From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM02-BL2-obe.outbound.protection.outlook.com (mail-bl2nam02on0081.outbound.protection.outlook.com [104.47.38.81]) by dpdk.org (Postfix) with ESMTP id ABA431B201 for ; Tue, 10 Oct 2017 14:22:37 +0200 (CEST) Received: from BLUPR0301CA0006.namprd03.prod.outlook.com (10.162.113.144) by CO2PR03MB2359.namprd03.prod.outlook.com (10.166.93.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.77.7; Tue, 10 Oct 2017 12:22:36 +0000 Received: from BY2FFO11FD025.protection.gbl (2a01:111:f400:7c0c::188) by BLUPR0301CA0006.outlook.office365.com (2a01:111:e400:5259::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.77.7 via Frontend Transport; Tue, 10 Oct 2017 12:22:35 +0000 Authentication-Results: spf=fail (sender IP is 192.88.158.2) smtp.mailfrom=nxp.com; intel.com; dkim=none (message not signed) header.d=none;intel.com; dmarc=fail action=none header.from=nxp.com; Received-SPF: Fail (protection.outlook.com: domain of nxp.com does not designate 192.88.158.2 as permitted sender) receiver=protection.outlook.com; client-ip=192.88.158.2; helo=az84smr01.freescale.net; Received: from az84smr01.freescale.net (192.88.158.2) by BY2FFO11FD025.mail.protection.outlook.com (10.1.15.214) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.20.77.10 via Frontend Transport; Tue, 10 Oct 2017 12:22:35 +0000 Received: from [10.232.134.49] (B35197-11.ap.freescale.net [10.232.134.49]) by az84smr01.freescale.net (8.14.3/8.14.0) with ESMTP id v9ACMSSH031545; Tue, 10 Oct 2017 05:22:29 -0700 To: "Ananyev, Konstantin" , "dev@dpdk.org" CC: "Doherty, Declan" , "De Lara Guarch, Pablo" , "hemant.agrawal@nxp.com" , "Nicolau, Radu" , "borisp@mellanox.com" , "aviadye@mellanox.com" , "thomas@monjalon.net" , "sandeep.malik@nxp.com" , "jerin.jacob@caviumnetworks.com" , "Mcnamara, John" , "shahafs@mellanox.com" , "olivier.matz@6wind.com" References: <20171003131413.23846-1-akhil.goyal@nxp.com> <20171006181151.4758-1-akhil.goyal@nxp.com> <2601191342CEEE43887BDE71AB9772585FAA653D@IRSMSX103.ger.corp.intel.com> From: Akhil Goyal Message-ID: <5146e24f-99de-d6cf-eb42-b553135de6c7@nxp.com> Date: Tue, 10 Oct 2017 17:52:27 +0530 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.3.0 MIME-Version: 1.0 In-Reply-To: <2601191342CEEE43887BDE71AB9772585FAA653D@IRSMSX103.ger.corp.intel.com> Content-Type: text/plain; charset="utf-8"; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-EOPAttributedMessage: 