summaryrefslogtreecommitdiff
path: root/sys/net/pfkeyv2.h
diff options
context:
space:
mode:
authorAngelos D. Keromytis <angelos@cvs.openbsd.org>2000-10-14 06:23:53 +0000
committerAngelos D. Keromytis <angelos@cvs.openbsd.org>2000-10-14 06:23:53 +0000
commit8daaea286dc3be20a9c7897fe10b935d97c6863a (patch)
treeb3c392d2ca74b2c8c3d85325496c132297609de0 /sys/net/pfkeyv2.h
parentd6277e1dfdb29065da02107dc01cdcee0968b5d8 (diff)
ASKPOLICY message; used by key management to inquire about policy
triggering an ACQUIRE.
Diffstat (limited to 'sys/net/pfkeyv2.h')
-rw-r--r--sys/net/pfkeyv2.h17
1 files changed, 13 insertions, 4 deletions
diff --git a/sys/net/pfkeyv2.h b/sys/net/pfkeyv2.h
index 92b76665be4..9d7073f70b6 100644
--- a/sys/net/pfkeyv2.h
+++ b/sys/net/pfkeyv2.h
@@ -29,7 +29,8 @@ didn't get a copy, you may request one from <license@ipv6.nrl.navy.mil>.
#define SADB_X_ADDFLOW 12
#define SADB_X_DELFLOW 13
#define SADB_X_GRPSPIS 14
-#define SADB_MAX 14
+#define SADB_X_ASKPOLICY 15
+#define SADB_MAX 15
struct sadb_msg {
uint8_t sadb_msg_version;
@@ -157,7 +158,13 @@ struct sadb_protocol {
uint8_t sadb_protocol_direction;
uint16_t sadb_protocol_reserved2;
};
-
+
+struct sadb_policy {
+ uint16_t sadb_policy_len;
+ uint16_t sadb_policy_exttype;
+ u_int32_t sadb_policy_seq;
+};
+
#define SADB_GETSPROTO(x) ( (x) == SADB_SATYPE_AH ? IPPROTO_AH :\
(x) == SADB_SATYPE_ESP ? IPPROTO_ESP :\
IPPROTO_IPIP )
@@ -186,7 +193,8 @@ struct sadb_protocol {
#define SADB_X_EXT_DST_FLOW 21
#define SADB_X_EXT_SA2 22
#define SADB_X_EXT_DST2 23
-#define SADB_EXT_MAX 23
+#define SADB_X_EXT_POLICY 24
+#define SADB_EXT_MAX 24
/* Fix pfkeyv2.c struct pfkeyv2_socket if SATYPE_MAX > 31 */
#define SADB_SATYPE_UNSPEC 0
@@ -300,7 +308,8 @@ int pfkeyv2_cleanup(void);
int pfkeyv2_parsemessage(void *, int, void **);
int pfkeyv2_expire(struct tdb *, u_int16_t);
int pfkeyv2_acquire(struct ipsec_policy *, union sockaddr_union *,
- union sockaddr_union *);
+ union sockaddr_union *, u_int32_t *,
+ struct sockaddr_encap *);
int pfkey_register(struct pfkey_version *version);
int pfkey_unregister(struct pfkey_version *version);