Add support for CPU crypto mode by introducing required handler.
Crypto mode (sync/async) is chosen during sym session create if an
appropriate flag is set in an xform type number.
Authenticated encryption and decryption are supported with tag
generation/verification.
Signed-off-by: Marcin
equeue, HW addresses computations, storing/dereferencing user
provided data (mbuf) for each crypto-op, etc).
The aim is to introduce a new optional API for SW crypto-devices
to perform crypto processing in a synchronous manner.
Marcin Smoczynski (6):
cryptodev: introduce cpu crypto support AP
Introduce CPU crypto action type allowing to differentiate between
regular async 'none security' and synchronous, CPU crypto accelerated
sessions.
Signed-off-by: Marcin Smoczynski
---
lib/librte_security/rte_security.h | 6 +-
1 file changed, 5 insertions(+), 1 deletion(-)
diff -
capability.
Signed-off-by: Konstantin Ananyev
Signed-off-by: Marcin Smoczynski
---
lib/librte_cryptodev/rte_crypto_sym.h | 62 ++-
lib/librte_cryptodev/rte_cryptodev.c | 30 +
lib/librte_cryptodev/rte_cryptodev.h | 20 ++
lib/librte_cryptodev
Update library to handle CPU cypto security mode which utilizes
cryptodev's synchronous, CPU accelerated crypto operations.
Signed-off-by: Konstantin Ananyev
Signed-off-by: Marcin Smoczynski
---
lib/librte_ipsec/esp_inb.c | 154 ++-
lib/librte_ipsec/esp_o
Add support for CPU accelerated crypto. 'cpu-crypto' SA type has
been introduced in configuration allowing to use abovementioned
acceleration.
Legacy mode is not currently supported.
Signed-off-by: Konstantin Ananyev
Signed-off-by: Marcin Smoczynski
---
examples/ipsec-sec
Enable cpu-crypto mode testing by adding dedicated environmental
variable CRYPTO_PRIM_TYPE. Setting it to 'type cpu-crypto' allows
to run test scenario with cpu crypto acceleration.
Signed-off-by: Konstantin Ananyev
Signed-off-by: Marcin Smoczynski
---
examples/ipsec-secgw/test/comm
ation when
using cpu-crypto
- add gmac in aesni-gcm
- add tests for aesni-gcm/cpu crypto mode
- add documentation: pg and rel notes
- remove xform flags as no longer needed
- add some extra API comments
- remove compilation error from v3
Marcin Smoczynski (8):
cryptodev: introduce cpu cryp
capability.
Signed-off-by: Konstantin Ananyev
Signed-off-by: Marcin Smoczynski
---
lib/librte_cryptodev/rte_crypto_sym.h | 61 +++
lib/librte_cryptodev/rte_cryptodev.c | 33 ++
lib/librte_cryptodev/rte_cryptodev.h | 20 ++
lib/librte_cryptodev
Add support for CPU crypto mode by introducing required handler.
Crypto mode (sync/async) is chosen during sym session create if an
appropriate flag is set in an xform type number.
Authenticated encryption and decryption are supported with tag
generation/verification.
Signed-off-by: Marcin
Introduce CPU crypto action type allowing to differentiate between
regular async 'none security' and synchronous, CPU crypto accelerated
sessions.
Signed-off-by: Marcin Smoczynski
---
lib/librte_security/rte_security.h | 6 +-
1 file changed, 5 insertions(+), 1 deletion(-)
diff -
Add unit and performance tests for CPU crypto mode currently implemented
by AESNI-GCM cryptodev. Unit tests cover AES-GCM and GMAC test vectors.
Signed-off-by: Marcin Smoczynski
---
app/test/Makefile | 1 +
app/test/cpu_crypto_all_gcm_perf_test_cases.h | 11 +
app
Update library to handle CPU cypto security mode which utilizes
cryptodev's synchronous, CPU accelerated crypto operations.
Signed-off-by: Konstantin Ananyev
Signed-off-by: Marcin Smoczynski
---
lib/librte_ipsec/esp_inb.c | 154 ++-
lib/librte_ipsec/esp_o
Update documentation with a description of cpu crypto in cryptodev,
ipsec and security libraries.
