Signed-off-by: Robbie King <robk...@cisco.com>
---
 example/ipsec/odp_ipsec.c | 1444 +++++++++++++++++++++++++++++++++++++++++++++
 1 files changed, 1444 insertions(+), 0 deletions(-)
 create mode 100644 example/ipsec/odp_ipsec.c

diff --git a/example/ipsec/odp_ipsec.c b/example/ipsec/odp_ipsec.c
new file mode 100644
index 0000000..4281c8a
--- /dev/null
+++ b/example/ipsec/odp_ipsec.c
@@ -0,0 +1,1444 @@
+/* Copyright (c) 2013, Linaro Limited
+ * All rights reserved.
+ *
+ * SPDX-License-Identifier:     BSD-3-Clause
+ */
+
+/**
+ * @file
+ *
+ * @example odp_example_ipsec.c  ODP basic packet IO cross connect with IPsec 
test application
+ */
+
+#include <stdlib.h>
+#include <string.h>
+#include <getopt.h>
+#include <unistd.h>
+
+#include <odp.h>
+#include <odp_align.h>
+#include <odp_crypto.h>
+#include <helper/odp_linux.h>
+#include <helper/odp_packet_helper.h>
+#include <helper/odp_eth.h>
+#include <helper/odp_ip.h>
+#include <helper/odp_icmp.h>
+#include <helper/odp_ipsec.h>
+
+#include <stdbool.h>
+#include <sys/socket.h>
+#include <net/if.h>
+#include <sys/ioctl.h>
+
+#include <sys/socket.h>
+#include <netpacket/packet.h>
+#include <net/ethernet.h>
+#include <arpa/inet.h>
+
+#include <odp_ipsec_misc.h>
+#include <odp_ipsec_sa_db.h>
+#include <odp_ipsec_sp_db.h>
+#include <odp_ipsec_fwd_db.h>
+#include <odp_ipsec_loop_db.h>
+#include <odp_ipsec_cache.h>
+#include <odp_ipsec_stream.h>
+
+#define MAX_WORKERS     32   /**< maximum number of worker threads */
+
+#define USE_MAC_ADDR_HACK 1  /**< use socket I/O workaround */
+
+/**
+ * Parsed command line application arguments
+ */
+typedef struct {
+       int core_count;
+       int if_count;           /**< Number of interfaces to be used */
+       char **if_names;        /**< Array of pointers to interface names */
+       int type;               /**< Packet IO type */
+       int fanout;             /**< Packet IO fanout */
+       crypto_api_mode_e mode; /**< Crypto API preferred mode */
+       odp_buffer_pool_t pool; /**< Buffer pool for packet IO */
+} appl_args_t;
+
+/**
+ * Thread specific arguments (currently none, leave as placeholder)
+ */
+typedef struct {
+} thread_args_t;
+
+/**
+ * Grouping of both parsed CL args and thread specific args - alloc together
+ */
+typedef struct {
+       /** Application (parsed) arguments */
+       appl_args_t appl;
+       /** Thread specific arguments */
+       thread_args_t thread[MAX_WORKERS];
+} args_t;
+
+/* helper funcs */
+static void parse_args(int argc, char *argv[], appl_args_t *appl_args);
+static void print_info(char *progname, appl_args_t *appl_args);
+static void usage(char *progname);
+
+/** Global pointer to args */
+static args_t *args;
+
+/**
+ * Buffer pool for packet IO
+ */
+#define SHM_PKT_POOL_BUF_COUNT 1024
+#define SHM_PKT_POOL_BUF_SIZE  4096
+#define SHM_PKT_POOL_SIZE      (SHM_PKT_POOL_BUF_COUNT * SHM_PKT_POOL_BUF_SIZE)
+
+static odp_buffer_pool_t pkt_pool = ODP_BUFFER_POOL_INVALID;
+
+/**
+ * Buffer pool for crypto session output packets
+ */
+#define SHM_OUT_POOL_BUF_COUNT 1024
+#define SHM_OUT_POOL_BUF_SIZE  4096
+#define SHM_OUT_POOL_SIZE      (SHM_OUT_POOL_BUF_COUNT * SHM_OUT_POOL_BUF_SIZE)
+
+static odp_buffer_pool_t out_pool = ODP_BUFFER_POOL_INVALID;
+
+/** ATOMIC queue for IPsec sequence number assignment */
+static odp_queue_t seqnumq;
+
+/** ORDERED queue (eventually) for per packet crypto API completion events */
+static odp_queue_t completionq;
+
+/** Synchronize threads before packet processing begins */
+static odp_barrier_t sync_barrier;
+
+/**
+ * Packet processing states/steps
+ */
+typedef enum {
+       PKT_STATE_INPUT_VERIFY,        /**< Verify IPv4 and ETH */
+       PKT_STATE_IPSEC_IN_CLASSIFY,   /**< Initiate input IPsec */
+       PKT_STATE_IPSEC_IN_FINISH,     /**< Finish input IPsec */
+       PKT_STATE_ROUTE_LOOKUP,        /**< Use DST IP to find output IF */
+       PKT_STATE_IPSEC_OUT_CLASSIFY,  /**< Intiate output IPsec */
+       PKT_STATE_IPSEC_OUT_SEQ,       /**< Assign IPsec sequence numbers */
+       PKT_STATE_IPSEC_OUT_FINISH,    /**< Finish output IPsec */
+       PKT_STATE_TRANSMIT,            /**< Send packet to output IF queue */
+} pkt_state_e;
+
+/**
+ * Packet processing result codes
+ */
+typedef enum {
+       PKT_CONTINUE,    /**< No events posted, keep processing */
+       PKT_POSTED,      /**< Event posted, stop processing */
+       PKT_DROP,        /**< Reason to drop detected, stop processing */
+       PKT_DONE         /**< Finished with packet, stop processing */
+} pkt_disposition_e;
+
+/**
+ * Per packet IPsec processing context
+ */
+typedef struct {
+       uint8_t  ip_tos;         /**< Saved IP TOS value */
+       uint16_t ip_frag_offset; /**< Saved IP flags value */
+       uint8_t  ip_ttl;         /**< Saved IP TTL value */
+       int      hdr_len;        /**< Length of IPsec headers */
+       int      trl_len;        /**< Length of IPsec trailers */
+       uint16_t ah_offset;      /**< Offset of AH header from buffer start */
+       uint16_t esp_offset;     /**< Offset of ESP header from buffer start */
+
+       /* Output only */
+       odp_crypto_op_params_t params;  /**< Parameters for crypto call */
+       uint32_t *ah_seq;                    /**< AH sequence number location */
+       uint32_t *esp_seq;                   /**< ESP sequence number location 
*/
+} ipsec_ctx_t;
+
+/**
+ * Per packet processing context
+ */
+typedef struct {
+       odp_buffer_t buffer;  /**< Buffer for context */
+       pkt_state_e  state;   /**< Next processing step */
+       ipsec_ctx_t  ipsec;   /**< IPsec specific context */
+       odp_queue_t  outq;    /**< transmit queue */
+} pkt_ctx_t;
+
+#define SHM_CTX_POOL_BUF_SIZE  (sizeof(pkt_ctx_t))
+#define SHM_CTX_POOL_BUF_COUNT (SHM_PKT_POOL_BUF_COUNT + 
SHM_OUT_POOL_BUF_COUNT)
+#define SHM_CTX_POOL_SIZE      (SHM_CTX_POOL_BUF_COUNT * SHM_CTX_POOL_BUF_SIZE)
+
+static odp_buffer_pool_t ctx_pool = ODP_BUFFER_POOL_INVALID;
+
+/**
