#
6738c0a9 |
| 16-Apr-2020 |
Praveen Shetty <praveen.shetty@intel.com> |
examples/ipsec-secgw: support flow director
Support load distribution in security gateway application using NIC load distribution feature (Flow Director). Flow Director is used to redirect the speci
examples/ipsec-secgw: support flow director
Support load distribution in security gateway application using NIC load distribution feature (Flow Director). Flow Director is used to redirect the specified inbound ipsec flow to a specified queue. This is achieved by extending the SA rule syntax to support specification by adding new action_type of <flow-direction> to a specified <port_id> <queue_id>.
Signed-off-by: Praveen Shetty <praveen.shetty@intel.com> Acked-by: Akhil Goyal <akhil.goyal@nxp.com>
show more ...
|
#
a8af994b |
| 07-Apr-2020 |
Anoob Joseph <anoobj@marvell.com> |
examples/ipsec-secgw: support 192/256 AES key sizes
Adding support for the following, 1. AES-192-GCM 2. AES-256-GCM 3. AES-192-CBC
Signed-off-by: Anoob Joseph <anoobj@marvell.com> Signed-off-by: Te
examples/ipsec-secgw: support 192/256 AES key sizes
Adding support for the following, 1. AES-192-GCM 2. AES-256-GCM 3. AES-192-CBC
Signed-off-by: Anoob Joseph <anoobj@marvell.com> Signed-off-by: Tejasree Kondoj <ktejasree@marvell.com> Acked-by: Akhil Goyal <akhil.goyal@nxp.com>
show more ...
|
#
6118acc2 |
| 27-Feb-2020 |
Lukasz Bartosik <lbartosik@marvell.com> |
doc: add event mode to ipsec-secgw
Document addition of event mode support to ipsec-secgw application.
Signed-off-by: Anoob Joseph <anoobj@marvell.com> Signed-off-by: Lukasz Bartosik <lbartosik@mar
doc: add event mode to ipsec-secgw
Document addition of event mode support to ipsec-secgw application.
Signed-off-by: Anoob Joseph <anoobj@marvell.com> Signed-off-by: Lukasz Bartosik <lbartosik@marvell.com> Acked-by: Konstantin Ananyev <konstantin.ananyev@intel.com> Acked-by: Akhil Goyal <akhil.goyal@nxp.com>
show more ...
|
#
2cf67788 |
| 31-Jan-2020 |
Vladimir Medvedkin <vladimir.medvedkin@intel.com> |
examples/ipsec-secgw: add SAD cache
Introduce SAD cache. Stores the most recent SA in a per lcore cache. Cache represents flat array containing SA's indexed by SPI.
Signed-off-by: Vladimir Medvedki
examples/ipsec-secgw: add SAD cache
Introduce SAD cache. Stores the most recent SA in a per lcore cache. Cache represents flat array containing SA's indexed by SPI.
Signed-off-by: Vladimir Medvedkin <vladimir.medvedkin@intel.com> Acked-by: Konstantin Ananyev <konstantin.ananyev@intel.com> Acked-by: Akhil Goyal <akhil.goyal@nxp.com> Acked-by: Anoob Joseph <anoobj@marvell.com>
show more ...
|
#
f43d3dbb |
| 12-Nov-2019 |
David Marchand <david.marchand@redhat.com> |
doc/guides: clean repeated words
Shoot repeated words in all our guides.
Cc: stable@dpdk.org
Signed-off-by: David Marchand <david.marchand@redhat.com> Acked-by: Kevin Traynor <ktraynor@redhat.com>
|
#
403e9d91 |
| 14-Oct-2019 |
Marcin Smoczynski <marcinx.smoczynski@intel.com> |
examples/ipsec-secgw: add offload fallback tests
Add tests for offload fallback feature; add inbound config modificator SGW_CFG_XPRM_IN (offload fallback setting can be set only for inbound SAs). Te
examples/ipsec-secgw: add offload fallback tests
Add tests for offload fallback feature; add inbound config modificator SGW_CFG_XPRM_IN (offload fallback setting can be set only for inbound SAs). Tests are using cryptodev for outbound SA.
To test fragmentation with QAT set: MULTI_SEG_TEST="--reassemble=4096 --cryptodev_mask=0x5555"
Signed-off-by: Marcin Smoczynski <marcinx.smoczynski@intel.com> Acked-by: Konstantin Ananyev <konstantin.ananyev@intel.com> Acked-by: Akhil Goyal <akhil.goyal@nxp.com> Tested-by: Bernard Iremonger <bernard.iremonger@intel.com>
show more ...
|
#
bba1db35 |
| 14-Oct-2019 |
Marcin Smoczynski <marcinx.smoczynski@intel.com> |
examples/ipsec-secgw: add fragment TTL option
Due to fragment loss on highly saturated links and long fragment lifetime, ipsec-secgw application quickly runs out of free reassembly buckets. As a res
examples/ipsec-secgw: add fragment TTL option
Due to fragment loss on highly saturated links and long fragment lifetime, ipsec-secgw application quickly runs out of free reassembly buckets. As a result new fragments are being dropped.