Add release notes for 20.02.
Signed-off-by: Marcin Smoczynski
---
doc/guides/cryptodevs/aesni_gcm.rst | 5
doc/guides/prog_guide/cryptodev_lib.rst | 31 +
doc
Add support for CPU accelerated crypto. 'cpu-crypto' SA type has
been introduced in configuration allowing to use abovementioned
acceleration.
Legacy mode is not currently supported.
Signed-off-by: Konstantin Ananyev
Signed-off-by: Marcin Smoczynski
---
examples/ipsec-sec
Enable cpu-crypto mode testing by adding dedicated environmental
variable CRYPTO_PRIM_TYPE. Setting it to 'type cpu-crypto' allows
to run test scenario with cpu crypto acceleration.
Signed-off-by: Konstantin Ananyev
Signed-off-by: Marcin Smoczynski
---
examples/ipsec-secgw/test/comm
ing header include)
- update licensing information
Marcin Smoczynski (8):
cryptodev: introduce cpu crypto support API
crypto/aesni_gcm: cpu crypto support
test/crypto: add CPU crypto tests
security: add cpu crypto action type
ipsec: introduce support for cpu crypto mode
examples/ipsec-
capability.
Signed-off-by: Konstantin Ananyev
Signed-off-by: Marcin Smoczynski
---
lib/librte_cryptodev/rte_crypto_sym.h | 63 ++-
lib/librte_cryptodev/rte_cryptodev.c | 35 ++-
lib/librte_cryptodev/rte_cryptodev.h | 22 ++-
lib/librte_cryptodev
Introduce CPU crypto action type allowing to differentiate between
regular async 'none security' and synchronous, CPU crypto accelerated
sessions.
Signed-off-by: Marcin Smoczynski
Acked-by: Konstantin Ananyev
Acked-by: Fan Zhang
---
lib/librte_security/rte_security.h | 8 ++
Add support for CPU crypto mode by introducing required handler.
Crypto mode (sync/async) is chosen during sym session create if an
appropriate flag is set in an xform type number.
Authenticated encryption and decryption are supported with tag
generation/verification.
Signed-off-by: Marcin
Add unit and performance tests for CPU crypto mode currently implemented
by AESNI-GCM cryptodev. Unit tests cover AES-GCM and GMAC test vectors.
Signed-off-by: Marcin Smoczynski
Acked-by: Pablo de Lara
---
app/test/Makefile | 3 +-
app/test
Update library to handle CPU cypto security mode which utilizes
cryptodev's synchronous, CPU accelerated crypto operations.
Signed-off-by: Konstantin Ananyev
Signed-off-by: Marcin Smoczynski
Acked-by: Fan Zhang
---
lib/librte_ipsec/esp_inb.c | 156 ++-
Update documentation with a description of cpu crypto in cryptodev,
ipsec and security libraries.
Add release notes for 20.02.
Signed-off-by: Marcin Smoczynski
---
doc/guides/cryptodevs/aesni_gcm.rst | 7 +-
doc/guides/prog_guide/cryptodev_lib.rst | 33 -
doc
Enable cpu-crypto mode testing by adding dedicated environmental
variable CRYPTO_PRIM_TYPE. Setting it to 'type cpu-crypto' allows
to run test scenario with cpu crypto acceleration.
Signed-off-by: Konstantin Ananyev
Signed-off-by: Marcin Smoczynski
Acked-by: Fan Zhang
---
examples/i
Add support for CPU accelerated crypto. 'cpu-crypto' SA type has
been introduced in configuration allowing to use abovementioned
acceleration.
Legacy mode is not currently supported.
Signed-off-by: Konstantin Ananyev
Signed-off-by: Marcin Smoczynski
Acked-by: Fan Zhang
---
exam
Add support for CPU crypto mode by introducing required handler.
Authenticated encryption and decryption are supported with tag
generation/verification.
CPU crypto support include both AES-GCM and GMAC algorithms.
