|
Revision tags: v22.03, v22.03-rc4, v22.03-rc3, v22.03-rc2, v22.03-rc1, v21.11, v21.11-rc4, v21.11-rc3, v21.11-rc2, v21.11-rc1, v21.08, v21.08-rc4, v21.08-rc3, v21.08-rc2, v21.08-rc1, v21.05, v21.05-rc4, v21.05-rc3, v21.05-rc2, v21.05-rc1, v21.02, v21.02-rc4, v21.02-rc3, v21.02-rc2, v21.02-rc1, v20.11, v20.11-rc5, v20.11-rc4, v20.11-rc3, v20.11-rc2, v20.11-rc1, v20.08, v20.08-rc4, v20.08-rc3, v20.08-rc2, v20.08-rc1, v20.05, v20.05-rc4, v20.05-rc3, v20.05-rc2, v20.05-rc1, v20.02, v20.02-rc4, v20.02-rc3, v20.02-rc2, v20.02-rc1, v19.11, v19.11-rc4, v19.11-rc3, v19.11-rc2, v19.11-rc1, v19.08, v19.08-rc4, v19.08-rc3, v19.08-rc2, v19.08-rc1, v19.05, v19.05-rc4, v19.05-rc3, v19.05-rc2, v19.05-rc1, v19.02, v19.02-rc4, v19.02-rc3, v19.02-rc2, v19.02-rc1, v18.11, v18.11-rc5, v18.11-rc4, v18.11-rc3, v18.11-rc2, v18.11-rc1, v18.08, v18.08-rc3, v18.08-rc2, v18.08-rc1, v18.05, v18.05-rc6, v18.05-rc5, v18.05-rc4, v18.05-rc3, v18.05-rc2, v18.05-rc1, v18.02, v18.02-rc4, v18.02-rc3, v18.02-rc2, v18.02-rc1 |
|
| #
27d822e8 |
| 15-Jan-2018 |
Akhil Goyal <[email protected]> |
examples/ipsec-secgw: update incremental checksum
When TTL is decremented or ecn is updated in IP header before forwarding the packet, checksum needs to be updated.
In this patch an incremental che
examples/ipsec-secgw: update incremental checksum
When TTL is decremented or ecn is updated in IP header before forwarding the packet, checksum needs to be updated.
In this patch an incremental checksum is added for ipv4 case.
Signed-off-by: Akhil Goyal <[email protected]> Acked-by: Radu Nicolau <[email protected]>
show more ...
|
| #
9ebafd1e |
| 14-Dec-2017 |
Akhil Goyal <[email protected]> |
examples/ipsec-secgw: update mbuf packet type
Packet_type should be updated to remove/add L4 type for encrypted/decrypted packet
Signed-off-by: Akhil Goyal <[email protected]> Acked-by: Radu Nico
examples/ipsec-secgw: update mbuf packet type
Packet_type should be updated to remove/add L4 type for encrypted/decrypted packet
Signed-off-by: Akhil Goyal <[email protected]> Acked-by: Radu Nicolau <[email protected]>
show more ...
|
| #
3998e2a0 |
| 19-Dec-2017 |
Bruce Richardson <[email protected]> |
examples: use SPDX tag for Intel copyright files
Replace the BSD license header with the SPDX tag for files with only an Intel copyright on them.
Signed-off-by: Bruce Richardson <bruce.richardson@i
examples: use SPDX tag for Intel copyright files
Replace the BSD license header with the SPDX tag for files with only an Intel copyright on them.
Signed-off-by: Bruce Richardson <[email protected]>
show more ...
|
|
Revision tags: v17.11, v17.11-rc4, v17.11-rc3, v17.11-rc2, v17.11-rc1 |
|
| #
b43a8131 |
| 13-Oct-2017 |
Tomasz Duszynski <[email protected]> |
examples/ipsec-secgw: fix IPv6 payload length
IPv6 payload length header field should contain only the number of bytes following the IPv6 header and not the entire packet size.
Fixes: f159e70b0922
examples/ipsec-secgw: fix IPv6 payload length
IPv6 payload length header field should contain only the number of bytes following the IPv6 header and not the entire packet size.
