Go to the source code of this file.
|
enum | ipsec_crypto_alg {
IPSEC_API_CRYPTO_ALG_NONE = 0,
IPSEC_API_CRYPTO_ALG_AES_CBC_128,
IPSEC_API_CRYPTO_ALG_AES_CBC_192,
IPSEC_API_CRYPTO_ALG_AES_CBC_256,
IPSEC_API_CRYPTO_ALG_AES_CTR_128,
IPSEC_API_CRYPTO_ALG_AES_CTR_192,
IPSEC_API_CRYPTO_ALG_AES_CTR_256,
IPSEC_API_CRYPTO_ALG_AES_GCM_128,
IPSEC_API_CRYPTO_ALG_AES_GCM_192,
IPSEC_API_CRYPTO_ALG_AES_GCM_256,
IPSEC_API_CRYPTO_ALG_DES_CBC,
IPSEC_API_CRYPTO_ALG_3DES_CBC
} |
|
enum | ipsec_integ_alg {
IPSEC_API_INTEG_ALG_NONE = 0,
IPSEC_API_INTEG_ALG_MD5_96,
IPSEC_API_INTEG_ALG_SHA1_96,
IPSEC_API_INTEG_ALG_SHA_256_96,
IPSEC_API_INTEG_ALG_SHA_256_128,
IPSEC_API_INTEG_ALG_SHA_384_192,
IPSEC_API_INTEG_ALG_SHA_512_256
} |
|
enum | ipsec_sad_flags {
IPSEC_API_SAD_FLAG_NONE = 0,
IPSEC_API_SAD_FLAG_USE_ESN = 0x01,
IPSEC_API_SAD_FLAG_USE_ANTI_REPLAY = 0x02,
IPSEC_API_SAD_FLAG_IS_TUNNEL = 0x04,
IPSEC_API_SAD_FLAG_IS_TUNNEL_V6 = 0x08,
IPSEC_API_SAD_FLAG_UDP_ENCAP = 0x10
} |
|
enum | ipsec_proto { IPSEC_API_PROTO_ESP,
IPSEC_API_PROTO_AH
} |
|
◆ ipsec_crypto_alg
Enumerator |
---|
IPSEC_API_CRYPTO_ALG_NONE | |
IPSEC_API_CRYPTO_ALG_AES_CBC_128 | |
IPSEC_API_CRYPTO_ALG_AES_CBC_192 | |
IPSEC_API_CRYPTO_ALG_AES_CBC_256 | |
IPSEC_API_CRYPTO_ALG_AES_CTR_128 | |
IPSEC_API_CRYPTO_ALG_AES_CTR_192 | |
IPSEC_API_CRYPTO_ALG_AES_CTR_256 | |
IPSEC_API_CRYPTO_ALG_AES_GCM_128 | |
IPSEC_API_CRYPTO_ALG_AES_GCM_192 | |
IPSEC_API_CRYPTO_ALG_AES_GCM_256 | |
IPSEC_API_CRYPTO_ALG_DES_CBC | |
IPSEC_API_CRYPTO_ALG_3DES_CBC | |
Definition at line 24 of file ipsec_types.api.
◆ ipsec_integ_alg
Enumerator |
---|
IPSEC_API_INTEG_ALG_NONE | |
IPSEC_API_INTEG_ALG_MD5_96 | |
IPSEC_API_INTEG_ALG_SHA1_96 | |
IPSEC_API_INTEG_ALG_SHA_256_96 | |
IPSEC_API_INTEG_ALG_SHA_256_128 | |
IPSEC_API_INTEG_ALG_SHA_384_192 | |
IPSEC_API_INTEG_ALG_SHA_512_256 | |
Definition at line 43 of file ipsec_types.api.
◆ ipsec_proto
Enumerator |
---|
IPSEC_API_PROTO_ESP | |
IPSEC_API_PROTO_AH | |
Definition at line 76 of file ipsec_types.api.
◆ ipsec_sad_flags
Enumerator |
---|
IPSEC_API_SAD_FLAG_NONE | |
IPSEC_API_SAD_FLAG_USE_ESN | |
IPSEC_API_SAD_FLAG_USE_ANTI_REPLAY | |
IPSEC_API_SAD_FLAG_IS_TUNNEL | |
IPSEC_API_SAD_FLAG_IS_TUNNEL_V6 | |
IPSEC_API_SAD_FLAG_UDP_ENCAP | |
Definition at line 60 of file ipsec_types.api.
◆ api
import vnet ip ip_types api |
◆ crypto_algorithm
vl_api_ipsec_crypto_alg_t crypto_algorithm |
◆ crypto_key
◆ data
◆ flags
vl_api_ipsec_sad_flags_t flags |
◆ integrity_algorithm
vl_api_ipsec_integ_alg_t integrity_algorithm |
◆ integrity_key
vl_api_key_t integrity_key |
◆ ipsec_sad_entry
Initial value:
IPsec: Security Association Database entry.
- Template Parameters
-
client_index | - opaque cookie to identify the sender |
context | - sender context, to match reply w/ request |
is_add | - add SAD entry if non-zero, else delete |
sad_id | - sad id |
spi | - security parameter index |
protocol | - 0 = AH, 1 = ESP |
crypto_algorithm | - a supported crypto algorithm |
crypto_key | - crypto keying material |
integrity_algorithm | - one of the supported algorithms |
integrity_key | - integrity keying material |
tunnel_src_address | - IPsec tunnel source address IPv6 if is_tunnel_ipv6 is non-zero, else IPv4. Only valid if is_tunnel is non-zero |
tunnel_dst_address | - IPsec tunnel destination address IPv6 if is_tunnel_ipv6 is non-zero, else IPv4. Only valid if is_tunnel is non-zero |
tx_table_id | - the FIB id used for encapsulated packets |
salt | - for use with counter mode ciphers |
Definition at line 107 of file ipsec_types.api.
◆ key
◆ protocol
vl_api_ipsec_proto_t protocol |
◆ salt
◆ spi
◆ tunnel_dst
vl_api_address_t tunnel_dst |
◆ tunnel_src
vl_api_address_t tunnel_src |
◆ tx_table_id
◆ version