|
Revision tags: v22.03, v22.03-rc4, v22.03-rc3, v22.03-rc2, v22.03-rc1, v21.11, v21.11-rc4, v21.11-rc3, v21.11-rc2, v21.11-rc1, v21.08, v21.08-rc4, v21.08-rc3, v21.08-rc2, v21.08-rc1, v21.05, v21.05-rc4, v21.05-rc3, v21.05-rc2, v21.05-rc1, v21.02, v21.02-rc4, v21.02-rc3, v21.02-rc2, v21.02-rc1, v20.11, v20.11-rc5, v20.11-rc4, v20.11-rc3, v20.11-rc2, v20.11-rc1, v20.08, v20.08-rc4, v20.08-rc3, v20.08-rc2, v20.08-rc1, v20.05, v20.05-rc4, v20.05-rc3, v20.05-rc2, v20.05-rc1, v20.02, v20.02-rc4, v20.02-rc3, v20.02-rc2, v20.02-rc1, v19.11, v19.11-rc4, v19.11-rc3, v19.11-rc2, v19.11-rc1, v19.08, v19.08-rc4, v19.08-rc3, v19.08-rc2, v19.08-rc1, v19.05, v19.05-rc4, v19.05-rc3, v19.05-rc2, v19.05-rc1, v19.02, v19.02-rc4, v19.02-rc3, v19.02-rc2, v19.02-rc1, v18.11, v18.11-rc5, v18.11-rc4, v18.11-rc3, v18.11-rc2, v18.11-rc1, v18.08, v18.08-rc3, v18.08-rc2, v18.08-rc1, v18.05, v18.05-rc6, v18.05-rc5, v18.05-rc4, v18.05-rc3, v18.05-rc2, v18.05-rc1, v18.02, v18.02-rc4, v18.02-rc3, v18.02-rc2, v18.02-rc1 |
|
| #
3998e2a0 |
| 19-Dec-2017 |
Bruce Richardson <[email protected]> |
examples: use SPDX tag for Intel copyright files
Replace the BSD license header with the SPDX tag for files with only an Intel copyright on them.
Signed-off-by: Bruce Richardson <bruce.richardson@i
examples: use SPDX tag for Intel copyright files
Replace the BSD license header with the SPDX tag for files with only an Intel copyright on them.
Signed-off-by: Bruce Richardson <[email protected]>
show more ...
|
|
Revision tags: v17.11, v17.11-rc4, v17.11-rc3, v17.11-rc2, v17.11-rc1, v17.08, v17.08-rc4, v17.08-rc3, v17.08-rc2, v17.08-rc1, v17.05, v17.05-rc4, v17.05-rc3, v17.05-rc2, v17.05-rc1, v17.02, v17.02-rc3, v17.02-rc2, v17.02-rc1, v16.11, v16.11-rc3, v16.11-rc2, v16.11-rc1 |
|
| #
0d547ed0 |
| 21-Sep-2016 |
Fan Zhang <[email protected]> |
examples/ipsec-secgw: support configuration file
This patch adds the configuration file support to ipsec_secgw sample application. Instead of hard-coded rules, the users can specify their own SP, SA
examples/ipsec-secgw: support configuration file
This patch adds the configuration file support to ipsec_secgw sample application. Instead of hard-coded rules, the users can specify their own SP, SA, and routing rules in the configuration file. A command line option "-f" is added to pass the configuration file location to the application.
Configuration item formats:
SP rule format: sp <ip_ver> <dir> esp <action> <priority> <src_ip> <dst_ip> \ <proto> <sport> <dport>
SA rule format: sa <dir> <spi> <cipher_algo> <cipher_key> <auth_algo> <auth_key> \ <mode> <src_ip> <dst_ip>
Routing rule format: rt <ip_ver> <src_ip> <dst_ip> <port>
Signed-off-by: Fan Zhang <[email protected]> Acked-by: Sergio Gonzalez Monroy <[email protected]>
show more ...
|
|
Revision tags: v16.07, v16.07-rc5, v16.07-rc4, v16.07-rc3, v16.07-rc2, v16.07-rc1 |
|
| #
f159e70b |
| 09-Jun-2016 |
Sergio Gonzalez Monroy <[email protected]> |
examples/ipsec-secgw: support transport mode
IPSec transport mode support.
Signed-off-by: Sergio Gonzalez Monroy <[email protected]> Acked-by: Pablo de Lara <pablo.de.lara.guarch@int
examples/ipsec-secgw: support transport mode
IPSec transport mode support.
Signed-off-by: Sergio Gonzalez Monroy <[email protected]> Acked-by: Pablo de Lara <[email protected]>
show more ...
|
| #
906257e9 |
| 09-Jun-2016 |
Sergio Gonzalez Monroy <[email protected]> |
examples/ipsec-secgw: support IPv6
Support IPSec IPv6 allowing IPv4/IPv6 traffic in IPv4 or IPv6 tunnel.
We need separate Routing (LPM) and SP (ACL) tables for IPv4 and IPv6, but a common SA table.
examples/ipsec-secgw: support IPv6
Support IPSec IPv6 allowing IPv4/IPv6 traffic in IPv4 or IPv6 tunnel.
We need separate Routing (LPM) and SP (ACL) tables for IPv4 and IPv6, but a common SA table.
Signed-off-by: Sergio Gonzalez Monroy <[email protected]> Acked-by: Pablo de Lara <[email protected]>
show more ...
|
|
Revision tags: v16.04, v16.04-rc4, v16.04-rc3 |
|
| #
55d4c775 |
| 31-Mar-2016 |
Daniel Mrzyglod <[email protected]> |
examples/ipsec-secgw: fix build on FreeBSD
In FreeBSD, sys/types.h and netinet/in.h need to be included before netinet/ip.h
There were missed typedef for u_char - <sys/types.h> There were missed ne
examples/ipsec-secgw: fix build on FreeBSD
In FreeBSD, sys/types.h and netinet/in.h need to be included before netinet/ip.h
There were missed typedef for u_char - <sys/types.h> There were missed network definitions - <netinet/in.h>
Failure #13: http://dpdk.org/ml/archives/test-report/2016-March/001896.html
Fixes: d299106e8e31 ("examples/ipsec-secgw: add IPsec sample application")
Signed-off-by: Daniel Mrzyglod <[email protected]> Acked-by: Sergio Gonzalez Monroy <[email protected]>
show more ...
|
|
Revision tags: v16.04-rc2, v16.04-rc1 |
|
| #
d299106e |
| 11-Mar-2016 |
Sergio Gonzalez Monroy <[email protected]> |
examples/ipsec-secgw: add IPsec sample application
Sample app implementing an IPsec Security Geteway. The main goal of this app is to show the use of cryptodev framework in a "real world" applicatio
examples/ipsec-secgw: add IPsec sample application
Sample app implementing an IPsec Security Geteway. The main goal of this app is to show the use of cryptodev framework in a "real world" application.
Currently only supported static IPv4 ESP IPsec tunnels for the following algorithms: - Cipher: AES-CBC, NULL - Authentication: HMAC-SHA1, NULL
Not supported: - SA auto negotiation (No IKE implementation) - chained mbufs
Signed-off-by: Sergio Gonzalez Monroy <[email protected]> Acked-by: Pablo de Lara <[email protected]>
show more ...
|