+ * Get per packet processing context from packet buffer
+ *
+ * @param pkt  Packet
+ *
+ * @return pointer to context area
+ */
+static
+pkt_ctx_t *get_pkt_ctx_from_pkt(odp_packet_t pkt)
+{
+       return (pkt_ctx_t *)odp_packet_get_ctx(pkt);
+}
+
+/**
+ * Allocate per packet processing context and associate it with
+ * packet buffer
+ *
+ * @param pkt  Packet
+ *
+ * @return pointer to context area
+ */
+static
+pkt_ctx_t *alloc_pkt_ctx(odp_packet_t pkt)
+{
+       odp_buffer_t ctx_buf = odp_buffer_alloc(ctx_pool);
+       pkt_ctx_t *ctx;
+
+       /* There should always be enough contexts */
+       if (odp_unlikely(ODP_BUFFER_INVALID == ctx_buf))
+               abort();
+
+       ctx = odp_buffer_addr(ctx_buf);
+       memset(ctx, 0, sizeof(*ctx));
+       ctx->buffer = ctx_buf;
+       odp_packet_set_ctx(pkt, ctx);
+
+       return ctx;
+}
+
+/**
+ * Release per packet resources
+ *
+ * @param ctx  Packet context
+ */
+static
+void free_pkt_ctx(pkt_ctx_t *ctx)
+{
+       odp_buffer_free(ctx->buffer);
+}
+
+#if USE_MAC_ADDR_HACK
+
+/**
+ * Query MAC address associated with an interface
+ *
+ * @todo Remove once pktio API is committed
+ *
+ * @param intf    String name of the interface
+ * @param src_mac MAC address used by the interface
+ *
+ * @return 0 if successful else -1
+ */
+static
+int query_mac_address(char *intf, uint8_t *src_mac)
+{
+       int sd;
+       struct ifreq ifr;
+
+       /* Get a socket descriptor */
+       sd = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL));
+       if (sd < 0) {
+               ODP_ERR("Error: socket() failed for %s\n", intf);
+               return -1;
+       }
+
+       /* Use ioctl() to look up interface name and get its MAC address */
+       memset(&ifr, 0, sizeof(ifr));
+       snprintf(ifr.ifr_name, sizeof(ifr.ifr_name), "%s", intf);
+       if (ioctl(sd, SIOCGIFHWADDR, &ifr) < 0) {
+               ODP_ERR("Error: ioctl() failed for %s\n", intf);
+               return -1;
+       }
+       memcpy(src_mac, ifr.ifr_hwaddr.sa_data, 6);
+
+       /* Fini */
+       close(sd);
+
+       return 0;
+}
+
+#endif
+
+/**
+ * IPsec pre argument processing intialization
+ */
+static
+void ipsec_init_pre(void)
+{
+       odp_queue_param_t qparam;
+       void *pool_base;
+
+       /*
+        * Create queues
+        *
+        *  - completion queue (should eventually be ORDERED)
+        *  - sequence number queue (must be ATOMIC)
+        */
+       qparam.sched.prio  = ODP_SCHED_PRIO_HIGHEST;
+       qparam.sched.sync  = ODP_SCHED_SYNC_ATOMIC;
+       qparam.sched.group = ODP_SCHED_GROUP_DEFAULT;
+
+       completionq = odp_queue_create("completion",
+                                  ODP_QUEUE_TYPE_SCHED,
+                                  &qparam);
+       if (completionq == ODP_QUEUE_INVALID) {
+               ODP_ERR("Error: completion queue creation failed\n");
+               exit(EXIT_FAILURE);
+       }
+
+       qparam.sched.prio  = ODP_SCHED_PRIO_HIGHEST;
+       qparam.sched.sync  = ODP_SCHED_SYNC_ATOMIC;
+       qparam.sched.group = ODP_SCHED_GROUP_DEFAULT;
+
+       seqnumq = odp_queue_create("seqnum",
+                              ODP_QUEUE_TYPE_SCHED,
+                              &qparam);
+       if (seqnumq == ODP_QUEUE_INVALID) {
+               ODP_ERR("Error: sequence number queue creation failed\n");
+               exit(EXIT_FAILURE);
+       }
+
+       /* Create output buffer pool */
+       pool_base = odp_shm_reserve("shm_out_pool",
+                                   SHM_OUT_POOL_SIZE, ODP_CACHE_LINE_SIZE);
+
+       out_pool = odp_buffer_pool_create("out_pool", pool_base,
+                                         SHM_OUT_POOL_SIZE,
+                                         SHM_OUT_POOL_BUF_SIZE,
+                                         ODP_CACHE_LINE_SIZE,
+                                         ODP_BUFFER_TYPE_PACKET);
+
+       if (out_pool == ODP_BUFFER_POOL_INVALID) {
+               ODP_ERR("Error: message pool create failed.\n");
+               exit(EXIT_FAILURE);
+       }
+
+       /* Initialize our data bases */
+       init_sp_db();
+       init_sa_db();
+       init_ipsec_cache();
+}
+
+/**
+ * IPsec post argument processing intialization
+ *
+ * Resolve SP DB with SA DB and create corresponding IPsec cache entries
+ *
+ * @param api_mode  Mode to use when invoking per packet crypto API
+ */
+static
+void ipsec_init_post(crypto_api_mode_e api_mode)
+{
+       sp_db_entry_t *entry;
+
+       /* Attempt to find appropriate SA for each SP */
+       for (entry = sp_db->list; NULL != entry; entry = entry->next) {
+               sa_db_entry_t *cipher_sa = NULL;
+               sa_db_entry_t *auth_sa = NULL;
+
+               if (entry->esp)
+                       cipher_sa = find_sa_db_entry(&entry->src_subnet,
+                                                    &entry->dst_subnet,
+                                                    1);
+               if (entry->ah)
+                       auth_sa = find_sa_db_entry(&entry->src_subnet,
+                                                  &entry->dst_subnet,
+                                                  0);
+
+               if (cipher_sa || auth_sa)
+                       create_ipsec_cache_entry(cipher_sa,
+                                                auth_sa,
+                                                api_mode,
+                                                entry->input,
+                                                completionq,
+                                                out_pool);
+               else {
+                       printf(" WARNING: SA not found for SP\n");
+                       dump_sp_db_entry(entry);
+               }
+       }
+}
+
+/**
+ * Initialize loopback
+ *
+ * Initialize ODP queues to create our own idea of loopbacks, which allow
+ * testing without physical interfaces.  Interface name string will be of
+ * the format "loopX" where X is the decimal number of the interface.
