From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mga06.intel.com (mga06.intel.com [134.134.136.31]) by dpdk.org (Postfix) with ESMTP id 0D5D61B419 for ; Fri, 14 Dec 2018 17:40:28 +0100 (CET) X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga008.jf.intel.com ([10.7.209.65]) by orsmga104.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 14 Dec 2018 08:40:28 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.56,353,1539673200"; d="scan'208";a="101573794" Received: from sivswdev08.ir.intel.com (HELO localhost.localdomain) ([10.237.217.47]) by orsmga008.jf.intel.com with ESMTP; 14 Dec 2018 08:40:26 -0800 From: Konstantin Ananyev To: dev@dpdk.org Cc: akhil.goyal@nxp.com, radu.nicolau@intel.com, Konstantin Ananyev Date: Fri, 14 Dec 2018 16:40:14 +0000 Message-Id: <1544805623-18150-1-git-send-email-konstantin.ananyev@intel.com> X-Mailer: git-send-email 1.7.0.7 In-Reply-To: <1544111691-7481-1-git-send-email-konstantin.ananyev@intel.com> References: <1544111691-7481-1-git-send-email-konstantin.ananyev@intel.com> Subject: [dpdk-dev] [PATCH v4 0/9] examples/ipsec-secgw: make app to use ipsec library X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 14 Dec 2018 16:40:29 -0000 This patch series depends on the patch series: Add 'try' semantics for RD and WR locking http://patches.dpdk.org/patch/48044/ http://patches.dpdk.org/patch/48045/ ipsec: new library for IPsec data-path processing http://patches.dpdk.org/patch/48900/ http://patches.dpdk.org/patch/48901/ http://patches.dpdk.org/patch/48902/ http://patches.dpdk.org/patch/48903/ http://patches.dpdk.org/patch/48904/ http://patches.dpdk.org/patch/48905/ http://patches.dpdk.org/patch/48906/ http://patches.dpdk.org/patch/48907/ http://patches.dpdk.org/patch/48908/ http://patches.dpdk.org/patch/48910/ to be applied first. v3 ->v4 - fix few issues with the test scripts - update docs v2 -> v3 - add IPv6 cases into test scripts - fixes for IPv6 support - fixes for inline-crypto support - some code restructuring v1 -> v2 - Several bug fixes That series contians few bug-fixes and changes to make ipsec-secgw to utilize librte_ipsec library: - changes in the related data structures. - changes in the initialization code. - changes in the data-path code. - new command-line parameters to enable librte_ipsec codepath and related features. - test scripts to help automate ipsec-secgw functional testing. Note that right now by default current (non-librte_ipsec) code-path will be used. User has to run application with new command-line option ('-l') to enable new codepath. The main reason for that: - current librte_ipsec doesn't support all ipsec algorithms and features that the app does. - allow users to run both versions in parallel for some time to figure out any functional or performance degradation with the new code. Test scripts were run with the following crypto devices: - aesni_mb - aesni_gcm - qat Konstantin Ananyev (9): examples/ipsec-secgw: avoid to request unused TX offloads examples/ipsec-secgw: allow to specify neighbor mac address examples/ipsec-secgw: fix crypto-op might never get dequeued examples/ipsec-secgw: fix outbound codepath for single SA examples/ipsec-secgw: make local variables static examples/ipsec-secgw: make app to use ipsec library examples/ipsec-secgw: make data-path to use ipsec library examples/ipsec-secgw: add scripts for functional test doc: update ipsec-secgw guide and relelase notes doc/guides/rel_notes/release_19_02.rst | 14 + doc/guides/sample_app_ug/ipsec_secgw.rst | 101 ++++- examples/ipsec-secgw/Makefile | 1 + examples/ipsec-secgw/ipsec-secgw.c | 397 +++++++++++++----- examples/ipsec-secgw/ipsec.c | 62 ++- examples/ipsec-secgw/ipsec.h | 67 +++ examples/ipsec-secgw/ipsec_process.c | 341 +++++++++++++++ examples/ipsec-secgw/meson.build | 6 +- examples/ipsec-secgw/parser.c | 75 ++++ examples/ipsec-secgw/parser.h | 8 +- examples/ipsec-secgw/sa.c | 284 ++++++++++++- examples/ipsec-secgw/sp4.c | 35 +- examples/ipsec-secgw/sp6.c | 35 +- examples/ipsec-secgw/test/common_defs.sh | 153 +++++++ examples/ipsec-secgw/test/data_rxtx.sh | 62 +++ examples/ipsec-secgw/test/linux_test4.sh | 63 +++ examples/ipsec-secgw/test/linux_test6.sh | 64 +++ examples/ipsec-secgw/test/run_test.sh | 80 ++++ .../test/trs_aescbc_sha1_common_defs.sh | 69 +++ .../ipsec-secgw/test/trs_aescbc_sha1_defs.sh | 67 +++ .../test/trs_aescbc_sha1_esn_atom_defs.sh | 5 + .../test/trs_aescbc_sha1_esn_defs.sh | 66 +++ .../test/trs_aescbc_sha1_old_defs.sh | 5 + .../test/trs_aesgcm_common_defs.sh | 60 +++ examples/ipsec-secgw/test/trs_aesgcm_defs.sh | 66 +++ .../test/trs_aesgcm_esn_atom_defs.sh | 5 + .../ipsec-secgw/test/trs_aesgcm_esn_defs.sh | 66 +++ .../ipsec-secgw/test/trs_aesgcm_old_defs.sh | 5 + .../test/tun_aescbc_sha1_common_defs.sh | 68 +++ .../ipsec-secgw/test/tun_aescbc_sha1_defs.sh | 70 +++ .../test/tun_aescbc_sha1_esn_atom_defs.sh | 5 + .../test/tun_aescbc_sha1_esn_defs.sh | 70 +++ .../test/tun_aescbc_sha1_old_defs.sh | 5 + .../test/tun_aesgcm_common_defs.sh | 60 +++ examples/ipsec-secgw/test/tun_aesgcm_defs.sh | 70 +++ .../test/tun_aesgcm_esn_atom_defs.sh | 5 + .../ipsec-secgw/test/tun_aesgcm_esn_defs.sh | 70 +++ .../ipsec-secgw/test/tun_aesgcm_old_defs.sh | 5 + 38 files changed, 2550 insertions(+), 140 deletions(-) create mode 100644 examples/ipsec-secgw/ipsec_process.c create mode 100644 examples/ipsec-secgw/test/common_defs.sh create mode 100644 examples/ipsec-secgw/test/data_rxtx.sh create mode 100644 examples/ipsec-secgw/test/linux_test4.sh create mode 100644 examples/ipsec-secgw/test/linux_test6.sh create mode 100644 examples/ipsec-secgw/test/run_test.sh create mode 100644 examples/ipsec-secgw/test/trs_aescbc_sha1_common_defs.sh create mode 100644 examples/ipsec-secgw/test/trs_aescbc_sha1_defs.sh create mode 100644 examples/ipsec-secgw/test/trs_aescbc_sha1_esn_atom_defs.sh create mode 100644 examples/ipsec-secgw/test/trs_aescbc_sha1_esn_defs.sh create mode 100644 examples/ipsec-secgw/test/trs_aescbc_sha1_old_defs.sh create mode 100644 examples/ipsec-secgw/test/trs_aesgcm_common_defs.sh create mode 100644 examples/ipsec-secgw/test/trs_aesgcm_defs.sh create mode 100644 examples/ipsec-secgw/test/trs_aesgcm_esn_atom_defs.sh create mode 100644 examples/ipsec-secgw/test/trs_aesgcm_esn_defs.sh create mode 100644 examples/ipsec-secgw/test/trs_aesgcm_old_defs.sh create mode 100644 examples/ipsec-secgw/test/tun_aescbc_sha1_common_defs.sh create mode 100644 examples/ipsec-secgw/test/tun_aescbc_sha1_defs.sh create mode 100644 examples/ipsec-secgw/test/tun_aescbc_sha1_esn_atom_defs.sh create mode 100644 examples/ipsec-secgw/test/tun_aescbc_sha1_esn_defs.sh create mode 100644 examples/ipsec-secgw/test/tun_aescbc_sha1_old_defs.sh create mode 100644 examples/ipsec-secgw/test/tun_aesgcm_common_defs.sh create mode 100644 examples/ipsec-secgw/test/tun_aesgcm_defs.sh create mode 100644 examples/ipsec-secgw/test/tun_aesgcm_esn_atom_defs.sh create mode 100644 examples/ipsec-secgw/test/tun_aesgcm_esn_defs.sh create mode 100644 examples/ipsec-secgw/test/tun_aesgcm_old_defs.sh -- 2.17.1