| /f-stack/dpdk/examples/ipsec-secgw/test/ |
| H A D | tun_aesgcm_common_defs.sh | 32 aead_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \ 36 aead_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \ 41 aead_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \ 45 aead_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \ 88 aead_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \ 92 aead_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \ 97 aead_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \ 101 aead_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \
|
| H A D | trs_aesgcm_common_defs.sh | 32 aead_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \ 36 aead_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \ 41 aead_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \ 45 aead_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \
|
| /f-stack/dpdk/app/test-crypto-perf/ |
| H A D | cperf_test_vector_parsing.c | 91 if (test_vector->aead_key.data) { in show_test_vector() 93 for (i = 0; i < test_vector->aead_key.length; ++i) { in show_test_vector() 96 if (i == (uint32_t)(test_vector->aead_key.length - 1)) in show_test_vector() 97 printf("0x%02x", test_vector->aead_key.data[i]); in show_test_vector() 100 test_vector->aead_key.data[i]); in show_test_vector() 348 rte_free(vector->aead_key.data); in parse_entry() 349 vector->aead_key.data = data; in parse_entry() 351 vector->aead_key.length = data_length; in parse_entry() 358 vector->aead_key.length = opts->aead_key_sz; in parse_entry()
|
| H A D | cperf_test_vectors.c | 393 uint8_t aead_key[] = { variable 547 t_vec->aead_key.length = options->aead_key_sz; in cperf_test_vector_get_dummy() 548 t_vec->aead_key.data = aead_key; in cperf_test_vector_get_dummy()
|
| H A D | cperf_test_vectors.h | 29 } aead_key; member
|
| H A D | main.c | 485 if (test_vec->aead_key.data == NULL) in cperf_check_test_vector() 487 if (test_vec->aead_key.length != opts->aead_key_sz) in cperf_check_test_vector()
|
| H A D | cperf_ops.c | 798 test_vector->aead_key.data; in cperf_create_session() 800 test_vector->aead_key.length; in cperf_create_session()
|
| /f-stack/dpdk/examples/ip_pipeline/examples/ |
| H A D | flow_crypto.cli | 53 …0.0.10 action fwd port 0 sym_crypto encrypt type aead aead_algo aes-gcm aead_key 00010203040506070… 55 …0.0.10 action fwd port 0 sym_crypto decrypt type aead aead_algo aes-gcm aead_key 00010203040506070…
|
| /f-stack/dpdk/drivers/crypto/mvsam/ |
| H A D | rte_mrvl_pmd.c | 339 uint8_t *aead_key; in mrvl_crypto_set_aead_session_parameters() local 373 aead_key = malloc(aead_xform->aead.key.length); in mrvl_crypto_set_aead_session_parameters() 374 if (aead_key == NULL) { in mrvl_crypto_set_aead_session_parameters() 379 memcpy(aead_key, aead_xform->aead.key.data, in mrvl_crypto_set_aead_session_parameters() 382 sess->sam_sess_params.cipher_key = aead_key; in mrvl_crypto_set_aead_session_parameters()
|
| /f-stack/dpdk/drivers/crypto/dpaa_sec/ |