+ *
+ * @param intf     Loopback interface name string
+ */
+static
+void initialize_loop(char *intf)
+{
+       int idx;
+       odp_queue_t outq_def;
+       odp_queue_t inq_def;
+       char queue_name[ODP_QUEUE_NAME_LEN];
+       odp_queue_param_t qparam;
+       uint8_t *mac;
+       char mac_str[32];
+
+       /* Derive loopback interface index */
+       idx = loop_if_index(intf);
+       if (idx < 0) {
+               ODP_ERR("Error: loopback \"%s\" invalid\n", intf);
+               exit(EXIT_FAILURE);
+       }
+
+       /* Create input queue */
+       qparam.sched.prio  = ODP_SCHED_PRIO_DEFAULT;
+       qparam.sched.sync  = ODP_SCHED_SYNC_ATOMIC;
+       qparam.sched.group = ODP_SCHED_GROUP_DEFAULT;
+       snprintf(queue_name, sizeof(queue_name), "%i-loop_inq_def", idx);
+       queue_name[ODP_QUEUE_NAME_LEN - 1] = '\0';
+
+       inq_def = odp_queue_create(queue_name, ODP_QUEUE_TYPE_SCHED, &qparam);
+       if (inq_def == ODP_QUEUE_INVALID) {
+               ODP_ERR("Error: input queue creation failed for %s\n", intf);
+               exit(EXIT_FAILURE);
+       }
+       /* Create output queue */
+       qparam.sched.prio  = ODP_SCHED_PRIO_DEFAULT;
+       qparam.sched.sync  = ODP_SCHED_SYNC_ATOMIC;
+       qparam.sched.group = ODP_SCHED_GROUP_DEFAULT;
+       snprintf(queue_name, sizeof(queue_name), "%i-loop_outq_def", idx);
+       queue_name[ODP_QUEUE_NAME_LEN - 1] = '\0';
+
+       outq_def = odp_queue_create(queue_name, ODP_QUEUE_TYPE_POLL, &qparam);
+       if (outq_def == ODP_QUEUE_INVALID) {
+               ODP_ERR("Error: output queue creation failed for %s\n", intf);
+               exit(EXIT_FAILURE);
+       }
+
+       /* Initialize the loopback DB entry */
+       create_loopback_db_entry(idx, inq_def, outq_def, pkt_pool);
+       mac = query_loopback_db_mac(idx);
+
+       printf("Created loop:%02i, queue mode (ATOMIC queues)\n"
+              "          default loop%02i-INPUT queue:%u\n"
+              "          default loop%02i-OUTPUT queue:%u\n"
+              "          source mac address %s\n",
+              idx, idx, inq_def, idx, outq_def,
+              mac_addr_str(mac_str, mac));
+
+       /* Resolve any routes using this interface for output */
+       resolve_fwd_db(intf, outq_def, mac);
+}
+
+/**
+ * Initialize interface
+ *
+ * Initialize ODP pktio and queues, query MAC address and update
+ * forwarding database.
+ *
+ * @param intf     Interface name string
+ * @param type     Packet IO type (BASIC, MMSG, MMAP)
+ * @param fanout   Packet IO fanout
+ */
+static
+void initialize_intf(char *intf, int type, int fanout)
+{
+       odp_pktio_t pktio;
+       odp_queue_t outq_def;
+       odp_queue_t inq_def;
+       char inq_name[ODP_QUEUE_NAME_LEN];
+       odp_queue_param_t qparam;
+       int ret;
+       odp_pktio_params_t params;
+       socket_params_t *sock_params = &params.sock_params;
+       uint8_t src_mac[6];
+       char src_mac_str[32];
+
+       /*
+        * Open a packet IO instance for thread and get default output queue
+        */
+       sock_params->type = type;
+       sock_params->fanout = fanout;
+       pktio = odp_pktio_open(intf, pkt_pool, &params);
+       if (pktio == ODP_PKTIO_INVALID) {
+               ODP_ERR("Error: pktio create failed for %s\n", intf);
+               exit(EXIT_FAILURE);
+       }
+       outq_def = odp_pktio_outq_getdef(pktio);
+
+       /*
+        * Create and set the default INPUT queue associated with the 'pktio'
+        * resource
+        */
+       qparam.sched.prio  = ODP_SCHED_PRIO_DEFAULT;
+       qparam.sched.sync  = ODP_SCHED_SYNC_ATOMIC;
+       qparam.sched.group = ODP_SCHED_GROUP_DEFAULT;
+       snprintf(inq_name, sizeof(inq_name), "%i-pktio_inq_def", (int)pktio);
+       inq_name[ODP_QUEUE_NAME_LEN - 1] = '\0';
+
+       inq_def = odp_queue_create(inq_name, ODP_QUEUE_TYPE_PKTIN, &qparam);
+       if (inq_def == ODP_QUEUE_INVALID) {
+               ODP_ERR("Error: pktio queue creation failed for %s\n", intf);
+               exit(EXIT_FAILURE);
+       }
+
+       ret = odp_pktio_inq_setdef(pktio, inq_def);
+       if (ret != 0) {
+               ODP_ERR("Error: default input-Q setup for %s\n", intf);
+               exit(EXIT_FAILURE);
+       }
+
+       /*
+        * Read the source MAC address for this interface
+        *
+        * @todo Remove once pktio API is committed
+        */
+#if USE_MAC_ADDR_HACK
+       ret = query_mac_address(intf, src_mac);
+#else
+       ret = odp_pktio_get_mac_addr(pktio, src_mac);
+#endif
+       if (ret != 0) {
+               ODP_ERR("Error: failed during MAC address get for %s\n", intf);
+               exit(EXIT_FAILURE);
+       }
+
+       printf("Created pktio:%02i, queue mode (ATOMIC queues)\n"
+              "          default pktio%02i-INPUT queue:%u\n"
+              "          source mac address %s\n",
+              pktio, pktio, inq_def, mac_addr_str(src_mac_str, src_mac));
+
+       /* Resolve any routes using this interface for output */
+       resolve_fwd_db(intf, outq_def, src_mac);
+}
+
+/**
+ * Packet Processing - Input verification
+ *
+ * @param pkt  Packet to inspect
+ * @param ctx  Packet process context (not used)
+ *
+ * @return PKT_CONTINUE if good, supported packet else PKT_DROP
+ */
+static
+pkt_disposition_e do_input_verify(odp_packet_t pkt, pkt_ctx_t *ctx ODP_UNUSED)
+{
+       if (odp_unlikely(odp_packet_error(pkt)))
+               return PKT_DROP;
+
+       if (!odp_packet_inflag_eth(pkt))
+               return PKT_DROP;
+
+       if (!odp_packet_inflag_ipv4(pkt))
+               return PKT_DROP;
+
+       return PKT_CONTINUE;
+}
+
+/**
+ * Packet Processing - Route lookup in forwarding database
+ *
+ * @param pkt  Packet to route
+ * @param ctx  Packet process context
+ *
+ * @return PKT_CONTINUE if route found else PKT_DROP
+ */
+static
+pkt_disposition_e do_route_fwd_db(odp_packet_t pkt, pkt_ctx_t *ctx)
+{
+       odp_ipv4hdr_t *ip = (odp_ipv4hdr_t *)odp_packet_l3(pkt);
+       fwd_db_entry_t *entry;
+
+       entry = find_fwd_db_entry(odp_be_to_cpu_32(ip->dst_addr));
+
+       if (entry) {
+               odp_ethhdr_t *eth = (odp_ethhdr_t *)odp_packet_l2(pkt);
+
+               memcpy(&eth->dst, entry->dst_mac, 6);
+               memcpy(&eth->src, entry->src_mac, 6);
+               ctx->outq = entry->queue;
+
+               return PKT_CONTINUE;
+       }
+
+       return PKT_DROP;
+}
+
+/**
+ * Packet Processing - Input IPsec packet classification
+ *
+ * Verify the received packet has IPsec headers and a match
+ * in the IPsec cache, if so issue crypto request else skip
+ * input crypto.
