKreckeTdHzcNq9PHQdHEiPS2GS8QeYWXJND0lYUhKbcDeY?= =?Windows-1252?Q?xw4uJzaJ4nA+3q0Uvoiu4/Otu/RVYZoiAG0e2eOLG02RpLRffd3a6R6Q?= =?Windows-1252?Q?GVrO++c5PO+g+alTT7FzcuL8yohBpjZQWcrL4bqcSsmAbRNnB1JXbxys?= =?Windows-1252?Q?WTAu8UarIgkPpPjFTbimff5cIlbTR3iU5EaUvjZmzdU/yKp/OozkTktK?= =?Windows-1252?Q?PqIjmF6q0EwmYM8FbTtLKfaKv0xuicjvOybUnClGEZumKNoRGMKwARgd?= =?Windows-1252?Q?fKlFLBai19CaG/PDkrKD4mxi931g9Qg7mt/d7vhhu1iC8QA4KqX8GAr5?= =?Windows-1252?Q?yG28I2FJHp1fLLYBzmTJOucQ8YRww/TmSjhqlsXCm6mITcIjyC7lF7rS?= =?Windows-1252?Q?ci4s88w4bJLExzSLFZOY9KORE7XyVnhHXhN8ud1iVrciQj7/pO0HE4Ld?= =?Windows-1252?Q?EDtCJZItqzFFkcqyIi2F+wPvua8Dx+xeSXzzuEra621T4CgCjuRPTqjn?= =?Windows-1252?Q?DkOn47cNhUxXfO+/jLeY3812QePPd6bi3dLXnWMdY/BLwXa4gzwjvtYg?= =?Windows-1252?Q?cK+dg2u5CGi3YYUfaeHlIG1T9W/Kww97n9gvZnh8CB/nepKVoBRTcYZR?= =?Windows-1252?Q?ZUzmyxE8i0dMrZikn0CBkCGX+hZ4PFI2p1IJEbD2hEHBaNePkw3c6eup?= =?Windows-1252?Q?grY2M+04V+FwO13LsqyzMPsgoxJJpo7e7eWO7k8pXUWu4nV2f+SfUt/F?= =?Windows-1252?Q?mZMMlZvekAaQCWe6ysJ8JRfWg1pMAHD4eXHZd/CWAVrNOltz51or9x8g?= =?Windows-1252?Q?Rn7iThC1L4ROg5TJcWKfPjpIFK6iKTmA3xOAzyxwVTiwUQxsXgrghf8y?= =?Windows-1252?Q?j/kxRSPeAY6+SHvMyF/iICB68KCJj4jat6JJpqPm3lqKobFRQ1liLd5l?= =?Windows-1252?Q?zACLVUGWtFrkfn66s3VgZ8dZMajtDYv1TjIxNt9a5Rk7EBX1g4nVGbV9?= =?Windows-1252?Q?tzK1WWScCL5wqLSH9QmsjdobosmDlsB+A3VEpoz96VDlVDaQufeqgvLj?= =?Windows-1252?Q?oRrsa8Mz9enaJunR2Ie6rRUI+s4gL/ZiGzq3FmY4jM75x6uVDOHjJGgG?= =?Windows-1252?Q?+ryEf8m+7KuOKtqGnWA2pfjTU6PNc/X541NYDj+XcPOjWGn7n2Fe8Czr?= =?Windows-1252?Q?K7mZkKgzV5EM2+jUOHwH3G9yR0uFU0KeuXqCUkQmvdaIJR2B0DJKr4yV?= =?Windows-1252?Q?CCt4v6Y8BMshHaaduNRVjuyNK9xRRPcGsJ2LR1E/rmebj9WV/+Bpoq3+?= =?Windows-1252?Q?b5w55mQje4RrRy7Yr8bJKvrmVpPNK2X+H06DdXbAhi+XGWUde5CyLwHY?= =?Windows-1252?Q?OCOjpKh+aeiG0AJvif4AG+Lva6ZikljO7fxFib1UDEJ6QqNQ4OO9fERp?= =?Windows-1252?Q?LJOUtpA501mut?= X-Microsoft-Exchange-Diagnostics: =?Windows-1252?Q?1; BLUPR0301MB2114; 6:etr7SJSKpk/HOiz4sebttvoP2FL8r1iG6JPL?= =?Windows-1252?Q?sbTrq/vhxzvxe6rthkurbq6m5kHVt/4APSvhwPVGEaLFBs1YV2ah7IwX?= =?Windows-1252?Q?VjyK7Y4gLWwisKgzzSXS5HhJi+cVTQHVDGfFoRiYh7ysgnq3VjSV3cRS?= =?Windows-1252?Q?LdVkXwIe80ZIBnXuNOmIam7EaaX630zhECsnDvH05ZsJTwrnvpnAEqA0?= =?Windows-1252?Q?8rq5GpW6043BJO9Xt3CMooIxWQohxS9UloTZ1L+1p38RC9f+joOB5aTZ?= =?Windows-1252?Q?hu7y667CyKDSQybynmqerS74XFnQJ+9ZWWuGKR/DBusBgcYVM7zRS3xo?= =?Windows-1252?Q?fcM3YRj9WSVvbNjOY9NOjUcRbtftNjGFKI+5cNNjvbAVBA/rdR08nHTH?= =?Windows-1252?Q?asgfnrq/clGH7z6LSzeUnWczI1EtWcb1h1b3eYe6f4gTp3C/kCdvrHPt?= =?Windows-1252?Q?lrDPatNhyPDnJQ3Z+j22fCHeMofyhpYAPb4X1n+YKjqe7rHFDcBtwRl9?= =?Windows-1252?Q?wUYDACvzMBMI8dDoLOCuHH/qRlEpGUFjbTw9JtS3B5iBsM0SPzZkeM8w?= =?Windows-1252?Q?jy5hqQALPs2Xkf+j5E/WyHAvAbc89SSOv+gON0d85zkKvm8huOEmW3Gl?= =?Windows-1252?Q?ibfaJuLsoiw28fSmL1ur9yr9SjDHKgB3Cshngft+iVOno9C30ikhuyum?= =?Windows-1252?Q?i8mW/R+YuDvTbOxAlM6tMuHPVFqV/ShCupRh8KxiymVBu2m3HvNPVE5u?= =?Windows-1252?Q?CkvR6yGs2JJPHigsUl9/21Z+xQPvbPDDG4qxX97fLiVuNhTB4FdVkST4?= =?Windows-1252?Q?bYooe5/u1Mh0b3UOFmgU9qL99cKVJ/nCOWv7LQvH3Tj+yzlyPenpUhze?= =?Windows-1252?Q?LSOhB7knSXhpjna3oseCHChlymbSrj5yYfvIV/SG1eXCLWPjW3eOxH/i?= =?Windows-1252?Q?rVynirimLE0Z+9IxgpTIFwoToZJSif05zl0t7pZs+ZShWunGHTGXdSRA?= =?Windows-1252?Q?wt2/Oha5UQ9GfseDWmAEOjUMzbfrJftuseYDmx6Y2Z0v4yX+Yg=3D=3D?