Show a cover letter.

GET /api/covers/122537/?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 122537,
    "url": "http://patchwork.dpdk.org/api/covers/122537/?format=api",
    "web_url": "http://patchwork.dpdk.org/project/dpdk/cover/20230126133427.379941-1-cristian.dumitrescu@intel.com/",
    "project": {
        "id": 1,
        "url": "http://patchwork.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20230126133427.379941-1-cristian.dumitrescu@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20230126133427.379941-1-cristian.dumitrescu@intel.com",
    "date": "2023-01-26T13:34:16",
    "name": "[V5,00/11] pipeline: add IPsec support",
    "submitter": {
        "id": 19,
        "url": "http://patchwork.dpdk.org/api/people/19/?format=api",
        "name": "Cristian Dumitrescu",
        "email": "cristian.dumitrescu@intel.com"
    },
    "mbox": "http://patchwork.dpdk.org/project/dpdk/cover/20230126133427.379941-1-cristian.dumitrescu@intel.com/mbox/",
    "series": [
        {
            "id": 26657,
            "url": "http://patchwork.dpdk.org/api/series/26657/?format=api",
            "web_url": "http://patchwork.dpdk.org/project/dpdk/list/?series=26657",
            "date": "2023-01-26T13:34:16",
            "name": "pipeline: add IPsec support",
            "version": 5,
            "mbox": "http://patchwork.dpdk.org/series/26657/mbox/"
        }
    ],
    "comments": "http://patchwork.dpdk.org/api/covers/122537/comments/",
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id AD33142492;\n\tThu, 26 Jan 2023 14:34:57 +0100 (CET)",
            "from mails.dpdk.org (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 425C540223;\n\tThu, 26 Jan 2023 14:34:57 +0100 (CET)",
            "from mga17.intel.com (mga17.intel.com [192.55.52.151])\n by mails.dpdk.org (Postfix) with ESMTP id 72CBA400D7\n for <dev@dpdk.org>; Thu, 26 Jan 2023 14:34:55 +0100 (CET)",
            "from orsmga003.jf.intel.com ([10.7.209.27])\n by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 26 Jan 2023 05:34:29 -0800",
            "from silpixa00400573.ir.intel.com (HELO\n silpixa00400573.ger.corp.intel.com) ([10.237.222.53])\n by orsmga003.jf.intel.com with ESMTP; 26 Jan 2023 05:34:27 -0800"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/simple;\n d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n t=1674740095; x=1706276095;\n h=from:to:subject:date:message-id:in-reply-to:references:\n mime-version:content-transfer-encoding;\n bh=hti8k6vJ/ZgDbBCLqnbGgnxiwwLCP8kmXT3Zxxx+mwE=;\n b=CV10i5xuKTkuVTjSOf9xYNtyJT1yKDuF8CtUWQ89CFALyoLrAGts+Vcf\n tJidNNagS2ESYRF8DNdUP654SJQ0yGI03WXLNn6tYjV16VKl76vkxKt7v\n jbEy5XTjNUB4uPfJ2tptjslHREt1/SK7NrwWsRwDR/jojWAfuU8S7xuWN\n IcCVbvP5neLY4jnnRkp/CwYLlMcxTgqDBRips+FCHRkiJZaWFaBZfstQ8\n aJc6xKd2yNEpCHCx2hPKb1jSV95J25lKNOV+lyQVNYTmcy+Gl/cYGXgHj\n aNImUEDA+S6wN+yTo9O9U9BaS5RXPrp3vbb8kdBkGjzJZqdIk14Sqj1KJ w==;",
        "X-IronPort-AV": [
            "E=McAfee;i=\"6500,9779,10602\"; a=\"307154991\"",
            "E=Sophos;i=\"5.97,248,1669104000\"; d=\"scan'208\";a=\"307154991\"",
            "E=McAfee;i=\"6500,9779,10602\"; a=\"612789637\"",
            "E=Sophos;i=\"5.97,248,1669104000\"; d=\"scan'208\";a=\"612789637\""
        ],
        "X-ExtLoop1": "1",
        "From": "Cristian Dumitrescu <cristian.dumitrescu@intel.com>",
        "To": "dev@dpdk.org",
        "Subject": "[PATCH V5 00/11] pipeline: add IPsec support",
        "Date": "Thu, 26 Jan 2023 13:34:16 +0000",
        "Message-Id": "<20230126133427.379941-1-cristian.dumitrescu@intel.com>",
        "X-Mailer": "git-send-email 2.34.1",
        "In-Reply-To": "<20230111205608.87953-1-cristian.dumitrescu@intel.com>",
        "References": "<20230111205608.87953-1-cristian.dumitrescu@intel.com>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org"
    },
