From: Dmitry Eremin-Solenikov
Signed-off-by: Dmitry Eremin-Solenikov
---
/** Email created from pull request 351 (lumag:ipsec_crypto_caps)
** https://github.com/Linaro/odp/pull/351
** Patch: https://github.com/Linaro/odp/pull/351.patch
** Base sha: 12fd3a9224a856271934986a1bad981843915d68
**
From: Dmitry Eremin-Solenikov
Currently IPsec uses capabilities from crypto module to report supported
key lengths. Crypto capabilities also contain additional data (like
digest length, IV len, AAD len, etc. However this data is not relevant
for IPsec, as most of such variables are fixed by proto
From: Dmitry Eremin-Solenikov
Signed-off-by: Dmitry Eremin-Solenikov
---
/** Email created from pull request 351 (lumag:ipsec_crypto_caps)
** https://github.com/Linaro/odp/pull/351
** Patch: https://github.com/Linaro/odp/pull/351.patch
** Base sha: 12fd3a9224a856271934986a1bad981843915d68
**
Generic crypto caps provide too much information to be useful for IPsec
applications (because some of the data is fixed). Rework respective functions
to provide just necessary data.
github
/** Email created from pull request 351 (lumag:ipsec_crypto_caps)
From: Dmitry Eremin-Solenikov
Signed-off-by: Dmitry Eremin-Solenikov
---
/** Email created from pull request 351 (lumag:ipsec_crypto_caps)
** https://github.com/Linaro/odp/pull/351
** Patch: https://github.com/Linaro/odp/pull/351.patch
** Base sha: 12fd3a9224a856271934986a1bad981843915d68
**
From: Dmitry Eremin-Solenikov
Currently IPsec uses capabilities from crypto module to report supported
key lengths. Crypto capabilities also contain additional data (like
digest length, IV len, AAD len, etc. However this data is not relevant
for IPsec, as most of such variables are fixed by proto
From: Dmitry Eremin-Solenikov
Signed-off-by: Dmitry Eremin-Solenikov
---
/** Email created from pull request 351 (lumag:ipsec_crypto_caps)
** https://github.com/Linaro/odp/pull/351
** Patch: https://github.com/Linaro/odp/pull/351.patch
** Base sha: 12fd3a9224a856271934986a1bad981843915d68
**
From: Dmitry Eremin-Solenikov
Separate handling of authentication IV data.
Signed-off-by: Dmitry Eremin-Solenikov
---
/** Email created from pull request 352 (lumag:crypto_gmac_iv)
** https://github.com/Linaro/odp/pull/352
** Patch: https://github.com/Linaro/odp/pull/352.patch
** Base sha: 1
Generic crypto caps provide too much information to be useful for IPsec
applications (because some of the data is fixed). Rework respective functions
to provide just necessary data.
github
/** Email created from pull request 351 (lumag:ipsec_crypto_caps)
From: Dmitry Eremin-Solenikov
There is no point in having odp_crypto_generic_session_t definition in
global include file. Move it to odp_crypto module.
Signed-off-by: Dmitry Eremin-Solenikov
---
/** Email created from pull request 352 (lumag:crypto_gmac_iv)
** https://github.com/Linaro/odp/pul
From: Dmitry Eremin-Solenikov
Change GMAC testing code to use new auth IV fields.
Signed-off-by: Dmitry Eremin-Solenikov
---
/** Email created from pull request 352 (lumag:crypto_gmac_iv)
** https://github.com/Linaro/odp/pull/352
** Patch: https://github.com/Linaro/odp/pull/352.patch
** Base
From: Dmitry Eremin-Solenikov
GMAC auth algorithm requires IV to work. Instead of hacking the
ODP_CIPHER_ALG_NULL iv to include value for ODP_AUTH_ALG_GMAC, provide
separate iv (in auth capability, session params and operation params).
