From mboxrd@z Thu Jan  1 00:00:00 1970
Return-Path: <hemant.agrawal@nxp.com>
Received: from NAM02-CY1-obe.outbound.protection.outlook.com
 (mail-cys01nam02on0042.outbound.protection.outlook.com [104.47.37.42])
 by dpdk.org (Postfix) with ESMTP id D9BBE2BBE
 for <dev@dpdk.org>; Fri, 15 Sep 2017 06:48:55 +0200 (CEST)
Received: from CY4PR03CA0024.namprd03.prod.outlook.com (2603:10b6:903:33::34)
 by BN1PR0301MB0721.namprd03.prod.outlook.com (2a01:111:e400:4c::12)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.56.11; Fri, 15
 Sep 2017 04:48:53 +0000
Received: from BY2FFO11OLC010.protection.gbl (2a01:111:f400:7c0c::127) by
 CY4PR03CA0024.outlook.office365.com (2603:10b6:903:33::34) with Microsoft
 SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.56.8 via Frontend
 Transport; Fri, 15 Sep 2017 04:48:53 +0000
Authentication-Results: spf=fail (sender IP is 192.88.158.2)
 smtp.mailfrom=nxp.com; nxp.com; dkim=none (message not signed)
 header.d=none;nxp.com; dmarc=fail action=none header.from=nxp.com;
Received-SPF: Fail (protection.outlook.com: domain of nxp.com does not
 designate 192.88.158.2 as permitted sender) receiver=protection.outlook.com;
 client-ip=192.88.158.2; helo=az84smr01.freescale.net;
Received: from az84smr01.freescale.net (192.88.158.2) by
 BY2FFO11OLC010.mail.protection.outlook.com (10.1.15.21) with Microsoft SMTP
 Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.20.13.11
 via Frontend Transport; Fri, 15 Sep 2017 04:48:53 +0000
Received: from [10.232.133.65] (B10814-12.ap.freescale.net [10.232.133.65])
 by az84smr01.freescale.net (8.14.3/8.14.0) with ESMTP id v8F4mlIl019860;
 Thu, 14 Sep 2017 21:48:48 -0700
To: Akhil Goyal <akhil.goyal@nxp.com>, <dev@dpdk.org>
References: <20170914082651.26232-1-akhil.goyal@nxp.com>
 <20170914082651.26232-10-akhil.goyal@nxp.com>
CC: <declan.doherty@intel.com>, <pablo.de.lara.guarch@intel.com>,
 <radu.nicolau@intel.com>, <borisp@mellanox.com>, <aviadye@mellanox.com>,
 <thomas@monjalon.net>, <sandeep.malik@nxp.com>,
 <jerin.jacob@caviumnetworks.com>
From: Hemant Agrawal <hemant.agrawal@nxp.com>
Message-ID: <ecd42e7e-f001-2603-32b4-3852bd3abca9@nxp.com>
Date: Fri, 15 Sep 2017 10:18:47 +0530
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101
 Thunderbird/45.8.0
MIME-Version: 1.0
In-Reply-To: <20170914082651.26232-10-akhil.goyal@nxp.com>
Content-Type: text/plain; charset="windows-1252"; format=flowed
Content-Transfer-Encoding: 7bit
X-EOPAttributedMessage: 0
X-Matching-Connectors: 131499245334808012;
 (91ab9b29-cfa4-454e-5278-08d120cd25b8); ()
X-Forefront-Antispam-Report: CIP:192.88.158.2; IPV:NLI; CTRY:US; EFV:NLI;