Introduce --frag-ttl option which allow user to lower default fragment lifetime which solves problem of saturated reassembly buckets with high bandwidth fragmented traffic.
Signed-off-by: Marcin Smoczynski <marcinx.smoczynski@intel.com> Acked-by: Konstantin Ananyev <konstantin.ananyev@intel.com> Acked-by: Akhil Goyal <akhil.goyal@nxp.com> Tested-by: Konstantin Ananyev <konstantin.ananyev@intel.com>
show more ...
|
#
ba66534f |
| 14-Oct-2019 |
Marcin Smoczynski <marcinx.smoczynski@intel.com> |
examples/ipsec-secgw: support fallback session
Inline processing is limited to a specified subset of traffic. It is often unable to handle more complicated situations, such as fragmented traffic. Wh
examples/ipsec-secgw: support fallback session
Inline processing is limited to a specified subset of traffic. It is often unable to handle more complicated situations, such as fragmented traffic. When using inline processing such traffic is dropped.
Introduce fallback session for inline crypto processing allowing handling packets that normally would be dropped. A fallback session is configured by adding 'fallback' keyword with 'lookaside-none' parameter to an SA configuration. Only 'inline-crypto-offload" as a primary session and 'lookaside-none' as a fall-back session combination is supported by this patch.
Fallback session feature is not available in the legacy mode.
Signed-off-by: Marcin Smoczynski <marcinx.smoczynski@intel.com> Acked-by: Konstantin Ananyev <konstantin.ananyev@intel.com> Acked-by: Akhil Goyal <akhil.goyal@nxp.com> Tested-by: Bernard Iremonger <bernard.iremonger@intel.com>
show more ...
|
#
b01d1cd2 |
| 25-Jun-2019 |
Konstantin Ananyev <konstantin.ananyev@intel.com> |
examples/ipsec-secgw: support fragmentation and reassembly
Add optional ability to fragment packet bigger then mtu, and reassemble fragmented packet. To minimize possible performance effect, reassem
examples/ipsec-secgw: support fragmentation and reassembly
Add optional ability to fragment packet bigger then mtu, and reassemble fragmented packet. To minimize possible performance effect, reassembly is implemented as RX callback. To support these features ipsec-secgw relies on librte_ipsec ability to handle multi-segment packets. Also when reassemble/fragmentation support is enabled, attached crypto devices have to support 'In Place SGL' offload capability. To enable/disable this functionality, two new optional command-line options are introduced: --reassemble <val> - number of entries in reassemble table --mtu <val> - MTU value for all attached ports As separate '--mtu' option is introduced, '-j <val>' option is now used to specify mbuf data buffer size only.
Signed-off-by: Konstantin Ananyev <konstantin.ananyev@intel.com> Acked-by: Akhil Goyal <akhil.goyal@nxp.com>
show more ...
|
#
d629b7b5 |
| 26-Apr-2019 |
John McNamara <john.mcnamara@intel.com> |
doc: fix spelling reported by aspell in guides
Fix spelling errors in the guide docs.
Signed-off-by: John McNamara <john.mcnamara@intel.com> Acked-by: Rami Rosen <ramirose@gmail.com>
|
#
02dc5b7d |
| 10-Jan-2019 |
Konstantin Ananyev <konstantin.ananyev@intel.com> |
doc: update ipsec-secgw guide and release notes
Update ipsec-secgw guide and release notes to reflect latest changes.
Signed-off-by: Bernard Iremonger <bernard.iremonger@intel.com> Signed-off-by: K
doc: update ipsec-secgw guide and release notes
Update ipsec-secgw guide and release notes to reflect latest changes.
Signed-off-by: Bernard Iremonger <bernard.iremonger@intel.com> Signed-off-by: Konstantin Ananyev <konstantin.ananyev@intel.com> Acked-by: Akhil Goyal <akhil.goyal@nxp.com>
show more ...
|
#
7622291b |
| 10-Jan-2019 |
Konstantin Ananyev <konstantin.ananyev@intel.com> |
examples/ipsec-secgw: allow to specify neighbour MAC address
In some cases it is useful to allow user to specify destination ether address for outgoing packets. This patch adds such ability by intro
examples/ipsec-secgw: allow to specify neighbour MAC address
In some cases it is useful to allow user to specify destination ether address for outgoing packets. This patch adds such ability by introducing new 'neigh' config file option.