Signed-off-by: Dmitry Eremin-Solenikov
---
/** Email create
I was thinking again about GMAC auth case. Currently GMAC just reuses cipher IV
data fields, which is not future proof and not quite obvious. So let's add
separate set of IV-related fields for authentication algorithms.
github
/** Email created from pull r
ODP has two functions, odp_pktin_recv_tmo and odp_pktin_recv_mq_tmo that
allow sleeping for a certain time. However, the sleep was not a genuine
interruptible sleep (select/poll/epoll) but rather a busy loop. This
resulted in high CPU use when this call was used. This functionality
adds to two pkti
From: Dmitry Eremin-Solenikov
Currently IPsec uses capabilities from crypto module to report supported
key lengths. Crypto capabilities also contain additional data (like
digest length, IV len, AAD len, etc. However this data is not relevant
for IPsec, as most of such variables are fixed by proto
From: Dmitry Eremin-Solenikov
Signed-off-by: Dmitry Eremin-Solenikov
---
/** Email created from pull request 351 (lumag:ipsec_crypto_caps)
** https://github.com/Linaro/odp/pull/351
** Patch: https://github.com/Linaro/odp/pull/351.patch
** Base sha: 12fd3a9224a856271934986a1bad981843915d68
**
From: Dmitry Eremin-Solenikov
Signed-off-by: Dmitry Eremin-Solenikov
---
/** Email created from pull request 351 (lumag:ipsec_crypto_caps)
** https://github.com/Linaro/odp/pull/351
** Patch: https://github.com/Linaro/odp/pull/351.patch
** Base sha: 12fd3a9224a856271934986a1bad981843915d68
**
Generic crypto caps provide too much information to be useful for IPsec
applications (because some of the data is fixed). Rework respective functions
to provide just necessary data.
github
/** Email created from pull request 351 (lumag:ipsec_crypto_caps)
Dmitry Eremin-Solenikov(lumag) replied on github web page:
test/m4/miscellaneous.m4
line 5
@@ -4,5 +4,11 @@
AC_ARG_ENABLE([test-cpp],
[AS_HELP_STRING([--disable-test-cpp], [run basic test aginast cpp])],
[test_cpp=$enableval],
-[test_cpp=yes])
+[AC_LANG_PUSH([C++])
Comment:
Mi
From: Dmitry Eremin-Solenikov
Signed-off-by: Dmitry Eremin-Solenikov
---
/** Email created from pull request 338 (lumag:pktio_parse_layer)
** https://github.com/Linaro/odp/pull/338
** Patch: https://github.com/Linaro/odp/pull/338.patch
** Base sha: 12fd3a9224a856271934986a1bad981843915d68
**
From: Dmitry Eremin-Solenikov
Signed-off-by: Dmitry Eremin-Solenikov
---
/** Email created from pull request 338 (lumag:pktio_parse_layer)
** https://github.com/Linaro/odp/pull/338
** Patch: https://github.com/Linaro/odp/pull/338.patch
** Base sha: 12fd3a9224a856271934986a1bad981843915d68
**
From: Dmitry Eremin-Solenikov
Signed-off-by: Dmitry Eremin-Solenikov
---
/** Email created from pull request 338 (lumag:pktio_parse_layer)
** https://github.com/Linaro/odp/pull/338
** Patch: https://github.com/Linaro/odp/pull/338.patch
** Base sha: 12fd3a9224a856271934986a1bad981843915d68
**
From: Dmitry Eremin-Solenikov
Instead of using separate odp_pktio_parser_layer_t switch to using
odp_proto_layer_t. Deprecate old enum and values. For now do not put
them under ODP_DEPRECATED_API to let the rest of ODP code to adapt.
Signed-off-by: Dmitry Eremin-Solenikov
---
/** Email created
From: Dmitry Eremin-Solenikov
Signed-off-by: Dmitry Eremin-Solenikov
---
/** Email created from pull request 338 (lumag:pktio_parse_layer)
** https://github.com/Linaro/odp/pull/338
** Patch: https://github.com/Linaro/odp/pull/338.patch
** Base sha: 12fd3a9224a856271934986a1bad981843915d68
**
odp_pktio_parser_layer_t duplicates odp_proto_layer_t. So let's deprecate the
former type in favour of later one.
github
/** Email created from pull request 338 (lumag:pktio_parse_layer)
** https://github.com/Linaro/odp/pull/338
** Patch: https://github.c
From: Dmitry Eremin-Solenikov
In new odp_crypto_packet_op_param_t change AAD from struct with a single
pointer to just data pointer. This API is new, so there is no need to
deprecate and/or handle old pointer in any specific way.