Signed-off-by: Marcin Smoczynski
Acked-by: Pablo de Lara
Acked-by: Fan Zhang
-off-by: Konstantin Ananyev
Signed-off-by: Marcin Smoczynski
---
doc/guides/cryptodevs/features/default.ini| 1 +
doc/guides/prog_guide/cryptodev_lib.rst | 33 -
lib/librte_cryptodev/rte_crypto_sym.h | 128 +-
lib/librte_cryptodev/rte_cryptodev.c
Introduce CPU crypto action type allowing to differentiate between
regular async 'none security' and synchronous, CPU crypto accelerated
sessions.
This mode is similar to ACTION_TYPE_NONE but crypto processing is
performed synchronously on a CPU.
Signed-off-by: Marcin Smoczynski
ing header include)
- update licensing information
v5 to v6 changes:
- unit tests integrated in the current test application for cryptodev
- iova fix
- moved mbuf to sgl helper function to crypo sym header
Marcin Smoczynski (8):
cryptodev: introduce cpu crypto support API
crypto/aesn
This patch adds ability to run unit tests in cpu crypto mode and
provides test for aesni_gcm's cpu crypto implementation.
Signed-off-by: Konstantin Ananyev
Signed-off-by: Marcin Smoczynski
---
app/test/test_cryptodev.c | 161 +++---
1 file changed
Add release note for cpu crypto, a new features added to the cryptodev
API.
Signed-off-by: Marcin Smoczynski
---
doc/guides/rel_notes/release_20_02.rst | 7 +++
1 file changed, 7 insertions(+)
diff --git a/doc/guides/rel_notes/release_20_02.rst
b/doc/guides/rel_notes/release_20_02.rst
Add support for CPU accelerated crypto. 'cpu-crypto' SA type has
been introduced in configuration allowing to use abovementioned
acceleration.
Legacy mode is not currently supported.
Signed-off-by: Konstantin Ananyev
Signed-off-by: Marcin Smoczynski
Acked-by: Fan Zhang
---
exam
Update library to handle CPU cypto security mode which utilizes
cryptodev's synchronous, CPU accelerated crypto operations.
Signed-off-by: Konstantin Ananyev
Signed-off-by: Marcin Smoczynski
Acked-by: Fan Zhang
Tested-by: Konstantin Ananyev
---
doc/guides/prog_guide/ipsec_lib.rst
Enable cpu-crypto mode testing by adding dedicated environmental
variable CRYPTO_PRIM_TYPE. Setting it to 'type cpu-crypto' allows
to run test scenario with cpu crypto acceleration.
Signed-off-by: Konstantin Ananyev
Signed-off-by: Marcin Smoczynski
Acked-by: Fan Zhang
---
examples/i
Add missing doxygen comment of rte_crypto_mbuf_to_vec's fields.
Signed-off-by: Marcin Smoczynski
---
lib/librte_cryptodev/rte_crypto_sym.h | 2 ++
1 file changed, 2 insertions(+)
diff --git a/lib/librte_cryptodev/rte_crypto_sym.h
b/lib/librte_cryptodev/rte_crypto_sym.h
index deb4
This patch adds ability to run unit tests in cpu crypto mode for AESNI
GCM cryptodev.
Signed-off-by: Marcin Smoczynski
---
app/test/test_cryptodev.c | 181 --
1 file changed, 172 insertions(+), 9 deletions(-)
diff --git a/app/test/test_cryptodev.c b/app/test
Add missing BSD-3 license tag to inline fallback testing scripts.
Signed-off-by: Marcin Smoczynski
---
.../ipsec-secgw/test/trs_aesgcm_inline_crypto_fallback_defs.sh | 1 +
.../ipsec-secgw/test/tun_aesgcm_inline_crypto_fallback_defs.sh | 1 +
2 files changed, 2 insertions(+)
diff --git
a
packets that normally would be dropped.
A fallback session type in the SA configuration by adding 'fallback'
with 'lookaside-none' or 'lookaside-protocol' parameter to determine
type of session.
Fallback session feature is available only when using librte_ipsec.