= X-Microsoft-Exchange-Diagnostics: 1; BLUPR0301MB2114; 5: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; 24:73vXzZrce30EMrcTiFho6vNzMtEChgRuPdwD+YGM3evCz3Oj8HPnRDnS1rbbyBDfqiSQmygJMLCL1MxqgPmGQ9lyZwOI8lLp2IK4knTce9E= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; BLUPR0301MB2114; 7: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 X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Aug 2017 13:16:32.8245 (UTC) X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.168.50]; Helo=[tx30smr01.am.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BLUPR0301MB2114 Subject: Re: [dpdk-dev] [RFC PATCH 0/1] IPSec Inline and look aside crypto offload X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 02 Aug 2017 13:16:39 -0000 Hi Declan, On 7/26/2017 7:16 PM, Declan Doherty wrote: > Hey Akhil, I like the proposal of allowing the rte_secruity API to be > supported on both NIC and crypto devices as I think it allows us to > cover all the protocol offload scenarios in a consist manner. > > The main concern I have is in regards to the device identification in a > consistent manner between device types, and I'm not exactly clear from > your description below on how you want to do that, as the dev_id and > port_id can overlap. > > If we follow this model, I think it would a good time to introduce a > sudo UUID into each device in DPDK, not necessarily a 16 byte UUID but I > think a unit16_t or uint32_t would be more than sufficient for DPDK > needs. As we now have a common rte_device structure in all device types, > we can add the UUID here, and then allow common APIs like this to use > the UUID as the key. We could also then support some generic device APIs > such as: > > uuid_t rte_device_get_uuid_by_name(char *dev_name); > > uuid_t rte_ethdev_get_port_uuid(uint8_t pid); > uuid_t rte_cryptodev_get_device_uuid(uint8_t pid); > > Which will allow easy retrieval handle to use in the rte_security APIs. > > Also I don't know if we need all the semantic of the cryptodev API in > regards the way sessions are managed as I these security sessions are > implicitly linked to hardware there isn't any need to support moving > session between devices? > > int rte_security_configure(uuid_t uuid, struct rte_mempool *mempool); > > struct rte_security_session *sess > rte_security_session_create(uuid_t uuid, > struct rte_security_sess_conf *conf); > Thanks for the comment. The uuid idea is good, we should work on it. But this work can be started without uuid as well. the port and platform type shall be able to help identifying the destination. We shall do it in next phase. > > On 25/07/2017 12:21 PM, Akhil Goyal wrote: >> Below is a counter proposal for the RFC sent by Boris. >> If we find some consensus, we can have implementation for this >> proposal in a few weeks. >> >> The proposal is largely inline with the thoughts from Declan with a >> few exceptions. >> Here we are proposing a security framework which can be used both by >> crypto drivers >> and the hw offloaded NIC to showcase the protocol offload support as >> well as inline >> ipsec in hw offloaded NIC. >> >> The placement of the rte_security.X can either be a separate library like >> lib/librte_security/ or it can be taken as an