| /dpdk/doc/guides/prog_guide/ |
| H A D | rte_security.rst | 111 Inline protocol offload 115 The crypto and protocol processing for security protocol (e.g. IPsec) 191 Lookaside protocol offload 218 for any protocol header addition. 355 are defined by the security action type, security protocol, protocol 366 PMD which supports the IPsec and PDCP protocol. 395 .protocol = RTE_SECURITY_PROTOCOL_PDCP, 404 .protocol = RTE_SECURITY_PROTOCOL_PDCP, 470 protocol. 600 enum rte_security_session_protocol protocol; [all …]
|
| H A D | packet_classif_access_ctrl.rst | 58 * _BITMASK - for fields such as protocol identifiers that have a value and a bit mask. 147 source addr/mask destination addr/mask source ports dest ports protocol/mask 150 Any IPv4 packets with protocol ID 17 (UDP), source address 192.168.1.[0-255], destination address 1… 153 To define classification for the IPv6 2-tuple: <protocol, IPv6 source address> over the following I… 216 source addr/mask protocol/mask 219 Any IPv6 packets with protocol ID 6 (TCP), and source address inside the range 284 source addr/mask destination addr/mask tos/mask protocol/mask 287 Any IPv4 packets with protocol ID 6 (TCP), source address 192.168.1.[0-255], destination address 19…
|
| /dpdk/doc/guides/rel_notes/ |
| H A D | deprecation.rst | 73 should start with relevant protocol header. 74 Some matching pattern structures implements this by duplicating protocol header 75 fields in the struct. To clarify the intention and to be sure protocol header 76 is intact, will replace those fields with relevant protocol header struct. 77 In v21.02 both individual protocol header fields and the protocol header struct 78 will be added as union, target is switch usage to the protocol header by time. 79 In v21.11 LTS, protocol header fields will be cleaned and only protocol header
|
| H A D | release_21_11.rst | 86 * **Added L2TPv2 and PPP protocol support in flow API.** 93 an arbitrary user-specified network protocol header, 170 * Added protocol agnostic flow offloading support in Flow Director. 171 * Added protocol agnostic flow offloading support in RSS hash. 258 * Added AES-CBC SHA1-HMAC support in lookaside protocol (IPsec) for CN10K. 259 * Added Transport mode support in lookaside protocol (IPsec) for CN10K. 261 * Added support for lookaside protocol (IPsec) offload for CN9K. 264 * Added inner checksum support in lookaside protocol (IPsec) for CN10K. 359 * **Added lookaside protocol (IPsec) tests in dpdk-test.** 377 UDP discard protocol. [all …]
|
| H A D | release_22_03.rst | 150 * Added SHA256-HMAC support in lookaside protocol (IPsec) for CN10K. 151 * Added SHA384-HMAC support in lookaside protocol (IPsec) for CN9K & CN10K. 152 * Added SHA512-HMAC support in lookaside protocol (IPsec) for CN9K & CN10K. 153 * Added AES-CTR support in lookaside protocol (IPsec) for CN9K & CN10K. 154 * Added NULL cipher support in lookaside protocol (IPsec) for CN9K & CN10K. 155 * Added AES-XCBC support in lookaside protocol (IPsec) for CN9K & CN10K. 157 * Added ESN and anti-replay support in lookaside protocol (IPsec) for CN10K.