Marcin Sm
rte_ipsec_session structure.
Such refactoring is needed to introduce many sessions per SA feature,
e.g. fallback session for inline offload processing.
Signed-off-by: Marcin Smoczynski
---
examples/ipsec-secgw/esp.c | 35 +++
examples/ipsec-secgw/ipsec.c | 91
packets that normally would be dropped.
A fallback session type in the SA configuration by adding 'fallback'
with 'lookaside-none' or 'lookaside-protocol' parameter to determine
type of session.
Fallback session feature is available only when using librte_ipsec.
Si
ail/sp/800-38d/final
Fixes: 0fbd75a99f ("cryptodev: move IV parameters to session")
Cc: sta...@dpdk.org
Signed-off-by: Marcin Smoczynski
---
examples/ipsec-secgw/sa.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/examples/ipsec-secgw/sa.c b/examples/ipsec-secgw/s
for ipsec-secgw sample application which
allows to automatically check how custom packets are processed.
This patchset depends on the following patch:
http://patchwork.dpdk.org/patch/53406/
Marcin Smoczynski (4):
net: new ipv6 header extension parsing function
ipsec: fix transport mode for
with
header extensions (trs_ipv6opts.py).
Fix incomplete test log problem by disabling buffering of ipsec-secgw
standard output with stdbuf application.
Signed-off-by: Marcin Smoczynski
---
examples/ipsec-secgw/test/common_defs.sh | 58 +-
.../ipsec-secgw/test/common_defs_secgw.sh
Introduce new function for IPv6 header extension parsing able to
determine extension length and next protocol number.
This function is helpful when implementing IPv6 header traversing.
Signed-off-by: Marcin Smoczynski
---
lib/librte_net/rte_ip.h | 49
ata contains a total
length of the IPv6 header with header extensions up to ESP header.
Signed-off-by: Marcin Smoczynski
---
lib/Makefile | 3 ++-
lib/librte_ipsec/iph.h | 55 --
lib/meson.build| 2 +-
3 files changed, 50 insertions(+), 1
traffic and to reconstruct L3 header by
librte_ipsec.
Signed-off-by: Marcin Smoczynski
---
examples/ipsec-secgw/ipsec-secgw.c | 35 +-
examples/ipsec-secgw/sa.c | 5 +
2 files changed, 31 insertions(+), 9 deletions(-)
diff --git a/examples/ipsec-secgw
Update Scapy version requirement from 2.4.3rc1 to 2.4.3, which has been
used because 2.4.2 had a bug which made this version unable to install.
Accept future versions of Scapy too.
Signed-off-by: Marcin Smoczynski
---
examples/ipsec-secgw/test/pkttest.py | 2 +-
1 file changed, 1 insertion
tl command line option which allows to change
fragment lifetime
v2 to v3 changes:
- doc and commit log update - explicitly state feature limitations
v1 to v2 changes:
- disable fallback offload for outbound SAs
- add test scripts
Marcin Smoczynski (4):
examples/ipsec-secgw: sa structure cle
saturated reassembly buckets with high
bandwidth fragmented traffic.
Acked-by: Konstantin Ananyev
Tested-by: Konstantin Ananyev
Signed-off-by: Marcin Smoczynski
---
doc/guides/sample_app_ug/ipsec_secgw.rst | 7 +
examples/ipsec-secgw/ipsec-secgw.c | 40 ++--
2 files
rte_ipsec_session structure.
Such refactoring is needed to introduce many sessions per SA feature,
e.g. fallback session for inline offload processing.
Acked-by: Konstantin Ananyev
Acked-by: Radu Nicolau
Tested-by: Bernard Iremonger
Signed-off-by: Marcin Smoczynski
---
examples/ipsec-secgw/esp.c
Acked-by: Konstantin Ananyev
Tested-by: Bernard Iremonger
Signed-off-by: Marcin Smoczynski
---
doc/guides/sample_app_ug/ipsec_secgw.rst| 5 +
examples/ipsec-secgw/test/trs_aesgcm_common_defs.sh | 4 ++--
.../test/trs_aesgcm_inline_crypto_fallback_defs.sh
acy mode.