+ *
+ * @param pkt   Packet to classify
+ * @param ctx   Packet process context
+ * @param skip  Pointer to return "skip" indication
+ *
+ * @return PKT_CONTINUE if done else PKT_POSTED
+ */
+static
+pkt_disposition_e do_ipsec_in_classify(odp_packet_t pkt,
+                                      pkt_ctx_t *ctx,
+                                      bool *skip)
+{
+       uint8_t *buf = odp_packet_buf_addr(pkt);
+       odp_ipv4hdr_t *ip = (odp_ipv4hdr_t *)odp_packet_l3(pkt);
+       int hdr_len;
+       odp_ahhdr_t *ah = NULL;
+       odp_esphdr_t *esp = NULL;
+       ipsec_cache_entry_t *entry;
+       odp_crypto_op_params_t params;
+       bool posted = 0;
+
+       /* Default to skip IPsec */
+       *skip = TRUE;
+
+       /* Check IP header for IPSec protocols and look it up */
+       hdr_len = locate_ipsec_headers(ip, &ah, &esp);
+       if (!ah && !esp)
+               return PKT_CONTINUE;
+       entry = find_ipsec_cache_entry_in(odp_be_to_cpu_32(ip->src_addr),
+                                         odp_be_to_cpu_32(ip->dst_addr),
+                                         ah,
+                                         esp);
+       if (!entry)
+               return PKT_CONTINUE;
+
+       /* Account for configured ESP IV length in packet */
+       hdr_len += entry->esp.iv_len;
+
+       /* Initialize parameters block */
+       memset(&params, 0, sizeof(params));
+       params.session = entry->state.session;
+       params.pkt = pkt;
+       params.out_pkt = entry->in_place ? pkt : ODP_PACKET_INVALID;
+
+       /*Save everything to context */
+       ctx->ipsec.ip_tos = ip->tos;
+       ctx->ipsec.ip_frag_offset = odp_be_to_cpu_16(ip->frag_offset);
+       ctx->ipsec.ip_ttl = ip->ttl;
+       ctx->ipsec.ah_offset = ah ? ((uint8_t *)ah) - buf : 0;
+       ctx->ipsec.esp_offset = esp ? ((uint8_t *)esp) - buf : 0;
+       ctx->ipsec.hdr_len = hdr_len;
+       ctx->ipsec.trl_len = 0;
+
+       /*If authenticating, zero the mutable fields build the request */
+       if (ah) {
+               ip->chksum = 0;
+               ip->tos = 0;
+               ip->frag_offset = 0;
+               ip->ttl = 0;
+
+               params.auth_range.offset = ((uint8_t *)ip) - buf;
+               params.auth_range.length = odp_be_to_cpu_16(ip->tot_len);
+               params.hash_result_offset = ah->icv - buf;
+       }
+
+       /* If deciphering build request */
+       if (esp) {
+               params.cipher_range.offset = ipv4_data_p(ip) + hdr_len - buf;
+               params.cipher_range.length = ipv4_data_len(ip) - hdr_len;
+               params.override_iv_ptr = esp->iv;
+       }
+
+       /* Issue crypto request */
+       *skip = FALSE;
+       if (odp_crypto_operation(&params,
+                                &posted,
+                                odp_buffer_from_packet(pkt))) {
+               abort();
+       }
+       return (posted) ? PKT_POSTED : PKT_CONTINUE;
+}
+
+/**
+ * Packet Processing - Input IPsec packet processing cleanup
+ *
+ * @param pkt  Packet to handle
+ * @param ctx  Packet process context
+ *
+ * @return PKT_CONTINUE if successful else PKT_DROP
+ */
+static
+pkt_disposition_e do_ipsec_in_finish(odp_packet_t pkt,
+                                    pkt_ctx_t *ctx)
+{
+       odp_buffer_t event;
+       odp_crypto_compl_status_t cipher_rc, auth_rc;
+       odp_ipv4hdr_t *ip = (odp_ipv4hdr_t *)odp_packet_l3(pkt);
+       int       hdr_len = ctx->ipsec.hdr_len;
+       int       trl_len = 0;
+
+       /* Check crypto result */
+       event = odp_buffer_from_packet(pkt);
+       odp_crypto_get_operation_compl_status(event, &cipher_rc, &auth_rc);
+       if (!is_crypto_compl_status_ok(&cipher_rc))
+               return PKT_DROP;
+       if (!is_crypto_compl_status_ok(&auth_rc))
+               return PKT_DROP;
+
+       /*
+        * Finish auth
+        */
+       if (ctx->ipsec.ah_offset) {
+               uint8_t *buf = odp_packet_buf_addr(pkt);
+               odp_ahhdr_t *ah;
+
+               ah = (odp_ahhdr_t *)(ctx->ipsec.ah_offset + buf);
+               ip->proto = ah->next_header;
+       }
+
+       /*
+        * Finish cipher by finding ESP trailer and processing
+        *
+        * NOTE: ESP authentication ICV not supported
+        */
+       if (ctx->ipsec.esp_offset) {
+               uint8_t *eop = (uint8_t *)(ip) + odp_be_to_cpu_16(ip->tot_len);
+               odp_esptrl_t *esp_t = (odp_esptrl_t *)(eop) - 1;
+
+               ip->proto = esp_t->next_header;
+               trl_len += esp_t->pad_len + sizeof(*esp_t);
+       }
+
+       /* Finalize the IPv4 header */
+       ipv4_adjust_len(ip, -(hdr_len + trl_len));
+       ip->ttl = ctx->ipsec.ip_ttl;
+       ip->tos = ctx->ipsec.ip_tos;
+       ip->frag_offset = odp_cpu_to_be_16(ctx->ipsec.ip_frag_offset);
+       ip->chksum = 0;
+       odp_ipv4_csum_update(pkt);
+
+       /* Correct the packet length and move payload into position */
+       odp_packet_set_len(pkt, odp_packet_get_len(pkt) - (hdr_len + trl_len));
+       memmove(ipv4_data_p(ip),
+               ipv4_data_p(ip) + hdr_len,
+               odp_be_to_cpu_16(ip->tot_len));
+
+       /* Fall through to next state */
+       return PKT_CONTINUE;
+}
+
+/**
+ * Packet Processing - Output IPsec packet classification
+ *
+ * Verify the outbound packet has a match in the IPsec cache,
+ * if so issue prepend IPsec headers and prepare parameters
+ * for crypto API call.  Post the packet to ATOMIC queue so
+ * that sequence numbers can be applied in packet order as
+ * the next processing step.
