| #
17344c02 |
| 14-Oct-2021 |
Radu Nicolau <radu.nicolau@intel.com> |
security: add UDP parameters for IPsec NAT-T
Add support for specifying UDP port params for UDP encapsulation option. RFC3948 section-2.1 does not enforce using specific the UDP ports for UDP-Encaps
security: add UDP parameters for IPsec NAT-T
Add support for specifying UDP port params for UDP encapsulation option. RFC3948 section-2.1 does not enforce using specific the UDP ports for UDP-Encapsulated ESP Header
Signed-off-by: Declan Doherty <declan.doherty@intel.com> Signed-off-by: Radu Nicolau <radu.nicolau@intel.com> Signed-off-by: Abhijit Sinha <abhijit.sinha@intel.com> Signed-off-by: Daniel Martin Buckley <daniel.m.buckley@intel.com> Acked-by: Fan Zhang <roy.fan.zhang@intel.com> Acked-by: Anoob Joseph <anoobj@marvell.com> Acked-by: Konstantin Ananyev <konstantin.ananyev@intel.com> Acked-by: Akhil Goyal <gakhil@marvell.com>
show more ...
|
| #
199fcba1 |
| 14-Oct-2021 |
Radu Nicolau <radu.nicolau@intel.com> |
security: add ESN field to IPsec xform
Update ipsec_xform definition to include ESN field. This allows the application to control the ESN starting value.
Signed-off-by: Declan Doherty <declan.doher
security: add ESN field to IPsec xform
Update ipsec_xform definition to include ESN field. This allows the application to control the ESN starting value.
Signed-off-by: Declan Doherty <declan.doherty@intel.com> Signed-off-by: Radu Nicolau <radu.nicolau@intel.com> Signed-off-by: Abhijit Sinha <abhijit.sinha@intel.com> Signed-off-by: Daniel Martin Buckley <daniel.m.buckley@intel.com> Acked-by: Fan Zhang <roy.fan.zhang@intel.com> Acked-by: Anoob Joseph <anoobj@marvell.com> Acked-by: Konstantin Ananyev <konstantin.ananyev@intel.com> Acked-by: Akhil Goyal <gakhil@marvell.com>
show more ...
|
| #
03ab51ea |
| 30-Sep-2021 |
Archana Muniganti <marchana@marvell.com> |
security: add SA config option for inner checksum
Add inner packet IPv4 hdr and L4 checksum enable options in conf. These will be used in case of protocol offload. Per SA, application could specify
security: add SA config option for inner checksum
Add inner packet IPv4 hdr and L4 checksum enable options in conf. These will be used in case of protocol offload. Per SA, application could specify whether the checksum(compute/verify) can be offloaded to security device.
Signed-off-by: Archana Muniganti <marchana@marvell.com> Acked-by: Konstantin Ananyev <konstantin.ananyev@intel.com> Acked-by: Akhil Goyal <gakhil@marvell.com>
show more ...
|
| #
f7e3aa69 |
| 29-Sep-2021 |
Tejasree Kondoj <ktejasree@marvell.com> |
security: add option to configure UDP ports verification
Add option to indicate whether UDP encapsulation ports verification need to be done as part of inbound IPsec processing.
Signed-off-by: Teja
security: add option to configure UDP ports verification
Add option to indicate whether UDP encapsulation ports verification need to be done as part of inbound IPsec processing.
Signed-off-by: Tejasree Kondoj <ktejasree@marvell.com> Acked-by: Hemant Agrawal <hemant.agrawal@nxp.com> Acked-by: Akhil Goyal <gakhil@marvell.com>
show more ...
|
| #
f9b2a75e |
| 06-Oct-2021 |
Tal Shnaiderman <talshn@nvidia.com> |
security: use net library to include IP structs
Remove the netinet includes and replaces them with rte_ip.h to support the in_addr/in6_addr structs on all operating systems.
Signed-off-by: Tal Shna
security: use net library to include IP structs
Remove the netinet includes and replaces them with rte_ip.h to support the in_addr/in6_addr structs on all operating systems.
Signed-off-by: Tal Shnaiderman <talshn@nvidia.com> Acked-by: Akhil Goyal <gakhil@marvell.com> Acked-by: William Tu <u9012063@gmail.com>
show more ...
|
| #
f0b538a5 |
| 28-Sep-2021 |
Tejasree Kondoj <ktejasree@marvell.com> |
security: add option to configure tunnel header verification
Add option to indicate whether outer header verification need to be done as part of inbound IPsec processing.
With inline IPsec processi
security: add option to configure tunnel header verification
Add option to indicate whether outer header verification need to be done as part of inbound IPsec processing.
With inline IPsec processing, SA lookup would be happening in the Rx path of rte_ethdev. When rte_flow is configured to support more than one SA, SPI would be used to lookup SA. In such cases, additional verification would be required to ensure duplicate SPIs are not getting processed in the inline path.
For lookaside cases, the same option can be used by application to offload tunnel verification to the PMD.
These verifications would help in averting possible DoS attacks.
