From patchwork Fri Jun 9 10:51:42 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Petri Savolainen X-Patchwork-Id: 103472 Delivered-To: patch@linaro.org Received: by 10.140.91.77 with SMTP id y71csp146888qgd; Fri, 9 Jun 2017 03:53:49 -0700 (PDT) X-Received: by 10.200.40.251 with SMTP id j56mr24345927qtj.186.1497005629416; Fri, 09 Jun 2017 03:53:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1497005629; cv=none; d=google.com; s=arc-20160816; b=fSFjPCgom7HBYtcwKtzvsR4q89b+cYrdDoHnnKwzWXIWkF1S1RXoybTKccvtNuxF9H 4wDRYDEGFlByKqwzoowy8nRgq+4h4T0Bz4ypejP63iy5N2SG+VUw1k/xcgQ6RSsHXu/F 9l86eKYUJwvpdZvoGL4enz6ccV4MA45065i6OLftD0Wnm5qMhXDVmt3iZA/PtbQuneWz 13zjuAUb03ZJY0fcw/wayzlcQmivfgfcA2n6QUVEw1ggwql8v2c2gfqTYgFTUlKjAzXv QsF0hw8IP8XWgo0A44hE0ev6YUoaxC9Cx/wPP4d6ZavAsmFWSo0Ey5dMDz69qWAqBULL 3dSQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:list-subscribe:list-help:list-post:list-archive :list-unsubscribe:list-id:precedence:subject:spamdiagnosticmetadata :spamdiagnosticoutput:mime-version:references:in-reply-to:message-id :date:to:from:delivered-to:arc-authentication-results; bh=sS9CbDYtzVIhM8jsFOHWqCxLaVFixbHrSbE6fnSCqOM=; b=gbv5Tjpv92zuh6gqor+nxzIbVbYlJmnxap/sSA9p30Q7/AEBg94AlLFy/Izo15RPzF Aa93AgiMYNdbjVZq9FLj4IPshL4OqiOzvmjsFO8rL6n4li0Z0JC+CyZy/Trcq4U23l6+ uVZItBFRzxp9aEKmi/v3PHx8LIUuwYPL3nAg6vCwmje/2E2yUUy/bTUZF+qmWAxHbme1 GhWVqFHIF0wtpmxxYZU69/Ybc8ZOjmAOIjZMEmR95DhXOnKOElscwv9lf+wSgCt/Ow63 1ehR/bUNAQczdsKniPFH6lWVAIvXPZLUUpBp5zSEQQumG7wytW5VjZHxfMRuS7gIcdnk qIxQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of lng-odp-bounces@lists.linaro.org designates 54.225.227.206 as permitted sender) smtp.mailfrom=lng-odp-bounces@lists.linaro.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from lists.linaro.org (lists.linaro.org. [54.225.227.206]) by mx.google.com with ESMTP id f8si636547qkb.268.2017.06.09.03.53.49; Fri, 09 Jun 2017 03:53:49 -0700 (PDT) Received-SPF: pass (google.com: domain of lng-odp-bounces@lists.linaro.org designates 54.225.227.206 as permitted sender) client-ip=54.225.227.206; Authentication-Results: mx.google.com; spf=pass (google.com: domain of lng-odp-bounces@lists.linaro.org designates 54.225.227.206 as permitted sender) smtp.mailfrom=lng-odp-bounces@lists.linaro.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: by lists.linaro.org (Postfix, from userid 109) id 106EE60B17; Fri, 9 Jun 2017 10:53:49 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on ip-10-142-244-252 X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAD_ENC_HEADER,BAYES_00, RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H3, RCVD_IN_MSPIKE_WL, SPF_HELO_PASS, URIBL_BLOCKED autolearn=disabled version=3.4.0 Received: from [127.0.0.1] (localhost [127.0.0.1]) by lists.linaro.org (Postfix) with ESMTP id 0ACA4608D5; Fri, 9 Jun 2017 10:53:33 +0000 (UTC) X-Original-To: lng-odp@lists.linaro.org Delivered-To: lng-odp@lists.linaro.org Received: by lists.linaro.org (Postfix, from userid 109) id 0D4FD60916; Fri, 9 Jun 2017 10:53:29 +0000 (UTC) Received: from EUR01-DB5-obe.outbound.protection.outlook.com (mail-db5eur01on0136.outbound.protection.outlook.com [104.47.2.136]) by lists.linaro.org (Postfix) with ESMTPS id C3B82608D5 for ; Fri, 9 Jun 2017 10:52:48 +0000 (UTC) Received: from DB6PR07CA0157.eurprd07.prod.outlook.com (2603:10a6:6:43::11) by DBXPR07MB030.eurprd07.prod.outlook.com (2a01:111:e400:9807::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1157.9; Fri, 9 Jun 2017 10:52:47 +0000 Received: from AM5EUR03FT044.eop-EUR03.prod.protection.outlook.com (2a01:111:f400:7e08::208) by DB6PR07CA0157.outlook.office365.com (2603:10a6:6:43::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1178.5 via Frontend Transport; Fri, 9 Jun 2017 10:52:47 +0000 Received-SPF: SoftFail (protection.outlook.com: domain of transitioning linaro.org discourages use of 131.228.2.241 as permitted sender) Received: from mailrelay.int.nokia.com (131.228.2.241) by AM5EUR03FT044.mail.protection.outlook.com (10.152.17.56) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.1143.11 via Frontend Transport; Fri, 9 Jun 2017 10:52:45 +0000 Received: from fihe3nok0735.emea.nsn-net.net (localhost [127.0.0.1]) by fihe3nok0735.emea.nsn-net.net (8.14.9/8.14.5) with ESMTP id v59AphFX010829 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT) for ; Fri, 9 Jun 2017 13:51:43 +0300 Received: from 10.144.19.15 ([10.144.104.219]) by fihe3nok0735.emea.nsn-net.net (8.14.9/8.14.5) with ESMTP id v59AphhX010823 (version=TLSv1/SSLv3 cipher=AES128-SHA256 bits=128 verify=NOT) for ; Fri, 9 Jun 2017 13:51:43 +0300 X-HPESVCS-Source-Ip: 10.144.104.219 From: Petri Savolainen To: Date: Fri, 9 Jun 2017 13:51:42 +0300 Message-ID: <20170609105143.11350-2-petri.savolainen@linaro.org> X-Mailer: git-send-email 2.13.0 In-Reply-To: <20170609105143.11350-1-petri.savolainen@linaro.org> References: <20170609105143.11350-1-petri.savolainen@linaro.org> X-EOPAttributedMessage: 