|
| /dpdk/app/test/ |
| H A D | test_security.c | 2078 .protocol = RTE_SECURITY_PROTOCOL_IPSEC, in test_capability_get_no_matching_protocol() 2087 .protocol = RTE_SECURITY_PROTOCOL_PDCP, in test_capability_get_no_matching_protocol() 2117 .protocol = RTE_SECURITY_PROTOCOL_MACSEC, in test_capability_get_no_support_for_macsec() 2151 .protocol = RTE_SECURITY_PROTOCOL_IPSEC, in test_capability_get_ipsec_mismatch_proto() 2191 .protocol = RTE_SECURITY_PROTOCOL_IPSEC, in test_capability_get_ipsec_mismatch_mode() 2233 .protocol = RTE_SECURITY_PROTOCOL_IPSEC, in test_capability_get_ipsec_mismatch_dir() 2277 .protocol = RTE_SECURITY_PROTOCOL_IPSEC, in test_capability_get_ipsec_match() 2324 .protocol = RTE_SECURITY_PROTOCOL_PDCP, in test_capability_get_pdcp_mismatch_domain() 2332 .protocol = RTE_SECURITY_PROTOCOL_PDCP, in test_capability_get_pdcp_mismatch_domain() 2364 .protocol = RTE_SECURITY_PROTOCOL_PDCP, in test_capability_get_pdcp_match() [all …]
|
| /dpdk/drivers/net/hinic/ |
| H A D | hinic_pmd_ethdev.h | 169 u32 protocol:8; member 199 u32 protocol:8; 219 u32 protocol:7; member 238 u32 protocol:7;
|
| /dpdk/lib/security/ |
| H A D | rte_security.c | 182 capability->protocol == idx->protocol) { in rte_security_capability_get() 183 if (idx->protocol == RTE_SECURITY_PROTOCOL_IPSEC) { in rte_security_capability_get() 191 } else if (idx->protocol == RTE_SECURITY_PROTOCOL_PDCP) { in rte_security_capability_get() 195 } else if (idx->protocol == in rte_security_capability_get()
|
| H A D | rte_security.h | 505 enum rte_security_session_protocol protocol; member 774 enum rte_security_session_protocol protocol; member 811 enum rte_security_session_protocol protocol; member 892 enum rte_security_session_protocol protocol; member
|
| /dpdk/drivers/common/sfc_efx/base/ |
| H A D | efx_tunnel.c | 320 __in efx_tunnel_protocol_t protocol) in efx_tunnel_config_udp_add() argument 330 if (protocol >= EFX_TUNNEL_NPROTOS) { in efx_tunnel_config_udp_add() 336 (1u << protocol)) == 0) { in efx_tunnel_config_udp_add() 357 protocol; in efx_tunnel_config_udp_add() 442 __in efx_tunnel_protocol_t protocol) in efx_tunnel_config_udp_remove() argument 462 if (etcp->etc_udp_entries[entry].etue_protocol != protocol) { in efx_tunnel_config_udp_remove()
|
| /dpdk/drivers/crypto/cnxk/ |
| H A D | cnxk_cryptodev_capabilities.c | 974 .protocol = RTE_SECURITY_PROTOCOL_IPSEC, 985 .protocol = RTE_SECURITY_PROTOCOL_IPSEC, 996 .protocol = RTE_SECURITY_PROTOCOL_IPSEC, 1007 .protocol = RTE_SECURITY_PROTOCOL_IPSEC, 1018 .protocol = RTE_SECURITY_PROTOCOL_IPSEC, 1029 .protocol = RTE_SECURITY_PROTOCOL_IPSEC, 1040 .protocol = RTE_SECURITY_PROTOCOL_IPSEC, 1051 .protocol = RTE_SECURITY_PROTOCOL_IPSEC,
|
| /dpdk/doc/guides/sample_app_ug/ |
| H A D | ipsec_secgw.rst | 423 * IP protocol version 429 * *ipv4*: IP protocol version 4 430 * *ipv6*: IP protocol version 6 690 * *lookaside-protocol-offload*: look aside protocol offload to HW accelerator 691 * *inline-protocol-offload*: inline protocol offload on ethernet device 831 * IP protocol version 837 * *ipv4*: IP protocol version 4 838 * *ipv6*: IP protocol version 6 896 * IP protocol version 902 * *ipv4*: IP protocol version 4 [all …]
|
| H A D | l3_forward_access_ctrl.rst | 43 a source port, a destination port and a protocol identifier. 134 The protocol identifier is an 8-bit value and a mask separated by '/'. 135 For example: 6/0xfe matches protocol values 6 and 7. 153 destination IP address = [192.168.0.36], protocol = [6]/[7] 157 protocol = [6]/[7], destined to port 1. 168 …et 1 has source IP address = [1.2.3.4], destination IP address = [192.168.0.36], and protocol = [6] 170 …et 2 has source IP address = [1.2.4.4], destination IP address = [192.168.0.36], and protocol = [6] 172 …et 3 has source IP address = [1.2.3.4], destination IP address = [192.168.0.36], and protocol = [8] 332 no extra protocol field retrieval need to be performed.
|
| /dpdk/drivers/net/mlx5/ |
| H A D | mlx5_flow_verbs.c | 846 uint8_t protocol) in flow_verbs_item_gre_ip_protocol_update() argument 865 ip.ipv4->val.proto = protocol; in flow_verbs_item_gre_ip_protocol_update() 872 ip.ipv6->val.next_hdr = protocol; in flow_verbs_item_gre_ip_protocol_update() 963 tunnel.val.protocol = spec->protocol; in flow_verbs_translate_item_gre() 965 tunnel.mask.protocol = mask->protocol; in flow_verbs_translate_item_gre() 969 if (tunnel.mask.protocol) { in flow_verbs_translate_item_gre() 970 tunnel.val.protocol &= tunnel.mask.protocol; in flow_verbs_translate_item_gre() 973 if (tunnel.val.protocol) { in flow_verbs_translate_item_gre() 974 tunnel.mask.protocol = 0xFFFF; in flow_verbs_translate_item_gre() 975 tunnel.val.protocol = in flow_verbs_translate_item_gre() [all …]
|
| /dpdk/doc/guides/nics/ |
| H A D | ice.rst | 108 Configure the RX queues to do protocol extraction into mbuf for protocol 113 -a 18:00.0,proto_xtr=<queues:protocol>[<queues:protocol>...] 114 -a 18:00.0,proto_xtr=<protocol> 119 specified, PMD will use this protocol extraction type for all queues. 128 VLAN extraction, other queues run with no protocol extraction. 214 Use ``rte_net_ice_dynf_proto_xtr_metadata_get`` to access the protocol 219 access the protocol extraction result in ``struct rte_mbuf``.