 SFV:NSPM;
 SFS:(10009020)(6009001)(7966004)(336005)(39380400002)(39860400002)(346002)(376002)(2980300002)(1109001)(1110001)(339900001)(199003)(189002)(377454003)(24454002)(8676002)(81156014)(47776003)(81166006)(356003)(104016004)(83506001)(64126003)(5660300001)(65826007)(85426001)(65806001)(65956001)(97736004)(230700001)(54356999)(53546010)(2950100002)(76176999)(105606002)(498600001)(8936002)(4326008)(50986999)(69596002)(106466001)(53936002)(7416002)(31686004)(305945005)(86362001)(189998001)(68736007)(31696002)(50466002)(2906002)(33646002)(77096006)(8656003)(54906002)(6246003)(229853002)(316002)(36756003)(23746002)(58126008);
 DIR:OUT; SFP:1101; SCL:1; SRVR:BN1PR0301MB0721; H:az84smr01.freescale.net;
 FPR:; SPF:Fail; PTR:InfoDomainNonexistent; A:1; MX:1; LANG:en; 
X-Microsoft-Exchange-Diagnostics: 1; BY2FFO11OLC010;
 1:R/CdOrQ2AnTZziJ7ytv2dZR4he9JSB4Q9kuWOT9tYLFTEG1hKGrhcnDgvjHXxhxuAvF1AospF/IfhUh/IkIm/xhjh49czGwlQfHfQKMn/ZCbFtqz852D5chMYgRKK5iV
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 3d4096ad-d263-4d70-597e-08d4fbf510cb
X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0;
 RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(300000503095)(300135400095)(2017052603199)(201703131430075)(201703131517081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095);
 SRVR:BN1PR0301MB0721; 
X-Microsoft-Exchange-Diagnostics: 1; BN1PR0301MB0721;
 3:WYfQG9pB2lFSEYo2N5SkqNIY8fPBy3lV5W//1ndkV8TibvDTP6xmDjDdXJF4RkduYJlBuO/LZqi0zVxB8WcBmIJSdLvzzXWgF1eLMUAXRXm8nU6y8CZq2iCQUIdXeDR6jwzjlgXLdE1ntSVgiR5owM+OkRLOoUirw1RjOlZoVM3OX5gbb+LJN35mJIvYmxOyG1LfzKpPV/YLo3sQxqG4BIXcQcQvIQP5HoZn4J0Gj/Nn1Nx8SBWOSxf+7swHPs8kH8X2HKdWdhSCXSz+jTYoapCgFo2yTBB1n0eoDJHgK3nenRiz1icQ3aGseXg/aGQYmCUCPbhKfXMMBHcBE81bKA==;
 25:XJQ9dM3VC/NOq4/C/WLCd+1Vx9NdjJIPakmnUMtz2lGaqp0qXm0hNAeTTYzMRAMoibXtNyrsavwGtnOW5kYLYSFvkpIDpE3sPAFLAX3+m9BIJTc8+FhwMtRlGt97QjHrE7GlUc7Z008AvnBCtFVvE8dqeLIYrRoCJsb+8Sm3u1sg+niP0Ol/GzIkQSqWA04K7eElDd//qt+AxFrF9fJZCyWFeDOLN0xUKadV0rvJ255DmsIWoPCD3RrkwVkBRG5xuQRod0Gh8wJfi4FJxh8t1tWP0JdD1WkUm2hFRDxwmii3u5Y0257X9CZ9mvRWgPScxwT8g8+sTDdJo8JX47K3MQ==;
 31:ksofgyLSahONcGcyB3iuLNWC+4HGGdthqAtE73zhpt56JZdeI/ek3wQfY2r7iR+cYdD51Ktzvk6A2pA3UebdJwAaq/8l1qowDgwOsy5kw7APIDH1Jv+kGyXUwvZq6oasbujTz+4HwYbR8OF32yrd368tqumM1aAtFNX5VdiqTE3WXwb2Bf1GDOjuA42SZM2w5UmP9tj4eTj1FMdOAilC8KJG59jRwGQ5WjGZXTZPIu4=
X-MS-TrafficTypeDiagnostic: BN1PR0301MB0721:
X-Exchange-Antispam-Report-Test: UriScan:;
X-Microsoft-Antispam-PRVS: <BN1PR0301MB0721E14EE0A81847E30B5F37896C0@BN1PR0301MB0721.namprd03.prod.outlook.com>
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0;
 RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6095135)(2401047)(5005006)(8121501046)(10201501046)(100000703101)(100105400095)(93006095)(93001095)(3002001)(6055026)(6096035)(20161123561025)(20161123565025)(20161123559100)(20161123563025)(20161123556025)(201703131430075)(201703131433075)(201703131441075)(201703131448075)(201703161259150)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095);
 SRVR:BN1PR0301MB0721; BCL:0; PCL:0;
 RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(400006)(100000804101)(100110200095)(100000805101)(100110500095);
 SRVR:BN1PR0301MB0721; 
X-Microsoft-Exchange-Diagnostics: 1; BN1PR0301MB0721;
 4:JxaVEXAFALF4bAY/53ld7iG9QulPkWGgNwf3CC4isMzmKuw7UbHx6I+azIauNKkcg2Asy71eifDA41TRbj6O+Az2qQzaI1jjdlr0pFhJFmKY9unRPprb39YqexWY5oybhG/QbQCno76nCEQzWzFZmkHbIy2QBPKDMsY6mo8NmHiE05czzFDdIN1+t5d7IUkUdySoXbOIWzuAx4vBb98WaAtg9JeJtsXjqK36lRngXqC59bJgyop25MR04XQ69szf
X-Forefront-PRVS: 0431F981D8
X-Microsoft-Exchange-Diagnostics: =?Windows-1252?Q?1; BN1PR0301MB0721;
 23:al35l61zMidrwwCql6PfXTnabUgHId2VpxG?=
 =?Windows-1252?Q?Qe2ztAspEYYmW8AEQANiILSlNkvmbDxcHG64aMcCeIz5rQdNMC+Isqlc?=
 =?Windows-1252?Q?JsOFUk6HsCcTpvF0SifNKP+sjP6I2ouzCIAHpeWzQQqyJyXPEcbQOXaw?=
 =?Windows-1252?Q?C+w2nnbE4eAQmdTLNoAfekB1jTE0KdmwKkG91t32kneSDBngldW9z8t/?=
 =?Windows-1252?Q?6V0rBtLjdF6qCuhuVnu7aDc0H1IsfDjC/h8WQzbKtVsxEHoV0DcxkUFI?=
 =?Windows-1252?Q?BbDgrsJ9d8v7f3ayaei+I4z/w9iVswj5eY2MIfcunnjf8naHKTfNfzOz?=
 =?Windows-1252?Q?KgbJJETtDNyDKJhkP7bO9//S8+JI9K/R0OELuCK4djhsJREamBIDN5Du?=
 =?Windows-1252?Q?uxAFeSPIEzp2gCqx6Yyq1Khis+Eh6z5d09Y8Df11OgYKnPPIg1isdLxO?=
 =?Windows-1252?Q?QmInX6+vXVGmf+z9WpuNaMCnoF52muj2/ygLPfjiBdzQPayxvNZ40S4a?=
 =?Windows-1252?Q?wD96Hqz9F1u2nJUjMO86GBPnvagrIXAxjBAuoCU/9dFEu9cXrEThKuxf?=
 =?Windows-1252?Q?0U295n8DUxl6wxjC+GtzHvfSF17TthNCXIL04jGdGxun+HQIFSVccksx?=
 =?Windows-1252?Q?Klm0YYH37RG0vsKG3Rzl81L35/KU1X71OjYaqZJKHLbQ78EnwgEa8Oc4?=
 =?Windows-1252?Q?UK19MGSIYO5A5Ka0JuK6EdA/Vpx5pB9FqMZiImyAouB6Nt3qWq14DlWG?=
 =?Windows-1252?Q?n2tRivLt8oUmdcFYbs8nU9Oj2riO5t7W3qKOoutsulV8OM+NQjg94Lx8?=
 =?Windows-1252?Q?tVUXfTK6o6TierxNqD5AUzqr3LL3FVgrU3R/BGC1OwT4YSQvOpAAj1RW?=
 =?Windows-1252?Q?6i3A6dYMc5IJGGX4rWM9SHXvK42ExP3P7T6VrRQ2xTpvQorX+E3CFmho?=
 =?Windows-1252?Q?tJgo9Et0sHm0V5WlvfEDdKv4IuFQILnB3+uwksVn8lHkW6GLcSFRW9GV?=
 =?Windows-1252?Q?6AmuA3ZhN/+r/2Gnlx/GS8z5RQUAPVlBjCqmp7TXwJU5hkIRkoEU/aBZ?=
 =?Windows-1252?Q?WgC3fGgOAyU8NVdrp19DbP3HigSmwJtGVul3xyXFHJXLeHsDoS9yu/nO?=
 =?Windows-1252?Q?rpq0CaFAhzodk77ne3OWFRAwXb9XXOvEa1e/faOxAh/HYlcffXz+uJ8I?=
 =?Windows-1252?Q?JRsNSi27QRCs8YeCq48gKX6efWqQwyJyJHh3Y2pP6zByl6102MboSWqn?=
