| #ifndef _LINUX_XFRM_H |
| #define _LINUX_XFRM_H |
| |
| #include <linux/types.h> |
| |
| /* All of the structures in this file may not change size as they are |
| * passed into the kernel from userspace via netlink sockets. |
| */ |
| |
| /* Structure to encapsulate addresses. I do not want to use |
| * "standard" structure. My apologies. |
| */ |
| typedef union |
| { |
| __u32 a4; |
| __u32 a6[4]; |
| } xfrm_address_t; |
| |
| /* Ident of a specific xfrm_state. It is used on input to lookup |
| * the state by (spi,daddr,ah/esp) or to store information about |
| * spi, protocol and tunnel address on output. |
| */ |
| struct xfrm_id |
| { |
| xfrm_address_t daddr; |
| __u32 spi; |
| __u8 proto; |
| }; |
| |
| struct xfrm_sec_ctx { |
| __u8 ctx_doi; |
| __u8 ctx_alg; |
| __u16 ctx_len; |
| __u32 ctx_sid; |
| char ctx_str[0]; |
| }; |
| |
| /* Security Context Domains of Interpretation */ |
| #define XFRM_SC_DOI_RESERVED 0 |
| #define XFRM_SC_DOI_LSM 1 |
| |
| /* Security Context Algorithms */ |
| #define XFRM_SC_ALG_RESERVED 0 |
| #define XFRM_SC_ALG_SELINUX 1 |
| |
| /* Selector, used as selector both on policy rules (SPD) and SAs. */ |
| |
| struct xfrm_selector |
| { |
| xfrm_address_t daddr; |
| xfrm_address_t saddr; |
| __u16 dport; |
| __u16 dport_mask; |
| __u16 sport; |
| __u16 sport_mask; |
| __u16 family; |
| __u8 prefixlen_d; |
| __u8 prefixlen_s; |
| __u8 proto; |
| int ifindex; |
| uid_t user; |
| }; |
| |
| #define XFRM_INF (~(__u64)0) |
| |
| struct xfrm_lifetime_cfg |
| { |
| __u64 soft_byte_limit; |
| __u64 hard_byte_limit; |
| __u64 soft_packet_limit; |
| __u64 hard_packet_limit; |
| __u64 soft_add_expires_seconds; |
| __u64 hard_add_expires_seconds; |
| __u64 soft_use_expires_seconds; |
| __u64 hard_use_expires_seconds; |
| }; |
| |
| struct xfrm_lifetime_cur |
| { |
| __u64 bytes; |
| __u64 packets; |
| __u64 add_time; |
| __u64 use_time; |
| }; |
| |
| struct xfrm_replay_state |
| { |
| __u32 oseq; |
| __u32 seq; |
| __u32 bitmap; |
| }; |
| |
| struct xfrm_algo { |
| char alg_name[64]; |
| int alg_key_len; /* in bits */ |
| char alg_key[0]; |
| }; |
| |
| struct xfrm_stats { |
| __u32 replay_window; |
| __u32 replay; |
| __u32 integrity_failed; |
| }; |
| |
| enum |
| { |
| XFRM_POLICY_IN = 0, |
| XFRM_POLICY_OUT = 1, |
| XFRM_POLICY_FWD = 2, |
| XFRM_POLICY_MAX = 3 |
| }; |
| |
| enum |
| { |
| XFRM_SHARE_ANY, /* No limitations */ |
| XFRM_SHARE_SESSION, /* For this session only */ |
| XFRM_SHARE_USER, /* For this user only */ |
| XFRM_SHARE_UNIQUE /* Use once */ |
| }; |
| |