Signed-off-by: Dmitry Eremin-Solenikov
---
/** Email created from
…t params
In new odp_crypto_packet_op_param_t change AAD from struct with a single
pointer to just data pointer. This API is new, so there is no need to
deprecate and/or handle old pointer in any specific way.
Signed-off-by: Dmitry Eremin-Solenikov dmitry.ereminsoleni...@linaro.org
---
From: Dmitry Eremin-Solenikov
Signed-off-by: Dmitry Eremin-Solenikov
---
/** Email created from pull request 351 (lumag:ipsec_crypto_caps)
** https://github.com/Linaro/odp/pull/351
** Patch: https://github.com/Linaro/odp/pull/351.patch
** Base sha: 12fd3a9224a856271934986a1bad981843915d68
**
From: Dmitry Eremin-Solenikov
Currently IPsec uses capabilities from crypto module to report supported
key lengths. Crypto capabilities also contain additional data (like
digest length, IV len, AAD len, etc. However this data is not relevant
for IPsec, as most of such variables are fixed by proto
From: Dmitry Eremin-Solenikov
Signed-off-by: Dmitry Eremin-Solenikov
---
/** Email created from pull request 351 (lumag:ipsec_crypto_caps)
** https://github.com/Linaro/odp/pull/351
** Patch: https://github.com/Linaro/odp/pull/351.patch
** Base sha: 12fd3a9224a856271934986a1bad981843915d68
**
Generic crypto caps provide too much information to be useful for IPsec
applications (because some of the data is fixed). Rework respective functions
to provide just necessary data.
github
/** Email created from pull request 351 (lumag:ipsec_crypto_caps)
This event has been canceled and removed from your calendar.
Title: OpenDataPlane (ODP) Public Call
Meeting notes document:
https://docs.google.com/a/linaro.org/document/d/1KjcdpidVqMCDa6FXURSxrTwFjkmb1_pKz54m7eYvVMo/edit Note:
Effective June 2nd we are moving this conference to Blue Jeans.
This event has been canceled and removed from your calendar.
Title: OpenDataPlane (ODP) Public Call
Meeting notes document:
https://docs.google.com/a/linaro.org/document/d/1KjcdpidVqMCDa6FXURSxrTwFjkmb1_pKz54m7eYvVMo/edit Note:
Effective June 2nd we are moving this conference to Blue Jeans.
Josep Puigdemont(joseppc) replied on github web page:
platform/linux-generic/odp_packet.c
line 8
@@ -816,10 +816,7 @@ odp_packet_t odp_packet_alloc(odp_pool_t pool_hdl,
uint32_t len)
odp_packet_t pkt;
int num, num_seg;
- if (odp_unlikely(pool->params.type != ODP_POOL_PACKE
Juha-Matti Tilli(jmtilli) replied on github web page:
platform/linux-generic/odp_packet_io.c
@@ -1577,10 +1577,29 @@ int odp_pktin_recv_tmo(odp_pktin_queue_t queue,
odp_packet_t packets[], int num,
odp_time_t t1, t2;
struct timespec ts;
int started = 0;
+ pktio_entry
From: Juha-Matti Tilli
ODP has two functions, odp_pktin_recv_tmo and odp_pktin_recv_mq_tmo that
allow sleeping for a certain time. However, the sleep was not a genuine
interruptible sleep (select/poll/epoll) but rather a busy loop. This
resulted in high CPU use when this call was used. This funct
ODP has two functions, odp_pktin_recv_tmo and odp_pktin_recv_mq_tmo that
allow sleeping for a certain time. However, the sleep was not a genuine
interruptible sleep (select/poll/epoll) but rather a busy loop. This
resulted in high CPU use when this call was used. This functionality
adds to two pkti
Matias Elo(matiaselo) replied on github web page:
platform/linux-generic/pktio/socket_mmap.c
line 71
@@ -614,6 +628,78 @@ static int sock_mmap_recv(pktio_entry_t *pktio_entry, int
index ODP_UNUSED,
return ret;
}
+static int sock_mmap_recv_tmo(pktio_entry_t *pktio_entry, int index,
