> -----Original Message-----
> From: Anoob Joseph [mailto:[email protected]]
> Sent: Friday, January 26, 2018 2:38 PM
> To: Nicolau, Radu <[email protected]>; Akhil Goyal
> <[email protected]>
> Cc: [email protected]; Doherty, Declan
> <[email protected]>; Gonzalez Monroy, Sergio
> <[email protected]>; Jerin Jacob
> <[email protected]>; Narayana Prasad
> <[email protected]>; Nelio Laranjeiro
> <[email protected]>; [email protected]
> Subject: Re: [RFC 0/3] set protocol specific metadata using set_pkt_metadata
> API
> 
> Hi Radu,
> 
> On 01/26/2018 04:52 PM, Nicolau, Radu wrote:
> >
> >> -----Original Message-----
> >> From: Anoob Joseph [mailto:[email protected]]
> >> Sent: Thursday, January 25, 2018 5:13 PM
> >> To: Akhil Goyal <[email protected]>; Nicolau, Radu
> >> <[email protected]>
> >> Cc: Doherty, Declan <[email protected]>; Gonzalez Monroy,
> >> Sergio <[email protected]>;
> >> [email protected]; Jerin Jacob
> >> <[email protected]>; Narayana Prasad
> >> <[email protected]>; Nelio Laranjeiro
> >> <[email protected]>; [email protected]
> >> Subject: Re: [RFC 0/3] set protocol specific metadata using
> >> set_pkt_metadata API
> >>
> >> Hi Akhil, Radu,
> >>
> >> Could you review the patch and share your thoughts on the proposed
> >> change?
> >>
> > Hi,
> >
> > I've had a quick look. From what I can see you can do everything you do in
> this patch with the current API. For example you can store an internal struct
> pointer in the private section of the security context and you can increment
> the ESP SN with every tx or set metadata call.
> With the current API, PMD could store the ESN with the security session, but
> there is no means for the application to read this. Application should be
> aware of the sequence number used per packet. This is required to monitor
> sequence number overflow.In the proposal, the sequence number field is
> IN-OUT. So application could either dictate the sequence number, or read
> the value from the PMD.
> 
> Thanks,
> Anoob

My concern is that we are adding too much and too specific to the security API.
Overflow situation can be monitored with a tx callback event or a crypto 
callback event, depending on the device type.

Reply via email to