summaryrefslogtreecommitdiffstats
path: root/src/vnet/ipsec
AgeCommit message (Expand)AuthorFilesLines
2019-09-28ipsec ip tcp l2: multiarch nodes cannot be declared as staticDamjan Marion1-4/+4
2019-09-25ipsec: Fix NULL encryption algorithmNeale Ranns2-1/+9
2019-09-25ipsec: Add 'detail' option to 'sh ipsec sa'Neale Ranns1-4/+8
2019-09-19ipsec: fix missed IPSEC_INTEG_ALG_MD5_96Dmitry Vakhrushev1-0/+5
2019-08-01ipsec: Redo the anit-replay check post decryptNeale Ranns2-0/+36
2019-07-31ipsec: Typo in flag nameNeale Ranns1-1/+1
2019-07-24ipsec: GCM, Anti-replay and ESN fixessNeale Ranns4-42/+129
2019-07-19fib: FIB Entry trackingNeale Ranns1-10/+6
2019-07-19ipsec: register for port 4500 at INITNeale Ranns1-13/+5
2019-07-16ipsec: handle UDP keepalivesNeale Ranns8-38/+227
2019-07-16ipsec: coverity found c-n-p errorNeale Ranns1-1/+1
2019-07-15ipsec: rewind missing from dual loopNeale Ranns1-4/+9
2019-07-12ipsec: drop outbound ESP when no crypto alg setMatthew Smith4-5/+162
2019-07-12ipsec: Reference count the SAsNeale Ranns9-166/+155
2019-07-12ip ipsec: Remove IPSec SPI-0 punt reasonNeale Ranns3-24/+9
2019-07-11ipsec: Revert "IPSEC: remove byte swap operations in DP during SPD classify"Neale Ranns5-27/+26
2019-07-11ipsec: Revert "IPSEC: remove double byte swap of IP addresses"Neale Ranns1-10/+18
2019-06-25ipsec: print spi in hexadecimalGuillaume Solignac6-15/+16
2019-06-25ipsec: return error if the engine backend has no handler for theNeale Ranns1-1/+23
2019-06-19ipsec: fix l2 header handling in ah encryptKlement Sekera1-6/+6
2019-06-18ipsec: ipsec-tun protectNeale Ranns16-131/+1481
2019-06-17ipsec: One DPO per SANeale Ranns5-24/+16
2019-06-17ipsec: return original SA create error for tunnel createNeale Ranns1-2/+2
2019-06-14ipsec: Display user specified SPI ID not VPP's indexNeale Ranns1-1/+3
2019-06-14ipsec: Correctly rewind the buffer to the IP header when punting UDP encapped...Neale Ranns1-3/+5
2019-06-13ipsec: remove spurious warningsNeale Ranns3-7/+0
2019-06-05ipsec: ah_decrypt reworkFilip Tehlar1-167/+283
2019-06-07ipsec: remove the set_key APINeale Ranns7-371/+0
2019-06-05ipsec: fix combined counters in ah-encrypt nodeFilip Tehlar1-3/+5
2019-06-05ipsec: fix sa counters in esp-encryptDamjan Marion1-4/+7
2019-06-05ipsec: fix sa counters in esp-decryptDamjan Marion1-6/+7
2019-06-05IPSEC: some CLI fixesNeale Ranns2-6/+11
2019-06-04Fix: bug prevented IPsec ipv4 SPDs to show correctlyGuillaume Solignac1-4/+9
2019-06-02IPSec: memcpy of integ key borkNeale Ranns1-1/+1
2019-05-30IPsec: modify post-decrypt buf len calculationMatthew G Smith1-2/+2
2019-05-29ipsec: fix perf issue in esp_aad_fillDamjan Marion1-4/+7
2019-05-28ipsec: ah_encrypt reworkFilip Tehlar1-194/+280
2019-05-28Punt: socket register for exception dispatched/punted packets based on reasonNeale Ranns1-5/+5
2019-05-20IPSEC: rename default backendNeale Ranns1-2/+2
2019-05-15IPSEC: remove CLI check for unsupported IPv6-AH - it is supportedNeale Ranns1-22/+0
2019-05-14IPSEC coverity fixesNeale Ranns2-2/+4
2019-05-14IPSEC: remove unecessary pass by reference of sequence numberNeale Ranns3-4/+4
2019-05-06Add missing init fn dependency to ipsec_initDave Barach1-0/+5
2019-05-01esp_encrypt: remove unnecessary codeZhiyong Yang1-1/+1
2019-05-01ipsec: fix ipsec format overflowBenoît Ganne1-4/+3
2019-04-30crypto: enforce per-alg crypto key lengthBenoît Ganne1-0/+5
2019-04-26crypto, ipsec: change GCM IV handlingDamjan Marion2-3/+21
2019-04-25crypto: AES GCM IV length is always 12Damjan Marion1-1/+0
2019-04-25crypto_ipsecmb: use pre-expanded keysDamjan Marion1-1/+1
2019-04-25IPSEC; dpdk backend for tunnel interface encryptionNeale Ranns7-56/+92