| H A D | dpaa_sec.c | 525 alginfo.key = (size_t)ses->aead_key.data; in dpaa_sec_prep_cdb() 526 alginfo.keylen = ses->aead_key.length; in dpaa_sec_prep_cdb() 529 alginfo.algtype = ses->aead_key.alg; in dpaa_sec_prep_cdb() 530 alginfo.algmode = ses->aead_key.algmode; in dpaa_sec_prep_cdb() 2248 session->aead_key.alg = OP_ALG_ALGSEL_AES; in dpaa_sec_aead_init() 2249 session->aead_key.algmode = OP_ALG_AAI_GCM; in dpaa_sec_aead_init() 2326 rte_free(s->aead_key.data); in free_session_data() 2520 session->aead_key.alg = OP_PCL_IPSEC_AES_GCM8; in dpaa_sec_ipsec_aead_init() 2523 session->aead_key.alg = OP_PCL_IPSEC_AES_GCM12; in dpaa_sec_ipsec_aead_init() 2526 session->aead_key.alg = OP_PCL_IPSEC_AES_GCM16; in dpaa_sec_ipsec_aead_init() [all …]
|
| H A D | dpaa_sec.h | 138 } aead_key; member
|
| /f-stack/dpdk/drivers/crypto/caam_jr/ |
| H A D | caam_jr_pvt.h | 121 } aead_key; member
|
| H A D | caam_jr.c | 362 alginfo.key = (size_t)ses->aead_key.data; in caam_jr_prep_cdb() 363 alginfo.keylen = ses->aead_key.length; in caam_jr_prep_cdb() 1606 session->aead_key.data = rte_zmalloc(NULL, xform->aead.key.length, in caam_jr_aead_init() 1608 if (session->aead_key.data == NULL && xform->aead.key.length > 0) { in caam_jr_aead_init() 1612 session->aead_key.length = xform->aead.key.length; in caam_jr_aead_init() 1615 memcpy(session->aead_key.data, xform->aead.key.data, in caam_jr_aead_init()
|
| /f-stack/dpdk/drivers/crypto/dpaa2_sec/ |
| H A D | dpaa2_sec_dpseci.c | 2210 session->aead_key.data = rte_zmalloc(NULL, aead_xform->key.length, in dpaa2_sec_aead_init() 2217 memcpy(session->aead_key.data, aead_xform->key.data, in dpaa2_sec_aead_init() 2221 session->aead_key.length = aead_xform->key.length; in dpaa2_sec_aead_init() 2224 aeaddata.key = (size_t)session->aead_key.data; in dpaa2_sec_aead_init() 2225 aeaddata.keylen = session->aead_key.length; in dpaa2_sec_aead_init() 2296 rte_free(session->aead_key.data); in dpaa2_sec_aead_init() 2610 session->aead_key.data = rte_zmalloc(NULL, aead_xform->key.length, in dpaa2_sec_ipsec_aead_init() 2616 memcpy(session->aead_key.data, aead_xform->key.data, in dpaa2_sec_ipsec_aead_init() 2620 session->aead_key.length = aead_xform->key.length; in dpaa2_sec_ipsec_aead_init() 2622 aeaddata->key = (size_t)session->aead_key.data; in dpaa2_sec_ipsec_aead_init() [all …]
|
| H A D | dpaa2_sec_priv.h | 172 } aead_key; member
|
| /f-stack/dpdk/doc/guides/sample_app_ug/ |
| H A D | l2_forward_crypto.rst | 48 [--aead_algo ALGO] [--aead_op ENCRYPT/DECRYPT] [--aead_key KEY] / 124 * aead_key: set the AEAD key to be used. Bytes has to be separated with ":" 130 Note that if --aead_key is used, this will be ignored.
|
| H A D | ipsec_secgw.rst | 597 ``<aead_key>`` 609 For example: *aead_key A1:B2:C3:D4:A1:B2:C3:D4:A1:B2:C3:D4: 728 aead_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \ 737 aead_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \
|
| H A D | ip_pipeline.rst | 498 aead_algo <algo> aead_key <key> aead_iv <iv> aead_aad <aad>
|
| /f-stack/dpdk/examples/l2fwd-crypto/ |
| H A D | main.c | 157 uint8_t aead_key[MAX_KEY_SIZE]; member 1300 parse_bytes(options->aead_key, optarg, MAX_KEY_SIZE); in l2fwd_crypto_parse_args_long_options() 2359 generate_random_key(options->aead_key, in initialize_cryptodevs() 2642 options->aead_xform.aead.key.data = options->aead_key; in reserve_key_memory()
|
| /f-stack/dpdk/app/test/ |
| H A D | test_cryptodev.c | 7384 uint8_t aead_key[key_len]; in create_aead_session() local 7389 memcpy(aead_key, key, key_len); in create_aead_session() 7396 ut_params->aead_xform.aead.key.data = aead_key; in create_aead_session()
|