0 X-MS-Office365-Filtering-HT: Tenant X-Forefront-Antispam-Report: CIP:131.228.2.241; IPV:CAL; SCL:-1; CTRY:FI; EFV:NLI; SFV:NSPM; SFS:(10019020)(6009001)(39400400002)(39840400002)(39450400003)(39410400002)(39860400002)(39850400002)(2980300002)(189002)(199003)(9170700003)(575784001)(77096006)(2950100002)(110136004)(86362001)(36756003)(2351001)(50986999)(5660300001)(305945005)(356003)(5003940100001)(6916009)(38730400002)(76176999)(53936002)(498600001)(81166006)(105596002)(8936002)(53946003)(22756006)(47776003)(1076002)(2906002)(48376002)(50226002)(189998001)(33646002)(8676002)(217873001); DIR:OUT; SFP:1102; SCL:1; SRVR:DBXPR07MB030; H:mailrelay.int.nokia.com; FPR:; SPF:SoftFail; MLV:sfv; MX:1; A:1; LANG:en; X-Microsoft-Exchange-Diagnostics: 1; AM5EUR03FT044; 1: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 MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DBXPR07MB030: X-MS-Office365-Filtering-Correlation-Id: 6aeb8931-65ed-48aa-cd06-08d4af25a9df X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(2017030254075)(201703131423075)(201703031133081); SRVR:DBXPR07MB030; X-Microsoft-Exchange-Diagnostics: 1; DBXPR07MB030; 3:bmZOINFxJ0tqTIgjgNXlkQT8Daip2IqUSSZb2ZwujhVstDQOMdVYDVXY34jGgo4KP3uFSf/ciSnBfdTTcEDolDJWLjWV0ac5ZPzqfvuqbvcmXruqliiGR7tBfFjQkuApcczp6Bk964zMgSiMkHwRHE+bWaWBIF7TWGuxQ5fMOjFOpCTCvonDs9kDWgJX2EwlCYbvCknjjyt95mxlJg8N70fajwKMGZWFhSDoJVfwXHLPWHb6EmWeVZ8Oq/TKoyzYPGgiNI63lhNqTpqwzQrZo9NRSumVjuyMe9O2fIN/Hk3kgu+jpo6PqKnguMjEh6iz26RhARhdssNv5M0zpQmi0xKmvGA/30bKtfLifFxo7AYBPzEkp9cqyk4dTSgR2rAc5JHpZXBBxUadoI2Cb4tmaZ062j4pOUKS/N0q+ZqWOwzc2nELWvCXfPXNrEuoUnNQKc1LKMSzo8Yl6+31kIv84w== X-Microsoft-Exchange-Diagnostics: 1; DBXPR07MB030; 25:jPbxI/v5cO7yix+FSSLRTnwcT4G1dYFFyn0t2k1lrp+aDs1Jv7RRPUylohRy/B37jXbTEQRVGjvl7YJTFZ5w+Ij7CHdU/W8UhEf9c8JcoTcJ2BJiuURTP8WNs6JyIhpdYz005ciSfmibsAuO0KBivHJS7+yRZAdYCDwgSeAtY3/7WjdrxOYGwnp3E/wHiJUdwNMU2lZGbM/BF/zGb0DDAULWJ2ZFNbrOmr85Hgt5sZ6wC0qCDa0ds0cq2mmx4yd+d3JNgsgX2Kw96SayaTpu4buzTFk8yNoCM3IEYmCLzl9W1D1qBPhK21vpv81A/9a6nbg12KKPR9uHoqrj5Fvf3lkp40m3VWNPH+msqHCjE1J5pg5ErEcgljGvGtbkn2qS6iMeIgKn2q1Pv+yGNrAq7F+FkO8qR928pwl2bGGxG/qMl64aefSvZGzCZXn5BxCxQPx5Gl/X1h8mBkYVEc95ICpbxUfUCaIbhtpl0OC1jKg=; 31:iXdm69QbuuPiP0xmfDJaNdC7voYwtT6aW1Ghcij1HfKLZlOoLGfTfjXU6rMqkgaO3JkVoCnyCwA/TApchOs+blOXngT3rphEr7+VoVswnY05ONCSKBldE8j9X7almVrO0BeByxWuu0tAET0BJOlOB3dg5sEIr+N5F93+zIPeDzJQ4fo6mfKz0Sy1Y2nZNT3bZaVwTYgaO+RUykocOg20OcFI2ATeL+ctmO8DpINEdD6f+sY22FYue++OcG32CFLG X-Microsoft-Exchange-Diagnostics: 1; DBXPR07MB030; 20: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 X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(20558992708506)(131327999870524); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(13021025)(8121501046)(13013025)(5005006)(100000703101)(100105400095)(10201501046)(3002001)(93006095)(93003095)(6055026)(6041248)(201703131423075)(201702281528075)(201703061421075)(201703061750153)(20161123555025)(20161123564025)(20161123558100)(20161123560025)(20161123562025)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:DBXPR07MB030; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:DBXPR07MB030; X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; DBXPR07MB030; 4:SYrM/tIZczb6MdKJoUSj0e9UC64PMFzsN3RAbnOyJ2b?= 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 X-Forefront-PRVS: 03333C607F X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; DBXPR07MB030; 23:ojEn/UKIXs4ukjzCgMIMLBoQQRac6w8C+vNziIQRi9?= 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 X-Microsoft-Exchange-Diagnostics: 1; DBXPR07MB030; 6:FuKbG73uii7rD1dVA96z2hMDGB6tQt80FA2E7em+9B1+LfaFbGzTbAa1kXzyJ0VRGh070AvNF9bHdZli91CHux9mQcwXxCBQvATZ44DHAz8vvQbLhDhJLskWuYcANMo6C2bq1F5jfjedgxRzUojWe4q6M+BUcMAcQc/3QljlmmxCKhtlkYd2Y/gQNTtMYfatuKoYaOeLXJahBPotXXPWcoVwt7SWqhp/unEOOM/oCXR4RIDpZS1PtftgTozfbziehW4WrUEFwz35T+mOT+EqgrGmwTgoceS4TrVeMMMs09nnBEIg+wdI/iwlrXZbt25CYGwd8/yAFQCVM7okHtk3EbpWR5X+Ef8Y9QJfylRl7eVnnRdHsU4U0pO/cQ+rxLL+I19Sc94gA7EijX/ecphsvnBF0nhZDtd3Wg9MABGt/9xISFy+ZcesPr8HjCNskiTLSTba17XShvML9BH1HFykN85aldE9kbIxM/AMhyIBIrVM+CsJL23asK/FImie+RIkgi4oB2Cb1JKz0T69pDW8K6+m6SRmtVJS4njI1msve2Fp3GkqQ2CQNlTLQwHFQnX8 X-Microsoft-Exchange-Diagnostics: 1; DBXPR07MB030; 5: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; 24:6CGRyIPGf/K9/LTrlyHFd1gPeOKXoIPM+hKEi7W+75rWsJQ+R4S2NTJaCNxb3TC1Ljxy9/DEF3lIdRXT2SJ8xSZ/NSm/zKhXiuy9MeC83kc= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; DBXPR07MB030; 7:DqtpKXQkCoFRulCaiTLxGOpl9PthtBL3tETWWYl7kGU6s9Ckkt36DFpGJZmEe5v3PcZ6ezuPl19Ikj/J3T/mGorKw/wdna04ymM8FDBET5XBARRTm3djn38WngP/ySd418bL/ZpaKVZGOHc3n9tMpW2S14fqf9xYkJMWg5nAplechah3PSj+w7ImuXrf8CHz1XBgBEbbhDFHsyJNAiQNBxXCqhKzifLr9RtjhnQTAxpU7UFx19LGKygYqaT6raGmWUvLYQkcZej/HwJ6vATQUC94YsERvHjglrBXfpwWev+V1vw+dVPG6lNv2PEmW7S5ZjEZoVEP4tCWHG7MIGamYg== X-OriginatorOrg: nokia.onmicrosoft.