| /dpdk/app/test/ |
| H A D | test_thash.c | 114 union rte_thash_tuple tuple; in test_toeplitz_hash_calc() local 180 union rte_thash_tuple tuple; in test_toeplitz_hash_gfni() local 303 union rte_thash_tuple tuple[2]; in test_toeplitz_hash_gfni_bulk() local 584 union rte_thash_tuple tuple; in test_predictable_rss_min_seq() local 605 tuple.v4.sport = 0; in test_predictable_rss_min_seq() 607 tuple.v4.dport = 0; in test_predictable_rss_min_seq() 608 tuple.v4.sctp_tag = rte_be_to_cpu_32(tuple.v4.sctp_tag); in test_predictable_rss_min_seq() 614 tuple.v4.sctp_tag = rte_cpu_to_be_32(tuple.v4.sctp_tag); in test_predictable_rss_min_seq() 616 tuple.v4.sctp_tag = rte_be_to_cpu_32(tuple.v4.sctp_tag); in test_predictable_rss_min_seq() 736 uint8_t tuple[TUPLE_SZ]; in test_adjust_tuple() local [all …]
|
| H A D | test_ipsec_sad.c | 162 status = rte_ipsec_sad_add(NULL, tuple, in __test_add_invalid() 184 status = rte_ipsec_sad_add(sad, tuple, in __test_add_invalid() 190 status = rte_ipsec_sad_add(sad, tuple, in __test_add_invalid() 196 status = rte_ipsec_sad_add(sad, tuple, in __test_add_invalid() 384 key_arr[0] = tuple; in __test_lookup_basic() 459 status = rte_ipsec_sad_add(sad, tuple, in __test_lookup_adv() 479 status = rte_ipsec_sad_add(sad, tuple, in __test_lookup_adv() 499 status = rte_ipsec_sad_add(sad, tuple, in __test_lookup_adv() 519 status = rte_ipsec_sad_add(sad, tuple, in __test_lookup_adv() 523 status = rte_ipsec_sad_add(sad, tuple, in __test_lookup_adv() [all …]
|
| /dpdk/app/test-sad/ |
| H A D | main.c | 87 union rte_ipsec_sad_key tuple; member 192 &tbl[j].tuple.v6.dip); in parse_file() 195 &tbl[j].tuple.v4.dip); in parse_file() 200 &tbl[j].tuple.v6.sip); in parse_file() 203 &tbl[j].tuple.v4.sip); in parse_file() 271 tbl[i].tuple.v4.spi = in get_random_rules() 276 tbl[i].tuple.v6.dip[j] = in get_random_rules() 499 v4 = &rule->tuple.v4; in print_result() 500 v6 = &rule->tuple.v6; in print_result() 565 &rules_tbl[i].tuple, in add_rules() [all …]
|
| /dpdk/doc/guides/prog_guide/ |
| H A D | toeplitz_hash_lib.rst | 32 * A length of this tuple counted in double words. 52 * A pointer to the tuple. 53 * A length of the tuple in bytes. 58 * A length of the longest tuple in bytes. 79 LSB's as the hash from the original tuple. 188 Adjust tuple API 199 * A pointer to the tuple to be changed. 201 * The length of the tuple. 292 union rte_thash_tuple tuple, rev_tuple; 294 /* A complete tuple from the packet. */ [all …]
|
| H A D | flow_classify_lib.rst | 10 The initial implementation supports counting of IPv4 5-tuple packets which match 271 another table could be added for the IPv6 5-tuple rule. 276 The library currently supports three IPv4 5-tuple flow patterns, for UDP, TCP 281 /* Pattern for IPv4 5-tuple UDP filter */ 289 /* Pattern for IPv4 5-tuple TCP filter */ 297 /* Pattern for IPv4 5-tuple SCTP filter */ 306 IPv4 5-tuple pattern, attributes and actions and returns the 5-tuple data in the 326 The 5-tuple ACL key data is obtained from the ``rte_eth_ntuple_filter`` 383 /** IPv4 5-tuple data */ 411 /** count of packets that match IPv4 5tuple pattern */ [all …]
|
