X-Git-Url: https://gerrit.fd.io/r/gitweb?a=blobdiff_plain;f=src%2Fvnet%2Fipsec%2Fipsec.api;h=68efe8f50f76020d83aeb56a91b6d93864058612;hb=2f4586d9b3507243918c11ce99b9d151d5bde7a0;hp=2e69e6250342dbd931839883f43593ea467e8831;hpb=f441b5d0ed8ff9d87412c1640dfec93e9cba03bd;p=vpp.git diff --git a/src/vnet/ipsec/ipsec.api b/src/vnet/ipsec/ipsec.api index 2e69e625034..68efe8f50f7 100644 --- a/src/vnet/ipsec/ipsec.api +++ b/src/vnet/ipsec/ipsec.api @@ -167,6 +167,7 @@ define ipsec_spd_details { define ipsec_sad_entry_add_del { option deprecated; + u32 client_index; u32 context; bool is_add; @@ -175,6 +176,8 @@ define ipsec_sad_entry_add_del define ipsec_sad_entry_add_del_v2 { + option deprecated; + u32 client_index; u32 context; bool is_add; @@ -188,12 +191,21 @@ define ipsec_sad_entry_add_del_v3 bool is_add; vl_api_ipsec_sad_entry_v3_t entry; }; + define ipsec_sad_entry_add { u32 client_index; u32 context; vl_api_ipsec_sad_entry_v3_t entry; }; + +define ipsec_sad_entry_add_v2 +{ + u32 client_index; + u32 context; + vl_api_ipsec_sad_entry_v4_t entry; +}; + autoreply define ipsec_sad_entry_del { u32 client_index; @@ -201,6 +213,29 @@ autoreply define ipsec_sad_entry_del u32 id; }; + +/** \brief An API to bind an SAD entry to a specific worker + + @param client_index - opaque cookie to identify the sender + @param context - sender context, to match reply w/ request + @param sa_id - the id of the SA to bind + @param worker - the worker's index to which the SA will be bound to + */ +autoreply define ipsec_sad_bind +{ + u32 client_index; + u32 context; + u32 sa_id; + u32 worker; +}; + +autoreply define ipsec_sad_unbind +{ + u32 client_index; + u32 context; + u32 sa_id; +}; + /** \brief An API to update the tunnel parameters and the ports associated with an SA Used in the NAT-T case when the NAT data changes @@ -226,6 +261,7 @@ autoreply define ipsec_sad_entry_update define ipsec_sad_entry_add_del_reply { option deprecated; + u32 context; i32 retval; u32 stat_index; @@ -233,6 +269,8 @@ define ipsec_sad_entry_add_del_reply define ipsec_sad_entry_add_del_v2_reply { + option deprecated; + u32 context; i32 retval; u32 stat_index; @@ -244,6 +282,7 @@ define ipsec_sad_entry_add_del_v3_reply i32 retval; u32 stat_index; }; + define ipsec_sad_entry_add_reply { u32 context; @@ -251,6 +290,13 @@ define ipsec_sad_entry_add_reply u32 stat_index; }; +define ipsec_sad_entry_add_v2_reply +{ + u32 context; + i32 retval; + u32 stat_index; +}; + /** \brief Add or Update Protection for a tunnel with IPSEC Tunnel protection directly associates an SA with all packets @@ -414,12 +460,15 @@ define ipsec_itf_details define ipsec_sa_dump { option deprecated; + u32 client_index; u32 context; u32 sa_id; }; define ipsec_sa_v2_dump { + option deprecated; + u32 client_index; u32 context; u32 sa_id; @@ -430,6 +479,18 @@ define ipsec_sa_v3_dump u32 context; u32 sa_id; }; +define ipsec_sa_v4_dump +{ + u32 client_index; + u32 context; + u32 sa_id; +}; +define ipsec_sa_v5_dump +{ + u32 client_index; + u32 context; + u32 sa_id; +}; /** \brief IPsec security association database response @param context - sender context which was passed in the request @@ -445,6 +506,7 @@ define ipsec_sa_v3_dump */ define ipsec_sa_details { option deprecated; + u32 context; vl_api_ipsec_sad_entry_t entry; @@ -457,6 +519,8 @@ define ipsec_sa_details { u32 stat_index; }; define ipsec_sa_v2_details { + option deprecated; + u32 context; vl_api_ipsec_sad_entry_v2_t entry; @@ -479,6 +543,28 @@ define ipsec_sa_v3_details { u32 stat_index; }; +define ipsec_sa_v4_details { + u32 context; + vl_api_ipsec_sad_entry_v3_t entry; + + vl_api_interface_index_t sw_if_index; + u64 seq_outbound; + u64 last_seq_inbound; + u64 replay_window; + u32 thread_index; + u32 stat_index; +}; +define ipsec_sa_v5_details { + u32 context; + vl_api_ipsec_sad_entry_v4_t entry; + + vl_api_interface_index_t sw_if_index; + u64 seq_outbound; + u64 last_seq_inbound; + u64 replay_window; + u32 thread_index; + u32 stat_index; +}; /** \brief Dump IPsec backends @param client_index - opaque cookie to identify the sender