From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id F3D3445BC5; Thu, 24 Oct 2024 17:02:29 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 5B18D434C5; Thu, 24 Oct 2024 17:02:17 +0200 (CEST) Received: from EUR03-AM7-obe.outbound.protection.outlook.com (mail-am7eur03on2053.outbound.protection.outlook.com [40.107.105.53]) by mails.dpdk.org (Postfix) with ESMTP id 79257434BA for ; Thu, 24 Oct 2024 17:02:12 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=J5YK85AOiedwTKs3Blzx/BittZBh/qH4qv2y9+WjUC6xY8WRaH8yYAYkUZj+Sct1n5Qg1pfTLrOuw+HmXblAPFPeXnXzHpBsiwrK/+i+jIDa2xorvMRUzYo196FafZP3qqcOTmdn+DaivCJLJ2e4QxU102gl0sRXr72K/QvbPevLwfeLTOWtCROBLv3SZE/mJ18xOvxEB3dPr5cy37Vpa2HQcKhppZvMKHUcW3DmckAOPJwNAVDDdmpzH6f2WL/tSDSP6mL3cLOgD6QhkfN1lQxiRZ3eDcLn15O0uXJi01Ic7+/89GIPvsFXxxdIoWiq63tUySF49h1Eh67z0NZbww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=ClCpuyFmQlS4d9BKycyBUmA+CerqAjtT7LfxDTUIoZo=; b=gZN3ZunDF+ureeFAF3TeUzOfhy/ULyvxO5wfswqakqzW0UKKpOWQ/u4eSqLvVtyVGPPG3gnzx02dvmQbE9YtdUFVHWsdazQJJL/d99yK8gB4VtvDh8r0WhRPiKM6TeqqpEyjd+nFICDJ6xFc/tPIK9uHQgxWvKn0BG4VwG4vz37tTOr2hqLW1ffvIcKGdpQd6LXAr80iXikvxqiCeO1IgCoxK+P/glEMOqRv8S66j4h82GKTlcjU4L8vNupitP7e0nkTd5CJfY6QZkQaeEC0lSMFAq/tapxlSzLJsVW7lB7OZbyjcMKOmqYmZ3b2eC350sdwvGYbTDJAuaUUCWFWbQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ClCpuyFmQlS4d9BKycyBUmA+CerqAjtT7LfxDTUIoZo=; b=l7NkzDdzwhwL3yREjLLTGiTGAWTZv2MbYPTWicz//lBZXt8ur0Ud5FtdmS6xhf2Qr0oJYtglkzDZLrNaQLXutzzR25ZZ32/4cGKNL28jykcIX5qdVdymw1fyM5QnnM/KiWJGxEI+LWvqKHTkAyNaoqw8buc3ig3SY8hMI+EZE66Yy7GvBno4qEI6xsfB9qaHNpK7ZLovY2Ixkgf9qQVygFRuCND4W9CRieNxPLDykqqquS4ifHz+kvwoCvMKHMP6lmWq3DeMQ59tGrtGUccQolIOvYt/6W3nmhFEtOE4cukoL6Bv9XJGPI5sunlGo8f0GwEawQIxWnkMqxmmpP15GA== Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nxp.com; Received: from PAXPR04MB9328.eurprd04.prod.outlook.com (2603:10a6:102:2b6::15) by AM9PR04MB7715.eurprd04.prod.outlook.com (2603:10a6:20b:285::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8069.28; Thu, 24 Oct 2024 15:02:11 +0000 Received: from PAXPR04MB9328.eurprd04.prod.outlook.com ([fe80::367:d59:375:fb87]) by PAXPR04MB9328.eurprd04.prod.outlook.com ([fe80::367:d59:375:fb87%3]) with mapi id 15.20.8093.014; Thu, 24 Oct 2024 15:02:11 +0000 From: Hemant Agrawal To: gakhil@marvell.com Cc: dev@dpdk.org, Barry Cao Subject: [PATCH 3/4] crypto/dpaa_sec: add support for UDP-encapsulated ESP Date: Thu, 24 Oct 2024 20:31:50 +0530 Message-Id: <20241024150151.2290617-3-hemant.agrawal@nxp.