Signed-off-by: Konstantin Ananyev <konstantin.ananyev@intel.com> Acked-by: Radu Nicolau <radu.nicolau@intel.com> Acked-by: Akhil Goyal <akhil.goyal@nxp.com>
show more ...
|
#
03128be4 |
| 10-Jan-2019 |
Konstantin Ananyev <konstantin.ananyev@intel.com> |
examples/ipsec-secgw: allow disabling some Rx/Tx offloads
Right now ipsec-secgw always enables TX offloads (DEV_TX_OFFLOAD_MULTI_SEGS, DEV_TX_OFFLOAD_SECURITY), even when they are not requested by t
examples/ipsec-secgw: allow disabling some Rx/Tx offloads
Right now ipsec-secgw always enables TX offloads (DEV_TX_OFFLOAD_MULTI_SEGS, DEV_TX_OFFLOAD_SECURITY), even when they are not requested by the config. That causes many PMD to choose full-featured TX function, which in many cases is much slower then one without offloads. That patch adds ability for the user to disable unneeded HW offloads. If DEV_TX_OFFLOAD_IPV4_CKSUM is disabled by user, then SW version of ip cksum calculation is used. That allows to use vector TX function, when inline-ipsec is not requested.
Signed-off-by: Remy Horton <remy.horton@intel.com> Signed-off-by: Konstantin Ananyev <konstantin.ananyev@intel.com> Acked-by: Radu Nicolau <radu.nicolau@intel.com> Acked-by: Akhil Goyal <akhil.goyal@nxp.com>
show more ...
|
#
1bc489ca |
| 25-Jul-2018 |
Hemant Agrawal <hemant.agrawal@nxp.com> |
examples/ipsec-secgw: support 3DES-CBC
Signed-off-by: Hemant Agrawal <hemant.agrawal@nxp.com> Acked-by: Akhil Goyal <akhil.goyal@nxp.com>
|
#
fa908884 |
| 08-Feb-2018 |
Anoob Joseph <anoob.joseph@caviumnetworks.com> |
examples/ipsec-secgw: support AES 256
Adding support for AES 256 algorithm in ipsec-secgw application
Signed-off-by: Anoob Joseph <anoob.joseph@caviumnetworks.com> Acked-by: Radu Nicolau <radu.nico
examples/ipsec-secgw: support AES 256
Adding support for AES 256 algorithm in ipsec-secgw application
Signed-off-by: Anoob Joseph <anoob.joseph@caviumnetworks.com> Acked-by: Radu Nicolau <radu.nicolau@intel.com>
show more ...
|
#
5630257f |
| 01-Feb-2018 |
Ferruh Yigit <ferruh.yigit@intel.com> |
doc: convert Intel license headers to SPDX tags
Signed-off-by: Ferruh Yigit <ferruh.yigit@intel.com> Acked-by: Bruce Richardson <bruce.richardson@intel.com>
|
#
3de3a041 |
| 12-Dec-2017 |
Anoob Joseph <anoob.joseph@caviumnetworks.com> |
examples/ipsec-secgw: fix usage of incorrect port
When security offload is enabled, the packet should be forwarded on the port configured in the SA. Security session will be configured on that port
examples/ipsec-secgw: fix usage of incorrect port
When security offload is enabled, the packet should be forwarded on the port configured in the SA. Security session will be configured on that port only, and sending the packet on other ports could result in unencrypted packets being sent out.
This would have performance improvements too, as the per packet LPM lookup would be avoided for IPsec packets, in inline mode.
Fixes: ec17993a145a ("examples/ipsec-secgw: support security offload")
Signed-off-by: Anoob Joseph <anoob.joseph@caviumnetworks.com> Acked-by: Akhil Goyal <akhil.goyal@nxp.com> Acked-by: Radu Nicolau <radu.nicolau@intel.com>
show more ...
|
#
7cacb056 |
| 25-Oct-2017 |
Herakliusz Lipiec <herakliusz.lipiec@intel.com> |
doc: add generic build instructions for sample apps
Moved duplicated, and occasionally outdated, doc sections from each of the sample app guides chapters to a common chapter at the start.
This redu
doc: add generic build instructions for sample apps
Moved duplicated, and occasionally outdated, doc sections from each of the sample app guides chapters to a common chapter at the start.
This reduces the duplication in the docs and provides a single point of reference for compiling the sample apps.