Acked-by: Konstantin Ananyev
Tested-by: Bernard Iremonger
Signed-off-by: Marcin Smoczynski
---
doc/guides/rel_notes/release_19_11.rst | 8 ++
doc/guides/sample_app_ug/ipsec_secgw.rst | 24 -
examples/ipsec-secgw/esp.c | 4 +-
examples/ipsec-secgw/ipsec-secg
this patch.
Fallback session feature is not available in the legacy mode.
Acked-by: Konstantin Ananyev
Tested-by: Bernard Iremonger
Signed-off-by: Marcin Smoczynski
---
doc/guides/rel_notes/release_19_11.rst | 8 ++
doc/guides/sample_app_ug/ipsec_secgw.rst | 22 -
examples/ipsec-secg
disable fallback offload for outbound SAs
- add test scripts
Marcin Smoczynski (4):
examples/ipsec-secgw: sa structure cleanup
examples/ipsec-secgw: add fallback session feature
examples/ipsec-secgw: add frag TTL cmdline option
examples/ipsec-secgw: add offload fallback tests
doc/guide
saturated reassembly buckets with high
bandwidth fragmented traffic.
Acked-by: Konstantin Ananyev
Tested-by: Konstantin Ananyev
Signed-off-by: Marcin Smoczynski
---
doc/guides/sample_app_ug/ipsec_secgw.rst | 7 +
examples/ipsec-secgw/ipsec-secgw.c | 40 ++--
2 files
rte_ipsec_session structure.
Such refactoring is needed to introduce many sessions per SA feature,
e.g. fallback session for inline offload processing.
Acked-by: Konstantin Ananyev
Acked-by: Radu Nicolau
Tested-by: Bernard Iremonger
Signed-off-by: Marcin Smoczynski
---
examples/ipsec-secgw/esp.c
Acked-by: Konstantin Ananyev
Tested-by: Bernard Iremonger
Signed-off-by: Marcin Smoczynski
---
doc/guides/sample_app_ug/ipsec_secgw.rst| 5 +
examples/ipsec-secgw/test/trs_aesgcm_common_defs.sh | 4 ++--
.../test/trs_aesgcm_inline_crypto_fallback_defs.sh
Introduce new function for IPv6 header extension parsing able to
determine extension length and next protocol number.
This function is helpful when implementing IPv6 header traversing.
Signed-off-by: Marcin Smoczynski
---
lib/librte_net/rte_ip.h | 49
ata contains a total
length of the IPv6 header with header extensions up to ESP header.
Signed-off-by: Marcin Smoczynski
---
lib/Makefile | 3 ++-
lib/librte_ipsec/iph.h | 55 --
2 files changed, 49 insertions(+), 9 deletions(-)
diff --git
assertions.
Signed-off-by: Marcin Smoczynski
---
examples/ipsec-secgw/ipsec-secgw.c | 33 +++-
examples/ipsec-secgw/sa.c | 5 +-
examples/ipsec-secgw/test/test-scapy.py | 231
3 files changed, 260 insertions(+), 9 deletions(-)
create mode 100755
Invalid statement is used to indicate header files to install.
Fixed the statement and reformatted recipe file.
Signed-off-by: Marcin Smoczynski
---
lib/librte_ipsec/meson.build | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/lib/librte_ipsec/meson.build b/lib
Fix invalid indentation - extra whitespace before error directive which
is causing syntax error when no pkgconfig file for the DPDK is found and
RTE_SDK is not specified.
Signed-off-by: Marcin Smoczynski
---
examples/ipsec-secgw/Makefile | 2 +-
1 file changed, 1 insertion(+), 1 deletion
].