+ *
+ * @param pkt   Packet to classify
+ * @param ctx   Packet process context
+ * @param skip  Pointer to return "skip" indication
+ *
+ * @return PKT_CONTINUE if done else PKT_POSTED
+ */
+static
+pkt_disposition_e do_ipsec_out_classify(odp_packet_t pkt,
+                                       pkt_ctx_t *ctx,
+                                       bool *skip)
+{
+       uint8_t *buf = odp_packet_buf_addr(pkt);
+       odp_ipv4hdr_t *ip = (odp_ipv4hdr_t *)odp_packet_l3(pkt);
+       uint16_t ip_data_len = ipv4_data_len(ip);
+       uint8_t *ip_data = ipv4_data_p(ip);
+       ipsec_cache_entry_t *entry;
+       odp_crypto_op_params_t params;
+       int      hdr_len = 0;
+       int      trl_len = 0;
+       odp_ahhdr_t *ah = NULL;
+       odp_esphdr_t *esp = NULL;
+
+       /* Default to skip IPsec */
+       *skip = TRUE;
+
+       /* Find record */
+       entry = find_ipsec_cache_entry_out(odp_be_to_cpu_32(ip->src_addr),
+                                          odp_be_to_cpu_32(ip->dst_addr),
+                                          ip->proto);
+       if (!entry)
+               return PKT_CONTINUE;
+
+       /* Save IPv4 stuff */
+       ctx->ipsec.ip_tos = ip->tos;
+       ctx->ipsec.ip_frag_offset = odp_be_to_cpu_16(ip->frag_offset);
+       ctx->ipsec.ip_ttl = ip->ttl;
+
+       /* Initialize parameters block */
+       memset(&params, 0, sizeof(params));
+       params.session = entry->state.session;
+       params.pkt = pkt;
+       params.out_pkt = entry->in_place ? pkt : ODP_PACKET_INVALID;
+
+       /* Compute ah and esp, determine length of headers, move the data */
+       if (entry->ah.alg) {
+               ah = (odp_ahhdr_t *)(ip_data);
+               hdr_len += sizeof(odp_ahhdr_t);
+               hdr_len += entry->ah.icv_len;
+       }
+       if (entry->esp.alg) {
+               esp = (odp_esphdr_t *)(ip_data + hdr_len);
+               hdr_len += sizeof(odp_esphdr_t);
+               hdr_len += entry->esp.iv_len;
+       }
+       memmove(ip_data + hdr_len, ip_data, ip_data_len);
+       ip_data += hdr_len;
+
+       /* For cipher, compute encrypt length, build headers and request */
+       if (esp) {
+               uint32_t encrypt_len;
+               odp_esptrl_t *esp_t;
+
+               encrypt_len = ESP_ENCODE_LEN(ip_data_len + sizeof(*esp_t),
+                                            entry->esp.block_len);
+               trl_len = encrypt_len - ip_data_len;
+
+               esp->spi = odp_cpu_to_be_32(entry->esp.spi);
+               memcpy(esp + 1, entry->state.iv, entry->esp.iv_len);
+
+               esp_t = (odp_esptrl_t *)(ip_data + encrypt_len) - 1;
+               esp_t->pad_len     = trl_len - sizeof(*esp_t);
+               esp_t->next_header = ip->proto;
+               ip->proto = ODP_IPPROTO_ESP;
+
+               params.cipher_range.offset = ip_data - buf;
+               params.cipher_range.length = encrypt_len;
+       }
+
+       /* For authentication, build header clear mutables and build request */
+       if (ah) {
+               memset(ah, 0, sizeof(*ah) + entry->ah.icv_len);
+               ah->spi = odp_cpu_to_be_32(entry->ah.spi);
+               ah->ah_len = 1 + (entry->ah.icv_len / 4);
+               ah->next_header = ip->proto;
+               ip->proto = ODP_IPPROTO_AH;
+
+               ip->chksum = 0;
+               ip->tos = 0;
+               ip->frag_offset = 0;
+               ip->ttl = 0;
+
+               params.auth_range.offset = ((uint8_t *)ip) - buf;
+               params.auth_range.length =
+                       odp_be_to_cpu_16(ip->tot_len) + (hdr_len + trl_len);
+               params.hash_result_offset = ah->icv - buf;
+       }
+
+       /* Set IPv4 length before authentication */
+       ipv4_adjust_len(ip, hdr_len + trl_len);
+       odp_packet_set_len(pkt, odp_packet_get_len(pkt) + (hdr_len + trl_len));
+
+       /* Save remaining context */
+       ctx->ipsec.hdr_len = hdr_len;
+       ctx->ipsec.trl_len = trl_len;
+       ctx->ipsec.ah_offset = ah ? ((uint8_t *)ah) - buf : 0;
+       ctx->ipsec.esp_offset = esp ? ((uint8_t *)esp) - buf : 0;
+       ctx->ipsec.ah_seq = &entry->state.ah_seq;
+       ctx->ipsec.esp_seq = &entry->state.esp_seq;
+       memcpy(&ctx->ipsec.params, &params, sizeof(params));
+
+       /* Send packet to the atmoic queue to assign sequence numbers */
+       *skip = FALSE;
+       odp_queue_enq(seqnumq, odp_buffer_from_packet(pkt));
+
+       return PKT_POSTED;
+}
+
+/**
+ * Packet Processing - Output IPsec packet sequence number assignment
+ *
+ * Assign the necessary sequence numbers and then issue the crypto API call
+ *
+ * @param pkt  Packet to handle
+ * @param ctx  Packet process context
+ *
+ * @return PKT_CONTINUE if done else PKT_POSTED
+ */
+static
+pkt_disposition_e do_ipsec_out_seq(odp_packet_t pkt,
+                                  pkt_ctx_t *ctx)
+{
+       uint8_t *buf = odp_packet_buf_addr(pkt);
+       bool posted = 0;
+
+       /* We were dispatched from atomic queue, assign sequence numbers */
+       if (ctx->ipsec.ah_offset) {
+               odp_ahhdr_t *ah;
+
+               ah = (odp_ahhdr_t *)(ctx->ipsec.ah_offset + buf);