Signed-off-by: Tejasree Kondoj <ktejasree@marvell.com> Acked-by: Hemant Agrawal <hemant.agrawal@nxp.com> Acked-by: Akhil Goyal <gakhil@marvell.com>
show more ...
|
| #
ad7515a3 |
| 28-Sep-2021 |
Anoob Joseph <anoobj@marvell.com> |
security: add SA lifetime configuration
Add SA lifetime configuration to register soft and hard expiry limits. Expiry can be in units of number of packets or bytes. Crypto op status is also updated
security: add SA lifetime configuration
Add SA lifetime configuration to register soft and hard expiry limits. Expiry can be in units of number of packets or bytes. Crypto op status is also updated to include new field, aux_flags, which can be used to indicate cases such as soft expiry in case of lookaside protocol operations.
In case of soft expiry, the packets are successfully IPsec processed but the soft expiry would indicate that SA needs to be reconfigured. For inline protocol capable ethdev, this would result in an eth event while for lookaside protocol capable cryptodev, this can be communicated via `rte_crypto_op.aux_flags` field.
In case of hard expiry, the packets will not be IPsec processed and would result in error.
Signed-off-by: Anoob Joseph <anoobj@marvell.com> Acked-by: Konstantin Ananyev <konstantin.ananyev@intel.com> Acked-by: Akhil Goyal <gakhil@marvell.com>
show more ...
|
| #
63992166 |
| 07-Sep-2021 |
Anoob Joseph <anoobj@marvell.com> |
security: support user-specified IV
Enabled user to provide IV to be used per security operation. This would be used with lookaside protocol offload for comparing against known vectors.
By default,
security: support user-specified IV
Enabled user to provide IV to be used per security operation. This would be used with lookaside protocol offload for comparing against known vectors.
By default, PMD would internally generate random IV.
Signed-off-by: Anoob Joseph <anoobj@marvell.com> Acked-by: Akhil Goyal <gakhil@marvell.com> Acked-by: Konstantin Ananyev <konstantin.ananyev@intel.com>
show more ...
|
| #
d08dcd28 |
| 15-Sep-2021 |
Nithin Dabilpuram <ndabilpuram@marvell.com> |
security: add option for faster user/meta data access
Currently rte_security_set_pkt_metadata() and rte_security_get_userdata() methods to set pkt metadata on Inline outbound and get userdata after
security: add option for faster user/meta data access
Currently rte_security_set_pkt_metadata() and rte_security_get_userdata() methods to set pkt metadata on Inline outbound and get userdata after Inline inbound processing is always driver specific callbacks.
For drivers that do not have much to do in the callbacks but just to update metadata in rte_security dynamic field and get userdata from rte_security dynamic field, having to just to PMD specific callback is costly per packet operation. This patch provides a mechanism to do the same in inline function and avoid function pointer jump if a driver supports the same.
Signed-off-by: Nithin Dabilpuram <ndabilpuram@marvell.com> Acked-by: Konstantin Ananyev <konstantin.ananyev@intel.com> Acked-by: Akhil Goyal <gakhil@marvell.com>
show more ...
|
| #
864c1a40 |
| 08-Sep-2021 |
Hemant Agrawal <hemant.agrawal@nxp.com> |
security: support PDCP short MAC-I
This patch add support to handle PDCP short MAC-I domain along with standard control and data domains as it has to be treaty as special case with PDCP protocol off
security: support PDCP short MAC-I
This patch add support to handle PDCP short MAC-I domain along with standard control and data domains as it has to be treaty as special case with PDCP protocol offload support.
ShortMAC-I is the 16 least significant bits of calculated MAC-I. Usually when a RRC message is exchanged between UE and eNodeB it is integrity & ciphered protected.
MAC-I = f(key, varShortMAC-I, count, bearer, direction). Here varShortMAC-I is prepared by using (current cellId, pci of source cell and C-RNTI of old cell). Other parameters like count, bearer and direction set to all 1.
crypto-perf app is updated to take short MAC as input mode.
Signed-off-by: Gagandeep Singh <g.singh@nxp.com> Signed-off-by: Hemant Agrawal <hemant.agrawal@nxp.com> Acked-by: Akhil Goyal <gakhil@marvell.com>
show more ...
|
|
Revision tags: v21.08, v21.08-rc4, v21.08-rc3, v21.08-rc2, v21.08-rc1, v21.05, v21.05-rc4, v21.05-rc3, v21.05-rc2, v21.05-rc1 |
|
| #
99a2dd95 |
| 20-Apr-2021 |
Bruce Richardson <bruce.richardson@intel.com> |
lib: remove librte_ prefix from directory names
There is no reason for the DPDK libraries to all have 'librte_' prefix on the directory names. This prefix makes the directory names longer and also m
lib: remove librte_ prefix from directory names
There is no reason for the DPDK libraries to all have 'librte_' prefix on the directory names. This prefix makes the directory names longer and also makes it awkward to add features referring to individual libraries in the build - should the lib names be specified with or without the prefix. Therefore, we can just remove the library prefix and use the library's unique name as the directory name, i.e. 'eal' rather than 'librte_eal'
Signed-off-by: Bruce Richardson <bruce.richardson@intel.com>
show more ...
|