blob: fd2ef742a9fd1e1c62d873a5cec2a9b78362c5da [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001#ifndef _LINUX_XFRM_H
2#define _LINUX_XFRM_H
3
4#include <linux/types.h>
5
6/* All of the structures in this file may not change size as they are
7 * passed into the kernel from userspace via netlink sockets.
8 */
9
10/* Structure to encapsulate addresses. I do not want to use
11 * "standard" structure. My apologies.
12 */
13typedef union
14{
15 __u32 a4;
16 __u32 a6[4];
17} xfrm_address_t;
18
19/* Ident of a specific xfrm_state. It is used on input to lookup
20 * the state by (spi,daddr,ah/esp) or to store information about
21 * spi, protocol and tunnel address on output.
22 */
23struct xfrm_id
24{
25 xfrm_address_t daddr;
26 __u32 spi;
27 __u8 proto;
28};
29
30/* Selector, used as selector both on policy rules (SPD) and SAs. */
31
32struct xfrm_selector
33{
34 xfrm_address_t daddr;
35 xfrm_address_t saddr;
36 __u16 dport;
37 __u16 dport_mask;
38 __u16 sport;
39 __u16 sport_mask;
40 __u16 family;
41 __u8 prefixlen_d;
42 __u8 prefixlen_s;
43 __u8 proto;
44 int ifindex;
45 uid_t user;
46};
47
48#define XFRM_INF (~(__u64)0)
49
50struct xfrm_lifetime_cfg
51{
52 __u64 soft_byte_limit;
53 __u64 hard_byte_limit;
54 __u64 soft_packet_limit;
55 __u64 hard_packet_limit;
56 __u64 soft_add_expires_seconds;
57 __u64 hard_add_expires_seconds;
58 __u64 soft_use_expires_seconds;
59 __u64 hard_use_expires_seconds;
60};
61
62struct xfrm_lifetime_cur
63{
64 __u64 bytes;
65 __u64 packets;
66 __u64 add_time;
67 __u64 use_time;
68};
69
70struct xfrm_replay_state
71{
72 __u32 oseq;
73 __u32 seq;
74 __u32 bitmap;
75};
76
77struct xfrm_algo {
78 char alg_name[64];
79 int alg_key_len; /* in bits */
80 char alg_key[0];
81};
82
83struct xfrm_stats {
84 __u32 replay_window;
85 __u32 replay;
86 __u32 integrity_failed;
87};
88
89enum
90{
91 XFRM_POLICY_IN = 0,
92 XFRM_POLICY_OUT = 1,
93 XFRM_POLICY_FWD = 2,
94 XFRM_POLICY_MAX = 3
95};
96
97enum
98{
99 XFRM_SHARE_ANY, /* No limitations */
100 XFRM_SHARE_SESSION, /* For this session only */
101 XFRM_SHARE_USER, /* For this user only */
102 XFRM_SHARE_UNIQUE /* Use once */
103};
104
105/* Netlink configuration messages. */
106enum {
107 XFRM_MSG_BASE = 0x10,
108
109 XFRM_MSG_NEWSA = 0x10,
110#define XFRM_MSG_NEWSA XFRM_MSG_NEWSA
111 XFRM_MSG_DELSA,
112#define XFRM_MSG_DELSA XFRM_MSG_DELSA
113 XFRM_MSG_GETSA,
114#define XFRM_MSG_GETSA XFRM_MSG_GETSA
115
116 XFRM_MSG_NEWPOLICY,
117#define XFRM_MSG_NEWPOLICY XFRM_MSG_NEWPOLICY
118 XFRM_MSG_DELPOLICY,
119#define XFRM_MSG_DELPOLICY XFRM_MSG_DELPOLICY
120 XFRM_MSG_GETPOLICY,
121#define XFRM_MSG_GETPOLICY XFRM_MSG_GETPOLICY
122
123 XFRM_MSG_ALLOCSPI,
124#define XFRM_MSG_ALLOCSPI XFRM_MSG_ALLOCSPI
125 XFRM_MSG_ACQUIRE,
126#define XFRM_MSG_ACQUIRE XFRM_MSG_ACQUIRE
127 XFRM_MSG_EXPIRE,
128#define XFRM_MSG_EXPIRE XFRM_MSG_EXPIRE
129
130 XFRM_MSG_UPDPOLICY,
131#define XFRM_MSG_UPDPOLICY XFRM_MSG_UPDPOLICY
132 XFRM_MSG_UPDSA,
133#define XFRM_MSG_UPDSA XFRM_MSG_UPDSA
134
135 XFRM_MSG_POLEXPIRE,
