| /dpdk/doc/guides/contributing/ |
| H A D | vulnerability.rst | 39 to `security@dpdk.org <https://core.dpdk.org/security#contact>`_. 43 <https://mails.dpdk.org/roster/security>`_. 46 as part of the security process. 69 The DPDK security team reviews the security vulnerability reported. 105 The security team develops a security advisory document. 170 by the security team and 183 (`security[email protected] <mailto:security[email protected]>`_), 199 OSS-security process <https://oss-security.openwall.org/wiki/mailing-lists/distros>` 243 (`security[email protected] <mailto:security[email protected]>`_), 286 The security advisory is posted [all …]
|
| /dpdk/doc/guides/prog_guide/ |
| H A D | rte_security.rst | 46 security action should be configured on the port. 117 security action should be configured on the port. 143 the security index and other requirement in tx descriptors. 355 are defined by the security action type, security protocol, protocol 577 security session which processed the packet. 624 /**< No security actions */ 742 --> /security/cryptodev/list 743 {"/security/cryptodev/list": [0, 1, 2, 3]} 745 #. Get the security capabilities of a Crypto device:: 747 --> /security/cryptodev/sec_caps,0 [all …]
|
| H A D | ipsec_lib.rst | 9 security API to provide the application with a transparent and 29 The SA level API is based on top of crypto-dev/security API and relies on 115 security device specific data with the packet 132 security device specific data with the packet 164 - security parameter index(SPI)
|
| /dpdk/examples/ipsec-secgw/ |
| H A D | ipsec.c | 122 if (ips->security.ses == NULL) { in create_lookaside_session() 256 if (ips->security.ses == NULL) { in create_inline_session() 283 ips->security.ctx = sec_ctx; in create_inline_session() 408 (ips->security.ol_flags & in create_inline_session() 489 ips->security.ctx = sec_ctx; in create_inline_session() 643 ips->security.ses); in ipsec_enqueue() 677 if (ips->security.ol_flags & in ipsec_enqueue() 680 ips->security.ctx, ips->security.ses, in ipsec_enqueue() 690 ips->security.ses); in ipsec_enqueue() 699 if (ips->security.ol_flags & in ipsec_enqueue() [all …]
|
| H A D | ipsec_worker.c | 128 data[sa->portid].sess = pri_sess->security.ses; in prepare_out_sessions_tbl() 129 data[sa->portid].ctx = pri_sess->security.ctx; in prepare_out_sessions_tbl() 459 rte_security_set_pkt_metadata(sess->security.ctx, in process_ipsec_ev_outbound() 460 sess->security.ses, pkt, NULL); in process_ipsec_ev_outbound() 545 rte_security_set_pkt_metadata(sess->security.ctx, in ipsec_ev_route_pkts() 546 sess->security.ses, pkt, NULL); in ipsec_ev_route_pkts()
|
| H A D | meson.build | 9 deps += ['security', 'lpm', 'acl', 'hash', 'ip_frag', 'ipsec', 'eventdev', 'telemetry']
|
| H A D | esp.c | 177 ips->security.ol_flags & RTE_SECURITY_RX_HW_TRAILER_OFFLOAD) { in esp_inbound_post() 288 !(ips->security.ol_flags & in esp_outbound() 355 if (ips->security.ol_flags & in esp_outbound()
|
| /dpdk/doc/guides/cryptodevs/ |
| H A D | nitrox.rst | 8 cryptographic operations to the NITROX V security processor. Detailed 9 information about the NITROX V security processor can be obtained here: 11 * https://www.marvell.com/security-solutions/nitrox-security-processors/nitrox-v/
|
| H A D | caam_jr.rst | 11 …nxp.com/applications/solutions/internet-of-things/secure-things/network-security-technology/crypto… 16 SEC is the SOC's security engine, which serves as NXP's latest cryptographic 35 logic block that tracks the security state of the SOC. SEC is programmed by
|
| H A D | dpaa_sec.rst | 15 SEC is the SOC's security engine, which serves as NXP's latest cryptographic 37 logic block that tracks the security state of the SOC. SEC is programmed by
|
| /dpdk/lib/ipsec/ |
| H A D | ses.c | 19 if (ss->security.ses == NULL) in session_check() 24 ss->security.ctx == NULL) in session_check() 50 ss->security.ses->opaque_data = (uintptr_t)ss; in rte_ipsec_session_prepare()
|
| H A D | meson.build | 17 deps += ['mbuf', 'net', 'cryptodev', 'security', 'hash', 'telemetry']
|
| H A D | rte_ipsec.h | 76 } security; member
|
| /dpdk/app/proc-info/ |
| H A D | meson.build | 11 deps += ['ethdev', 'security']
|
| /dpdk/drivers/crypto/dpaa2_sec/ |
| H A D | meson.build | 9 deps += ['security', 'mempool_dpaa2']
|
| /dpdk/drivers/crypto/dpaa_sec/ |
| H A D | meson.build | 9 deps += ['bus_dpaa', 'mempool_dpaa', 'security']
|
| /dpdk/drivers/crypto/caam_jr/ |
| H A D | meson.build | 9 deps += ['bus_vdev', 'bus_dpaa', 'security']
|
| /dpdk/app/test-crypto-perf/ |
| H A D | meson.build | 22 deps += ['cryptodev', 'net', 'security']
|
| /dpdk/drivers/crypto/mvsam/ |
| H A D | meson.build | 23 deps += ['bus_vdev', 'common_mvep', 'security']
|
| /dpdk/drivers/net/txgbe/ |
| H A D | meson.build | 25 deps += ['hash', 'security']
|
| /dpdk/drivers/crypto/cnxk/ |
| H A D | meson.build | 25 deps += ['bus_pci', 'common_cnxk', 'security', 'eventdev']
|
| /dpdk/drivers/net/ixgbe/ |
| H A D | meson.build | 23 deps += ['hash', 'security']
|
| /dpdk/drivers/net/i40e/base/ |
| H A D | meson.build | 15 '-Wno-format', '-Wno-format-security',
|
| /dpdk/doc/guides/rel_notes/ |
| H A D | release_21_11.rst | 251 * **Added telemetry to security library.** 253 Added telemetry callback functions to query security capabilities of 516 the crypto/security operation. This field will be used to communicate 571 routines used by inline outbound and inline inbound security processing were 576 * security: A new option ``iv_gen_disable`` was added in structure 580 * security: A new option ``tunnel_hdr_verify`` was added in structure 584 * security: A new option ``udp_ports_verify`` was added in structure 588 * security: A new structure ``rte_security_ipsec_lifetime`` was added to 596 security device. 598 * security: A new structure ``esn`` was added in structure [all …]
|
| /dpdk/drivers/crypto/ipsec_mb/ |
| H A D | meson.build | 39 deps += ['bus_vdev', 'net', 'security']
|