No empty .Rs/.Re
[netbsd-mini2440.git] / crypto / dist / ipsec-tools / src / racoon / policy.h
blob125b1aa03b2dc97a8f4fc878c9a04b9f4bbeace9
1 /* $NetBSD: policy.h,v 1.7 2007/05/31 19:54:55 manu Exp $ */
3 /* Id: policy.h,v 1.5 2004/06/11 16:00:17 ludvigm Exp */
5 /*
6 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
7 * All rights reserved.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the project nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
34 #ifndef _POLICY_H
35 #define _POLICY_H
37 #include <sys/queue.h>
40 #ifdef HAVE_SECCTX
41 #define MAX_CTXSTR_SIZE 50
42 struct security_ctx {
43 u_int8_t ctx_doi; /* Security Context DOI */
44 u_int8_t ctx_alg; /* Security Context Algorithm */
45 u_int16_t ctx_strlen; /* Security Context stringlength
46 * (includes terminating NULL)
48 char ctx_str[MAX_CTXSTR_SIZE]; /* Security Context string */
50 #endif
52 /* refs. ipsec.h */
54 * Security Policy Index
55 * NOTE: Ensure to be same address family and upper layer protocol.
56 * NOTE: ul_proto, port number, uid, gid:
57 * ANY: reserved for waldcard.
58 * 0 to (~0 - 1): is one of the number of each value.
60 struct policyindex {
61 u_int8_t dir; /* direction of packet flow, see blow */
62 struct sockaddr_storage src; /* IP src address for SP */
63 struct sockaddr_storage dst; /* IP dst address for SP */
64 u_int8_t prefs; /* prefix length in bits for src */
65 u_int8_t prefd; /* prefix length in bits for dst */
66 u_int16_t ul_proto; /* upper layer Protocol */
67 u_int32_t priority; /* priority for the policy */
68 u_int64_t created; /* Used for generated SPD entries deletion */
69 #ifdef HAVE_SECCTX
70 struct security_ctx sec_ctx; /* Security Context */
71 #endif
74 /* Security Policy Data Base */
75 struct secpolicy {
76 TAILQ_ENTRY(secpolicy) chain;
78 struct policyindex spidx; /* selector */
79 u_int32_t id; /* It's unique number on the system. */
81 u_int policy; /* DISCARD, NONE or IPSEC, see keyv2.h */
82 struct ipsecrequest *req;
83 /* pointer to the ipsec request tree, */
84 /* if policy == IPSEC else this value == NULL.*/
86 /* MIPv6 needs to perform negotiation of SA using different addresses
87 * than the endpoints of the SA (CoA for the source). In that case,
88 * MIGRATE msg provides that info (before movement occurs on the MN) */
89 struct sockaddr *local;
90 struct sockaddr *remote;
93 /* Security Assocciation Index */
94 /* NOTE: Ensure to be same address family */
95 struct secasindex {
96 struct sockaddr_storage src; /* srouce address for SA */
97 struct sockaddr_storage dst; /* destination address for SA */
98 u_int16_t proto; /* IPPROTO_ESP or IPPROTO_AH */
99 u_int8_t mode; /* mode of protocol, see ipsec.h */
100 u_int32_t reqid; /* reqid id who owned this SA */
101 /* see IPSEC_MANUAL_REQID_MAX. */
104 /* Request for IPsec */
105 struct ipsecrequest {
106 struct ipsecrequest *next;
107 /* pointer to next structure */
108 /* If NULL, it means the end of chain. */
110 struct secasindex saidx;/* hint for search proper SA */
111 /* if __ss_len == 0 then no address specified.*/
112 u_int level; /* IPsec level defined below. */
114 struct secpolicy *sp; /* back pointer to SP */
117 #ifdef HAVE_PFKEY_POLICY_PRIORITY
118 #define KEY_SETSECSPIDX(_dir, s, d, ps, pd, ulp, _priority, _created, idx) \
119 do { \
120 bzero((idx), sizeof(struct policyindex)); \
121 (idx)->dir = (_dir); \
122 (idx)->prefs = (ps); \
123 (idx)->prefd = (pd); \
124 (idx)->ul_proto = (ulp); \
125 (idx)->priority = (_priority); \
126 (idx)->created = (_created); \
127 memcpy(&(idx)->src, (s), sysdep_sa_len((struct sockaddr *)(s))); \
128 memcpy(&(idx)->dst, (d), sysdep_sa_len((struct sockaddr *)(d))); \
129 } while (0)
130 #else
131 #define KEY_SETSECSPIDX(_dir, s, d, ps, pd, ulp, _created, idx) \
132 do { \
133 bzero((idx), sizeof(struct policyindex)); \
134 (idx)->dir = (_dir); \
135 (idx)->prefs = (ps); \
136 (idx)->prefd = (pd); \
137 (idx)->ul_proto = (ulp); \
138 (idx)->created = (_created); \
139 memcpy(&(idx)->src, (s), sysdep_sa_len((struct sockaddr *)(s))); \
140 memcpy(&(idx)->dst, (d), sysdep_sa_len((struct sockaddr *)(d))); \
141 } while (0)
142 #endif
144 struct ph2handle;
145 struct policyindex;
146 extern struct secpolicy *getsp __P((struct policyindex *));
147 extern struct secpolicy *getsp_r __P((struct policyindex *));
148 struct secpolicy *getspbyspid __P((u_int32_t));
149 extern int cmpspidxstrict __P((struct policyindex *, struct policyindex *));
150 extern int cmpspidxwild __P((struct policyindex *, struct policyindex *));
151 extern struct secpolicy *newsp __P((void));
152 extern void delsp __P((struct secpolicy *));
153 extern void delsp_bothdir __P((struct policyindex *));
154 extern void inssp __P((struct secpolicy *));
155 extern void remsp __P((struct secpolicy *));
156 extern void flushsp __P((void));
157 extern void initsp __P((void));
158 extern struct ipsecrequest *newipsecreq __P((void));
160 extern const char *spidx2str __P((const struct policyindex *));
161 #ifdef HAVE_SECCTX
162 #include <selinux/selinux.h>
163 extern int get_security_context __P((vchar_t *, struct policyindex *));
164 extern void init_avc __P((void));
165 extern int within_range __P((security_context_t, security_context_t));
166 extern void set_secctx_in_proposal __P((struct ph2handle *, struct policyindex));
167 #endif
169 #endif /* _POLICY_H */