0 X-Matching-Connectors: 131521117557441222; (91ab9b29-cfa4-454e-5278-08d120cd25b8); () X-Forefront-Antispam-Report: CIP:192.88.158.2; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(6009001)(336005)(7966004)(376002)(39860400002)(39380400002)(346002)(2980300002)(1109001)(1110001)(339900001)(3190300001)(24454002)(13464003)(199003)(189002)(377454003)(36756003)(305945005)(8676002)(69596002)(230700001)(81156014)(81166006)(8936002)(64126003)(68736007)(50466002)(15650500001)(104016004)(53936002)(47776003)(31696002)(86362001)(85426001)(2950100002)(77096006)(83506001)(356003)(2906002)(53546010)(8656003)(23676002)(316002)(65956001)(189998001)(6246003)(498600001)(58126008)(65806001)(54356999)(50986999)(4326008)(76176999)(229853002)(2501003)(106466001)(105606002)(33646002)(54906003)(97736004)(7416002)(5660300001)(31686004)(65826007)(110136005); DIR:OUT; SFP:1101; SCL:1; SRVR:CO2PR03MB2359; H:az84smr01.freescale.net; FPR:; SPF:Fail; PTR:InfoDomainNonexistent; A:1; MX:1; LANG:en; X-Microsoft-Exchange-Diagnostics: 1; BY2FFO11FD025; 1:98TIywMo0i6wA1Ef/pJ78LifBMFTI3hnP5g8QV9/JlICIIo57GPgT63f3W9yRGyNuMt3hN9fmXVkJxrp5VTfUxHsy+iimKCb+fd0MdIvCjaJmuCfnH8CWhpQIYGusi0N X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: c8dad69b-3438-4b52-37ce-08d50fd996dd X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(2017052603199)(201703131430075)(201703131517081); SRVR:CO2PR03MB2359; X-Microsoft-Exchange-Diagnostics: 1; CO2PR03MB2359; 3:dmxjRmT4muzs0e/V6QWuN0NXVbMjjnXwXqvaSKqBHWmitEo6F5LqWFpXxvf2iICfxSOz4QByjykGg4UJyZghlFb/cF9GxEiQ7kaa9VMbdK21N0xYsz82ODrmCbGmxc75Pxwbvg7sTCjc8s/Qmhj/ORNbjXzTP7QFoNC1gcLiiHKMqwqVapf7qnC3eDRJvCokVPIiGNtmXgM3fcjQx0LUmPJjv09qMGBZxPJXe2UEMwtcvs1Sh1/WMjyOUpeRFT20nmyerOKHaM4t0c2k1LZDbbVJqSn+eE0ZS7pydJ4rm3R/JvzxQ54B0hDTGWu6JU818tI0Xms8nud7OC4rfsjuoaV+PNg6VEAD8usEjPOCTJY=; 25:MMoZ5t78bFgdVCqBTZWiWnVrv7U2Tt7oqKg/+11BjfK4mRszTv/RREBs9QxL4NoTRcL7/2k3fWp6FrL+h0a4W5H+M+zrvcDXO4lRlZu5w0OOY8EPdhjaIaO8BWfbOM6DMhTh4Qu+3vZxBrYg1YGT7q8fcZfI6pIDlhjjbx84qPVmwBkrB+g2BlCYVgJITWRURQrNM9KT35yiP5N0ylYZS18c5EAVmUBpwj4cN9ps2fzZDhoRvOBEyljrj6KvnRdpJppSYu3xHHEFe762uiq+IrsIm+EmvNJUriRGPezcZwDiyTzXX7/4D0rWJx+8xpMOAhX1cpMCVyR6g7zgJj8Udg== X-MS-TrafficTypeDiagnostic: CO2PR03MB2359: X-Microsoft-Exchange-Diagnostics: 1; CO2PR03MB2359; 31:oYXkH0ke+nmohH6/4PAubrLD+ZUerNcB+JJKEBrDE6bIRPLkpnIDwuMGaySwxlG1Hn9ZJBi4Jyr2Ssv8JOJGS6j5P/aCEu7piw31Y8jOxyCZb5iAx75eHpk0/q2l43J8JjJUm0hnCts0IhhK8/cpJ5h4JHOZRr8PNord4zm9DahOj4XYtXbtr6V3la68LvYsdnJqmxaAeyIXVkcbonNg/UTDl22MCSwvYOcZYzGsG6o=; 