Hi Radu,

On 9/14/2017 1:56 PM, Akhil Goyal wrote:

+static const struct rte_security_capability ixgbe_security_capabilities[] = {
+       { /* IPsec Inline Crypto AH Transport Egress */
+               .action = RTE_SECURITY_ACTION_TYPE_INLINE_CRYPTO,
+               .protocol = RTE_SECURITY_PROTOCOL_IPSEC,
+               .ipsec = {
+                       .proto = RTE_SECURITY_IPSEC_SA_PROTO_AH,

You are supporting AH, however only ESP is proposed in other patch for addition to rte_flow?

+                       .mode = RTE_SECURITY_IPSEC_SA_MODE_TRANSPORT,
+                       .direction = RTE_SECURITY_IPSEC_SA_DIR_EGRESS,
+                       .options = { 0 },
+               },
+               .crypto_capabilities = aes_gmac_crypto_capabilities
+       },
+       { /* IPsec Inline Crypto ESP Transport Egress */
+               .action = RTE_SECURITY_ACTION_TYPE_INLINE_CRYPTO,
+               .protocol = RTE_SECURITY_PROTOCOL_IPSEC,
+               .ipsec = {
+                       .proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP,
+                       .mode = RTE_SECURITY_IPSEC_SA_MODE_TRANSPORT,
+                       .direction = RTE_SECURITY_IPSEC_SA_DIR_EGRESS,
+                       .options = { 0 }
+               },
+               .crypto_capabilities = aes_gcm_gmac_crypto_capabilities
+       },
+       { /* IPsec Inline Crypto AH Transport Ingress */
+               .action = RTE_SECURITY_ACTION_TYPE_INLINE_CRYPTO,
+               .protocol = RTE_SECURITY_PROTOCOL_IPSEC,
+               .ipsec = {
+                       .proto = RTE_SECURITY_IPSEC_SA_PROTO_AH,
+                       .mode = RTE_SECURITY_IPSEC_SA_MODE_TRANSPORT,
+                       .direction = RTE_SECURITY_IPSEC_SA_DIR_INGRESS,
+                       .options = { 0 }
+               },
+               .crypto_capabilities = aes_gmac_crypto_capabilities
+       },
+       { /* IPsec Inline Crypto AH Tunnel Ingress */
+               .action = RTE_SECURITY_ACTION_TYPE_INLINE_CRYPTO,
+               .protocol = RTE_SECURITY_PROTOCOL_IPSEC,
+               .ipsec = {
+                       .proto = RTE_SECURITY_IPSEC_SA_PROTO_AH,
+                       .mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL,
+                       .direction = RTE_SECURITY_IPSEC_SA_DIR_INGRESS,
+                       .options = { 0 }
+               },
+               .crypto_capabilities = aes_gmac_crypto_capabilities
+       },
+       { /* IPsec Inline Crypto ESP Transport Ingress */
+               .action = RTE_SECURITY_ACTION_TYPE_INLINE_CRYPTO,
+               .protocol = RTE_SECURITY_PROTOCOL_IPSEC,
+               .ipsec = {
+                       .proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP,
+                       .mode = RTE_SECURITY_IPSEC_SA_MODE_TRANSPORT,
+                       .direction = RTE_SECURITY_IPSEC_SA_DIR_INGRESS,
+                       .options = { 0 }
+               },
+               .crypto_capabilities = aes_gcm_gmac_crypto_capabilities
+       },
+       { /* IPsec Inline Crypto ESP Tunnel Ingress */
+               .action = RTE_SECURITY_ACTION_TYPE_INLINE_CRYPTO,
+               .protocol = RTE_SECURITY_PROTOCOL_IPSEC,
+               .ipsec = {
+                       .proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP,
+                       .mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL,
+                       .direction = RTE_SECURITY_IPSEC_SA_DIR_INGRESS,
+                       .options = { 0 }
+               },
+               .crypto_capabilities = aes_gcm_gmac_crypto_capabilities
+       },
+       {
+               .action = RTE_SECURITY_ACTION_TYPE_NONE
+       }
+};


Reply via email to