summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--sbin/ipsecctl/ipsecctl.h4
-rw-r--r--sbin/ipsecctl/parse.y3
-rw-r--r--sbin/ipsecctl/pfkdump.c7
3 files changed, 10 insertions, 4 deletions
diff --git a/sbin/ipsecctl/ipsecctl.h b/sbin/ipsecctl/ipsecctl.h
index f95440e39c4..0df75eac73d 100644
--- a/sbin/ipsecctl/ipsecctl.h
+++ b/sbin/ipsecctl/ipsecctl.h
@@ -1,4 +1,4 @@
-/* $OpenBSD: ipsecctl.h,v 1.67 2012/07/10 13:58:33 lteo Exp $ */
+/* $OpenBSD: ipsecctl.h,v 1.68 2015/11/04 12:46:13 mikeb Exp $ */
/*
* Copyright (c) 2004, 2005 Hans-Joerg Hoexer <hshoexer@openbsd.org>
*
@@ -67,7 +67,7 @@ enum {
ENCXF_AES_128_CTR, ENCXF_AES_192_CTR, ENCXF_AES_256_CTR,
ENCXF_AES_128_GCM, ENCXF_AES_192_GCM, ENCXF_AES_256_GCM,
ENCXF_AES_128_GMAC, ENCXF_AES_192_GMAC, ENCXF_AES_256_GMAC,
- ENCXF_BLOWFISH, ENCXF_CAST128, ENCXF_NULL
+ ENCXF_BLOWFISH, ENCXF_CAST128, ENCXF_CHACHA20_POLY1305, ENCXF_NULL
};
enum {
COMPXF_UNKNOWN, COMPXF_DEFLATE, COMPXF_LZS
diff --git a/sbin/ipsecctl/parse.y b/sbin/ipsecctl/parse.y
index cab02d25c40..46748f61d17 100644
--- a/sbin/ipsecctl/parse.y
+++ b/sbin/ipsecctl/parse.y
@@ -1,4 +1,4 @@
-/* $OpenBSD: parse.y,v 1.162 2015/06/03 02:24:36 millert Exp $ */
+/* $OpenBSD: parse.y,v 1.163 2015/11/04 12:46:13 mikeb Exp $ */
/*
* Copyright (c) 2002, 2003, 2004 Henning Brauer <henning@openbsd.org>
@@ -122,6 +122,7 @@ const struct ipsec_xf encxfs[] = {
{ "aes-256-gmac", ENCXF_AES_256_GMAC, 32+4, 32+4, 1, 1 },
{ "blowfish", ENCXF_BLOWFISH, 5, 56, 0, 0 },
{ "cast128", ENCXF_CAST128, 5, 16, 0, 0 },
+ { "chacha20-poly1305", ENCXF_CHACHA20_POLY1305, 32+4, 32+4, 1, 1 },
{ "null", ENCXF_NULL, 0, 0, 0, 0 },
{ NULL, 0, 0, 0, 0, 0 },
};
diff --git a/sbin/ipsecctl/pfkdump.c b/sbin/ipsecctl/pfkdump.c
index feead80eccc..a54d70f0779 100644
--- a/sbin/ipsecctl/pfkdump.c
+++ b/sbin/ipsecctl/pfkdump.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: pfkdump.c,v 1.39 2015/04/17 10:04:37 mikeb Exp $ */
+/* $OpenBSD: pfkdump.c,v 1.40 2015/11/04 12:46:13 mikeb Exp $ */
/*
* Copyright (c) 2003 Markus Friedl. All rights reserved.
@@ -151,6 +151,7 @@ struct idname auth_types[] = {
{ SADB_X_AALG_AES128GMAC, "gmac-aes-128", NULL },
{ SADB_X_AALG_AES192GMAC, "gmac-aes-192", NULL },
{ SADB_X_AALG_AES256GMAC, "gmac-aes-256", NULL },
+ { SADB_X_AALG_CHACHA20POLY1305, "chacha20-poly1305", NULL },
{ 0, NULL, NULL }
};
@@ -171,6 +172,7 @@ struct idname enc_types[] = {
{ SADB_EALG_NULL, "null", NULL },
{ SADB_X_EALG_RC4, "rc4", NULL },
{ SADB_X_EALG_RC5, "rc5", NULL },
+ { SADB_X_EALG_CHACHA20POLY1305, "chacha20-poly1305", NULL },
{ 0, NULL, NULL }
};
@@ -745,6 +747,9 @@ pfkey_print_sa(struct sadb_msg *msg, int opts)
case SADB_X_EALG_CAST:
xfs.encxf = &encxfs[ENCXF_CAST128];
break;
+ case SADB_X_EALG_CHACHA20POLY1305:
+ xfs.encxf = &encxfs[ENCXF_CHACHA20_POLY1305];
+ break;
case SADB_EALG_NULL:
xfs.encxf = &encxfs[ENCXF_NULL];
break;