[1] https://mails.dpdk.org/archives/dev/2019-May/131885.html
[2] http://mails.dpdk.org/archives/test-report/2019-May/082263.html
[3] https://mails.dpdk.org/archives/dev/2019-May/132110.html
Signed-off-by: Marcin Smoczynski
---
app/meson.build | 5 +
drivers/meson.build
v1 -> v2
* merge multiple -D__BSD_VISIBLE into one
* merge multiple -D_GNU_SOURCE into one
* add -D__BSD_VISIBLE to pc file for FreeBSD
Marcin Smoczynski (1):
build: enable BSD features visibility for FreeBSD
app/meson.build | 3 ---
config/meson.build
/dev/2019-May/132110.html
Signed-off-by: Marcin Smoczynski
---
app/meson.build | 3 ---
config/meson.build| 8
drivers/meson.build | 3 ---
examples/meson.build | 3 ---
lib/meson.build | 3 ---
meson.build | 6
ess than a max number of packets were
received allowing next call to receive the rest.
Fixes: a0d8e807d9 ("net/tap: add Rx trigger")
Cc: sta...@dpdk.org
Tested-by: Mariusz Drost
Signed-off-by: Marcin Smoczynski
---
drivers/net/tap/rte_eth_tap.c | 6 --
1 file changed, 4 insert
rte_ipsec_session structure.
Such refactoring is needed to introduce many sessions per SA feature,
e.g. fallback session for inline offload processing.
Signed-off-by: Marcin Smoczynski
---
examples/ipsec-secgw/esp.c | 35 +++
examples/ipsec-secgw/ipsec.c | 91
2 changes:
- disable fallback offload for outbound SAs
- add test scripts
Marcin Smoczynski (3):
examples/ipsec-secgw: ipsec_sa structure cleanup
examples/ipsec-secgw: add fallback session feature
examples/ipsec-secgw: add offload fallback tests
doc/guides/sample_app_ug/ipsec_secgw.rst
packets that normally would be dropped.
A fallback session type in the SA configuration by adding 'fallback'
with 'lookaside-none' or 'lookaside-protocol' parameter to determine
type of session.
Fallback session feature is available only when using librte_ipsec.
Si
Signed-off-by: Marcin Smoczynski
---
examples/ipsec-secgw/test/trs_aesgcm_common_defs.sh | 4 ++--
.../test/trs_aesgcm_inline_crypto_fallback_defs.sh | 5 +
examples/ipsec-secgw/test/tun_aesgcm_common_defs.sh | 6 --
.../test/tun_aesgcm_inline_crypto_fallba
Signed-off-by: Marcin Smoczynski
---
examples/ipsec-secgw/test/trs_aesgcm_common_defs.sh | 4 ++--
.../test/trs_aesgcm_inline_crypto_fallback_defs.sh | 5 +
examples/ipsec-secgw/test/tun_aesgcm_common_defs.sh | 6 --
.../test/tun_aesgcm_inline_crypto_fallba
on is of type
'inline-protocol-offload' or fallback session is 'lookaside-protocol'
because SA sequence number is not synchronized between software and
hardware sessions. Fallback sessions are also limited to ingress IPsec
traffic.
Fallback session feature is not available in
rte_ipsec_session structure.
Such refactoring is needed to introduce many sessions per SA feature,
e.g. fallback session for inline offload processing.
Signed-off-by: Marcin Smoczynski
---
examples/ipsec-secgw/esp.c | 35 +++
examples/ipsec-secgw/ipsec.c | 91
ges:
- disable fallback offload for outbound SAs
- add test scripts
Marcin Smoczynski (3):
examples/ipsec-secgw: ipsec_sa structure cleanup
examples/ipsec-secgw: add fallback session feature
examples/ipsec-secgw: add offload fallback tests
doc/guides/sample_app_ug/ipsec_secgw.rst | 20 ++-
ess than a max number of packets were
received allowing next call to receive the rest.
Remove unnecessary compiler barrier.
Fixes: a0d8e807d9 ("net/tap: add Rx trigger")
Cc: sta...@dpdk.org
Tested-by: Mariusz Drost
Tested-by: Konstantin Ananyev
Signed-off-by: Marcin Smoczynski
ess than a max number of packets were
received allowing next call to receive the rest.
v1 to v2 changes:
- fix typo in commit description
- remove unnecessary compiler barrier
Marcin Smoczynski (1):
net/tap: fix blocked rx packets error
drivers/net/tap/rte_eth_tap.c | 7 ---
1 file
--ressemble option has not been
set and packet exceeds MTU after encapsulation - drop it.