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20241024150151.2290617-1-hemant.agrawal@nxp.com> References: <20241024150151.2290617-1-hemant.agrawal@nxp.com> Content-Transfer-Encoding: 8bit Content-Type: text/plain X-ClientProxiedBy: SG3P274CA0012.SGPP274.PROD.OUTLOOK.COM (2603:1096:4:be::24) To PAXPR04MB9328.eurprd04.prod.outlook.com (2603:10a6:102:2b6::15) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: PAXPR04MB9328:EE_|AM9PR04MB7715:EE_ X-MS-Office365-Filtering-Correlation-Id: f2879401-6354-4ca6-9954-08dcf43cd636 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|52116014|376014|366016|1800799024|38350700014; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?bTLLEuvKOIo7jklyJ6ZZ7h8yjB7+lsZvR2vhx/HDkHV9soyN3aRw7hvd+ji/?= =?us-ascii?Q?INpCDMfzUUotVwQrLCiRjUOKk9AcsnybYuOtGMELcanQovT+RE6hNUKGTIDa?= =?us-ascii?Q?hc+85Du25LIYa/Rul48QdF9itZv7ZBsis8mJQZiXO7FsstiR5n66ddVkwCiy?= =?us-ascii?Q?m+5zOuQFX86RCGj7YaxuAsgbYZNDrwzY09WV9ru0xPii24hZnBCfzLdCCW0G?= =?us-ascii?Q?EQTaewXowTudEXpoj2Zndr4MQ4QOvCN8Y/D2itC+zrjt+WT7pT5erJCkG8Lw?= =?us-ascii?Q?NHMeuZSDuJ8F0K/or1ZDJ6ao3EVJKCPpAVowJg8EtUmTx+CdwjwIz5Q/a35H?= =?us-ascii?Q?dKUAByRiqx/AdxLp1EBs7YyHZ8H4189vz5E0OIDonqgn38rbT6wcAyLECBTB?= =?us-ascii?Q?sY0VGXR3PxiYnmVhEXPpWwyv3cix1mxvzD40Q7nl3mqQnWdN50ULDfQF8FZL?= =?us-ascii?Q?+jFHXvvN7KNemUOt3DUbC9/UBivdNezXuhxdQtNlUT+7G+qMdt6fje3sj5DS?= =?us-ascii?Q?2jUPwFSi1jZo2JZwU6QmB5prnSn/9/GA2LRnQqYHg/Lk4dU0bfEc43UANttX?= =?us-ascii?Q?rLMQWtZWu0PlzPHjULZQ5/kzi/CugqbM3H3CFhBy3ttCX1fMxm9oT6kCqizU?= =?us-ascii?Q?bdlrsahZAc7jwJ7hWabuNsWHN4GeweoDAeP2D9Q2fGWeBPko70CxtvA4FJch?= =?us-ascii?Q?/TMmKImlY5IDzegdW7wh6/9oOMTBNQffVBvyp/2Yq46VVAWJDowG4/mOcyIs?= =?us-ascii?Q?9HZonFy9nsMBnQrFFWvP7SfsIxCeUT1NT68pfnEBTLoBxt8jNlN24F1fqdOD?= =?us-ascii?Q?F+JfPSsDxjcmb1mVMCZ+rXbnVAzmfEgN5xO/zw3zW0+v1pPoQoedYK9dik6W?= =?us-ascii?Q?IFk+m1blCLEpvofrSHurOf3yM3U0Iay32PZ+hEFb18Ul8Ez6r/eRWvKWEZ3V?= =?us-ascii?Q?cleMYcKtWIAzQTqIAC0FZ1ArK4Gw0V5PGXBxDcYiNb4gySR1j2DhweWuzSgi?= =?us-ascii?Q?90/TvzbePuITFW4/S53Mz5O00/iBIXRqKb/pAV/2TBdPWejKb3pY7Lg9iRqG?= =?us-ascii?Q?YaAQJjJ8TZ2EPAqkjEUQA02akf5YS8iJYHVkByF8wj85ZrO62oxIxTGjbzmL?= =?us-ascii?Q?rIHKsgG+mTPK9mvtYWnImIo1cCQMbOR+zFtNFJylFfJOT62pJHcEFS6Ydl1p?= =?us-ascii?Q?UWUT5u0e1iQ6qcEQeK9zgLgzIpze2lJuZaCwSKGVIJtMAxtDgX9qm5vRRbFn?= =?us-ascii?Q?bYmOxdnYWeejju6nua6HjzwSEXipvO3nnINbPMmH0Zg/WRyQ3t003H8HsQQt?= =?us-ascii?Q?lAS9amW8E5YD8co+LHdNs6e8cMLgyzj/cIVnDGAuQThWiq+7qeKR6YDFVooR?= =?us-ascii?Q?QnBCyO0=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PAXPR04MB9328.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230040)(52116014)(376014)(366016)(1800799024)(38350700014); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?AFX0CLOVMVpxHXufK7YvnYNyhC4XSXKzB2oiy6efIkV+GgNNcP1hw2M/VYaB?= =?us-ascii?Q?V+oP9gHbf9IfdCh7p1Xa6c6FR8qLu5FBgoXmEdHUKESqab5Ptyz0Dl+nn85R?