| /f-stack/dpdk/doc/guides/contributing/ |
| H A D | vulnerability.rst | 39 to `security@dpdk.org <https://core.dpdk.org/security#contact>`_. 43 <https://mails.dpdk.org/roster/security>`_. 46 as part of the security process. 69 The DPDK security team reviews the security vulnerability reported. 105 The security team develops a security advisory document. 170 by the security team and 183 (`security[email protected] <mailto:security[email protected]>`_), 199 OSS-security process <https://oss-security.openwall.org/wiki/mailing-lists/distros>` 243 (`security[email protected] <mailto:security[email protected]>`_), 286 The security advisory is posted [all …]
|
| /f-stack/dpdk/doc/guides/prog_guide/ |
| H A D | rte_security.rst | 9 The security library provides a framework for management and provisioning 10 of security protocol operations offloaded to hardware based devices. The 46 security action should be configured on the port. 66 relevant security protocol headers. Only the data will not be 117 security action should be configured on the port. 143 the security index and other requirement in tx descriptors. 355 are defined by the security action type, security protocol, protocol 548 security ops. This parameter can be retrieved using the APIs 568 security session which processed the packet. 579 identifying the security processing done on the packet. [all …]
|
| H A D | ipsec_lib.rst | 9 security API to provide the application with a transparent and 29 The SA level API is based on top of crypto-dev/security API and relies on 115 security device specific data with the packet 132 security device specific data with the packet 164 - security parameter index(SPI)
|
| /f-stack/dpdk/examples/ipsec-secgw/ |
| H A D | ipsec.c | 122 if (ips->security.ses == NULL) { in create_lookaside_session() 204 if (ips->security.ses == NULL) { in create_inline_session() 231 ips->security.ctx = sec_ctx; in create_inline_session() 337 (ips->security.ol_flags & in create_inline_session() 418 ips->security.ctx = sec_ctx; in create_inline_session() 563 ips->security.ses); in ipsec_enqueue() 597 if (ips->security.ol_flags & in ipsec_enqueue() 600 ips->security.ctx, ips->security.ses, in ipsec_enqueue() 610 ips->security.ses); in ipsec_enqueue() 619 if (ips->security.ol_flags & in ipsec_enqueue() [all …]
|
| H A D | meson.build | 9 deps += ['security', 'lpm', 'acl', 'hash', 'ip_frag', 'ipsec', 'eventdev']
|
| /f-stack/freebsd/contrib/openzfs/config/ |
| H A D | user-pam.m4 | 10 [install pam module in dir [[$libdir/security]]]), 11 [pammoduledir="$withval"],[pammoduledir=$libdir/security]) 20 AC_CHECK_HEADERS([security/pam_modules.h], [ 25 *** security/pam_modules.h missing, libpam0g-dev package required
|
| H A D | kernel-security-inode-init.m4 | 4 dnl # a filesystem specific callback to write security extended attributes. 10 #include <linux/security.h>
|
| /f-stack/dpdk/doc/guides/cryptodevs/ |
| H A D | nitrox.rst | 8 cryptographic operations to the NITROX V security processor. Detailed 9 information about the NITROX V security processor can be obtained here: 11 * https://www.marvell.com/security-solutions/nitrox-security-processors/nitrox-v/
|
| H A D | caam_jr.rst | 11 …nxp.com/applications/solutions/internet-of-things/secure-things/network-security-technology/crypto… 16 SEC is the SOC's security engine, which serves as NXP's latest cryptographic 35 logic block that tracks the security state of the SOC. SEC is programmed by
|
| /f-stack/dpdk/lib/librte_ipsec/ |
| H A D | ses.c | 19 if (ss->security.ses == NULL) in session_check() 24 ss->security.ctx == NULL) in session_check() 50 ss->security.ses->opaque_data = (uintptr_t)ss; in rte_ipsec_session_prepare()
|
| H A D | meson.build | 8 deps += ['mbuf', 'net', 'cryptodev', 'security', 'hash']
|
| /f-stack/freebsd/contrib/openzfs/lib/libshare/os/linux/ |
| H A D | nfs.c | 56 const char *host, const char *security, const char *access, void *cookie); 165 const char *security; member 186 udata->security = value; in foreach_nfs_host_cb() 209 udata->sharepath, host, udata->security, in foreach_nfs_host_cb() 241 udata.security = "sys"; in foreach_nfs_host() 442 const char *host, const char *security, const char *access_opts, in nfs_add_entry() argument 465 security, access_opts, linux_opts) < 0) { in nfs_add_entry()
|
| /f-stack/dpdk/app/proc-info/ |
| H A D | meson.build | 5 deps += ['ethdev', 'metrics', 'security']
|
| /f-stack/dpdk/drivers/crypto/dpaa2_sec/ |
| H A D | meson.build | 9 deps += ['security', 'mempool_dpaa2']
|
| /f-stack/dpdk/drivers/crypto/dpaa_sec/ |
| H A D | meson.build | 9 deps += ['bus_dpaa', 'mempool_dpaa', 'security']
|
| /f-stack/dpdk/app/test-crypto-perf/ |
| H A D | meson.build | 14 deps += ['cryptodev', 'net', 'security']
|
| /f-stack/dpdk/drivers/crypto/caam_jr/ |
| H A D | meson.build | 9 deps += ['bus_vdev', 'bus_dpaa', 'security']
|
| /f-stack/freebsd/contrib/device-tree/Bindings/rtc/ |
| H A D | imxdi-rtc.txt | 11 - interrupts: dryice security violation interrupt (second entry)
|
| H A D | imxdi-rtc.yaml | 22 - description: dryice security violation interrupt
|
| /f-stack/dpdk/drivers/net/ixgbe/ |
| H A D | meson.build | 23 deps += ['hash', 'security']
|
| /f-stack/dpdk/drivers/net/i40e/base/ |
| H A D | meson.build | 15 '-Wno-format', '-Wno-format-security',
|
| /f-stack/dpdk/drivers/crypto/octeontx2/ |
| H A D | meson.build | 15 deps += ['security']
|
| /f-stack/dpdk/drivers/crypto/aesni_mb/ |
| H A D | meson.build | 25 deps += ['bus_vdev', 'net', 'security']
|
| /f-stack/dpdk/drivers/crypto/qat/ |
| H A D | meson.build | 12 qat_deps += 'security'
|
| /f-stack/dpdk/drivers/net/octeontx2/ |
| H A D | meson.build | 34 deps += ['bus_pci', 'cryptodev', 'eventdev', 'security']
|