4:8LlYM6VGNwU4yKHZFb7m5VfGBOJmijGX+4235amIG6hcNlmvDkvqhTu2ry+9dbsvVBcZ5gEZ/CD5XXs5tA4zcR7mFbkIDLhtx9f16DS0hHu6u95c1SvJN7PVKEbzhO/kJg+GzQqtZpv7xqGsZynC6RNRoqHxeNwtb3hqx0PGlBfOUPgjtRoCVwSndhtESDLrKLG6zHah/ICvPmylmC1g0irMnewffJUBCqzeKGAVD2e4AHZi1Hxql0z3IMARL5f+e0gzPBgvP83JvbDoKG9JlR2SmW230Hpwrw2v26Y4mKOXlMl6jiRpvOq3y1TauE+2T3cVq3UDVn/VIJbgWk3mMYQ9DmHSB65UfLmSJoi+iPWFf38091KIm3jDiaAxqMOC X-Exchange-Antispam-Report-Test: UriScan:(192374486261705)(185117386973197)(228905959029699); X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6095135)(2401047)(5005006)(8121501046)(10201501046)(100000703101)(100105400095)(93006095)(93001095)(3002001)(6055026)(6096035)(20161123556025)(20161123565025)(20161123559100)(201703131430075)(201703131441075)(201703131448075)(201703131433075)(201703161259150)(20161123563025)(20161123561025)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:CO2PR03MB2359; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(400006)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:CO2PR03MB2359; X-Forefront-PRVS: 04569283F9 X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtDTzJQUjAzTUIyMzU5OzIzOlB6MjdBMVhwSlJTR05raHNmQTZQeGlIMS9F?= =?utf-8?B?Z04zckw3aG9LS1g5UjA1TmdxeW5Mc0JZalB2clB3ZjhEQmVFcG1RQml0dUpa?= =?utf-8?B?bElGRXc3T2lzSi9xM3FQZFdZREVaL2tsVjhncnpyMmZyRTZLYXN1aFFKdVRU?= =?utf-8?B?NmNzWkJRdld4dTZnRlRsMnQ1TlBkNGxvSU9wVldsSy9wazZ4SzhHY2N5UjhD?= =?utf-8?B?WTFjUkdZZUIyclA2cTRrL2xlcy9LeVZXc3BEbWxDaW1SU05nRjFNVE9NUjl5?= =?utf-8?B?bWFCUXErSzQxczQ1R2dRVWcrYXU2OUpaUEJQTHpCZk5rdm8yZVY5dU51TmpH?= =?utf-8?B?dTdaMHMxVU9JaW1PbnVRY29SSEQzRWVwazBUd3VKNmRUYisyd1ZLejNUMUZw?= =?utf-8?B?bXBNSVc5V2VYdFR6V2NONFJzdVBsY2lTUm0rWDE3RzlMZ3RYZk9ILzVJeVBo?= =?utf-8?B?VGFncktDK1FVMkdZOVRnTjQ1MytrSkZwdkx2YnpaQmgrRjlmYk4wTnFFZldH?= =?utf-8?B?QmJzTjNrVzYwVndlOUlVamw0Ry9ha0dIQzF0Q3liNDk4bUlSSDUra0JDYWZk?= =?utf-8?B?eDk2R28rbkJOWE1xTVc3c1BHcmdNa3dnZ3U1Q1dtQjNDQ1NIOG1JQXhVWkdm?= =?utf-8?B?OU9FeThhTnJ0VG9PV25FRHZtZlU3ZzNxamVRckZoNlAvaXVqTWJGbWEzWXJa?= =?utf-8?B?dHR3Y3hDWUdwdlRyNmtRSVg1eVF0SGVHNS8rb0tkVzBweTlUQ1RoN0hCeTJh?= =?utf-8?B?THhmRHFVMjJDSVMrMExjaUNuZlBMMEVkWDlnaWpwNGZzbVZuekJYNzd3ZkQv?= =?utf-8?B?bysvUWpjSEoyaXJ1WXVSSlhqV2poVFJLRndsWGNUVGpWcGxoRGJreHFJNVJy?= =?utf-8?B?SWI0cXFJL1NDT1p0TFJvR01uWWw0dkZOMllYNE9BZ21ONXkyUkdzVVJJbnAv?= =?utf-8?B?bDgxelVQR1ZlM211ZXhkK0F5ZWlvN1M1ell1WGswRFdVSU5ib2JRTldLMEZt?