= =?us-ascii?Q?LuAGm7faJ6ChbYKZEiafatu8GSiSqGgsZBdm/N2IeeuJLhKfXIbm9U17xErz?= =?us-ascii?Q?nkU17+AQyvOdlNzISMYH1VPH/mH8go4AF6UuHWXDTjbM6zdrvn3eHXpqNmKT?= =?us-ascii?Q?izE97urVIcq/N8TuAUQK/J1GzvfokmxMPOEHSDUBcSfv4Ikp72NN9nXh4DKC?= =?us-ascii?Q?JLpXHE+4zjAvw03HbnL9ZT6ps7XxIJs8rnccJaP38yK3+bUZR8WVQC33RkPl?= =?us-ascii?Q?ZXfnG3eJOR7Rt4RjYS614nvlW2sEaONZqBe1A4PinJzz2WSwIWRcJiqKC64f?= =?us-ascii?Q?zQau9iOGOzfjCe5/qnedJDdk/C65z5NhCpwgL071NRizW6SBh3rzoRx2U0yj?= =?us-ascii?Q?9zjxGtNwDCXqZqZsPom9svjKm9XEoGxmO2xrrJ87NZCZbXi+gf01JOq+bXMS?= =?us-ascii?Q?ZenVw7u8JslofeTUqDFGpktk4KpxRkuF7jSj9LuajMRpSgCsn3i58+Ir0ACg?= =?us-ascii?Q?kk68MT6U1lxWwWlB59WiutrMT7tUiy5DF74xg+yx8UwPfuTrSqeJGFpoYujO?= =?us-ascii?Q?N3sVV0BO5gm9tpMng3bnaJhHfkvOFAFlzwHgcK7xwqGMeYIZkQ/CfTnePuiW?= =?us-ascii?Q?HdJNgE09iB8CZFm+cHEG+ib4PTK6aNXXaWRMgRegPJQvIWftO47Jxer5Wi0n?= =?us-ascii?Q?QaIEv5xrVRQl0JbkBBxlXwdSbyU0BIcs011akmiZXmo00+gYl7f7Fd4h0YMT?= =?us-ascii?Q?bhqA3kLZYhfRXdIySJYeGXdO0vDCQA+OW43kxu/Kk6+d5C6AR36V0W7g4dVb?= =?us-ascii?Q?5LXx+piv3gp58BhqnFUMk9XA7PlptCEaGVJJ+5Pqkoy9MZwzgCBsLlpIblia?= =?us-ascii?Q?1NIEMAAA1Dr78gJgZJ5Z0W86bgPrVkg+RWqpO4Gq8ZJhDXlgh+oHdWUFS5QP?= =?us-ascii?Q?YuHIbbqr2iHYdqg+MVrnpA37qw3DzwPrapugTaN2ezwcfEI7A+x+oxoWsMtk?= =?us-ascii?Q?ovIyqMs9Cpy8X2L2iK2sSdn/DwjaIGd+Ixnc96WWG79AiTzrdKJKfZktZTYR?= =?us-ascii?Q?7RPuyxLjoTFoH3XDXK6+Lgk3mm67FTz+QZbBWy07LWQd+rtTWaqw5gEMv1RC?= =?us-ascii?Q?gGHU2xCOBuloN/I236BL7gl14CPJdgA69QGjk6NlzFKLBEeKXUrfLrKR+ZYE?= =?us-ascii?Q?cjz3BYrQ4ZNuL+bvKg786WztQE8HHPBlfy1r2PTnB1CrK/Dljyt99FM1vc7a?= =?us-ascii?Q?KvSDguyw+gA+O8VH963o30UDv9HQxUIk62K7F0LYEneTGrvpVwQpXuvnCR2H?= =?us-ascii?Q?mm9Kmmbx39hyZPWjW2HObX0nPIxyeb3SPl7RHWBsWJMva76L8ZKEs1sgyg3n?= =?us-ascii?Q?Brrjq9z0sQ2w8O7xOIezc1YVsAUK4NkgTBcq+5DxPX6DgBJgTpxfO4BzNisg?= =?us-ascii?Q?fQ9tfzchHOQr/WnM1yk+HB1fHY81rAFSPwsDP3X586rcw7023+c/9tx9PUv8?= =?us-ascii?Q?6OR21BtMn1SlrCx0Z8Y/x9+wdrMozaKnY1sF7d6jIlFDJL/sDFAcY92ZZeby?= =?us-ascii?Q?3g=3D=3D?= X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: f2879401-6354-4ca6-9954-08dcf43cd636 X-MS-Exchange-CrossTenant-AuthSource: PAXPR04MB9328.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 Oct 2024 15:02:10.9889 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: Beq18/0i1GP+Om1tHxgsYbj3oXbcwme+jUVhOJszeZ7lU5lQb80eQ1lJdkJJLFfLGewoZwfBxwSJgTKJboB8Kg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR04MB7715 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org From: Barry Cao This patch enables support for NAT-T traversal in IPSEC ESP protocol offload mode. Signed-off-by: Hemant Agrawal Signed-off-by: Barry Cao --- drivers/crypto/dpaa_sec/dpaa_sec.c | 63 ++++++++++++++++++++++++------ drivers/crypto/dpaa_sec/dpaa_sec.h | 14 +++++++ 2 files