|
| H A D | igc.rst | 74 - 2-tuple filter(destination L4 protocol and destination L4 port) 90 Add a rule to direct packet whose ``ip-protocol=0x6(TCP), tcp_port=0x80`` to queue 1: 96 Add a rule to direct packet whose ``ip-protocol=0x6(TCP), SYN flag is set`` to queue 1:
|
| /dpdk/drivers/crypto/dpaa2_sec/ |
| H A D | dpaa2_sec_priv.h | 896 .protocol = RTE_SECURITY_PROTOCOL_IPSEC, 908 .protocol = RTE_SECURITY_PROTOCOL_IPSEC, 920 .protocol = RTE_SECURITY_PROTOCOL_PDCP, 929 .protocol = RTE_SECURITY_PROTOCOL_PDCP, 938 .protocol = RTE_SECURITY_PROTOCOL_PDCP,
|
| /dpdk/drivers/crypto/caam_jr/ |
| H A D | caam_jr_capabilities.c | 231 .protocol = RTE_SECURITY_PROTOCOL_IPSEC, 242 .protocol = RTE_SECURITY_PROTOCOL_IPSEC,
|
| /dpdk/drivers/crypto/dpaa_sec/ |
| H A D | dpaa_sec.h | 953 .protocol = RTE_SECURITY_PROTOCOL_IPSEC, 965 .protocol = RTE_SECURITY_PROTOCOL_IPSEC, 977 .protocol = RTE_SECURITY_PROTOCOL_PDCP, 986 .protocol = RTE_SECURITY_PROTOCOL_PDCP, 995 .protocol = RTE_SECURITY_PROTOCOL_PDCP,
|
| /dpdk/drivers/crypto/mvsam/ |
| H A D | rte_mrvl_pmd_ops.c | 868 switch (conf->protocol) { in mrvl_crypto_pmd_security_session_create() 944 .protocol = RTE_SECURITY_PROTOCOL_IPSEC, 956 .protocol = RTE_SECURITY_PROTOCOL_IPSEC, 968 .protocol = RTE_SECURITY_PROTOCOL_IPSEC, 980 .protocol = RTE_SECURITY_PROTOCOL_IPSEC,
|
| /dpdk/drivers/net/ice/ |
| H A D | rte_pmd_ice.h | 46 uint16_t protocol:8, member 207 data.ipv4.protocol); in rte_net_ice_dump_proto_xtr_metadata()
|
| /dpdk/drivers/net/iavf/ |
| H A D | rte_pmd_iavf.h | 46 uint16_t protocol:8, member 211 data.ipv4.protocol); in rte_pmd_ifd_dump_proto_xtr_metadata()
|
| /dpdk/drivers/net/cnxk/ |
| H A D | cn10k_ethdev_sec.c | 278 .protocol = RTE_SECURITY_PROTOCOL_IPSEC, 303 .protocol = RTE_SECURITY_PROTOCOL_IPSEC, 328 .protocol = RTE_SECURITY_PROTOCOL_IPSEC, 352 .protocol = RTE_SECURITY_PROTOCOL_IPSEC, 604 if (conf->protocol != RTE_SECURITY_PROTOCOL_IPSEC) in cn10k_eth_sec_session_create() 926 conf->protocol != RTE_SECURITY_PROTOCOL_IPSEC) in cn10k_eth_sec_session_update() 1034 stats->protocol = RTE_SECURITY_PROTOCOL_IPSEC; in cn10k_eth_sec_session_stats_get()
|
| H A D | cn9k_ethdev_sec.c | 89 .protocol = RTE_SECURITY_PROTOCOL_IPSEC, 101 .protocol = RTE_SECURITY_PROTOCOL_IPSEC, 158 if (conf->protocol != RTE_SECURITY_PROTOCOL_IPSEC) in cn9k_eth_sec_session_create()
|
| /dpdk/examples/bpf/ |
| H A D | t1.c | 45 if (iphdr->protocol != 17 || (iphdr->frag_off & 0x1ffff) != 0 || in entry()
|