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Jun 2017 10:52:45.8655 (UTC) X-MS-Exchange-CrossTenant-Id: 5d471751-9675-428d-917b-70f44f9630b0 X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5d471751-9675-428d-917b-70f44f9630b0; Ip=[131.228.2.241]; Helo=[mailrelay.int.nokia.com] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBXPR07MB030 Subject: [lng-odp] [API-NEXT PATCH 1/2] api: ipsec: change IPSEC result to packet X-BeenThere: lng-odp@lists.linaro.org X-Mailman-Version: 2.1.16 Precedence: list List-Id: "The OpenDataPlane \(ODP\) List" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: lng-odp-bounces@lists.linaro.org Sender: "lng-odp" Input and output of IPSEC operations are packets. Parameter and result structures are cleaner when packet arrays are direct parameters to functions. Also API is more flexible for application or API pipelining when output is packets with additional metadata. Application or API pipeline stages which do not care about IPSEC results may work on basic packet metadata. IPSEC result event type changes from ODP_EVENT_IPSEC_RESULT to ODP_EVENT_PACKET_IPSEC. Later on, other packet producing APIs (crypto, comp, etc) may also produce special packet events. Signed-off-by: Petri Savolainen --- include/odp/api/spec/event.h | 27 +- include/odp/api/spec/ipsec.h | 365 +++++++++++---------- include/odp/arch/default/api/abi/event.h | 6 +- .../include/odp/api/plat/event_types.h | 7 +- platform/linux-generic/odp_ipsec.c | 67 +++- 5 files changed, 279 insertions(+), 193 deletions(-) -- 2.13.0 diff --git a/include/odp/api/spec/event.h b/include/odp/api/spec/event.h index f22efce5..ad757c7d 100644 --- a/include/odp/api/spec/event.h +++ b/include/odp/api/spec/event.h @@ -37,9 +37,30 @@ extern "C" { /** * @typedef odp_event_type_t - * ODP event types: - * ODP_EVENT_BUFFER, ODP_EVENT_PACKET, ODP_EVENT_TIMEOUT, - * ODP_EVENT_CRYPTO_COMPL, ODP_EVENT_IPSEC_RESULT, ODP_EVENT_IPSEC_STATUS + * Event type + * + * Event type specifies the purpose and format of an event. It can be checked + * with odp_event_type(). Each event type has functions + * (e.g. odp_buffer_from_event()) to convert between the generic event handle + * (odp_event_t) and the type specific handle (e.g. odp_buffer_t). Results are + * undefined, if conversion function of a wrong event type is used. Application + * cannot change event type by chaining conversion functions. + * + * List of event types: + * - ODP_EVENT_BUFFER + * - Buffer event (odp_buffer_t) for simple data storage and message passing + * - ODP_EVENT_PACKET + * - Normal packet event (odp_packet_t) containing basic packet metadata. + * - ODP_EVENT_PACKET_IPSEC + * - Packet event (odp_packet_t) genereted as a result of an IPsec + * operation. It contains IPSEC specific metadata in addition to the basic + * packet metadata. + * - ODP_EVENT_TIMEOUT + * - Timeout event (odp_timeout_t) from a timer + * - ODP_EVENT_CRYPTO_COMPL + * - Crypto completion event (odp_crypto_compl_t) + * - ODP_EVENT_IPSEC_STATUS + * - IPSEC status update event (odp_ipsec_status_t) */ /** diff --git a/include/odp/api/spec/ipsec.h b/include/odp/api/spec/ipsec.h index 65f0b066..0da2b42c 100644 --- a/include/odp/api/spec/ipsec.h +++ b/include/odp/api/spec/ipsec.h @@ -552,16 +552,18 @@ typedef enum odp_ipsec_frag_mode_t { /** * Packet lookup mode + * + * Lookup mode controls how an SA participates in SA lookup offload. + * Inbound operations perform SA lookup if application does not provide a SA as + * a parameter. In inline mode, a lookup miss directs the packet back to normal + * packet input interface processing. SA lookup failure status (error.sa_lookup) + * is reported through odp_ipsec_packet_result_t. */ typedef enum odp_ipsec_lookup_mode_t { - /** Inbound SA lookup is disabled. */ + /** Inbound SA lookup is disabled for the SA. */ ODP_IPSEC_LOOKUP_DISABLED = 0, - /** Inbound SA lookup is enabled. Lookup matches only SPI value. - * In inline mode, a lookup miss directs the packet back to normal - * packet input interface processing. In other modes, the SA lookup - * failure status (error.sa_lookup) is reported through - * odp_ipsec_packet_result_t. */ + /** Inbound SA lookup is enabled. Lookup matches only SPI value. */ ODP_IPSEC_LOOKUP_SPI, /** Inbound SA lookup is enabled. Lookup matches both SPI value and @@ -850,17 +852,6 @@ int odp_ipsec_sa_destroy(odp_ipsec_sa_t sa); */ uint64_t odp_ipsec_sa_to_u64(odp_ipsec_sa_t sa); -/** - * IPSEC operation level options - * - * These may be used to override some SA level options - */ -typedef struct odp_ipsec_op_opt_t { - /** Fragmentation mode */ - odp_ipsec_frag_mode_t mode; - -} odp_ipsec_op_opt_t; - /** IPSEC operation status has no errors */ #define ODP_IPSEC_OK 0 @@ -870,7 +861,8 @@ typedef struct odp_ipsec_op_status_t { union { /** Error flags */ struct { - /** Protocol error. Not a valid ESP or AH packet. */ + /** Protocol error. Not a valid ESP or AH packet, + * packet data length error, etc. */ uint32_t