+               ah->seq_no = odp_cpu_to_be_32((*ctx->ipsec.ah_seq)++);
+       }
+       if (ctx->ipsec.esp_offset) {
+               odp_esphdr_t *esp;
+
+               esp = (odp_esphdr_t *)(ctx->ipsec.esp_offset + buf);
+               esp->seq_no = odp_cpu_to_be_32((*ctx->ipsec.esp_seq)++);
+       }
+
+       /* Issue crypto request */
+       if (odp_crypto_operation(&ctx->ipsec.params,
+                                &posted,
+                                odp_buffer_from_packet(pkt))) {
+               abort();
+       }
+       return (posted) ? PKT_POSTED : PKT_CONTINUE;
+}
+
+/**
+ * Packet Processing - Output IPsec packet processing cleanup
+ *
+ * @param pkt  Packet to handle
+ * @param ctx  Packet process context
+ *
+ * @return PKT_CONTINUE if successful else PKT_DROP
+ */
+static
+pkt_disposition_e do_ipsec_out_finish(odp_packet_t pkt,
+                                     pkt_ctx_t *ctx)
+{
+       odp_buffer_t event;
+       odp_crypto_compl_status_t cipher_rc, auth_rc;
+       odp_ipv4hdr_t *ip = (odp_ipv4hdr_t *)odp_packet_l3(pkt);
+
+       /* Check crypto result */
+       event = odp_buffer_from_packet(pkt);
+       odp_crypto_get_operation_compl_status(event, &cipher_rc, &auth_rc);
+       if (!is_crypto_compl_status_ok(&cipher_rc))
+               return PKT_DROP;
+       if (!is_crypto_compl_status_ok(&auth_rc))
+               return PKT_DROP;
+
+       /* Finalize the IPv4 header */
+       ip->ttl = ctx->ipsec.ip_ttl;
+       ip->tos = ctx->ipsec.ip_tos;
+       ip->frag_offset = odp_cpu_to_be_16(ctx->ipsec.ip_frag_offset);
+       ip->chksum = 0;
+       odp_ipv4_csum_update(pkt);
+
+       /* Fall through to next state */
+       return PKT_CONTINUE;
+}
+
+/**
+ * Packet IO worker thread
+ *
+ * Loop calling odp_schedule to obtain packets from one of three sources,
+ * and continue processing the packet based on the state stored in its
+ * per packet context.
+ *
+ *  - Input interfaces (i.e. new work)
+ *  - Sequence number assignment queue
+ *  - Per packet crypto API completion queue
+ *
+ * @param arg  thread arguments of type 'thread_args_t *'
+ *
+ * @return NULL (should never return)
+ */
+static
+void *pktio_thread(void *arg ODP_UNUSED)
+{
+       int thr;
+       odp_packet_t pkt;
+       odp_buffer_t buf;
+       unsigned long pkt_cnt = 0;
+
+       thr = odp_thread_id();
+
+       printf("Pktio thread [%02i] starts\n", thr);
+
+       odp_barrier_sync(&sync_barrier);
+
+       /* Loop packets */
+       for (;;) {
+               pkt_disposition_e rc;
+               pkt_ctx_t   *ctx;
+               odp_queue_t  dispatchq;
+
+               /* Use schedule to get buf from any input queue */
+               buf = odp_schedule(&dispatchq, ODP_SCHED_WAIT);
+               pkt = odp_packet_from_buffer(buf);
+
+               /* Determine new work versus completion or sequence number */
+               if ((completionq != dispatchq) && (seqnumq != dispatchq)) {
+                       ctx = alloc_pkt_ctx(pkt);
+                       ctx->state = PKT_STATE_INPUT_VERIFY;
+               } else {
+                       ctx = get_pkt_ctx_from_pkt(pkt);
+               }
+
+               /*
+                * We now have a packet and its associated context. Loop here
+                * executing processing based on the current state value stored
+                * in the context as long as the processing return code
+                * indicates PKT_CONTINUE.
+                *
+                * For other return codes:
+                *
+                *  o PKT_DONE   - finished with the packet
+                *  o PKT_DROP   - something incorrect about the packet, drop it
+                *  o PKT_POSTED - packet/event has been queued for later
+                */
+               do {
+                       bool skip = FALSE;
+
+                       switch (ctx->state) {
+                       case PKT_STATE_INPUT_VERIFY:
+
+                               rc = do_input_verify(pkt, ctx);
+                               ctx->state = PKT_STATE_IPSEC_IN_CLASSIFY;
+                               break;
+
+                       case PKT_STATE_IPSEC_IN_CLASSIFY:
+
+                               rc = do_ipsec_in_classify(pkt, ctx, &skip);
+                               ctx->state = (skip) ?
+                                       PKT_STATE_ROUTE_LOOKUP :
+                                       PKT_STATE_IPSEC_IN_FINISH;
+                               break;
+
+                       case PKT_STATE_IPSEC_IN_FINISH:
+
+                               rc = do_ipsec_in_finish(pkt, ctx);
+                               ctx->state = PKT_STATE_ROUTE_LOOKUP;
+                               break;
+
+                       case PKT_STATE_ROUTE_LOOKUP:
+
+                               rc = do_route_fwd_db(pkt, ctx);
+                               ctx->state = PKT_STATE_IPSEC_OUT_CLASSIFY;
+                               break;
+
+                       case PKT_STATE_IPSEC_OUT_CLASSIFY:
+
+                               rc = do_ipsec_out_classify(pkt, ctx, &skip);
+                               ctx->state = (skip) ?
