Lines Matching defs:rule
372 struct ipsec_sa *rule = NULL;
375 uint32_t *ri /*rule index*/;
394 rule = &sa_in[*ri];
395 rule->direction = RTE_SECURITY_IPSEC_SA_DIR_INGRESS;
401 rule = &sa_out[*ri];
402 rule->direction = RTE_SECURITY_IPSEC_SA_DIR_EGRESS;
411 rule->flags = 0;
412 rule->spi = atoi(tokens[1]);
413 rule->portid = UINT16_MAX;
414 ips = ipsec_get_primary_session(rule);
428 rule->flags |= IP4_TUNNEL;
431 rule->flags |= IP6_TUNNEL;
435 rule->flags |= TRANSPORT;
447 rule->flags |= SA_TELEMETRY_ENABLE;
472 rule->cipher_algo = algo->algo;
473 rule->block_size = algo->block_size;
474 rule->iv_len = algo->iv_len;
475 rule->cipher_key_len = algo->key_len;
478 if (rule->cipher_algo == RTE_CRYPTO_CIPHER_NULL) {
498 rule->cipher_key);
499 APP_CHECK(key_len == rule->cipher_key_len, status,
506 rule->salt = (uint32_t)rte_rand();
510 rule->cipher_key_len = key_len;
511 memcpy(&rule->salt,
512 &rule->cipher_key[key_len], 4);
539 rule->auth_algo = algo->algo;
540 rule->auth_key_len = algo->key_len;
541 rule->digest_len = algo->digest_len;
566 rule->auth_key);
567 APP_CHECK(key_len == rule->auth_key_len, status,
574 rule->auth_key_len = key_len;
575 rule->iv_len = algo->iv_len;
576 memcpy(&rule->salt,
577 &rule->auth_key[key_len], 4);
605 rule->aead_algo = algo->algo;
606 rule->cipher_key_len = algo->key_len;
607 rule->digest_len = algo->digest_len;
608 rule->aad_len = algo->aad_len;
609 rule->block_size = algo->block_size;
610 rule->iv_len = algo->iv_len;
627 rule->cipher_key);
628 APP_CHECK(key_len == rule->cipher_key_len, status,
634 rule->cipher_key_len = key_len;
635 memcpy(&rule->salt,
636 &rule->cipher_key[key_len], 4);
651 if (IS_IP4_TUNNEL(rule->flags)) {
661 rule->src.ip.ip4 = rte_bswap32(
663 } else if (IS_IP6_TUNNEL(rule->flags)) {
674 rule->src.ip.ip6 = ip;
675 } else if (IS_TRANSPORT(rule->flags)) {
694 if (IS_IP4_TUNNEL(rule->flags)) {
704 rule->dst.ip.ip4 = rte_bswap32(
706 } else if (IS_IP6_TUNNEL(rule->flags)) {
717 rule->dst.ip.ip6 = ip;
718 } else if (IS_TRANSPORT(rule->flags)) {
769 if (rule->portid == UINT16_MAX)
770 rule->portid = atoi(tokens[ti]);
771 else if (rule->portid != atoi(tokens[ti])) {
774 tokens[ti], rule->portid);
785 rule->mss = atoi(tokens[ti]);
792 rule->flags |= SA_REASSEMBLY_ENABLE;
800 rule->esn = atoll(tokens[ti]);
819 APP_CHECK(rule->direction ==
822 "rule");
831 fb = ipsec_get_fallback_session(rule);
842 rule->fallback_sessions = 1;
851 rule->fdir_flag = 1;
855 if (rule->portid == UINT16_MAX)
856 rule->portid = atoi(tokens[ti]);
857 else if (rule->portid != atoi(tokens[ti])) {
860 tokens[ti], rule->portid);
866 rule->fdir_qid = atoi(tokens[ti]);
868 status_p = check_flow_params(rule->portid,
869 rule->fdir_qid);
872 "not valid\n", rule->portid,
873 rule->fdir_qid);
896 rule->udp_encap = 1;
901 rule->udp_encap = 1;
902 rule->udp.sport = 0;
903 rule->udp.dport = 4500;
1170 "%s: SPI %u is not used by any SP rule\n",
1206 " IPv4 SP rule for SPI %u\n",
1222 " IPv6 SP rule for SPI %u\n",
1727 RTE_LOG(WARNING, IPSEC, "No SA Inbound rule specified\n");
1749 RTE_LOG(WARNING, IPSEC, "No SA Outbound rule "
1819 struct ipsec_sa *rule;
1837 rule = &sa_in[idx_sa];
1838 rule_type = ipsec_get_action_type(rule);
1842 && rule->portid == port_id)
1844 if (IS_HW_REASSEMBLY_EN(rule->flags)) {
1852 rule = &sa_out[idx_sa];
1853 rule_type = ipsec_get_action_type(rule);
1854 if (rule->portid == port_id) {
1864 if (rule->mss)
1870 if (rule->mss)