Fixes: f159e70b0922 ("examples/ipsec-secgw: support transport mode") Fixes: 906257e965b7 ("examples/ipsec-secgw: support IPv6") Cc: [email protected]
Signed-off-by: Tomasz Duszynski <[email protected]> Acked-by: Sergio Gonzalez Monroy <[email protected]>
show more ...
|
|
Revision tags: v17.08, v17.08-rc4, v17.08-rc3, v17.08-rc2, v17.08-rc1, v17.05, v17.05-rc4, v17.05-rc3, v17.05-rc2, v17.05-rc1, v17.02, v17.02-rc3, v17.02-rc2, v17.02-rc1, v16.11, v16.11-rc3, v16.11-rc2, v16.11-rc1, v16.07, v16.07-rc5, v16.07-rc4 |
|
| #
96362fad |
| 19-Jul-2016 |
Sergio Gonzalez Monroy <[email protected]> |
examples/ipsec-secgw: fix build with gcc 4.5
GCC 4.5.x does not handle well initializing anonymous union and/or structs.
To make the compiler happy we name those anonymous union/struct.
Fixes: 906
examples/ipsec-secgw: fix build with gcc 4.5
GCC 4.5.x does not handle well initializing anonymous union and/or structs.
To make the compiler happy we name those anonymous union/struct.
Fixes: 906257e965b7 ("examples/ipsec-secgw: support IPv6")
Signed-off-by: Sergio Gonzalez Monroy <[email protected]>
show more ...
|
|
Revision tags: v16.07-rc3, v16.07-rc2, v16.07-rc1 |
|
| #
906257e9 |
| 09-Jun-2016 |
Sergio Gonzalez Monroy <[email protected]> |
examples/ipsec-secgw: support IPv6
Support IPSec IPv6 allowing IPv4/IPv6 traffic in IPv4 or IPv6 tunnel.
We need separate Routing (LPM) and SP (ACL) tables for IPv4 and IPv6, but a common SA table.
examples/ipsec-secgw: support IPv6
Support IPSec IPv6 allowing IPv4/IPv6 traffic in IPv4 or IPv6 tunnel.
We need separate Routing (LPM) and SP (ACL) tables for IPv4 and IPv6, but a common SA table.
Signed-off-by: Sergio Gonzalez Monroy <[email protected]> Acked-by: Pablo de Lara <[email protected]>
show more ...
|
| #
50705e8e |
| 22-Apr-2016 |
Thomas Monjalon <[email protected]> |
eal: add assert macro for debug
The macro RTE_VERIFY always checks a condition. It is optimized with "unlikely" hint. While this macro is well suited for test applications, it is preferred in librar
eal: add assert macro for debug
The macro RTE_VERIFY always checks a condition. It is optimized with "unlikely" hint. While this macro is well suited for test applications, it is preferred in libraries and examples to enable such check in debug mode. That's why the macro RTE_ASSERT is introduced to call RTE_VERIFY only if built with debug logs enabled.
A lot of assert macros were duplicated and enabled with a specific flag. Removing these #ifdef allows to test these code branches more easily and avoid dead code pitfalls.
The ENA_ASSERT is kept (in debug mode only) because it has more parameters to log.
Signed-off-by: Thomas Monjalon <[email protected]>
show more ...
|
|
Revision tags: v16.04, v16.04-rc4, v16.04-rc3, v16.04-rc2, v16.04-rc1 |
|
| #
d299106e |
| 11-Mar-2016 |
Sergio Gonzalez Monroy <[email protected]> |
examples/ipsec-secgw: add IPsec sample application
Sample app implementing an IPsec Security Geteway. The main goal of this app is to show the use of cryptodev framework in a "real world" applicatio
examples/ipsec-secgw: add IPsec sample application
Sample app implementing an IPsec Security Geteway. The main goal of this app is to show the use of cryptodev framework in a "real world" application.
Currently only supported static IPv4 ESP IPsec tunnels for the following algorithms: - Cipher: AES-CBC, NULL - Authentication: HMAC-SHA1, NULL
Not supported: - SA auto negotiation (No IKE implementation) - chained mbufs
Signed-off-by: Sergio Gonzalez Monroy <[email protected]> Acked-by: Pablo de Lara <[email protected]>
show more ...
|