= =?utf-8?B?RHFaUnNvOVNZcGlORVZ4NzhRa0JtZHM1Q3NDQTFETmVpZ1duc2pINjNvanNX?= =?utf-8?B?UThwcHh4emZSL1VqSFludUd1R25mY0hNclBaUzFwcWtNMER3SWpWb1l1QmZ3?= =?utf-8?B?V1JRUzB3TFpkbDJXYzMvdnhNdG5ZcEF0Rkx0dUJVZDF1cHRzcmk3WUhydCtH?= =?utf-8?B?a0NDbWRzcGdOcURhd0dtUlY3VVdzUjUvdTdxZ0t4V1V6SnA5NGVzVnZsS3l0?= =?utf-8?B?bnN2aE9tc244Q1ZaOWppVHM1TzZYTnpBNU9UZmR3ZGFtc1N2WElFVlVIZU1P?= =?utf-8?B?TXVvcUJHRGZoeXpKeThPZitTN2I5bG5FenR6aUovWm1sa1pxMGJGQTBNcmtl?= =?utf-8?B?azQ0aW9iTE1CRVlLMlhkWndVVHo2QnJRSmVGMW9rOEh6ZjJ4LzVseVVUeTF2?= =?utf-8?B?eUtZbXhoSER0L29CVWgxdFltbVNqWEJYVWhUTXA5VkdadHpHTk05YVFwSUQr?= =?utf-8?B?VVBPWHYyM2ZVVXhKUkxUeDFYWTRlN2hHaCtVOUNDclc2UGNnemxZMCtZUURs?= =?utf-8?B?UEJTV01aZ0ZyZSs0a2xYajJLY1NSN2FiSkt5UzlkQ3dQWFA0MHhDWDhJVVQv?= =?utf-8?B?eERST0hpRVpraml3UTJyQ2RGeGJPNHViY3A4SWNWcTI3SXdMOThmMG1iem9r?= =?utf-8?B?c3M1K0hLa3Z4OXkwbUZkRXZmdEdLajlVdDc4VklTUFFSRm9JcGltMHN4L0xO?= =?utf-8?B?ZG9FM2hRRm55b0p6NjZBYVAvM2lOQlltRVo4bWNaeE9hQSthZ2d3S1dlZTdj?= =?utf-8?B?NW5JbHR3NklkaVBuWHpCVUd3a1J3ZDV1V21rWW50N095cWlMV2QwLzFrV3U5?= =?utf-8?B?eFdCNEFzTDhjRi8weElqVjNqU2FhL3FiZUg1Uk1nYTQ3aE4zTVYrdGJNK3F1?= =?utf-8?B?WjZaZ3pjZWRMd3VTVVl5OTBSTk90TklVWmtzaUNzVlBhRzM2b3lTQlU0OEJ0?= =?utf-8?B?aWxGSDg2WWVnN0FGTVlHVEhVL2VWK0R1dEYzbnhaazE5ZVMvUkxlZFl6c3Vn?= =?utf-8?Q?4G8cQDUx2+O6Nxj4wlDtYvn4/?= X-Microsoft-Exchange-Diagnostics: 1; CO2PR03MB2359; 6:NW7vg6VWOPKYoIi9EZFfwnDMOno9wuF5bZeMfEWK47oedb9uUk/opIGmxZXI02cCp/+t7z7yGuZDF1UaIClrQzDCgkTGKbzktAUHcE73M/+/Kp5f7O5WizJ6loxa9kGPcQdmx+LikeWgumwdG7G3ti7fyJ1dQ9wrbrajbF+uzAusBsrWIK3+SPAOd2Sy/YWWsf5cqOjeEwiHe7fVPeDmjSJ1qy2Z4ufkbXUU8mCMgkxXeTVHqz2uFyHDWFf5cJvaTB2KiT9LfouF/f89nkNcw6d9GyK53TARJWbGK19DFJsTO5F+a9Qdff+0tbIt5x/c9Spt/oHThUv1Li6FCTaLqQ==; 5:989KYQpW7yLWf0E/xGkaE/q6uaZr6z4/dVsOQ1sibtpcx2IH3Qegnvr8GZTog8sPfS1RCTspGVGeRBWdbgLFp6PrVAwZr+jV8p3T7zRgKVI7YrqNU68gSXDcLtAslyDTmKzIqC8uwka0vKfF4kHw9g==; 24:yp+RmBy2Ownp021orECAM6iEwiheZi1FU/+YF6+Gdo4ij5JY8aSlfqnhO99bqdeKJQ9G7vL7oe8umZnNyxWilUVSE1+c9uwPCtKeEAAFHcc=; 7:nTWOVfdmxuh0HEwVLhe2YmVmFpTn55TcNwyJtcViVSmYa2rBj129aNKDrtkgH8dwgZsyNqESDun4CeMBc/I1/MiP+niStoHpbzM+1zGWofNsiEg7KsUp6DIBsojmQwbIgDmzv5aDY+m0lt3arl8LpUtRzsoY5+SI8fnvSugB1Zd1aePojzOEv8xPQRHLCKXuI5ZD0P/LXsTGNTb4l/icy/tvKzzADWWrK64/z4Tw3sM= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Oct 2017 12:22:35.3853 (UTC) X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.158.2]; Helo=[az84smr01.