From patchwork Fri Oct 25 06:20:20 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Hemant Agrawal X-Patchwork-Id: 177614 Delivered-To: patch@linaro.org Received: by 2002:a92:409a:0:0:0:0:0 with SMTP id d26csp3219977ill; Thu, 24 Oct 2019 23:23:20 -0700 (PDT) X-Google-Smtp-Source: APXvYqw9Kgo6fuwBqT4b7ug+rgGevFsSDdVRYEXHdx46NL2AGzG5kUSOUDUCt2sKJGkLQlUz7kDj X-Received: by 2002:a17:906:32cc:: with SMTP id k12mr1885033ejk.196.1571984600156; Thu, 24 Oct 2019 23:23:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571984600; cv=none; d=google.com; s=arc-20160816; b=o/mubxttmFUnXtEVXfDsgmJyRr2Swm0d9aJEBkpjliR2gT2mwzkPeFvpgg5VZCUnf5 Up7v5swwUmB7FQb+rbIy1i03jbADzkquz5dMJ/x3WRD8PxAwzBtk9SG+5BhorqcZnKgF DJXPE6zJFReKxBCZ5q3ZlZ+URoPWtpSXD0sonPni2XeIJS1+ah9GyNb3JLBIc+8nTgsU tU/td6s6/CfYqYc3yBd0iAR8qic5o3MuyKyJwZrI9qE7Y3E6dcOHAn/kQHPAA/rbzBOB CI2SOI7TSGK0RbdF5JXfJFRzN+Qo+/v5fc4Do903jp2wGbndmrkaeh/yZftxkluZM4ia rDZw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:list-subscribe:list-help:list-post:list-archive :list-unsubscribe:list-id:precedence:subject:message-id:date:cc:to :from; bh=5xsl1N7NG7ykdW21jcRnMfoYvm0hIWneWOLV0+dllq0=; b=BTE6mkMXqWXH+KDdEBbfLD4OE3Z23GiOEg/l3vgvPH2vpZJEifbUg86SBwPOn2yI2J NIuKXUQXvLfNE+2OjImaKA48CNZrJcOZAJuwiAEiMjPzBIZaxkjgYkKoX2TSA011tx5a 9sQ/nCBDZicQU3I322/T70JyxOhqo9RAkenLZlnMTCgj5f22wq68T339B9Gld6WyzO98 7LQK4gFOQwIC0wI6FJlNuyTHb7J0qa5G7zvZ0Oqjeh8QBn2Z6SPWE3EUJKJSIi/2Liaj bdHwDnIISdkKifP0SGMvebyOtMiHNDN+BCepbJHxSc0JGgBQ73CL2fb+mKeXW3zx00j5 oVuQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of dev-bounces@dpdk.org designates 92.243.14.124 as permitted sender) smtp.mailfrom=dev-bounces@dpdk.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=nxp.com Return-Path: Received: from dpdk.org (dpdk.org. [92.243.14.124]) by mx.google.com with ESMTP id h91si634267edd.270.2019.10.24.23.23.19; Thu, 24 Oct 2019 23:23:20 -0700 (PDT) Received-SPF: pass (google.com: domain of dev-bounces@dpdk.org designates 92.243.14.124 as permitted sender) client-ip=92.243.14.124; Authentication-Results: mx.google.com; spf=pass (google.com: domain of dev-bounces@dpdk.org designates 92.243.14.124 as permitted sender) smtp.mailfrom=dev-bounces@dpdk.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=nxp.com Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 408F41E87A; Fri, 25 Oct 2019 08:23:18 +0200 (CEST) Received: from inva021.nxp.com (inva021.nxp.com [92.121.34.21]) by dpdk.org (Postfix) with ESMTP id CF3D51D44B for ; Fri, 25 Oct 2019 08:23:16 +0200 (CEST) Received: from inva021.nxp.com (localhost [127.0.0.1]) by inva021.eu-rdc02.nxp.com (Postfix) with ESMTP id 38C40200410; Fri, 25 Oct 2019 08:23:16 +0200 (CEST) Received: from invc005.ap-rdc01.nxp.com (invc005.ap-rdc01.nxp.com [165.114.16.14]) by inva021.eu-rdc02.nxp.com (Postfix) with ESMTP id 0B1FA20001C; Fri, 25 Oct 2019 08:23:14 +0200 (CEST) Received: from bf-netperf1.ap.freescale.net (bf-netperf1.ap.freescale.net [10.232.133.63]) by invc005.ap-rdc01.nxp.com (Postfix) with ESMTP id C0916402BC; Fri, 25 Oct 2019 14:23:10 +0800 (SGT) From: Hemant Agrawal To: dev@dpdk.org, akhil.goyal@nxp.com, declan.doherty@intel.com Cc: Hemant Agrawal Date: Fri, 25 Oct 2019 11:50:20 +0530 Message-Id: <20191025062021.18052-1-hemant.agrawal@nxp.com> X-Mailer: git-send-email 2.17.1 X-Virus-Scanned: ClamAV using ClamSMTP Subject: [dpdk-dev] [PATCH 1/2] security: add anti replay window size X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" At present the ipsec xfrom is missing the important step to configure the anti replay window size. The newly added field will also help in to enable or disable the anti replay checking, if available in offload by means of non-zero or zero value. Currently similar field is available in rte_ipsec lib for software ipsec usage. The newly introduced filed can replace that field as well eventually. Signed-off-by: Hemant Agrawal --- lib/librte_security/rte_security.h | 4 ++++ 1 file changed, 4 insertions(+) -- 2.17.1 diff --git a/lib/librte_security/rte_security.h b/lib/librte_security/rte_security.h index aaafdfcd7..195ad5645 100644 --- a/lib/librte_security/rte_security.h +++ b/lib/librte_security/rte_security.h @@ -212,6 +212,10 @@ struct rte_security_ipsec_xform { /**< Tunnel parameters, NULL for transport mode */ uint64_t esn_soft_limit; /**< ESN for which the overflow event need to be raised */ + uint32_t replay_win_sz; + /**< Anti replay window size to enable sequence replay attack handling. + * replay checking is disabled if the window size is 0. + */ }; /**