Deleted Added
full compact
ipsec.h (106680) ipsec.h (119643)
1/* $FreeBSD: head/sys/netipsec/ipsec.h 106680 2002-11-08 23:37:50Z sam $ */
1/* $FreeBSD: head/sys/netipsec/ipsec.h 119643 2003-09-01 05:35:55Z sam $ */
2/* $KAME: ipsec.h,v 1.53 2001/11/20 08:32:38 itojun Exp $ */
3
4/*
5 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
6 * All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions

--- 56 unchanged lines hidden (view full) ---

66 gid_t gids;
67 gid_t gidd;
68#endif
69};
70
71/* Security Policy Data Base */
72struct secpolicy {
73 LIST_ENTRY(secpolicy) chain;
2/* $KAME: ipsec.h,v 1.53 2001/11/20 08:32:38 itojun Exp $ */
3
4/*
5 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
6 * All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions

--- 56 unchanged lines hidden (view full) ---

66 gid_t gids;
67 gid_t gidd;
68#endif
69};
70
71/* Security Policy Data Base */
72struct secpolicy {
73 LIST_ENTRY(secpolicy) chain;
74 struct mtx lock;
74
75 u_int refcnt; /* reference count */
76 struct secpolicyindex spidx; /* selector */
77 u_int32_t id; /* It's unique number on the system. */
78 u_int state; /* 0: dead, others: alive */
79#define IPSEC_SPSTATE_DEAD 0
80#define IPSEC_SPSTATE_ALIVE 1
81

--- 21 unchanged lines hidden (view full) ---

103 /* pointer to next structure */
104 /* If NULL, it means the end of chain. */
105 struct secasindex saidx;/* hint for search proper SA */
106 /* if __ss_len == 0 then no address specified.*/
107 u_int level; /* IPsec level defined below. */
108
109 struct secasvar *sav; /* place holder of SA for use */
110 struct secpolicy *sp; /* back pointer to SP */
75
76 u_int refcnt; /* reference count */
77 struct secpolicyindex spidx; /* selector */
78 u_int32_t id; /* It's unique number on the system. */
79 u_int state; /* 0: dead, others: alive */
80#define IPSEC_SPSTATE_DEAD 0
81#define IPSEC_SPSTATE_ALIVE 1
82

--- 21 unchanged lines hidden (view full) ---

104 /* pointer to next structure */
105 /* If NULL, it means the end of chain. */
106 struct secasindex saidx;/* hint for search proper SA */
107 /* if __ss_len == 0 then no address specified.*/
108 u_int level; /* IPsec level defined below. */
109
110 struct secasvar *sav; /* place holder of SA for use */
111 struct secpolicy *sp; /* back pointer to SP */
112 struct mtx lock; /* to interlock updates */
111};
112
113/* security policy in PCB */
114struct inpcbpolicy {
115 struct secpolicy *sp_in;
116 struct secpolicy *sp_out;
117 int priv; /* privileged socket ? */
118};

--- 198 unchanged lines hidden (view full) ---

317extern int ip4_ipsec_ecn;
318extern int ip4_esp_randpad;
319extern int crypto_support;
320
321#define ipseclog(x) do { if (ipsec_debug) log x; } while (0)
322/* for openbsd compatibility */
323#define DPRINTF(x) do { if (ipsec_debug) printf x; } while (0)
324
113};
114
115/* security policy in PCB */
116struct inpcbpolicy {
117 struct secpolicy *sp_in;
118 struct secpolicy *sp_out;
119 int priv; /* privileged socket ? */
120};

--- 198 unchanged lines hidden (view full) ---

319extern int ip4_ipsec_ecn;
320extern int ip4_esp_randpad;
321extern int crypto_support;
322
323#define ipseclog(x) do { if (ipsec_debug) log x; } while (0)
324/* for openbsd compatibility */
325#define DPRINTF(x) do { if (ipsec_debug) printf x; } while (0)
326
327extern struct ipsecrequest *ipsec_newisr(void);
328extern void ipsec_delisr(struct ipsecrequest *);
329
325struct tdb_ident;
326extern struct secpolicy *ipsec_getpolicy __P((struct tdb_ident*, u_int));
327struct inpcb;
328extern struct secpolicy *ipsec4_checkpolicy __P((struct mbuf *, u_int, u_int,
329 int *, struct inpcb *));
330extern struct secpolicy *ipsec_getpolicybysock(struct mbuf *, u_int,
331 struct inpcb *, int *);
332extern struct secpolicy * ipsec_getpolicybyaddr(struct mbuf *, u_int,

--- 60 unchanged lines hidden ---
330struct tdb_ident;
331extern struct secpolicy *ipsec_getpolicy __P((struct tdb_ident*, u_int));
332struct inpcb;
333extern struct secpolicy *ipsec4_checkpolicy __P((struct mbuf *, u_int, u_int,
334 int *, struct inpcb *));
335extern struct secpolicy *ipsec_getpolicybysock(struct mbuf *, u_int,
336 struct inpcb *, int *);
337extern struct secpolicy * ipsec_getpolicybyaddr(struct mbuf *, u_int,

--- 60 unchanged lines hidden ---