proto : 1; /** SA lookup failed */ @@ -934,41 +926,70 @@ typedef struct odp_ipsec_op_status_t { } odp_ipsec_op_status_t; /** - * IPSEC operation input parameters + * IPSEC outbound operation options + * + * These may be used to override some SA level options */ -typedef struct odp_ipsec_op_param_t { - /** Number of packets to be processed */ - int num_pkt; +typedef struct odp_ipsec_out_opt_t { + /** Fragmentation mode */ + odp_ipsec_frag_mode_t mode; + +} odp_ipsec_out_opt_t; +/** + * IPSEC outbound operation parameters + */ +typedef struct odp_ipsec_out_param_t { /** Number of SAs * + * Outbound IPSEC operation needs SA from application. Use either + * single SA for all packets, or a SA per packet. + * * Valid values are: - * * 0: No SAs (default) - * * 1: Single SA for all packets - * * num_pkt: SA per packet + * * 1: Single SA for all packets + * * N: A SA per packet. N must match the number of packets. */ int num_sa; - /** Number of operation options + /** Number of outbound operation options * * Valid values are: - * * 0: No options (default) - * * 1: Single option for all packets - * * num_pkt: An option per packet + * * 0: No options + * * 1: Single option for all packets + * * N: An option per packet. N must match the number of packets. */ int num_opt; - /** Pointer to an array of packets + /** Pointer to an array of IPSEC SAs */ + odp_ipsec_sa_t *sa; + + /** Pointer to an array of outbound operation options + * + * May be NULL when num_opt is zero. + */ + odp_ipsec_out_opt_t *opt; + +} odp_ipsec_out_param_t; + +/** + * IPSEC inbound operation parameters + */ +typedef struct odp_ipsec_in_param_t { + /** Number of SAs * - * Each packet must have a valid value for these metadata: - * * L3 offset: Offset to the first byte of the (outmost) IP header - * * L4 offset: For inbound direction, when udp_encap is enabled - - * offset to the first byte of the encapsulating UDP - * header + * Inbound IPSEC operation processes a packet using the SA provided by + * the application. If the application does not provide an SA, the + * operation searches for the SA by matching the input packet with all + * inbound SAs according to the lookup mode (odp_ipsec_lookup_mode_t) + * configured in each SA. When passing SAs, use either single SA for + * all packets, or a SA per packet. * - * @see odp_packet_l3_offset(), odp_packet_l4_offset() + * Valid values are: + * * 0: No SAs. SA lookup is done for all packets. + * * 1: Single SA for all packets + * * N: A SA per packet. N must match the number of packets. */ - odp_packet_t *pkt; + int num_sa; /** Pointer to an array of IPSEC SAs * @@ -976,18 +997,12 @@ typedef struct odp_ipsec_op_param_t { */ odp_ipsec_sa_t *sa; - /** Pointer to an array of operation options - * - * May be NULL when num_opt is zero. - */ - odp_ipsec_op_opt_t *opt; - -} odp_ipsec_op_param_t; +} odp_ipsec_in_param_t; /** * Outbound inline IPSEC operation parameters */ -typedef struct odp_ipsec_inline_op_param_t { +typedef struct odp_ipsec_out_inline_param_t { /** Packet output interface for inline output operation * * Outbound inline IPSEC operation uses this packet IO interface to @@ -1011,7 +1026,7 @@ typedef struct odp_ipsec_inline_op_param_t { uint32_t len; } outer_hdr; -} odp_ipsec_inline_op_param_t; +} odp_ipsec_out_inline_param_t; /** * IPSEC operation result for a packet @@ -1020,16 +1035,6 @@ typedef struct odp_ipsec_packet_result_t { /** IPSEC operation status */ odp_ipsec_op_status_t status; - /** Number of output packets created from the corresponding input packet - * - * Without fragmentation offload this is always one. However, if the - * input packet was fragmented during the operation this is larger than - * one for the first returned fragment and zero for the rest of the - * fragments. All the fragments (of the same source packet) are stored - * consecutively in the 'pkt' array. - */ - int num_out; - /** IPSEC SA that was used to create the packet * * Operation updates this SA handle value, when SA look up is performed @@ -1040,7 +1045,8 @@ typedef struct odp_ipsec_packet_result_t { odp_ipsec_sa_t sa; /** Packet outer header status before inbound inline processing. - * This is valid only when status.flag.inline_mode is set. + * This is valid only when outer headers are retained + * (see odp_ipsec_inbound_config_t) and status.flag.inline_mode is set. */ struct { /** Points to the first byte of retained outer headers. These @@ -1048,7 +1054,7 @@ typedef struct odp_ipsec_packet_result_t { * implementation specific memory space. Since the memory space * may overlap with e.g. packet head/tailroom, the content * becomes invalid if packet data storage is modified in - * anyway. The memory space may not be sharable to other + * any way. The memory space may not be sharable to other * threads. */ uint8_t *ptr; @@ -1059,51 +1065,6 @@ typedef struct odp_ipsec_packet_result_t { } odp_ipsec_packet_result_t; /** - * IPSEC operation results - */ -typedef struct odp_ipsec_op_result_t { - /** Number of packets - * - * Application sets this to the maximum number of packets the operation - * may output (number of elements in 'pkt' and 'res' arrays). - * The operation updates it with the actual number of packets - * outputted. - */ - int num_pkt; - - /** Pointer to an array of packets - * - * Operation outputs packets into this array. The array must have - * at least 'num_pkt' elements. - * - * Each successfully transformed packet has a valid value for these - * metadata regardless of the inner packet parse configuration. - * (odp_ipsec_inbound_config_t): - * * L3 offset: Offset to the first byte of the (outmost) IP header - * * pktio: For inbound inline IPSEC processed packets, original - * packet input interface - * - * Other metadata for parse results and error checks depend on - * configuration (selected parse and error check levels). - */ - odp_packet_t *pkt; - - /** Pointer to an array of per packet operation results - * - * Operation outputs results for each outputted packet into this array. - * The array must have at least 'num_pkt' elements. The results include - * operation status and packet form information for each outputted - * packet. - * - * For example, some packets may not have been transformed due to - * an error, but the original packet is returned with appropriate - * packet result information instead. - */ - odp_ipsec_packet_result_t *res; - -} odp_ipsec_op_result_t; - -/** * IPSEC status ID */ typedef enum odp_ipsec_status_id_t { @@ -1136,20 +1097,32 @@ typedef struct odp_ipsec_status_t { * * This operation does inbound IPSEC processing in synchronous mode * (ODP_IPSEC_OP_MODE_SYNC). A successful operation returns the number of - * packets consumed and outputs a new packet handle as well as an operation - * result for each outputted packet. The operation does not modify packets that - * it does not consume. It cannot consume all input packets if 'output.num_pkt' - * is smaller than 'input.num_pkt'. + * packets consumed and outputs a new packet handle for each outputted packet. + * Outputted packets contain IPSEC result metadata (odp_ipsec_packet_result_t), + * which should be checked for transformation errors, etc. The operation does + * not modify packets that it does not consume. It cannot consume all input + * packets if 'num_out' is smaller than 'num_in'. * * Packet context pointer and user area content are copied from input to output * packets. Output packets are allocated from the same pool(s) as input packets. * - * When 'input.num_sa' is zero, this operation performs SA look up for each + * When 'param.num_sa' is zero, this operation performs SA look up for each * packet. Otherwise, application must provide the SA(s) as part of operation - * input parameters (odp_ipsec_op_param_t). The operation outputs used SA(s) as - * part of per packet operation results (odp_ipsec_packet_result_t), or an error + * input parameters (odp_ipsec_in_param_t). The operation outputs used SA(s) as + * part of per packet results (odp_ipsec_packet_result_t), or an error * status if a SA was not found. * + * Each input packet must have a valid value for these metadata (other metadata + * is ignored): + * * L3 offset: Offset to the first byte of the (outmost) IP header + * * L4 offset: When udp_encap is enabled, offset to the first byte of the + * encapsulating UDP header + * + * Additionally, implementation checks input IP packet length (odp_packet_len() + * minus odp_packet_l3_offset()) against protocol headers and reports an error + * (status.error.proto) if packet data length is less than protocol headers + * indicate. + * * Packets are processed in the input order. Packet order is maintained from * input 'pkt' array to output 'pkt' array. Packet order is not guaranteed * between calling threads. @@ -1162,35 +1135,50 @@ typedef struct odp_ipsec_status_t { * restored. The amount and content of packet data before the IP header is * undefined. * - * @param input Operation input parameters - * @param[out] output Operation results + * @param pkt_in Packets to be processed + * @param num_in Number of packets to be processed + * @param[out] pkt_out Packet handle array for resulting packets + * @param[in, out] num_out Number of resulting packets. Application sets this + * to 'pkt_out' array size. A successful operation sets + * this to the number of outputted packets + * (1 ... num_out). + * @param param Inbound operation parameters * - * @return Number of input packets consumed (0 ... input.num_pkt) + * @return Number of input packets consumed (0 ... num_in) * @retval <0 On failure * - * @see odp_packet_user_ptr(), odp_packet_user_area() + * @see odp_packet_user_ptr(), odp_packet_user_area(), odp_packet_l3_offset(), + * odp_packet_l4_offset() */ -int odp_ipsec_in(const