From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id 8B5E5A0487 for ; Wed, 3 Jul 2019 12:11:15 +0200 (CEST) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 8BD212BB5; Wed, 3 Jul 2019 12:11:14 +0200 (CEST) Received: from EUR02-HE1-obe.outbound.protection.outlook.com (mail-eopbgr10083.outbound.protection.outlook.com [40.107.1.83]) by dpdk.org (Postfix) with ESMTP id 00D89F04 for ; Wed, 3 Jul 2019 12:11:12 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=om9dIvW2nDy4cUtnM2uoDF26f++WkIrTTrAFf361vkE=; b=SLPKdb4hzwSvDu+dBgyJMpj0UWNRMqlP4pTMiiislh/RxmYsNRzOnIk360SsOuLbTFDEwKuyXuNuHiuq5fherX4Pst6eVJJyi9De5Sjk3i2gwJbSdt4R9MiqC/p61y/TI7GHTcPqeKInr4oJWI5BdWWp09V1QUwjGsiNINurjTo= Received: from VE1PR04MB6639.eurprd04.prod.outlook.com (20.179.235.82) by VE1PR04MB6479.eurprd04.prod.outlook.com (20.179.233.80) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2032.20; Wed, 3 Jul 2019 10:11:11 +0000 Received: from VE1PR04MB6639.eurprd04.prod.outlook.com ([fe80::a929:3d03:7bb7:d5e0]) by VE1PR04MB6639.eurprd04.prod.outlook.com ([fe80::a929:3d03:7bb7:d5e0%7]) with mapi id 15.20.2032.019; Wed, 3 Jul 2019 10:11:11 +0000 From: Akhil Goyal To: Fan Zhang , "dev@dpdk.org" CC: "pablo.de.lara.guarch@intel.com" Thread-Topic: [PATCH v6 0/2] ipsec: ECN and DSCP header reconstruction Thread-Index: AQHVMAWIqfVle0Z8s06MABlZxtPRWKa4rsLQ Date: Wed, 3 Jul 2019 10:11:11 +0000 Message-ID: References: <20190626150509.17442-1-roy.fan.zhang@intel.com> <20190701120124.70418-1-roy.fan.zhang@intel.com> In-Reply-To: <20190701120124.70418-1-roy.fan.zhang@intel.com> Accept-Language: en-IN, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=akhil.goyal@nxp.com; x-originating-ip: [92.120.1.65] x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 770bd11e-df26-4640-7591-08d6ff9ec66a x-ms-office365-filtering-ht: Tenant x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(4618075)(2017052603328)(7193020); SRVR:VE1PR04MB6479; x-ms-traffictypediagnostic: VE1PR04MB6479: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:8882; x-forefront-prvs: 00872B689F x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(136003)(39860400002)(346002)(376002)(396003)(366004)(199004)(189003)(52536014)(2501003)(256004)(4326008)(8676002)(81156014)(478600001)(71200400001)(71190400001)(305945005)(81166006)(73956011)(6506007)(446003)(33656002)(316002)(76176011)(14444005)(76116006)(2906002)(102836004)(26005)(186003)(74316002)(66476007)(25786009)(5660300002)(66446008)(8936002)(44832011)(6246003)(229853002)(66556008)(66946007)(7736002)(64756008)(110136005)(9686003)(11346002)(86362001)(6436002)(53936002)(3846002)(7696005)(486006)(99286004)(55016002)(14454004)(66066001)(68736007)(6116002)(476003); DIR:OUT; SFP:1101; SCL:1; SRVR:VE1PR04MB6479; H:VE1PR04MB6639.eurprd04.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; received-spf: None (protection.outlook.com: nxp.com does not designate permitted sender hosts) x-ms-exchange-senderadcheck: 1 x-microsoft-antispam-message-info: 6ZMyF5FbkZ0z4XymPixUmUeMrTlTvib0rIA6i/adb60rvfN7rVQfseovOf9QH+3you/LhoP5jsKy46wHUrd7svUiSFt1fdcIKnUhlNIbDdPQ4Cm6r/AmC5+IV+BejzhoD1jOe/gHzuGLC00uIGNBQVPeu/dpXBZOi8ADgAU1eYmnB/ix6VjXnikWmszUJnne0w+n0Y6iXQapSUNawnTq7nO9n8/N9XUh3z7nbuRETjXxWKbDCIupNnAWHqlBqGCIW3cKNdqUyXKHWZVOhjhSewknmVSz0D4MQGIOWgyNHCf+lFYdF4yLrJZaYa1lYmycNEpKSAO71zaT9K80TvygPSKKEBVXRqd4gXKEShRgDOo8LVs6jSdNWKdIwZwfUGAOs+Y/48mliKmmDH6bx2QQw/H/TyYOEhLl1MJ/y2UBK5k= Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: 770bd11e-df26-4640-7591-08d6ff9ec66a X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Jul 2019 10:11:11.7425 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: akhil.goyal@nxp.com X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1PR04MB6479 Subject: Re: [dpdk-dev] [PATCH v6 0/2] ipsec: ECN and DSCP header reconstruction X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" Hi Fan, This patchset need a rebase. As today we need to close the subtrees for RC1= , this patchset will go in RC2. Thanks, Akhil >=20 > This patchset adds the ECN and DSCP tunnel mode header reconstruction > support for rte_ipsec library. The ipsec-secgw sample application is > updated with the feature's enabling and a python3 script for testing > the correctness of the implementation. >=20 > v6: > - update_tun_tos function split for inbound/outbound. > - get/set ipv6 tc change from macro back to inline functions. >=20 > v5: > - Fixed a checkpatch error. >=20 > v4: > - Fixed a bug. > - Refrabricated the code a bit. >=20 > v3: > - Rebased on top of latest dpdk-next-crypto. > - Updated the library with individual header reconstruction function. >=20 > v2: > - Fixed a few bugs. > - Updated according to Konstantin's comments. > - Added python script for testing. >=20 > Fan Zhang (2): > lib/ipsec: add support for header construction > examples/ipsec-secgw: support header reconstruction >=20 > doc/guides/rel_notes/release_19_08.rst | 6 + > examples/ipsec-secgw/sa.c | 2 + > examples/ipsec-secgw/test/run_test.sh | 3 +- > .../test/tun_null_header_reconstruct.py | 477 +++++++++++++++= ++++++ > lib/librte_ipsec/esp_inb.c | 13 +- > lib/librte_ipsec/esp_outb.c | 4 +- > lib/librte_ipsec/iph.h | 168 +++++++- > lib/librte_ipsec/rte_ipsec_sa.h | 10 + > lib/librte_ipsec/sa.c | 18 + > lib/librte_ipsec/sa.h | 2 + > lib/librte_net/rte_ip.h | 12 + > lib/librte_security/rte_security.h | 9 + > 12 files changed, 715 insertions(+), 9 deletions(-) > create mode 100755 examples/ipsec- > secgw/test/tun_null_header_reconstruct.py >=20 > -- > 2.14.5