From: Dmitry Eremin-Solenikov <dmitry.ereminsoleni...@linaro.org>

IPsec allows one to use NH=59 packets to mangle traffic/packet
statistics. Add an event to deliver information about such packet to
application. Delivery of such events in SYNC mode is TBD.

Signed-off-by: Dmitry Eremin-Solenikov <dmitry.ereminsoleni...@linaro.org>
---
/** Email created from pull request 329 (lumag:ipsec-tfc)
 ** https://github.com/Linaro/odp/pull/329
 ** Patch: https://github.com/Linaro/odp/pull/329.patch
 ** Base sha: 0980001e33b4190133d478a0aa2e718fd1e3c164
 ** Merge commit sha: e21e3f5f12faf7775b8d0e993a95dd377130f4c7
 **/
 include/odp/api/spec/ipsec.h | 8 ++++++++
 1 file changed, 8 insertions(+)

diff --git a/include/odp/api/spec/ipsec.h b/include/odp/api/spec/ipsec.h
index 86803cecf..7346feb4f 100644
--- a/include/odp/api/spec/ipsec.h
+++ b/include/odp/api/spec/ipsec.h
@@ -1148,6 +1148,14 @@ typedef enum odp_ipsec_status_id_t {
         */
        ODP_IPSEC_STATUS_SA_DISABLE = 0,
 
+       /** Received dummy packet with NextHeader set to NoNextHeader
+        *
+        *  Following status event (odp_ipsec_status_t) fields have valid
+        *  content, other fields must be ignored:
+        *  - sa:       The SA that caused the warning
+        */
+       ODP_IPSEC_STATUS_NONH,
+
        /** Warning from inline IPSEC processing
         *
         *  Following status event (odp_ipsec_status_t) fields have valid

Reply via email to