odp_ipsec_op_param_t *input, - odp_ipsec_op_result_t *output); +int odp_ipsec_in(const odp_packet_t pkt_in[], int num_in, + odp_packet_t pkt_out[], int *num_out, + const odp_ipsec_in_param_t *param); /** * Outbound synchronous IPSEC operation * * This operation does outbound IPSEC processing in synchronous mode * (ODP_IPSEC_OP_MODE_SYNC). A successful operation returns the number of - * packets consumed and outputs a new packet handle as well as an operation - * result for each outputted packet. The operation does not modify packets that - * it does not consume. It cannot consume all input packets if 'output.num_pkt' - * is smaller than 'input.num_pkt'. + * packets consumed and outputs a new packet handle for each outputted packet. + * Outputted packets contain IPSEC result metadata (odp_ipsec_packet_result_t), + * which should be checked for transformation errors, etc. The operation does + * not modify packets that it does not consume. It cannot consume all input + * packets if 'num_out' is smaller than 'num_in'. * * Packet context pointer and user area content are copied from input to output * packets. Output packets are allocated from the same pool(s) as input packets. * * When outbound IP fragmentation offload is enabled, the number of outputted - * packets (and corresponding per packet results) may be greater than - * the number of input packets. In that case, application may examine 'num_out' - * of each packet result (odp_ipsec_packet_result_t) to find out which - * fragments are originated from which input packet. + * packets may be greater than the number of input packets. + * + * Each input packet must have a valid value for these metadata (other metadata + * is ignored): + * * L3 offset: Offset to the first byte of the (outmost) IP header + * * L4 offset: Offset to the L4 header if L4 checksum offload is requested + * + * Additionally, input IP packet length (odp_packet_len() minus + * odp_packet_l3_offset()) must match values in protocol headers. Otherwise + * results are undefined. * * Packets are processed in the input order. Packet order is maintained from * input 'pkt' array to output 'pkt' array. Packet order is not guaranteed @@ -1201,31 +1189,37 @@ int odp_ipsec_in(const odp_ipsec_op_param_t *input, * with IPSEC, etc headers constructed according to the standards. The amount * and content of packet data before the IP header is undefined. * - * @param input Operation input parameters - * @param[out] output Operation results + * @param pkt_in Packets to be processed + * @param num_in Number of packets to be processed + * @param[out] pkt_out Packet handle array for resulting packets + * @param[in, out] num_out Number of resulting packets. Application sets this + * to 'pkt_out' array size. A successful operation sets + * this to the number of outputted packets + * (1 ... num_out). + * @param param Outbound operation parameters * - * @return Number of input packets consumed (0 ... input.num_pkt) + * @return Number of input packets consumed (0 ... num_in) * @retval <0 On failure * - * @see odp_packet_user_ptr(), odp_packet_user_area() + * @see odp_packet_user_ptr(), odp_packet_user_area(), odp_packet_l3_offset() */ -int odp_ipsec_out(const odp_ipsec_op_param_t *input, - odp_ipsec_op_result_t *output); +int odp_ipsec_out(const odp_packet_t pkt_in[], int num_in, + odp_packet_t pkt_out[], int *num_out, + const odp_ipsec_out_param_t *param); /** * Inbound asynchronous IPSEC operation * * This operation does inbound IPSEC processing in asynchronous mode. It - * processes packets otherwise identically to odp_ipsec_in(), but outputs all - * results through one or more ODP_EVENT_IPSEC_RESULT events with the following + * processes packets otherwise identically to odp_ipsec_in(), but outputs + * resulting packets as ODP_EVENT_PACKET_IPSEC events with the following * ordering considerations. * * Asynchronous mode maintains packet order per SA when application calls the * operation within an ordered or atomic scheduler context of the same queue. - * Resulting events for the same SA are enqueued in order and packet handles - * (for the same SA) are stored in order within an event. Packet order per SA at - * a destination queue is the same as if application would have enqueued packets - * there with odp_queue_enq_multi(). + * Resulting events for the same SA are enqueued in order. Packet order per SA + * at a destination queue is the same as if application would have enqueued + * packets there with odp_queue_enq_multi(). * * Packet order is also maintained when application otherwise guarantees * (e.g. using locks) that the operation is not called simultaneously from @@ -1239,29 +1233,31 @@ int odp_ipsec_out(const odp_ipsec_op_param_t *input, * may be processed simultaneously in both modes (initiated by this function * and inline operation). * - * @param input Operation input parameters + * @param