Signed-off-by: Herakliusz Lipiec <herakliusz.lipiec@intel.com> Signed-off-by: Marko Kovacevic <marko.kovacevic@intel.com>
show more ...
|
#
ec17993a |
| 25-Oct-2017 |
Akhil Goyal <akhil.goyal@nxp.com> |
examples/ipsec-secgw: support security offload
Ipsec-secgw application is modified so that it can support following type of actions for crypto operations 1. full protocol offload using crypto device
examples/ipsec-secgw: support security offload
Ipsec-secgw application is modified so that it can support following type of actions for crypto operations 1. full protocol offload using crypto devices. 2. inline ipsec using ethernet devices to perform crypto operations 3. full protocol offload using ethernet devices. 4. non protocol offload
Signed-off-by: Akhil Goyal <akhil.goyal@nxp.com> Signed-off-by: Radu Nicolau <radu.nicolau@intel.com> Signed-off-by: Boris Pismenny <borisp@mellanox.com> Signed-off-by: Declan Doherty <declan.doherty@intel.com> Signed-off-by: Aviad Yehezkel <aviadye@mellanox.com>
show more ...
|
#
bbabfe6e |
| 20-Oct-2017 |
Radu Nicolau <radu.nicolau@intel.com> |
examples/ipsec_secgw: support jumbo frames
Signed-off-by: Radu Nicolau <radu.nicolau@intel.com> Reviewed-by: Pablo de Lara <pablo.de.lara.guarch@intel.com>
|
#
30883f3e |
| 07-Jul-2017 |
Pablo de Lara <pablo.de.lara.guarch@intel.com> |
doc: use new crypto driver names
Crypto driver names were changed in 16.11, but some guides were still using the old ones (which are still valid, only kept for compatibility reasons).
To keep consi
doc: use new crypto driver names
Crypto driver names were changed in 16.11, but some guides were still using the old ones (which are still valid, only kept for compatibility reasons).
To keep consistency and avoid confusion, all guides should be using the same driver names.
Signed-off-by: Pablo de Lara <pablo.de.lara.guarch@intel.com>
show more ...
|
#
b79e4c00 |
| 02-Jul-2017 |
Pablo de Lara <pablo.de.lara.guarch@intel.com> |
cryptodev: use AES-GCM/CCM as AEAD algorithms
Now that all the structures/functions for AEAD algorithms are in place, migrate the two supported algorithms AES-GCM and AES-CCM to these, instead of us
cryptodev: use AES-GCM/CCM as AEAD algorithms
Now that all the structures/functions for AEAD algorithms are in place, migrate the two supported algorithms AES-GCM and AES-CCM to these, instead of using cipher and authentication parameters.
Signed-off-by: Pablo de Lara <pablo.de.lara.guarch@intel.com> Acked-by: Declan Doherty <declan.doherty@intel.com> Acked-by: Akhil Goyal <akhil.goyal@nxp.com> Acked-by: Fiona Trahe <fiona.trahe@intel.com>
show more ...
|
#
501e9c22 |
| 02-Jul-2017 |
Pablo de Lara <pablo.de.lara.guarch@intel.com> |
examples/ipsec-secgw: add AEAD parameters
Since there is a new operation type (AEAD), add parameters for this in the application.
Signed-off-by: Pablo de Lara <pablo.de.lara.guarch@intel.com> Acked
examples/ipsec-secgw: add AEAD parameters
Since there is a new operation type (AEAD), add parameters for this in the application.
Signed-off-by: Pablo de Lara <pablo.de.lara.guarch@intel.com> Acked-by: Declan Doherty <declan.doherty@intel.com> Acked-by: Akhil Goyal <akhil.goyal@nxp.com> Acked-by: Fiona Trahe <fiona.trahe@intel.com>
show more ...
|
#
4470c22d |
| 29-Sep-2016 |
Sergio Gonzalez Monroy <sergio.gonzalez.monroy@intel.com> |
examples/ipsec-secgw: add AES-CTR
RFC3686: Using AES Counter (CTR) Mode With IPsec ESP.`
Signed-off-by: Sergio Gonzalez Monroy <sergio.gonzalez.monroy@intel.com> Acked-by: Pablo de Lara <pablo.de.l
examples/ipsec-secgw: add AES-CTR
RFC3686: Using AES Counter (CTR) Mode With IPsec ESP.`
Signed-off-by: Sergio Gonzalez Monroy <sergio.gonzalez.monroy@intel.com> Acked-by: Pablo de Lara <pablo.de.lara.guarch@intel.com>
show more ...
|
#
a9121c40 |
| 29-Sep-2016 |
Sergio Gonzalez Monroy <sergio.gonzalez.monroy@intel.com> |
examples/ipsec-secgw: add AES-GCM
Add support for AES-GCM (Galois-Counter Mode).
RFC4106: The Use of Galois-Counter Mode (GCM) in IPSec ESP.
Signed-off-by: Sergio Gonzalez Monroy <sergio.gonzalez.
examples/ipsec-secgw: add AES-GCM
Add support for AES-GCM (Galois-Counter Mode).
RFC4106: The Use of Galois-Counter Mode (GCM) in IPSec ESP.
Signed-off-by: Sergio Gonzalez Monroy <sergio.gonzalez.monroy@intel.com> Acked-by: Pablo de Lara <pablo.de.lara.guarch@intel.com>
show more ...
|