| H A D | packet_classif_access_ctrl.rst | 10 The ACL library is used to perform an N-tuple search over a set of rules with multiple categories 78 For example, to define classification for the following IPv4 5-tuple structure: 143 A typical example of such an IPv4 5-tuple rule is a follows: 212 A typical example of such an IPv6 2-tuple rule is a follows: 280 A typical example of such an IPv4 4-tuple rule is as follows: 294 Note that if the input tuple matches more than one rule and these rules have equal priority, 312 …When the search is performed for an input tuple, all fields in that tuple must be in network byte … 409 The following example demonstrates IPv4, 5-tuple classification for rules defined above 513 For a tuple with source IP address: 10.1.1.1 and destination IP address: 192.168.1.15, 537 For a tuple with source IP address: 192.168.1.1 and destination IP address: 192.168.2.11, [all …]
|
| H A D | ipsec_lib.rst | 202 The key type reflects a set of tuple fields that will be used for lookup of the SA. 250 Library provides lookup by the given {SPI,DIP,SIP} tuple of 262 where v4 is a tuple for IPv4: 272 and v6 is a tuple for IPv6:
|
| /dpdk/lib/hash/ |
| H A D | rte_thash_x86_gfni.h | 67 __rte_thash_gfni(const uint64_t *mtrx, const uint8_t *tuple, in __rte_thash_gfni() argument 96 for (; len > 0; len -= 64, tuple += 64) { in __rte_thash_gfni() 103 tuple_bytes = _mm512_maskz_loadu_epi8(load_mask, tuple); in __rte_thash_gfni() 177 rte_thash_gfni(const uint64_t *m, const uint8_t *tuple, int len) in rte_thash_gfni() argument 181 __m512i xor_acc = __rte_thash_gfni(m, tuple, NULL, len); in rte_thash_gfni() 209 rte_thash_gfni_bulk(const uint64_t *mtrx, int len, uint8_t *tuple[], in rte_thash_gfni_bulk() argument 217 xor_acc = __rte_thash_gfni(mtrx, tuple[i], tuple[i + 1], len); in rte_thash_gfni_bulk() 222 xor_acc = __rte_thash_gfni(mtrx, tuple[i], NULL, len); in rte_thash_gfni_bulk()
|
| H A D | rte_thash.c | 762 uint8_t *tuple, unsigned int tuple_len, in rte_thash_adjust_tuple() argument 774 if ((ctx == NULL) || (h == NULL) || (tuple == NULL) || in rte_thash_adjust_tuple() 784 hash = rte_thash_gfni(ctx->matrices, tuple, tuple_len); in rte_thash_adjust_tuple() 789 *(uint32_t *)&tuple[j * 4]); in rte_thash_adjust_tuple() 801 tmp = read_unaligned_bits(tuple, ctx->reta_sz_log, offset); in rte_thash_adjust_tuple() 803 write_unaligned_bits(tuple, ctx->reta_sz_log, offset, tmp); in rte_thash_adjust_tuple() 806 ret = (fn(userdata, tuple)) ? 0 : -EEXIST; in rte_thash_adjust_tuple() 814 tmp = read_unaligned_bits(tuple, tmp_len, in rte_thash_adjust_tuple() 818 write_unaligned_bits(tuple, tmp_len, offset, in rte_thash_adjust_tuple()
|
| H A D | rte_thash.h | 458 typedef int (*rte_thash_check_tuple_t)(void *userdata, uint8_t *tuple); 493 uint8_t *tuple, unsigned int tuple_len,
|
| H A D | rte_thash_gfni.h | 71 int len __rte_unused, uint8_t *tuple[] __rte_unused, in rte_thash_gfni_bulk()
|
| /dpdk/drivers/net/qede/ |
| H A D | qede_filter.c | 351 switch (arfs->tuple.eth_proto) { in qede_arfs_construct_pkt() 358 ip->dst_addr = arfs->tuple.dst_ipv4; in qede_arfs_construct_pkt() 359 ip->src_addr = arfs->tuple.src_ipv4; in qede_arfs_construct_pkt() 387 ip6->proto = arfs->tuple.ip_proto; in qede_arfs_construct_pkt() 417 arfs->tuple.eth_proto); in qede_arfs_construct_pkt() 812 flow->entry.tuple.eth_proto = in qede_flow_parse_pattern() 830 flow->entry.tuple.eth_proto = in qede_flow_parse_pattern() 842 flow->entry.tuple.src_port = in qede_flow_parse_pattern() 844 flow->entry.tuple.dst_port = in qede_flow_parse_pattern() 857 flow->entry.tuple.src_port = in qede_flow_parse_pattern() [all …]