+                                       PKT_STATE_TRANSMIT :
+                                       PKT_STATE_IPSEC_OUT_SEQ;
+                               break;
+
+                       case PKT_STATE_IPSEC_OUT_SEQ:
+
+                               rc = do_ipsec_out_seq(pkt, ctx);
+                               ctx->state = PKT_STATE_IPSEC_OUT_FINISH;
+                               break;
+
+                       case PKT_STATE_IPSEC_OUT_FINISH:
+
+                               rc = do_ipsec_out_finish(pkt, ctx);
+                               ctx->state = PKT_STATE_TRANSMIT;
+                               break;
+
+                       case PKT_STATE_TRANSMIT:
+
+                               odp_queue_enq(ctx->outq, buf);
+                               rc = PKT_DONE;
+                               break;
+
+                       default:
+                               rc = PKT_DROP;
+                               break;
+                       }
+               } while (PKT_CONTINUE == rc);
+
+               /* Free context on drop or transmit */
+               if ((PKT_DROP == rc) || (PKT_DONE == rc))
+                       free_pkt_ctx(ctx);
+
+
+               /* Check for drop */
+               if (PKT_DROP == rc)
+                       odp_packet_free(pkt);
+
+               /* Print packet counts every once in a while */
+               if (PKT_DONE == rc) {
+                       if (odp_unlikely(pkt_cnt++ % 1000 == 0)) {
+                               printf("  [%02i] pkt_cnt:%lu\n", thr, pkt_cnt);
+                               fflush(NULL);
+                       }
+               }
+       }
+
+       /* unreachable */
+       return NULL;
+}
+
+/**
+ * ODP ipsec example main function
+ */
+int
+main(int argc, char *argv[])
+{
+       odp_linux_pthread_t thread_tbl[MAX_WORKERS];
+       int thr_id;
+       int num_workers;
+       void *pool_base;
+       int i;
+       int first_core;
+       int core_count;
+       int stream_count;
+
+       /* Init ODP before calling anything else */
+       if (odp_init_global()) {
+               ODP_ERR("Error: ODP global init failed.\n");
+               exit(EXIT_FAILURE);
+       }
+
+       /* Init this thread */
+       thr_id = odp_thread_create(0);
+       odp_init_local(thr_id);
+
+       /* Reserve memory for args from shared mem */
+       args = odp_shm_reserve("shm_args", sizeof(args_t), ODP_CACHE_LINE_SIZE);
+       if (args == NULL) {
+               ODP_ERR("Error: shared mem alloc failed.\n");
+               exit(EXIT_FAILURE);
+       }
+       memset(args, 0, sizeof(*args));
+
+       /* Must init our databases before parsing args */
+       ipsec_init_pre();
+       init_fwd_db();
+       init_loopback_db();
+       init_stream_db();
+
+       /* Parse and store the application arguments */
+       parse_args(argc, argv, &args->appl);
+
+       /* Print both system and application information */
+       print_info(NO_PATH(argv[0]), &args->appl);
+
+       core_count  = odp_sys_core_count();
+       num_workers = core_count;
+
+       if (args->appl.core_count)
+               num_workers = args->appl.core_count;
+
+       if (num_workers > MAX_WORKERS)
+               num_workers = MAX_WORKERS;
+
+       printf("Num worker threads: %i\n", num_workers);
+
+       /* Create a barrier to synchronize thread startup */
+       odp_barrier_init_count(&sync_barrier, num_workers);
+
+       /*
+        * By default core #0 runs Linux kernel background tasks.
+        * Start mapping thread from core #1
+        */
+       first_core = (core_count == 1) ? 0 : 1;
+       printf("First core:         %i\n\n", first_core);
+
+       /* Create packet buffer pool */
+       pool_base = odp_shm_reserve("shm_packet_pool",
+                                   SHM_PKT_POOL_SIZE, ODP_CACHE_LINE_SIZE);
+       if (pool_base == NULL) {
+               ODP_ERR("Error: packet pool mem alloc failed.\n");
+               exit(EXIT_FAILURE);
+       }
+
+       pkt_pool = odp_buffer_pool_create("packet_pool", pool_base,
+                                         SHM_PKT_POOL_SIZE,
+                                         SHM_PKT_POOL_BUF_SIZE,
+                                         ODP_CACHE_LINE_SIZE,
+                                         ODP_BUFFER_TYPE_PACKET);
+       if (pkt_pool == ODP_BUFFER_POOL_INVALID) {
+               ODP_ERR("Error: packet pool create failed.\n");
+               exit(EXIT_FAILURE);
+       }
+
+       /* Create context buffer pool */
+       pool_base = odp_shm_reserve("shm_ctx_pool",
+                                   SHM_CTX_POOL_SIZE, ODP_CACHE_LINE_SIZE);
+       if (pool_base == NULL) {
+               ODP_ERR("Error: context pool mem alloc failed.\n");
+               exit(EXIT_FAILURE);
+       }
+
+       ctx_pool = odp_buffer_pool_create("ctx_pool", pool_base,
+                                         SHM_CTX_POOL_SIZE,
+                                         SHM_CTX_POOL_BUF_SIZE,
+                                         ODP_CACHE_LINE_SIZE,
+                                         ODP_BUFFER_TYPE_RAW);
+       if (ctx_pool == ODP_BUFFER_POOL_INVALID) {
+               ODP_ERR("Error: context pool create failed.\n");
+               exit(EXIT_FAILURE);
+       }
+
+       /* Populate our IPsec cache */
+       printf("Using %s mode for crypto API\n\n",
+              (CRYPTO_API_SYNC == args->appl.mode) ? "SYNC" :
+              (CRYPTO_API_ASYNC_IN_PLACE == args->appl.mode) ?
+              "ASYNC_IN_PLACE" : "ASYNC_NEW_BUFFER");
+       ipsec_init_post(args->appl.mode);
+
+       /* Initialize interfaces (which resolves FWD DB entries */
+       for (i = 0; i < args->appl.if_count; i++) {
+               if (!strncmp("loop", args->appl.if_names[i], strlen("loop")))
+                       initialize_loop(args->appl.if_names[i]);
+               else
+                       initialize_intf(args->appl.if_names[i],
+                                       args->appl.type,
+                                       args->appl.fanout);
+       }
+
+       /* If we have test streams build them before starting workers */
+       resolve_stream_db();
+       stream_count = create_stream_db_inputs();
+
+       /*
+        * Create and init worker threads
+        */
+       memset(thread_tbl, 0, sizeof(thread_tbl));
+       for (i = 0; i < num_workers; ++i) {
+               int core;
+
+               core = (first_core + i) % core_count;
+
+               /*
+                * Create threads one-by-one instead of all-at-once,
+                * because each thread might get different arguments.
