: Mariusz Drost
---
doc/guides/sample_app_ug/ipsec_secgw.rst | 47 +++-
examples/ipsec-secgw/test/common_defs.sh | 127 ---
examples/ipsec-secgw/test/linux_test.sh | 141
examples/ipsec-secgw/test/linux_test4.sh | 70 --
examples/ipsec-secgw/test
Added cpu-crypto fallback option parsing as well as tests for it
Signed-off-by: Mariusz Drost
---
examples/ipsec-secgw/sa.c| 6 --
examples/ipsec-secgw/test/common_defs.sh | 12
.../test/trs_aesgcm_inline_crypto_fallback_defs.sh | 7
IPsec library")
Reported-by: Lukasz Bartosik
Signed-off-by: Mariusz Drost
---
examples/ipsec-secgw/ipsec-secgw.c | 48 ++--
examples/ipsec-secgw/ipsec.c | 5 +-
examples/ipsec-secgw/ipsec.h | 21 +-
examples/ipsec-secgw/sa.c | 396
Code fix for SAD selection logic by splitting SAD into IPv4 SAD and
IPv6 SAD. Test scripts updated to reflect changes.
v2:
* Added linux_test.sh
* Modified ep0.cfg and ep1.cfg files to run with ipsec-secgw app
Mariusz Drost (2):
examples/ipsec-secgw: fix SAD selection logic
examples/ipsec
brary")
Reported-by: Lukasz Bartosik
Signed-off-by: Mariusz Drost
---
examples/ipsec-secgw/ep0.cfg | 58 ++--
examples/ipsec-secgw/ep1.cfg | 62 +---
examples/ipsec-secgw/test/common_defs.sh | 7 +-
.../test/{linux_test6.sh => linux_tes
Code fix for SAD selection logic by splitting SAD into IPv4 SAD and
IPv6 SAD. Test scripts updated to reflect changes.
Mariusz Drost (2):
examples/ipsec-secgw: fix SAD selection logic
examples/ipsec-secgw: tests for split SAD
examples/ipsec-secgw/ipsec-secgw.c| 48 ++-
examples
brary")
Reported-by: Lukasz Bartosik
Signed-off-by: Mariusz Drost
---
examples/ipsec-secgw/test/common_defs.sh | 7 +-
examples/ipsec-secgw/test/linux_test4.sh | 78 --
examples/ipsec-secgw/test/linux_test6.sh | 79 ---
examples/ipsec-secgw/test/r
IPsec library")
Reported-by: Lukasz Bartosik
Signed-off-by: Mariusz Drost
---
examples/ipsec-secgw/ipsec-secgw.c | 48 ++--
examples/ipsec-secgw/ipsec.c | 5 +-
examples/ipsec-secgw/ipsec.h | 21 +-
examples/ipsec-secgw/sa.c | 396
private data, based on
crypto session ip type field, before the checking is done.
Fixes: ec17993a145a ("examples/ipsec-secgw: support security offload")
Fixes: 9a0752f498d2 ("net/ixgbe: enable inline IPsec")
Signed-off-by: Mariusz Drost
Acked-by: Konstantin Ananyev
Tested-by
transport modes. Because of that, there is need to
change all checks done on these flags, so they work as expected.
Fixes: ec17993a145a ("examples/ipsec-secgw: support security offload")
Fixes: 9a0752f498d2 ("net/ixgbe: enable inline IPsec")
Signed-off-by: Mariusz Drost
Fixes for ipsec-secgw application to work with inline crypto IPv4
transport mode and IPv6 tunnel/transport modes.
v2:
* Added comment to WITHOUT_TRANSPORT_VERSION macro
* Added macros around all ipsec_sa flags checks
Mariusz Drost (2):
net/ixgbe: fix lack of ip type for crypto session
private data, based on
crypto session ip type field, before the checking is done.
Fixes: ec17993a145a ("examples/ipsec-secgw: support security offload")
Fixes: 9a0752f498d2 ("net/ixgbe: enable inline IPsec")
Signed-off-by: Mariusz Drost
---
drivers/net/ixgbe/ixgbe_ipsec.c | 6 ++
transport modes. Because of that, there is need to
change all checks done on these flags, so they work as expected.
Fixes: ec17993a145a ("examples/ipsec-secgw: support security offload")
Fixes: 9a0752f498d2 ("net/ixgbe: enable inline IPsec")
Signed-off-by: Mariusz Drost
---
Fixes for ipsec-secgw application to work with inline crypto IPv4
transport mode and IPv6 tunnel/transport modes.
Mariusz Drost (2):
net/ixgbe: fix lack of ip type for crypto session
examples/ipsec-secgw: fix not working inline ipsec modes
drivers/net/ixgbe/ixgbe_ipsec.c | 6 +-
examples
14 matches
Mail list logo