| /f-stack/freebsd/contrib/zstd/lib/dictBuilder/ |
| H A D | divsufsort.c | 288 for(v = SA[i], c = Td[PA[v]]; (j = 2 * i + 1) < size; SA[i] = SA[k], i = k) { in ss_fixdown() 306 if(Td[PA[SA[m / 2]]] < Td[PA[SA[m]]]) { SWAP(SA[m], SA[m / 2]); } in ss_heapsort() 310 if((size % 2) == 0) { SWAP(SA[0], SA[m]); ss_fixdown(Td, PA, SA, 0, m); } in ss_heapsort() 312 t = SA[0], SA[0] = SA[i]; in ss_heapsort() 969 if(ISAd[SA[m / 2]] < ISAd[SA[m]]) { SWAP(SA[m], SA[m / 2]); } in tr_heapsort() 973 if((size % 2) == 0) { SWAP(SA[0], SA[m]); tr_fixdown(ISAd, SA, 0, m); } in tr_heapsort() 975 t = SA[0], SA[0] = SA[i]; in tr_heapsort() 1497 PAb = SA + n - m; ISAb = SA + m; in sort_typeBstar() 1572 do { ISAb[SA[i] = ~SA[i]] = j; } while(SA[--i] < 0); in sort_typeBstar() 1722 for(i = SA, j = SA + n, orig = SA; i < j; ++i) { in construct_BWT() [all …]
|
| H A D | divsufsort.h | 46 divsufsort(const unsigned char *T, int *SA, int n, int openMP);
|
| /f-stack/dpdk/doc/guides/prog_guide/ |
| H A D | ipsec_lib.rst | 15 SA level API 18 This API operates on the IPsec Security Association (SA) level. 19 It provides functionality that allows user for given SA to process 73 - update SA replay window 105 - update SA replay window 154 SA database API 157 SA database(SAD) is a table with <key, value> pairs. 161 According to RFC4301 each SA can be uniquely identified by a key 301 printf("SA not found for key index %d\n", i); 303 printf("SA pointer is %p\n", vals[i]); [all …]
|
| H A D | rte_security.rst | 196 Security Association (SA) as part of a crypto session creation including 234 | | SADB lookup | | <------ SA maps to cryptodev session 243 +--------V--------+ | | create <-- SA is added to hw 676 example if the security session specifies an egress IPsec SA, then multiple 677 flows can be specified to that SA. In the case of an ingress IPsec SA then 686 | IPsec SA | <------ Build security flow action of 696 | NIC PMD | <------ Add/Remove SA to/from hw context 706 * Add/Delete SA flow: 707 To add a new inline SA construct a rte_flow_item for Ethernet + IP + ESP 708 using the SA selectors and the ``rte_crypto_ipsec_xform`` as the ``rte_flow_action``.
|
| H A D | rte_flow.rst | 1977 ``rte_security_session``. The SA is identified according to the IP and ESP
|
| /f-stack/freebsd/contrib/openzfs/module/icp/include/sys/ia32/ |
| H A D | stack.h | 112 #define SA(x) SA64(x) macro 121 #define SA(x) SA32(x)
|
| /f-stack/dpdk/doc/guides/sample_app_ug/ |
| H A D | ipsec_secgw.rst | 22 Associations (SA) are stored in a table and the routing is implemented 32 These modes can be selected during the SA creation configuration. 48 * Perform Inbound SA lookup for ESP packets based on their SPI. 59 * Perform Outbound SA lookup for packets that need IPsec protection. 110 * Each SA must be handle by a unique lcore (*1 RX queue per port*). 345 your SP, SA, Routing, Flow and Neighbour tables. 492 SA rule syntax 495 The successfully parsed SA rules will be stored in an array table. 497 The SA rule syntax is shown as follows: 653 the SA to be performed with look aside protocol offload to HW [all …]
|
| /f-stack/freebsd/netinet/ |
| H A D | ip_options.c | 244 #define SA struct sockaddr * in ip_dooptions() macro 245 ia = (INA)ifa_ifwithdstaddr((SA)&ipaddr, in ip_dooptions() 248 ia = (INA)ifa_ifwithnet((SA)&ipaddr, 0, in ip_dooptions() 300 if ((ia = (INA)ifa_ifwithaddr((SA)&ipaddr)) != NULL) { in ip_dooptions() 350 ia = (INA)ifaof_ifpforaddr((SA)&ipaddr, in ip_dooptions() 368 if (ifa_ifwithaddr_check((SA)&ipaddr) == 0) in ip_dooptions()
|
| /f-stack/freebsd/contrib/device-tree/Bindings/rng/ |
| H A D | ks-sa-rng.txt | 6 - ti,syscon-sa-cfg: phandle to syscon node of the SA configuration registers.
|
| /f-stack/freebsd/contrib/device-tree/Bindings/net/ |
| H A D | keystone-netcp.txt | 9 generation. NetCP can also optionally include a Security Accelerator (SA) 52 - ranges: address range of NetCP (includes, Ethernet SS, PA and SA)
|
| /f-stack/dpdk/doc/api/ |
| H A D | doxy-api-index.md | 107 [IPsec SA] (@ref rte_ipsec_sa.h),
|
| /f-stack/dpdk/drivers/bus/dpaa/include/ |
| H A D | fsl_qman.h | 627 u32 SA:7; /* must be between 64-127 */ member 633 u32 SA:7; /* must be between 64-127 */
|
| /f-stack/freebsd/contrib/ncsw/Peripherals/QM/ |
| H A D | fsl_qman.h | 596 volatile uint32_t SA:7; /* must be between 64-127 */ member
|
| /f-stack/dpdk/examples/ipsec-secgw/ |
| H A D | ep0.cfg | 68 #SA rules
|
| H A D | ep1.cfg | 65 #SA rules
|
| /f-stack/freebsd/netipsec/ |
| H A D | key_debug.c | 131 EXT_NAME(SA); in kdebug_sadb_exttype()
|
| /f-stack/freebsd/contrib/device-tree/Bindings/ |
| H A D | vendor-prefixes.yaml | 824 description: PocketBook International SA
|
| /f-stack/dpdk/doc/guides/rel_notes/ |
| H A D | release_19_11.rst | 287 * Added Security Associations (SA) Database API to ``librte_ipsec``. A new
|
| /f-stack/dpdk/doc/guides/testpmd_app_ug/ |
| H A D | testpmd_funcs.rst | 973 Configure MACsec secure association (SA)::
|