+                * Calls odp_thread_create(cpu) for each thread
+                */
+               odp_linux_pthread_create(thread_tbl, 1, core, pktio_thread,
+                                        &args->thread[i]);
+       }
+
+       /*
+        * If there are streams attempt to verify them else
+        * wait indefinitely
+        */
+       if (stream_count) {
+               bool done;
+               do {
+                       done = verify_stream_db_outputs();
+                       sleep(1);
+               } while (!done);
+               printf("All received\n");
+       } else {
+               odp_linux_pthread_join(thread_tbl, num_workers);
+       }
+
+       printf("Exit\n\n");
+
+       return 0;
+}
+
+/**
+ * Parse and store the command line arguments
+ *
+ * @param argc       argument count
+ * @param argv[]     argument vector
+ * @param appl_args  Store application arguments here
+ */
+static void parse_args(int argc, char *argv[], appl_args_t *appl_args)
+{
+       int opt;
+       int long_index;
+       char *names, *str, *token, *save;
+       size_t len;
+       int i;
+       static struct option longopts[] = {
+               {"count", required_argument, NULL, 'c'},
+               {"interface", required_argument, NULL, 'i'},    /* return 'i' */
+               {"mode", required_argument, NULL, 'm'},         /* return 'm' */
+               {"route", required_argument, NULL, 'r'},        /* return 'r' */
+               {"policy", required_argument, NULL, 'p'},       /* return 'p' */
+               {"ah", required_argument, NULL, 'a'},           /* return 'a' */
+               {"esp", required_argument, NULL, 'e'},          /* return 'e' */
+               {"stream", required_argument, NULL, 's'},       /* return 's' */
+               {"help", no_argument, NULL, 'h'},               /* return 'h' */
+               {NULL, 0, NULL, 0}
+       };
+
+       appl_args->type = 3;  /* 3: ODP_PKTIO_TYPE_SOCKET_MMAP */
+       appl_args->fanout = 0; /* turn off fanout by default for mmap */
+       appl_args->mode = 0;  /* turn off async crypto API by default */
+
+       while (1) {
+               opt = getopt_long(argc, argv, "+c:i:m:t:f:h:r:p:a:e:s:",
+                                 longopts, &long_index);
+
+               if (opt == -1)
+                       break;  /* No more options */
+
+               switch (opt) {
+               case 'c':
+                       appl_args->core_count = atoi(optarg);
+                       break;
+                       /* parse packet-io interface names */
+               case 'i':
+                       len = strlen(optarg);
+                       if (len == 0) {
+                               usage(argv[0]);
+                               exit(EXIT_FAILURE);
+                       }
+                       len += 1;       /* add room for '\0' */
+
+                       names = malloc(len);
+                       if (names == NULL) {
+                               usage(argv[0]);
+                               exit(EXIT_FAILURE);
+                       }
+
+                       /* count the number of tokens separated by ',' */
+                       strcpy(names, optarg);
+                       for (str = names, i = 0;; str = NULL, i++) {
+                               token = strtok_r(str, ",", &save);
+                               if (token == NULL)
+                                       break;
+                       }
+                       appl_args->if_count = i;
+
+                       if (appl_args->if_count == 0) {
+                               usage(argv[0]);
+                               exit(EXIT_FAILURE);
+                       }
+
+                       /* allocate storage for the if names */
+                       appl_args->if_names =
+                               calloc(appl_args->if_count, sizeof(char *));
+
+                       /* store the if names (reset names string) */
+                       strcpy(names, optarg);
+                       for (str = names, i = 0;; str = NULL, i++) {
+                               token = strtok_r(str, ",", &save);
+                               if (token == NULL)
+                                       break;
+                               appl_args->if_names[i] = token;
+                       }
+                       break;
+
+               case 't':
+                       appl_args->type = atoi(optarg);
+                       break;
+
+               case 'f':
+                       appl_args->fanout = atoi(optarg);
+                       break;
+
+               case 'm':
+                       appl_args->mode = atoi(optarg);
+                       break;
+
+               case 'r':
+                       create_fwd_db_entry(optarg);
+                       break;
+
+               case 'p':
+                       create_sp_db_entry(optarg);
+                       break;
+
+               case 'a':
+                       create_sa_db_entry(optarg, FALSE);
+                       break;
+
+               case 'e':
+                       create_sa_db_entry(optarg, TRUE);
+                       break;
+
+               case 's':
+                       create_stream_db_entry(optarg);
+                       break;
+
+               case 'h':
+                       usage(argv[0]);
+                       exit(EXIT_SUCCESS);
+                       break;
+
+               default:
+                       break;
+               }
+       }
+
+       if (appl_args->if_count == 0) {
+               usage(argv[0]);
+               exit(EXIT_FAILURE);
+       }
+
+       optind = 1;             /* reset 'extern optind' from the getopt lib */
+}
+
+/**
+ * Print system and application info
+ */
+static void print_info(char *progname, appl_args_t *appl_args)
+{
+       int i;
+
+       printf("\n"
+              "ODP system info\n"
+              "---------------\n"
+              "ODP API version: %s\n"
+              "CPU model:       %s\n"
+              "CPU freq (hz):   %"PRIu64"\n"
+              "Cache line size: %i\n"
+              "Core count:      %i\n"
+              "\n",
+              odp_version_api_str(), odp_sys_cpu_model_str(), odp_sys_cpu_hz(),
+              odp_sys_cache_line_size(), odp_sys_core_count());
+
+       printf("Running ODP appl: \"%s\"\n"
+              "-----------------\n"
+              "IF-count:        %i\n"
+              "Using IFs:      ",
+              progname, appl_args->if_count);
+       for (i = 0; i < appl_args->if_count; ++i)
+               printf(" %s", appl_args->if_names[i]);
+
+       printf("\n");
+
+       dump_fwd_db();
+       dump_sp_db();
+       dump_sa_db();
+       printf("\n\n");
+       fflush(NULL);
+}
+
+/**
+ * Prinf usage information
+ */
+static void usage(char *progname)
+{
+       printf("\n"
+              "Usage: %s OPTIONS\n"
+              "  E.g. %s -i eth1,eth2,eth3 -m 0\n"
+              "\n"
+              "OpenDataPlane example application.\n"
+              "\n"
+              "Mandatory OPTIONS:\n"
+              " -i, --interface Eth interfaces (comma-separated, no spaces)\n"
+              " -t, --type   1: ODP_PKTIO_TYPE_SOCKET_BASIC\n"
+              "              2: ODP_PKTIO_TYPE_SOCKET_MMSG\n"
+              "              3: ODP_PKTIO_TYPE_SOCKET_MMAP\n"
+              "              4: ODP_PKTIO_TYPE_NETMAP\n"
+              "         Default: 3: ODP_PKTIO_TYPE_SOCKET_MMAP\n"
+              " -f, --fanout 0: off 1: on (Default 1: on)\n"
+              " -m, --mode   0: SYNC\n"
+              "              1: ASYNC_IN_PLACE\n"
+              "              2: ASYNC_NEW_BUFFER\n"
+              "         Default: 0: SYNC api mode\n"
+              "\n"
+              "Routing / IPSec OPTIONS:\n"
+              " -r, --route SubNet:Intf:NextHopMAC\n"
+              " -p, --policy SrcSubNet:DstSubNet:(in|out):(ah|esp|both)\n"
+              " -e, --esp SrcIP:DstIP:(3des|null):SPI:Key192\n"
+              " -a, --ah SrcIP:DstIP:(md5|null):SPI:Key128\n"
+              "\n"
+              "  Where: NextHopMAC is raw hex/dot notation, i.e. 
03.BA.44.9A.CE.02\n"
+              "         IP is decimal/dot notation, i.e. 192.168.1.1\n"
+              "         SubNet is decimal/dot/slash notation, i.e 
192.168.0.0/16\n"
+              "         SPI is raw hex, 32 bits\n"
+              "         KeyXXX is raw hex, XXX bits long\n"
+              "\n"
+              "  Examples:\n"
+              "     -r 192.168.222.0/24:p8p1:08.00.27.F5.8B.DB\n"
+              "     -p 192.168.111.0/24:192.168.222.0/24:out:esp\n"
+              "     -e 
192.168.111.2:192.168.222.2:3des:201:656c8523255ccc23a66c1917aa0cf30991fce83532a4b224\n"
+              "     -a 
192.168.111.2:192.168.222.2:md5:201:a731649644c5dee92cbd9c2e7e188ee6\n"
+              "\n"
+              "Optional OPTIONS\n"
+              "  -c, --count <number> Core count.\n"
+              "  -h, --help           Display help and exit.\n"
+              "\n", NO_PATH(progname), NO_PATH(progname)
+               );
+}
-- 
1.7.7.6


_______________________________________________
lng-odp mailing list
lng-odp@lists.linaro.org
http://lists.linaro.org/mailman/listinfo/lng-odp

Reply via email to