extension to the >> lib/librte_cryptodev/. >> The reason for placing this in the cryptodev is that we are referring >> to some >> crypto enums and the APIs look similar to that of cryptodev. >> >> Here we propose that the application may be able to configure either >> NIC or >> crypto PMD to perform IPSec and other security operations. >> This is configured using the API >> >> int >> rte_security_configure(uint16_t dev_id, char *dev_name); >> >> This API take dev_id and dev_name to identify which device needs to >> perform security >> operation. Once the device is enabled for Security operations, the >> application can >> create and initialize the session for the enabled device. >> >> struct rte_security_session * >> rte_security_session_create(struct rte_mempool *mempool); >> >> int >> rte_security_session_init(uint16_t dev_id, char *dev_name, >> struct rte_security_session *sess, >> struct rte_security_sess_conf *conf, >> struct rte_mempool *mempool); >> >> These two APIs are similar to the rte_cryptodev_sym_session_create and >> rte_cryptodev_sym_session_init respectively, except that >> rte_security_session_init >> takes device name also to identify between the NIC(IPSEC inline or >> full offload) >> or crypto(look aside protocol offload). >> >> These sessions can be cleared and freed with the APIs >> >> int >> rte_security_session_clear(uint8_t dev_id, char *dev_name, >> struct rte_security_session *sess); >> int >> rte_security_session_free(struct rte_security_session *sess); >> >> The details for various structures used are mentioned in the below patch. >> These are very similar to what Declan proposed with a few additions. >> This can be updated further for other security protocols like MACSec >> and DTLS >> >> Now, after the application configures the session using above APIs, it >> needs to >> attach the session with the crypto_op in case the session is >> configured for >> crypto look aside protocol offload. For IPSec inline/ full protocol >> offload >> using NIC, the mbuf ol_flags can be set as per the RFC suggested by >> Boris. >> >> Configuration path for both crypto and NIC can be illustrated as below >> >> Configuration Path Configuration Path >> for NIC for Crypto >> | | >> +--------|--------+ +--------|--------+ >> | Add/Remove | | Add/Remove | >> | IPsec SA | | IPSec SA | >> | | | | | | >> |--------|--------| +--------|--------+ >> | | >> +--------V--------+ | >> | Flow API | | >> +--------|--------+ | >> | | >> +--------V--------+ +--------V--------+ >> | | | | >> | NIC PMD | | Crypto PMD | >> | | | | >> +--------|--------+ +--------|--------+ >> | | >> +--------|--------+ +--------|--------+ >> | HW ACCELERATED | | HW Crypto | >> | NIC | | Protocol Aware | >> | | | Device | >> +--------|--------+ +--------|--------+ >> >> >> Now the application(ipsec-secgw) have 4 paths to decide for the data >> path. >> 1. Non-protocol offload (currently implemented) >> 2. IPSec inline(only crypto operations using NIC) >> 3. full protocol offload(crypto operations along with all the IPsec >> header >> and trailer processing using NIC) >> 4. look aside protocol offload(single-pass encryption and >> authentication with >> additional levels of protocol processing offload using