pkt Packets to be processed + * @param num Number of packets to be processed + * @param param Inbound operation parameters * - * @return Number of input packets consumed (0 ... input.num_pkt) + * @return Number of input packets consumed (0 ... num) * @retval <0 On failure * * @see odp_ipsec_in(), odp_ipsec_result() */ -int odp_ipsec_in_enq(const odp_ipsec_op_param_t *input); +int odp_ipsec_in_enq(const odp_packet_t pkt[], int num, + const odp_ipsec_in_param_t *param); /** * Outbound asynchronous IPSEC operation * * This operation does outbound IPSEC processing in asynchronous mode. It * processes packets otherwise identically to odp_ipsec_out(), but outputs all - * results through one or more ODP_EVENT_IPSEC_RESULT events with the following + * resulting packets as ODP_EVENT_PACKET_IPSEC events with the following * ordering considerations. * * Asynchronous mode maintains packet order per SA when application calls the * operation within an ordered or atomic scheduler context of the same queue. - * Resulting events for the same SA are enqueued in order and packet handles - * (for the same SA) are stored in order within an event. Packet order per SA at - * a destination queue is the same as if application would have enqueued packets - * there with odp_queue_enq_multi(). + * Resulting events for the same SA are enqueued in order. Packet order per SA + * at a destination queue is the same as if application would have enqueued + * packets there with odp_queue_enq_multi(). * * Packet order is also maintained when application otherwise guarantees * (e.g. using locks) that the operation is not called simultaneously from @@ -1273,14 +1269,17 @@ int odp_ipsec_in_enq(const odp_ipsec_op_param_t *input); * The function may be used also in inline processing mode, e.g. for IPSEC * packets for which inline processing is not possible. * - * @param input Operation input parameters + * @param pkt Packets to be processed + * @param num Number of packets to be processed + * @param param Outbound operation parameters * - * @return Number of input packets consumed (0 ... input.num_pkt) + * @return Number of input packets consumed (0 ... num) * @retval <0 On failure * * @see odp_ipsec_out(), odp_ipsec_result() */ -int odp_ipsec_out_enq(const odp_ipsec_op_param_t *input); +int odp_ipsec_out_enq(const odp_packet_t pkt[], int num, + const odp_ipsec_out_param_t *param); /** * Outbound inline IPSEC operation @@ -1291,39 +1290,73 @@ int odp_ipsec_out_enq(const odp_ipsec_op_param_t *input); * result events for those. * * Inline operation parameters are defined per packet. The array of parameters - * must have 'op_param.num_pkt' elements and is pointed to by 'inline_param'. + * must have 'num' elements and is pointed to by 'inline_param'. * - * @param op_param Operation parameters - * @param inline_param Outbound inline operation specific parameters + * @param pkt Packets to be processed + * @param num Number of packets to be processed + * @param param Outbound operation parameters + * @param inline_param Outbound inline operation specific parameters * - * @return Number of packets consumed (0 ... op_param.num_pkt) + * @return Number of packets consumed (0 ... num) * @retval <0 On failure * * @see odp_ipsec_out_enq() */ -int odp_ipsec_out_inline(const odp_ipsec_op_param_t *op_param, - const odp_ipsec_inline_op_param_t *inline_param); +int odp_ipsec_out_inline(const odp_packet_t pkt[], int num, + const odp_ipsec_out_param_t *param, + const odp_ipsec_out_inline_param_t *inline_param); + +/** + * Convert ODP_EVENT_IPSEC_PACKET event to packet handle + * + * Get packet handle for an IPSEC processed packet. Event type must be + * ODP_EVENT_IPSEC_PACKET. IPSEC operation results can be examined with + * odp_ipsec_result(). + * + * @param ev Event handle + * + * @return Packet handle + * + * @see odp_event_type(), odp_ipsec_result() + */ +odp_packet_t odp_ipsec_packet_from_event(odp_event_t ev); /** - * Get IPSEC results from an ODP_EVENT_IPSEC_RESULT event + * Convert IPSEC processed packet handle to event * - * Copies IPSEC operation results from an event. The event must be of - * type ODP_EVENT_IPSEC_RESULT. It must be freed before the application passes - * any resulting packet handles to other ODP calls. + * The packet handle must be an output of an IPSEC operation. * - * @param[out] result Pointer to operation result for output. Maybe NULL, if - * application is interested only on the number of - * packets. - * @param event An ODP_EVENT_IPSEC_RESULT event + * @param pkt Packet handle from IPSEC operation * - * @return Number of packets in the event. If this is larger than - * 'result.num_pkt', all packets did not fit into result struct and - * application must call the function again with a larger result struct. + * @return Event handle + */ +odp_event_t odp_ipsec_packet_to_event(odp_packet_t pkt); + +/** + * Get IPSEC operation