|
| H A D | qede_ethdev.h | 192 struct qede_arfs_tuple tuple; member
|
| /dpdk/drivers/net/igc/ |
| H A D | igc_filter.h | 25 const struct igc_ntuple_filter *tuple); 27 const struct igc_ntuple_filter *tuple);
|
| /dpdk/drivers/net/hns3/ |
| H A D | hns3_fdir.c | 491 static void hns3_fd_convert_int16(uint32_t tuple, struct hns3_fdir_rule *rule, in hns3_fd_convert_int16() argument 499 switch (tuple) { in hns3_fd_convert_int16() 555 uint32_t tuple, uint8_t *key_x, in hns3_fd_convert_tuple() argument 562 if ((rule->input_set & BIT(tuple)) == 0) in hns3_fd_convert_tuple() 566 switch (tuple) { in hns3_fd_convert_tuple() 583 hns3_fd_convert_int16(tuple, rule, key_x, key_y); in hns3_fd_convert_tuple() 633 hns3_warn(hw, "not support tuple of (%u)", tuple); in hns3_fd_convert_tuple()
|
| /dpdk/doc/guides/sample_app_ug/ |
| H A D | l3_forward_access_ctrl.rst | 41 The application implements packet classification for the IPv4/IPv6 5-tuple syntax specifically. 42 The 5-tuple syntax consist of a source IP address, a destination IP address, 44 The fields in the 5-tuple syntax have the following formats: 78 * 5-tuple field: This field has a format described in Section. 214 …* Lookup: Checks that the packet type is supported (IPv4/IPv6) and performs a 5-tuple lookup ove… 325 For each supported AC rule format (IPv4 5-tuple, IPv6 6-tuple) application creates a separate conte…
|
| H A D | flow_classify.rst | 63 ACL field definitions for the IPv4 5 tuple rule 139 :start-after: Read file of IPv4 tuple rules. 8< 140 :end-before: >8 End of reading file of IPv4 5 tuple rules.
|
| H A D | l3_forward.rst | 31 The hash lookup key is represented by a DiffServ 5-tuple composed of the following fields read from… 278 and then generate the expected 5-tuple as key to keep consistence with those of real flow
|
| /dpdk/examples/pipeline/examples/ |
| H A D | selector.spec | 20 ; within the flow, with the flow defined by the selector n-tuple fields. 24 ; address and the selector n-tuple is represented by the Protocol, the source IP address and the
|
| H A D | fib.spec | 15 ; typical 3-tuple) by always selecting the same next hop for packets that are part of the same flow.
|
| /dpdk/doc/guides/nics/ |
| H A D | igc.rst | 74 - 2-tuple filter(destination L4 protocol and destination L4 port)
|
| H A D | af_xdp.rst | 105 The context refers to the netdev,qid tuple.
|
| H A D | cxgbe.rst | 26 For 4-tuple, enabling 'RSS on TCP' and 'RSS on TCP + UDP' is supported. 133 Apart from the 4-tuple (IP src/dst addresses and TCP/UDP src/dst port
|
| /dpdk/buildtools/ |
| H A D | pmdinfogen.py | 42 version = tuple(int(c) for c in elftools.__version__.split("."))
|
| /dpdk/lib/eventdev/ |
| H A D | rte_event_eth_rx_adapter.c | 736 void *tuple; in rxa_do_softrss() local 747 tuple = &ipv4_tuple; in rxa_do_softrss() 752 tuple = &ipv6_tuple; in rxa_do_softrss() 757 return rte_softrss_be(tuple, input_len, rss_key_be); in rxa_do_softrss()
|