136#define XFRM_MSG_POLEXPIRE XFRM_MSG_POLEXPIRE
137
138 XFRM_MSG_FLUSHSA,
139#define XFRM_MSG_FLUSHSA XFRM_MSG_FLUSHSA
140 XFRM_MSG_FLUSHPOLICY,
141#define XFRM_MSG_FLUSHPOLICY XFRM_MSG_FLUSHPOLICY
142
Thomas Graf526bdb82005-05-03 14:26:01 -0700143 __XFRM_MSG_MAX
Linus Torvalds1da177e2005-04-16 15:20:36 -0700144};
Thomas Graf526bdb82005-05-03 14:26:01 -0700145#define XFRM_MSG_MAX (__XFRM_MSG_MAX - 1)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700146
Thomas Graf492b5582005-05-03 14:26:40 -0700147#define XFRM_NR_MSGTYPES (XFRM_MSG_MAX + 1 - XFRM_MSG_BASE)
148
Linus Torvalds1da177e2005-04-16 15:20:36 -0700149struct xfrm_user_tmpl {
150 struct xfrm_id id;
151 __u16 family;
152 xfrm_address_t saddr;
153 __u32 reqid;
154 __u8 mode;
155 __u8 share;
156 __u8 optional;
157 __u32 aalgos;
158 __u32 ealgos;
159 __u32 calgos;
160};
161
162struct xfrm_encap_tmpl {
163 __u16 encap_type;
164 __u16 encap_sport;
165 __u16 encap_dport;
166 xfrm_address_t encap_oa;
167};
168
169/* Netlink message attributes. */
170enum xfrm_attr_type_t {
171 XFRMA_UNSPEC,
172 XFRMA_ALG_AUTH, /* struct xfrm_algo */
173 XFRMA_ALG_CRYPT, /* struct xfrm_algo */
174 XFRMA_ALG_COMP, /* struct xfrm_algo */
175 XFRMA_ENCAP, /* struct xfrm_algo + struct xfrm_encap_tmpl */
176 XFRMA_TMPL, /* 1 or more struct xfrm_user_tmpl */
177 __XFRMA_MAX
178
179#define XFRMA_MAX (__XFRMA_MAX - 1)
180};
181
182struct xfrm_usersa_info {
183 struct xfrm_selector sel;
184 struct xfrm_id id;
185 xfrm_address_t saddr;
186 struct xfrm_lifetime_cfg lft;
187 struct xfrm_lifetime_cur curlft;
188 struct xfrm_stats stats;
189 __u32 seq;
190 __u32 reqid;
191 __u16 family;
192 __u8 mode; /* 0=transport,1=tunnel */
193 __u8 replay_window;
194 __u8 flags;
195#define XFRM_STATE_NOECN 1
196#define XFRM_STATE_DECAP_DSCP 2
197};
198
199struct xfrm_usersa_id {
200 xfrm_address_t daddr;
201 __u32 spi;
202 __u16 family;
203 __u8 proto;
204};
205
206struct xfrm_userspi_info {
207 struct xfrm_usersa_info info;
208 __u32 min;
209 __u32 max;
210};
211
212struct xfrm_userpolicy_info {
213 struct xfrm_selector sel;
214 struct xfrm_lifetime_cfg lft;
215 struct xfrm_lifetime_cur curlft;
216 __u32 priority;
217 __u32 index;
218 __u8 dir;
219 __u8 action;
220#define XFRM_POLICY_ALLOW 0
221#define XFRM_POLICY_BLOCK 1
222 __u8 flags;
223#define XFRM_POLICY_LOCALOK 1 /* Allow user to override global policy */
224 __u8 share;
225};
226
227struct xfrm_userpolicy_id {
228 struct xfrm_selector sel;
229 __u32 index;
230 __u8 dir;
231};
232
233struct xfrm_user_acquire {
234 struct xfrm_id id;
235 xfrm_address_t saddr;
236 struct xfrm_selector sel;
237 struct xfrm_userpolicy_info policy;
238 __u32 aalgos;
239 __u32 ealgos;
240 __u32 calgos;
241 __u32 seq;
242};
243
244struct xfrm_user_expire {
245 struct xfrm_usersa_info state;
246 __u8 hard;
247};
248
249struct xfrm_user_polexpire {
250 struct xfrm_userpolicy_info pol;
251 __u8 hard;
252};
253
254struct xfrm_usersa_flush {
255 __u8 proto;
256};
257
258#define XFRMGRP_ACQUIRE 1
259#define XFRMGRP_EXPIRE 2
260
261#endif /* _LINUX_XFRM_H */