 =?Windows-1252?Q?JMQuSdImI3VwHhVXA1pyamMChz4GpIZn58cBKLb0UhyOw0d/iy5PdqHp?=
 =?Windows-1252?Q?OqDGCDuXN35gXPJpzBr4p0L6nB8UywKEQRuuBtxIVZ8O1v5N/BsarJia?=
 =?Windows-1252?Q?NqTj5b/igw+tt1C0Gvz0uInPyqpDFfyiv04Q60SN2VXOsIV4ejznErg6?=
 =?Windows-1252?Q?YfA8pTfphWDqB4YWU5/xgU9rOwmNfsNSQR+Hp0hUWIS+fymxttUjIvVW?=
 =?Windows-1252?Q?Hs1ebJ/Z9UtyKOsVP9uVAzDSvEc8XiiICEnxsYru7EhelaekMKg=3D?=
 =?Windows-1252?Q?=3D?=
X-Microsoft-Exchange-Diagnostics: 1; BN1PR0301MB0721;
 6:qe1eZ1xaLi/wvLMFIi4bkya8thzj9WPpbRlTT09itZCkCxP9aVA5rALyQNT+2Xk1ezPCe6R9LLEGxjScXxupmLUuMihAP/jUmQpHLCsqJ4NLZ+TWlHTEfBYzvDki5v6IVT+CECEJbD0cpSvLH2jAy1HKDVWb4P6DL5LuBiEKsmiIVTI+N9As3bfmG+zQGG1DSsQ6A8IT7J8tHjiVoSoztvL4a3MNV15lbfHPU03OJDhANQOIZjwtjrKO85DURtZuFnOGIABGTVb3tqmH5gonTLqD/KWnGsqgaGwh/5SZfee5rM6ZnDZ3P+aT04ELsdZ37r6ZMFdGVRnV+AAZEp2KgA==;
 5:q5Ast/tWIwGIGdAK0GlhH4it+ltAQaDh04Dvkqw0zvxevX6OJmMCgtvWSqb93zBxkHXurgYRwNB0vBDPVrpH/jv+vDT0RGM0z9CRHvra7tFb4KylzBVdAP2s2oklzg4PGq5BJuvvFCzLzu+OtquuQQ==;
 24:mTdSdekuU2KOV1Q2nkSjSqsZm5CU6LEcepvFrHjBOITlv5BZzuNKC0LNEYHVIhiVBzdRMAamBnvGBmbPPorRbnuXy3IqrOE4t2N1QBzksak=;
 7:y2ZMww4jG9RHsNmBHPsykxKY+7nd/o3rEdUKp4esQc8fRxbEvrFHVA7Eod9Zh8ZaOELoMdr9sYIu67YFvBQS2krONtnOGzupt9sfEtNsdRyrUSa+zOgciW25fAolGCphIeNrMtOnzFRCIA7oFVWd38jP0XAlbcUa76wcUDiRZGroWkqtidvpIblBm5I2obp41q5/W/XtnN2fcdq+tPNIh9WZu+4rkYHfcH2klJytySc=
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Sep 2017 04:48:53.2156 (UTC)
X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.158.2];
 Helo=[az84smr01.freescale.net]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN1PR0301MB0721
Subject: Re: [dpdk-dev] [PATCH 09/11] net/ixgbe: enable inline ipsec
X-BeenThere: dev@dpdk.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: DPDK patches and discussions <dev.dpdk.org>
List-Unsubscribe: <http://dpdk.org/ml/options/dev>,
 <mailto:dev-request@dpdk.org?subject=unsubscribe>
List-Archive: <http://dpdk.org/ml/archives/dev/>
List-Post: <mailto:dev@dpdk.org>
List-Help: <mailto:dev-request@dpdk.org?subject=help>
List-Subscribe: <http://dpdk.org/ml/listinfo/dev>,
 <mailto:dev-request@dpdk.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Sep 2017 04:48:56 -0000

Hi Radu,

On 9/14/2017 1:56 PM, Akhil Goyal wrote:

> +static const struct rte_security_capability ixgbe_security_capabilities[] = {
> +	{ /* IPsec Inline Crypto AH Transport Egress */
> +		.action = RTE_SECURITY_ACTION_TYPE_INLINE_CRYPTO,
> +		.protocol = RTE_SECURITY_PROTOCOL_IPSEC,
> +		.ipsec = {
> +			.proto = RTE_SECURITY_IPSEC_SA_PROTO_AH,

You are supporting AH, however only ESP is proposed in other patch for 
addition to rte_flow?