crypto device) >> >> The application can decide using the below action types >> enum rte_security_session_action_type { >> RTE_SECURITY_SESS_ETH_INLINE_CRYPTO, >> /**< Crypto operations are performed by Network interface */ >> RTE_SECURITY_SESS_ETH_PROTO_OFFLOAD, >> /**< Crypto operations with protocol support are performed >> * by Network/ethernet device. >> */ >> RTE_SECURITY_SESS_CRYPTO_PROTO_OFFLOAD, >> /**< Crypto operations with protocol support are performed >> * by Crypto device. >> */ >> RTE_SECURITY_SESS_NONE >> /**< Non protocol offload. Application need to manage everything */ >> }; >> >> >> Egress Data Path >> >> For ETH_INLINE_CRYPTO For CRYPTO_PROTO_OFFLOAD >> | | >> +--------|--------+ +-----------|-----------+ >> | egress IPsec | | Plain packet from NIC | >> | | | | | | >> | +------V------+ | | +--------V--------+ | >> | | SABD lookup | | | | SA lookup | | >> | +------|------+ | | +--------|--------+ | >> | +------V------+ | | +--------V--------+ | >> | | Tunnel | | | | session attach | | >> | +------|------+ | | +--------|--------+ | >> +------------+ >> | +------V------+ | | +--------V--------+ | | >> Hw crypto | >> | | ESP | | | |Enqueue to crypto|------> >> Device | <--- Headers are added by the HW device. >> | | | | | | Device | | >> | | >> | +------|------+ | | +-----------------+ | >> +-----|------+ >> +--------V--------+ | +-----------------+ >> | | >> | | | Dequeue from >> |<-----------+ >> +--------V--------+ | | Crypto Device | | >> | L2 Stack | | +--------|--------+ | >> +--------|--------+ | +--------V--------+ | >> | | | L2 Stack | | >> +--------V--------+ | +--------|--------+ | >> | | +-----------|-----------+ >> | NIC PMD | | >> | | +-----------V-----------+ >> +--------|--------+ | NIC PMD | >> | | (packet sent out) | >> +--------|--------+ +-----------|-----------+ >> | HW ACCELERATED | >> | NIC | >> | | >> +--------|--------+ >> >> Ingress Data Path >> >> For ETH_INLINE_CRYPTO For CRYPTO_PROTO_OFFLOAD >> | | >> +--------|--------+ +-----------|-----------+ >> | Ingress ipsec | | Encap packet from NIC | >> | | | | | | >> | +------V------+ | | +--------V--------+ | >> | | HW ACC NIC | | | | SA lookup | | >> | +------|------+ | | +--------|--------+ | >> | +------V------+ | | +--------V--------+ | >> | |validate ESP | | | | session attach | | >> | +------|------+ | | +--------|--------+ | >> +------------+ >> | +------V------+ | | +--------V--------+ | | >> Hw crypto | >> | |Remove ESP | | | |Enqueue to crypto|------> >> Device | <--- Headers are removed by the HW device. >> | | and Tunnel | | | | Device | | >> | | >> | +------|------+ | | +-----------------+ | >> +-----|------+ >> +--------V--------+ | +-----------------+ >> | | >> | | | Dequeue from >> |<-----------+ >> +--------V----------+ | | Crypto Device | | >> |Plain packet to App| | +--------|--------+ | >> +--------|----------+ | +--------V--------+ | >> | |Plain packet to | | >> | | app | | >> | +-----------------+ | >> +-----------------------+ >> >> >> Akhil Goyal (1): >> RFC: rte_security: proposal >> >> lib/librte_security/rte_security.h | 405 >> +++++++++++++++++++++++++++++++++++++ >> 1 file changed, 405 insertions(+) >> create mode 100644 lib/librte_security/rte_security.h >> > >