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO2PR03MB2359 Subject: Re: [dpdk-dev] [PATCH v3 00/12] introduce security offload library X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 10 Oct 2017 12:22:38 -0000 Hi Konstantin, On 10/9/2017 7:19 PM, Ananyev, Konstantin wrote: > > >> -----Original Message----- >> From: Akhil Goyal [mailto:akhil.goyal@nxp.com] >> Sent: Friday, October 6, 2017 7:12 PM >> To: dev@dpdk.org >> Cc: Doherty, Declan ; De Lara Guarch, Pablo ; hemant.agrawal@nxp.com; >> Nicolau, Radu ; borisp@mellanox.com; aviadye@mellanox.com; thomas@monjalon.net; >> sandeep.malik@nxp.com; jerin.jacob@caviumnetworks.com; Mcnamara, John ; Ananyev, Konstantin >> ; shahafs@mellanox.com; olivier.matz@6wind.com >> Subject: [PATCH v3 00/12] introduce security offload library >> >> This patchset introduce the rte_security library in DPDK. >> This also includes the sample implementation of drivers and >> changes in ipsec gateway application to demonstrate its usage. >> >> >> rte_security library is implemented on the idea proposed earlier [1],[2],[3] >> to support IPsec Inline and look aside crypto offload. Though >> the current focus is only on IPsec protocol, but the library is >> not limited to IPsec, it can be extended to other security >> protocols e.g. MACSEC, PDCP or DTLS. >> >> In this library, crypto/ethernet devices can register itself to >> the security library to support security offload. >> >> The library support 3 modes of operation >> 1. full protocol offload using crypto devices. >> (RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL) >> 2. inline ipsec using ethernet devices to perform crypto operations >> (RTE_SECURITY_ACTION_TYPE_INLINE_CRYPTO) >> 3. full protocol offload using ethernet devices. >> (RTE_SECURITY_ACTION_TYPE_INLINE_PROTOCOL) >> >> The details for each mode is documented in the patchset in >> doc/guides/prog_guide/rte_security.rst >> >> The modification in the application ipsec-secgw is also doocumented in >> doc/guides/sample_app_ug/ipsec_secgw.rst >> >> This patchset is also available at: >> git://dpdk.org/draft/dpdk-draft-ipsec >> branch: integration >> >> changes in v3: >> 1. fixed compilation for FreeBSD >> 2. Incorporated comments from Pablo, John, Shahaf, Ananyev > > As I can see, you didn't address any of my comments in v3. > So please don't include my name here. > Konstantin > > This was a mistake on my part. I thought your comments on ethdev and ixgbe changes were taken care of. I would not repeat this in future. -Akhil