+
Matias Elo(matiaselo) replied on github web page:
platform/linux-generic/pktio/socket.c
line 134
@@ -855,6 +937,115 @@ static int sock_init_global(void)
return 0;
}
+static int sock_recv_mq_tmo_select(pktio_entry_t * const *entry,
+ const int index[],
+
Matias Elo(matiaselo) replied on github web page:
platform/linux-generic/pktio/socket.c
line 60
@@ -693,6 +693,88 @@ static int sock_mmsg_recv(pktio_entry_t *pktio_entry, int
index ODP_UNUSED,
return nb_rx;
}
+static int sock_fd_set(pktio_entry_t *pktio_entry, int index ODP_UNUSED,
+
Matias Elo(matiaselo) replied on github web page:
platform/linux-generic/odp_packet_io.c
line 16
@@ -1577,10 +1577,29 @@ int odp_pktin_recv_tmo(odp_pktin_queue_t queue,
odp_packet_t packets[], int num,
odp_time_t t1, t2;
struct timespec ts;
int started = 0;
+ pktio_e
Matias Elo(matiaselo) replied on github web page:
platform/linux-generic/pktio/netmap.c
line 95
@@ -786,6 +824,78 @@ static int netmap_recv(pktio_entry_t *pktio_entry, int
index,
return num_rx;
}
+static int netmap_recv_tmo(pktio_entry_t *pktio_entry, int index,
+
Since IPv6 doesn't have an L3 checksum and since we don't have a "not
applicable" enum, I'd say OK would be the best choice.
On Mon, Dec 18, 2017 at 11:25 PM, Dmitry Eremin-Solenikov <
dmitry.ereminsoleni...@linaro.org> wrote:
> Hello,
>
> I was working on checksum parsing/status. What is the L3
Add another iteration of crypto opertion to be run when testing to catch
different 'not reinitialized' or 'not cleared' errors.
Signed-off-by: Dmitry Eremin-Solenikov dmitry.ereminsoleni...@linaro.org
github
/** Email created from pull request 348 (lumag:cry
From: Dmitry Eremin-Solenikov
Add another iteration of crypto opertion to be run when testing to catch
different 'not reinitialized' or 'not cleared' errors.
Signed-off-by: Dmitry Eremin-Solenikov
---
/** Email created from pull request 348 (lumag:crypto-reinit)
** https://github.com/Linaro/od
Branch: refs/heads/api-next
Home: https://github.com/Linaro/odp
Commit: 12fd3a9224a856271934986a1bad981843915d68
https://github.com/Linaro/odp/commit/12fd3a9224a856271934986a1bad981843915d68
Author: Bill Fischofer
Date: 2017-12-19 (Tue, 19 Dec 2017)
Changed paths:
M doc
Branch: refs/heads/devel/caterpillar
Home: https://github.com/Linaro/odp
Branch: refs/heads/caterpillar
Home: https://github.com/Linaro/odp
From: Matias Elo
Update instructions to support RHEL 7.4.
Signed-off-by: Matias Elo
---
/** Email created from pull request 349 (matiaselo:fix/redhat_build)
** https://github.com/Linaro/odp/pull/349
** Patch: https://github.com/Linaro/odp/pull/349.patch
** Base sha: 6b5cdc77eb9759a2349b10372
From: Matias Elo
The odp_pktio_ordered test depends on pcap pktio, so skip it if pcap is not
available.
Signed-off-by: Matias Elo
---
/** Email created from pull request 349 (matiaselo:fix/redhat_build)
** https://github.com/Linaro/odp/pull/349
** Patch: https://github.com/Linaro/odp/pull/349
Enable build on a clean RHEL 7.4 install.
Signed-off-by: Matias Elo matias@nokia.com
github
/** Email created from pull request 349 (matiaselo:fix/redhat_build)
** https://github.com/Linaro/odp/pull/349
** Patch: https://github.com/Linaro/odp/pull/349.
From: Matias Elo
Enables building ODP on systems which have no C++ compiler available.
Signed-off-by: Matias Elo
---
/** Email created from pull request 349 (matiaselo:fix/redhat_build)
** https://github.com/Linaro/odp/pull/349
** Patch: https://github.com/Linaro/odp/pull/349.patch
** Base s
52 matches
Mail list logo