> +			.mode = RTE_SECURITY_IPSEC_SA_MODE_TRANSPORT,
> +			.direction = RTE_SECURITY_IPSEC_SA_DIR_EGRESS,
> +			.options = { 0 },
> +		},
> +		.crypto_capabilities = aes_gmac_crypto_capabilities
> +	},
> +	{ /* IPsec Inline Crypto ESP Transport Egress */
> +		.action = RTE_SECURITY_ACTION_TYPE_INLINE_CRYPTO,
> +		.protocol = RTE_SECURITY_PROTOCOL_IPSEC,
> +		.ipsec = {
> +			.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP,
> +			.mode = RTE_SECURITY_IPSEC_SA_MODE_TRANSPORT,
> +			.direction = RTE_SECURITY_IPSEC_SA_DIR_EGRESS,
> +			.options = { 0 }
> +		},
> +		.crypto_capabilities = aes_gcm_gmac_crypto_capabilities
> +	},
> +	{ /* IPsec Inline Crypto AH Transport Ingress */
> +		.action = RTE_SECURITY_ACTION_TYPE_INLINE_CRYPTO,
> +		.protocol = RTE_SECURITY_PROTOCOL_IPSEC,
> +		.ipsec = {
> +			.proto = RTE_SECURITY_IPSEC_SA_PROTO_AH,
> +			.mode = RTE_SECURITY_IPSEC_SA_MODE_TRANSPORT,
> +			.direction = RTE_SECURITY_IPSEC_SA_DIR_INGRESS,
> +			.options = { 0 }
> +		},
> +		.crypto_capabilities = aes_gmac_crypto_capabilities
> +	},
> +	{ /* IPsec Inline Crypto AH Tunnel Ingress */
> +		.action = RTE_SECURITY_ACTION_TYPE_INLINE_CRYPTO,
> +		.protocol = RTE_SECURITY_PROTOCOL_IPSEC,
> +		.ipsec = {
> +			.proto = RTE_SECURITY_IPSEC_SA_PROTO_AH,
> +			.mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL,
> +			.direction = RTE_SECURITY_IPSEC_SA_DIR_INGRESS,
> +			.options = { 0 }
> +		},
> +		.crypto_capabilities = aes_gmac_crypto_capabilities
> +	},
> +	{ /* IPsec Inline Crypto ESP Transport Ingress */
> +		.action = RTE_SECURITY_ACTION_TYPE_INLINE_CRYPTO,
> +		.protocol = RTE_SECURITY_PROTOCOL_IPSEC,
> +		.ipsec = {
> +			.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP,
> +			.mode = RTE_SECURITY_IPSEC_SA_MODE_TRANSPORT,
> +			.direction = RTE_SECURITY_IPSEC_SA_DIR_INGRESS,
> +			.options = { 0 }
> +		},
> +		.crypto_capabilities = aes_gcm_gmac_crypto_capabilities
> +	},
> +	{ /* IPsec Inline Crypto ESP Tunnel Ingress */
> +		.action = RTE_SECURITY_ACTION_TYPE_INLINE_CRYPTO,
> +		.protocol = RTE_SECURITY_PROTOCOL_IPSEC,
> +		.ipsec = {
> +			.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP,
> +			.mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL,
> +			.direction = RTE_SECURITY_IPSEC_SA_DIR_INGRESS,
> +			.options = { 0 }
> +		},
> +		.crypto_capabilities = aes_gcm_gmac_crypto_capabilities
> +	},
> +	{
> +		.action = RTE_SECURITY_ACTION_TYPE_NONE
> +	}
> +};