changed, 66 insertions(+), 11 deletions(-) diff --git a/drivers/crypto/dpaa_sec/dpaa_sec.c b/drivers/crypto/dpaa_sec/dpaa_sec.c index 881435fdb6..3fa88ca968 100644 --- a/drivers/crypto/dpaa_sec/dpaa_sec.c +++ b/drivers/crypto/dpaa_sec/dpaa_sec.c @@ -20,6 +20,7 @@ #include #include #include +#include #include #include #include @@ -46,6 +47,7 @@ #include #define DRIVER_DUMP_MODE "drv_dump_mode" +#define DPAA_DEFAULT_NAT_T_PORT 4500 /* DPAA_SEC_DP_DUMP levels */ enum dpaa_sec_dump_levels { @@ -2961,15 +2963,22 @@ dpaa_sec_set_ipsec_session(__rte_unused struct rte_cryptodev *dev, RTE_SECURITY_IPSEC_TUNNEL_IPV4) { session->ip4_hdr.ip_v = IPVERSION; session->ip4_hdr.ip_hl = 5; - session->ip4_hdr.ip_len = rte_cpu_to_be_16( - sizeof(session->ip4_hdr)); + if (ipsec_xform->options.udp_encap) + session->ip4_hdr.ip_len = rte_cpu_to_be_16( + sizeof(session->ip4_hdr) + sizeof(struct rte_udp_hdr)); + else + session->ip4_hdr.ip_len = rte_cpu_to_be_16( + sizeof(session->ip4_hdr)); session->ip4_hdr.ip_tos = ipsec_xform->tunnel.ipv4.dscp; session->ip4_hdr.ip_id = 0; session->ip4_hdr.ip_off = 0; session->ip4_hdr.ip_ttl = ipsec_xform->tunnel.ipv4.ttl; - session->ip4_hdr.ip_p = (ipsec_xform->proto == - RTE_SECURITY_IPSEC_SA_PROTO_ESP) ? - IPPROTO_ESP : IPPROTO_AH; + if (ipsec_xform->options.udp_encap) + session->ip4_hdr.ip_p = IPPROTO_UDP; + else + session->ip4_hdr.ip_p = (ipsec_xform->proto == + RTE_SECURITY_IPSEC_SA_PROTO_ESP) ? + IPPROTO_ESP : IPPROTO_AH; session->ip4_hdr.ip_sum = 0; session->ip4_hdr.ip_src = ipsec_xform->tunnel.ipv4.src_ip; @@ -2993,9 +3002,12 @@ dpaa_sec_set_ipsec_session(__rte_unused struct rte_cryptodev *dev, session->ip6_hdr.payload_len = 0; session->ip6_hdr.hop_limits = ipsec_xform->tunnel.ipv6.hlimit; - session->ip6_hdr.proto = (ipsec_xform->proto == - RTE_SECURITY_IPSEC_SA_PROTO_ESP) ? - IPPROTO_ESP : IPPROTO_AH; + if (ipsec_xform->options.udp_encap) + session->ip6_hdr.proto = IPPROTO_UDP; + else + session->ip6_hdr.proto = (ipsec_xform->proto == + RTE_SECURITY_IPSEC_SA_PROTO_ESP) ? + IPPROTO_ESP : IPPROTO_AH; memcpy(&session->ip6_hdr.src_addr, &ipsec_xform->tunnel.ipv6.src_addr, 16); memcpy(&session->ip6_hdr.dst_addr, @@ -3022,18 +3034,47 @@ dpaa_sec_set_ipsec_session(__rte_unused struct rte_cryptodev *dev, session->encap_pdb.seq_num_ext_hi = conf->ipsec.esn.hi; session->encap_pdb.seq_num = conf->ipsec.esn.low; } + if (ipsec_xform->options.udp_encap) { + struct rte_udp_hdr *udp_hdr; + + if (ipsec_xform->tunnel.type == RTE_SECURITY_IPSEC_TUNNEL_IPV4) + udp_hdr = (struct rte_udp_hdr *)(&session->udp4.udp_hdr); + else + udp_hdr = (struct rte_udp_hdr *)(&session->udp6.udp_hdr); + + if (ipsec_xform->udp.sport) + udp_hdr->src_port = rte_cpu_to_be_16(ipsec_xform->udp.sport); + else + udp_hdr->src_port = rte_cpu_to_be_16(DPAA_DEFAULT_NAT_T_PORT); + + if (ipsec_xform->udp.dport) + udp_hdr->dst_port = rte_cpu_to_be_16(ipsec_xform->udp.dport); + else + udp_hdr->dst_port = rte_cpu_to_be_16(DPAA_DEFAULT_NAT_T_PORT); + udp_hdr->dgram_len = 0; + udp_hdr->dgram_cksum = 0; + session->encap_pdb.ip_hdr_len += sizeof(struct rte_udp_hdr); + session->encap_pdb.options |= PDBOPTS_ESP_NAT | PDBOPTS_ESP_NUC; + } if (ipsec_xform->options.ecn) session->encap_pdb.options |= PDBOPTS_ESP_TECN; } else if (ipsec_xform->direction == RTE_SECURITY_IPSEC_SA_DIR_INGRESS) { if (ipsec_xform->tunnel.type == RTE_SECURITY_IPSEC_TUNNEL_IPV4) { - session->decap_pdb.options = sizeof(struct ip) << 16; + if (ipsec_xform->options.udp_encap) + session->decap_pdb.options = + (sizeof(struct ip) + sizeof(struct rte_udp_hdr)) << 16; + else + session->decap_pdb.options = sizeof(struct ip) << 16; if (ipsec_xform->options.copy_df) session->decap_pdb.options |= PDBHMO_ESP_DFV; } else { - session->decap_pdb.options = - sizeof(struct rte_ipv6_hdr) << 16; + if (ipsec_xform->options.udp_encap) + session->decap_pdb.options = + (sizeof(struct rte_ipv6_hdr) + sizeof(struct rte_udp_hdr)) << 16; + else + session->decap_pdb.options = sizeof(struct rte_ipv6_hdr) << 16; } if (ipsec_xform->options.esn) { session->decap_pdb.options |= PDBOPTS_ESP_ESN; diff --git a/drivers/crypto/dpaa_sec/dpaa_sec.h b/drivers/crypto/dpaa_sec/dpaa_sec.h index 603a7d8f38..64d9e22159 100644 --- a/drivers/crypto/dpaa_sec/dpaa_sec.h +++ b/drivers/crypto/dpaa_sec/dpaa_sec.h @@ -143,6 +143,16 @@ typedef struct dpaa_sec_job* (*dpaa_sec_build_raw_dp_fd_t)(uint8_t *drv_ctx, void *userdata, struct qm_fd *fd); +struct dpaa_ipv4_udp { + struct ip ip4_hdr; + struct rte_udp_hdr udp_hdr; +}; + +struct dpaa_ipv6_udp { + struct rte_ipv6_hdr ip6_hdr; + struct rte_udp_hdr udp_hdr; +}; + typedef struct dpaa_sec_session_entry { struct sec_cdb cdb; /**< cmd block associated with qp */ struct dpaa_sec_qp *qp[MAX_DPAA_CORES]; @@ -191,6 +201,8 @@ typedef struct dpaa_sec_session_entry { union { struct ip ip4_hdr; struct rte_ipv6_hdr ip6_hdr; + struct dpaa_ipv4_udp udp4; + struct dpaa_ipv6_udp udp6; }; uint8_t auth_cipher_text; /**< Authenticate/cipher ordering */ @@ -995,6 +1007,7 @@ static const struct rte_security_capability dpaa_sec_security_cap[] = { .dec_ttl = 1, .ecn = 1, .esn = 1, + .udp_encap = 1, }, .replay_win_sz_max = 128 }, @@ -1013,6 +1026,7 @@ static const struct rte_security_capability dpaa_sec_security_cap[] = { .dec_ttl = 1, .ecn = 1, .esn = 1, + .udp_encap = 1, }, .replay_win_sz_max = 128 }, -- 2.25.1