results from an IPSEC processed packet + * + * Successful IPSEC operations of all types (SYNC, ASYNC and INLINE) produce + * packets which contain IPSEC result metadata. This function copies the + * operation results from an IPSEC processed packet. Event type of this kind of + * packet is ODP_EVENT_PACKET_IPSEC. Results are undefined if a non-IPSEC + * processed packet is passed as input. + * + * Some packet API operations output a new packet handle + * (e.g. odp_packet_concat()). IPSEC metadata remain valid as long as the packet + * handle is not changed from the original (output of e.g. odp_ipsec_in() or + * odp_ipsec_packet_from_event() call) IPSEC processed packet handle. + * + * @param[out] result Pointer to operation result for output + * @param packet An IPSEC processed packet (ODP_EVENT_PACKET_IPSEC) + * + * @retval 0 On success * @retval <0 On failure * - * @see odp_ipsec_in_enq(), odp_ipsec_out_enq() + * @see odp_ipsec_in(), odp_ipsec_in_enq(), odp_ipsec_out(), + * odp_ipsec_out_enq(), odp_ipsec_out_inline(), + * odp_ipsec_packet_from_event() */ -int odp_ipsec_result(odp_ipsec_op_result_t *result, odp_event_t event); +int odp_ipsec_result(odp_ipsec_packet_result_t *result, odp_packet_t packet); /** * Get IPSEC status information from an ODP_EVENT_IPSEC_STATUS event diff --git a/include/odp/arch/default/api/abi/event.h b/include/odp/arch/default/api/abi/event.h index 87220d63..d807425b 100644 --- a/include/odp/arch/default/api/abi/event.h +++ b/include/odp/arch/default/api/abi/event.h @@ -27,9 +27,9 @@ typedef _odp_abi_event_t *odp_event_t; typedef enum odp_event_type_t { ODP_EVENT_BUFFER = 1, ODP_EVENT_PACKET = 2, - ODP_EVENT_TIMEOUT = 3, - ODP_EVENT_CRYPTO_COMPL = 4, - ODP_EVENT_IPSEC_RESULT = 5, + ODP_EVENT_PACKET_IPSEC = 3, + ODP_EVENT_TIMEOUT = 4, + ODP_EVENT_CRYPTO_COMPL = 5, ODP_EVENT_IPSEC_STATUS = 6 } odp_event_type_t; diff --git a/platform/linux-generic/include/odp/api/plat/event_types.h b/platform/linux-generic/include/odp/api/plat/event_types.h index 0f517834..3615b4a4 100644 --- a/platform/linux-generic/include/odp/api/plat/event_types.h +++ b/platform/linux-generic/include/odp/api/plat/event_types.h @@ -37,9 +37,10 @@ typedef ODP_HANDLE_T(odp_event_t); typedef enum odp_event_type_t { ODP_EVENT_BUFFER = 1, ODP_EVENT_PACKET = 2, - ODP_EVENT_TIMEOUT = 3, - ODP_EVENT_CRYPTO_COMPL = 4, - ODP_EVENT_IPSEC_RESULT = 5 + ODP_EVENT_PACKET_IPSEC = 3, + ODP_EVENT_TIMEOUT = 4, + ODP_EVENT_CRYPTO_COMPL = 5, + ODP_EVENT_IPSEC_STATUS = 6 } odp_event_type_t; /** diff --git a/platform/linux-generic/odp_ipsec.c b/platform/linux-generic/odp_ipsec.c index 10918dfb..c7eeb4ec 100644 --- a/platform/linux-generic/odp_ipsec.c +++ b/platform/linux-generic/odp_ipsec.c @@ -73,51 +73,68 @@ int odp_ipsec_sa_destroy(odp_ipsec_sa_t sa) return -1; } -int odp_ipsec_in(const odp_ipsec_op_param_t *input, - odp_ipsec_op_result_t *output) -{ - (void)input; - (void)output; +int odp_ipsec_in(const odp_packet_t pkt_in[], int num_in, + odp_packet_t pkt_out[], int *num_out, + const odp_ipsec_in_param_t *param) +{ + (void)pkt_in; + (void)num_in; + (void)pkt_out; + (void)num_out; + (void)param; return -1; } -int odp_ipsec_out(const odp_ipsec_op_param_t *input, - odp_ipsec_op_result_t *output) +int odp_ipsec_out(const odp_packet_t pkt_in[], int num_in, + odp_packet_t pkt_out[], int *num_out, + const odp_ipsec_out_param_t *param) { - (void)input; - (void)output; + (void)pkt_in; + (void)num_in; + (void)pkt_out; + (void)num_out; + (void)param; return -1; } -int odp_ipsec_in_enq(const odp_ipsec_op_param_t *input) +int odp_ipsec_in_enq(const odp_packet_t pkt[], int num, + const odp_ipsec_in_param_t *param) { - (void)input; + (void)pkt; + (void)num; + (void)param; return -1; } -int odp_ipsec_out_enq(const odp_ipsec_op_param_t *input) +int odp_ipsec_out_enq(const odp_packet_t pkt[], int num, + const odp_ipsec_out_param_t *param) { - (void)input; + (void)pkt; + (void)num; + (void)param; return -1; } -int odp_ipsec_out_inline(const odp_ipsec_op_param_t *op_param, - const odp_ipsec_inline_op_param_t *inline_param) +int odp_ipsec_out_inline(const odp_packet_t pkt[], int num, + const odp_ipsec_out_param_t *param, + const odp_ipsec_out_inline_param_t *inline_param) { - (void)op_param; + (void)pkt; + (void)num; + (void)param; (void)inline_param; return -1; } -int odp_ipsec_result(odp_ipsec_op_result_t *result, odp_event_t event) +int odp_ipsec_result(odp_ipsec_packet_result_t *result, odp_packet_t packet) { (void)result; - (void)event; + (void)packet; return -1; } @@ -145,6 +162,20 @@ void *odp_ipsec_sa_context(odp_ipsec_sa_t sa) return NULL; } +odp_packet_t odp_ipsec_packet_from_event(odp_event_t ev) +{ + (void)ev; + + return ODP_PACKET_INVALID; +} + +odp_event_t odp_ipsec_packet_to_event(odp_packet_t pkt) +{ + (void)pkt; + + return ODP_EVENT_INVALID; +} + uint64_t odp_ipsec_sa_to_u64(odp_ipsec_sa_t sa) { return _odp_pri(sa);