File: ip_encap.h

package info (click to toggle)
libreswan 5.2-2.2
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 81,632 kB
  • sloc: ansic: 129,988; sh: 32,018; xml: 20,646; python: 10,303; makefile: 3,022; javascript: 1,506; sed: 574; yacc: 511; perl: 264; awk: 52
file content (49 lines) | stat: -rw-r--r-- 1,481 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
/* IP encapsulation, for libreswan
 *
 * Copyright (C) 2020 Andrew Cagney
 *
 * This library is free software; you can redistribute it and/or modify it
 * under the terms of the GNU Library General Public License as published by
 * the Free Software Foundation; either version 2 of the License, or (at your
 * option) any later version.  See <https://www.gnu.org/licenses/lgpl-2.1.txt>.
 *
 * This library is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
 * or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU Library General Public
 * License for more details.
 *
 */

/*
 * Should the the ESP/AH packet be encapsulated using some other
 * transport?  For UDP this is called NAT.  For TCP this is called
 * IKETCP.
 *
 * XXX: Confusingly mode (TUNNEL, TRANSPORT) is also (understandably)
 * referred to as encapsulation :-(
 */

#ifndef IP_ENCAP_H
#define IP_ENCAP_H

struct ip_encap {
	const char *name;
	const struct ip_protocol *outer;
	const struct ip_protocol *inner;
	/*
	 * Passed into the kernel to flag that this transform is
	 * encapsulated.
	 *
	 * TCP Encap of IKE and IPsec Packets
	 * https://tools.ietf.org/html/rfc8229
	 */
	unsigned encap_type;
};

extern const struct ip_encap ip_encap_esp_in_tcp;
extern const struct ip_encap ip_encap_esp_in_udp;

#define PRI_IP_ENCAP "%u(%s)"
#define pri_ip_encap(E) (E) == NULL ? 0 : (E)->encap_type, (E) == NULL ? "none" : (E)->name

#endif