Fixes: b01d1cd213 ("examples/ipsec-secgw: support fragmentation and reassembly")
Cc: sta...@dpdk.org
Signed-off-by: Marcin Smoczynski
---
examples/ipsec-secgw/ipsec-secgw.c | 4 +++-
1 file
rte_ipsec_session structure.
Such refactoring is needed to introduce many sessions per SA feature,
e.g. fallback session for inline offload processing.
Acked-by: Konstantin Ananyev
Signed-off-by: Marcin Smoczynski
---
examples/ipsec-secgw/esp.c | 35 +++
examples/ipsec-secgw/ipsec.c
legacy mode.
Acked-by: Konstantin Ananyev
Signed-off-by: Marcin Smoczynski
---
doc/guides/sample_app_ug/ipsec_secgw.rst | 24 -
examples/ipsec-secgw/esp.c | 4 +-
examples/ipsec-secgw/ipsec-secgw.c | 16 ++--
examples/ipsec-secgw/ipsec.c | 10 +
doc and commit log update - explicitly state feature limitations
v1 to v2 changes:
- disable fallback offload for outbound SAs
- add test scripts
Marcin Smoczynski (4):
examples/ipsec-secgw: ipsec_sa structure cleanup
examples/ipsec-secgw: add fallback session feature
examples/ipsec-secg
Acked-by: Konstantin Ananyev
Signed-off-by: Marcin Smoczynski
---
examples/ipsec-secgw/test/trs_aesgcm_common_defs.sh | 4 ++--
.../test/trs_aesgcm_inline_crypto_fallback_defs.sh | 5 +
examples/ipsec-secgw/test/tun_aesgcm_common_defs.sh | 6 --
saturated reassembly buckets with high
bandwidth fragmented traffic.
Signed-off-by: Marcin Smoczynski
---
doc/guides/sample_app_ug/ipsec_secgw.rst | 7 +
examples/ipsec-secgw/ipsec-secgw.c | 40 ++--
2 files changed, 37 insertions(+), 10 deletions(-)
diff --git a/doc
add patch with --frag-ttl command line option which allows to change
fragment lifetime
v2 to v3 changes:
- doc and commit log update - explicitly state feature limitations
v1 to v2 changes:
- disable fallback offload for outbound SAs
- add test scripts
Marcin Smoczynski (4):
examples/ipsec-
rte_ipsec_session structure.
Such refactoring is needed to introduce many sessions per SA feature,
e.g. fallback session for inline offload processing.
Acked-by: Konstantin Ananyev
Signed-off-by: Marcin Smoczynski
---
examples/ipsec-secgw/esp.c | 35 +++
examples/ipsec-secgw/ipsec.c
legacy mode.
Acked-by: Konstantin Ananyev
Signed-off-by: Marcin Smoczynski
---
doc/guides/sample_app_ug/ipsec_secgw.rst | 24 -
examples/ipsec-secgw/esp.c | 4 +-
examples/ipsec-secgw/ipsec-secgw.c | 16 ++--
examples/ipsec-secgw/ipsec.c | 10 +
saturated reassembly buckets with high
bandwidth fragmented traffic.
Signed-off-by: Marcin Smoczynski
---
doc/guides/sample_app_ug/ipsec_secgw.rst | 7 +
examples/ipsec-secgw/ipsec-secgw.c | 40 ++--
2 files changed, 37 insertions(+), 10 deletions(-)
diff --git a/doc
Acked-by: Konstantin Ananyev
Signed-off-by: Marcin Smoczynski
---
examples/ipsec-secgw/test/trs_aesgcm_common_defs.sh | 4 ++--
.../test/trs_aesgcm_inline_crypto_fallback_defs.sh | 5 +
examples/ipsec-secgw/test/tun_aesgcm_common_defs.sh | 6 --
87 matches
Mail list logo