    "content": "This patch set introduces a companion block for the SWX pipeline for\nIPsec support.\n\nThe IPsec block is external to the pipeline, hence it needs to be\nexplicitly instantiated by the user and connected to a pipeline\ninstance through the pipeline I/O ports.\n\nMain features:\n* IPsec inbound (encrypted input packets -> clear text output packets)\nand outbound (clear text input packets -> encrypted output packets)\nprocessing support for tunnel and transport modes.\n\nInteraction of the IPsec block with the pipeline:\n* Each IPsec block instance has its own set of Security Associations\n(SAs) used to process the input packets. Each SA is identified by its\nunique SA ID. The IPsec inbound and outbound SAs share the same ID\nspace.\n* Each input packet is first mapped to one of the existing SAs by\nusing the SA ID and then processed according to the identified SA. The\nSA ID is read from input packet. The SA ID field is typically written\nby the pipeline before sending the packet to the IPsec block.\n\nChange log:\n\nV5:\nFixed build issue for gcc 4.8.5.\n\nV4:\nFixed Doxygen issues.\n\nV3:\nRebased on top of main latest.\n\nV2:\nFixed minor style issues.\n\nCristian Dumitrescu (11):\n  pipeline: add IPsec support\n  examples/pipeline: rework memory pool support\n  examples/pipeline: streamline ring support\n  examples/pipeline: streamline the Ethernet device support\n  examples/pipeline: support crypto devices\n  examples/pipeline: add CLI command for crypto device\n  examples/pipeline: add IPsec CLI commands\n  examples/pipeline: rework the thread configuration updates\n  examples/pipeline: support blocks other than pipelines\n  examples/pipeline: add block enable/disable CLI commands\n  examples/pipeline: add IPsec example\n\n examples/pipeline/cli.c                       |  896 ++++++--\n examples/pipeline/examples/fib.cli            |    4 +-\n examples/pipeline/examples/hash_func.cli      |    4 +-\n examples/pipeline/examples/ipsec.cli          |   57 +\n examples/pipeline/examples/ipsec.io           |   23 +\n examples/pipeline/examples/ipsec.spec         |  138 ++\n examples/pipeline/examples/ipsec_sa.txt       |  216 ++\n examples/pipeline/examples/l2fwd.cli          |    4 +-\n examples/pipeline/examples/l2fwd_macswp.cli   |    4 +-\n .../pipeline/examples/l2fwd_macswp_pcap.cli   |    4 +-\n examples/pipeline/examples/l2fwd_pcap.cli     |    4 +-\n examples/pipeline/examples/learner.cli        |    4 +-\n examples/pipeline/examples/meter.cli          |    4 +-\n examples/pipeline/examples/mirroring.cli      |    4 +-\n examples/pipeline/examples/recirculation.cli  |    4 +-\n examples/pipeline/examples/registers.cli      |    4 +-\n examples/pipeline/examples/selector.cli       |    4 +-\n examples/pipeline/examples/varbit.cli         |    4 +-\n examples/pipeline/examples/vxlan.cli          |    4 +-\n examples/pipeline/examples/vxlan_pcap.cli     |    4 +-\n examples/pipeline/main.c                      |   12 +-\n examples/pipeline/obj.c                       |  361 +---\n examples/pipeline/obj.h                       |  100 +-\n examples/pipeline/thread.c                    |  655 +++---\n examples/pipeline/thread.h                    |   24 +-\n lib/pipeline/meson.build                      |    4 +-\n lib/pipeline/rte_swx_ipsec.c                  | 1821 +++++++++++++++++\n lib/pipeline/rte_swx_ipsec.h                  |  383 ++++\n lib/pipeline/version.map                      |    9 +\n 29 files changed, 3741 insertions(+), 1018 deletions(-)\n create mode 100644 examples/pipeline/examples/ipsec.cli\n create mode 100644 examples/pipeline/examples/ipsec.io\n create mode 100644 examples/pipeline/examples/ipsec.spec\n create mode 100644 examples/pipeline/examples/ipsec_sa.txt\n create mode 100644 lib/pipeline/rte_swx_ipsec.c\n create mode 100644 lib/pipeline/rte_swx_ipsec.h"
}