From: Dmitry Eremin-Solenikov <dmitry.ereminsoleni...@linaro.org> IPsec allows one to use NH=59 packets to mangle traffic/packet statistics. Add an event to deliver information about such packet to application. Delivery of such events in SYNC mode is TBD.
Signed-off-by: Dmitry Eremin-Solenikov <dmitry.ereminsoleni...@linaro.org> --- /** Email created from pull request 329 (lumag:ipsec-tfc) ** https://github.com/Linaro/odp/pull/329 ** Patch: https://github.com/Linaro/odp/pull/329.patch ** Base sha: 0980001e33b4190133d478a0aa2e718fd1e3c164 ** Merge commit sha: e21e3f5f12faf7775b8d0e993a95dd377130f4c7 **/ include/odp/api/spec/ipsec.h | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/include/odp/api/spec/ipsec.h b/include/odp/api/spec/ipsec.h index 86803cecf..7346feb4f 100644 --- a/include/odp/api/spec/ipsec.h +++ b/include/odp/api/spec/ipsec.h @@ -1148,6 +1148,14 @@ typedef enum odp_ipsec_status_id_t { */ ODP_IPSEC_STATUS_SA_DISABLE = 0, + /** Received dummy packet with NextHeader set to NoNextHeader + * + * Following status event (odp_ipsec_status_t) fields have valid + * content, other fields must be ignored: + * - sa: The SA that caused the warning + */ + ODP_IPSEC_STATUS_NONH, + /** Warning from inline IPSEC processing * * Following status event (odp_ipsec_status_t) fields have valid