Lines Matching refs:rule

286 	struct ipsec_sa *rule = NULL;  in parse_sa_tokens()  local
307 rule = &sa_in[*ri]; in parse_sa_tokens()
308 rule->direction = RTE_SECURITY_IPSEC_SA_DIR_INGRESS; in parse_sa_tokens()
314 rule = &sa_out[*ri]; in parse_sa_tokens()
315 rule->direction = RTE_SECURITY_IPSEC_SA_DIR_EGRESS; in parse_sa_tokens()
324 rule->spi = atoi(tokens[1]); in parse_sa_tokens()
325 rule->portid = UINT16_MAX; in parse_sa_tokens()
326 ips = ipsec_get_primary_session(rule); in parse_sa_tokens()
340 rule->flags = IP4_TUNNEL; in parse_sa_tokens()
343 rule->flags = IP6_TUNNEL; in parse_sa_tokens()
347 rule->flags = TRANSPORT; in parse_sa_tokens()
379 rule->cipher_algo = algo->algo; in parse_sa_tokens()
380 rule->block_size = algo->block_size; in parse_sa_tokens()
381 rule->iv_len = algo->iv_len; in parse_sa_tokens()
382 rule->cipher_key_len = algo->key_len; in parse_sa_tokens()
385 if (rule->cipher_algo == RTE_CRYPTO_CIPHER_NULL) { in parse_sa_tokens()
405 rule->cipher_key); in parse_sa_tokens()
406 APP_CHECK(key_len == rule->cipher_key_len, status, in parse_sa_tokens()
413 rule->salt = (uint32_t)rte_rand(); in parse_sa_tokens()
417 rule->cipher_key_len = key_len; in parse_sa_tokens()
418 memcpy(&rule->salt, in parse_sa_tokens()
419 &rule->cipher_key[key_len], 4); in parse_sa_tokens()
446 rule->auth_algo = algo->algo; in parse_sa_tokens()
447 rule->auth_key_len = algo->key_len; in parse_sa_tokens()
448 rule->digest_len = algo->digest_len; in parse_sa_tokens()
473 rule->auth_key); in parse_sa_tokens()
474 APP_CHECK(key_len == rule->auth_key_len, status, in parse_sa_tokens()
504 rule->aead_algo = algo->algo; in parse_sa_tokens()
505 rule->cipher_key_len = algo->key_len; in parse_sa_tokens()
506 rule->digest_len = algo->digest_len; in parse_sa_tokens()
507 rule->aad_len = algo->aad_len; in parse_sa_tokens()
508 rule->block_size = algo->block_size; in parse_sa_tokens()
509 rule->iv_len = algo->iv_len; in parse_sa_tokens()
526 rule->cipher_key); in parse_sa_tokens()
527 APP_CHECK(key_len == rule->cipher_key_len, status, in parse_sa_tokens()
533 rule->cipher_key_len = key_len; in parse_sa_tokens()
534 memcpy(&rule->salt, in parse_sa_tokens()
535 &rule->cipher_key[key_len], 4); in parse_sa_tokens()
550 if (IS_IP4_TUNNEL(rule->flags)) { in parse_sa_tokens()
560 rule->src.ip.ip4 = rte_bswap32( in parse_sa_tokens()
562 } else if (IS_IP6_TUNNEL(rule->flags)) { in parse_sa_tokens()
572 memcpy(rule->src.ip.ip6.ip6_b, in parse_sa_tokens()
574 } else if (IS_TRANSPORT(rule->flags)) { in parse_sa_tokens()
593 if (IS_IP4_TUNNEL(rule->flags)) { in parse_sa_tokens()
603 rule->dst.ip.ip4 = rte_bswap32( in parse_sa_tokens()
605 } else if (IS_IP6_TUNNEL(rule->flags)) { in parse_sa_tokens()
615 memcpy(rule->dst.ip.ip6.ip6_b, ip.s6_addr, 16); in parse_sa_tokens()
616 } else if (IS_TRANSPORT(rule->flags)) { in parse_sa_tokens()
667 if (rule->portid == UINT16_MAX) in parse_sa_tokens()
668 rule->portid = atoi(tokens[ti]); in parse_sa_tokens()
669 else if (rule->portid != atoi(tokens[ti])) { in parse_sa_tokens()
672 tokens[ti], rule->portid); in parse_sa_tokens()
692 APP_CHECK(rule->direction == in parse_sa_tokens()
704 fb = ipsec_get_fallback_session(rule); in parse_sa_tokens()
715 rule->fallback_sessions = 1; in parse_sa_tokens()
724 rule->fdir_flag = 1; in parse_sa_tokens()
728 if (rule->portid == UINT16_MAX) in parse_sa_tokens()
729 rule->portid = atoi(tokens[ti]); in parse_sa_tokens()
730 else if (rule->portid != atoi(tokens[ti])) { in parse_sa_tokens()
733 tokens[ti], rule->portid); in parse_sa_tokens()
739 rule->fdir_qid = atoi(tokens[ti]); in parse_sa_tokens()
741 status_p = check_flow_params(rule->portid, in parse_sa_tokens()
742 rule->fdir_qid); in parse_sa_tokens()
745 "not valid\n", rule->portid, in parse_sa_tokens()
746 rule->fdir_qid); in parse_sa_tokens()
1593 struct ipsec_sa *rule; in sa_check_offloads() local
1602 rule = &sa_in[idx_sa]; in sa_check_offloads()
1603 rule_type = ipsec_get_action_type(rule); in sa_check_offloads()
1607 && rule->portid == port_id) in sa_check_offloads()
1613 rule = &sa_out[idx_sa]; in sa_check_offloads()
1614 rule_type = ipsec_get_action_type(rule); in sa_check_offloads()
1618 && rule->portid == port_id) in sa_check_offloads()