| #define XFRM_MODE_TRANSPORT 0 |
| #define XFRM_MODE_TUNNEL 1 |
| #define XFRM_MODE_MAX 2 |
| |
| /* Netlink configuration messages. */ |
| enum { |
| XFRM_MSG_BASE = 0x10, |
| |
| XFRM_MSG_NEWSA = 0x10, |
| #define XFRM_MSG_NEWSA XFRM_MSG_NEWSA |
| XFRM_MSG_DELSA, |
| #define XFRM_MSG_DELSA XFRM_MSG_DELSA |
| XFRM_MSG_GETSA, |
| #define XFRM_MSG_GETSA XFRM_MSG_GETSA |
| |
| XFRM_MSG_NEWPOLICY, |
| #define XFRM_MSG_NEWPOLICY XFRM_MSG_NEWPOLICY |
| XFRM_MSG_DELPOLICY, |
| #define XFRM_MSG_DELPOLICY XFRM_MSG_DELPOLICY |
| XFRM_MSG_GETPOLICY, |
| #define XFRM_MSG_GETPOLICY XFRM_MSG_GETPOLICY |
| |
| XFRM_MSG_ALLOCSPI, |
| #define XFRM_MSG_ALLOCSPI XFRM_MSG_ALLOCSPI |
| XFRM_MSG_ACQUIRE, |
| #define XFRM_MSG_ACQUIRE XFRM_MSG_ACQUIRE |
| XFRM_MSG_EXPIRE, |
| #define XFRM_MSG_EXPIRE XFRM_MSG_EXPIRE |
| |
| XFRM_MSG_UPDPOLICY, |
| #define XFRM_MSG_UPDPOLICY XFRM_MSG_UPDPOLICY |
| XFRM_MSG_UPDSA, |
| #define XFRM_MSG_UPDSA XFRM_MSG_UPDSA |
| |
| XFRM_MSG_POLEXPIRE, |
| #define XFRM_MSG_POLEXPIRE XFRM_MSG_POLEXPIRE |
| |
| XFRM_MSG_FLUSHSA, |
| #define XFRM_MSG_FLUSHSA XFRM_MSG_FLUSHSA |
| XFRM_MSG_FLUSHPOLICY, |
| #define XFRM_MSG_FLUSHPOLICY XFRM_MSG_FLUSHPOLICY |
| |
| XFRM_MSG_NEWAE, |
| #define XFRM_MSG_NEWAE XFRM_MSG_NEWAE |
| XFRM_MSG_GETAE, |
| #define XFRM_MSG_GETAE XFRM_MSG_GETAE |
| __XFRM_MSG_MAX |
| }; |
| #define XFRM_MSG_MAX (__XFRM_MSG_MAX - 1) |
| |
| #define XFRM_NR_MSGTYPES (XFRM_MSG_MAX + 1 - XFRM_MSG_BASE) |
| |
| /* |
| * Generic LSM security context for comunicating to user space |
| * NOTE: Same format as sadb_x_sec_ctx |
| */ |
| struct xfrm_user_sec_ctx { |
| __u16 len; |
| __u16 exttype; |
| __u8 ctx_alg; /* LSMs: e.g., selinux == 1 */ |
| __u8 ctx_doi; |
| __u16 ctx_len; |
| }; |
| |
| struct xfrm_user_tmpl { |
| struct xfrm_id id; |
| __u16 family; |
| xfrm_address_t saddr; |
| __u32 reqid; |
| __u8 mode; |
| __u8 share; |
| __u8 optional; |
| __u32 aalgos; |
| __u32 ealgos; |
| __u32 calgos; |
| }; |
| |
| struct xfrm_encap_tmpl { |
| __u16 encap_type; |
| __u16 encap_sport; |
| __u16 encap_dport; |
| xfrm_address_t encap_oa; |
| }; |
| |
| /* AEVENT flags */ |
| enum xfrm_ae_ftype_t { |
| XFRM_AE_UNSPEC, |
| XFRM_AE_RTHR=1, /* replay threshold*/ |
| XFRM_AE_RVAL=2, /* replay value */ |
| XFRM_AE_LVAL=4, /* lifetime value */ |
| XFRM_AE_ETHR=8, /* expiry timer threshold */ |
| XFRM_AE_CR=16, /* Event cause is replay update */ |
| XFRM_AE_CE=32, /* Event cause is timer expiry */ |
| XFRM_AE_CU=64, /* Event cause is policy update */ |
| __XFRM_AE_MAX |
| |
| #define XFRM_AE_MAX (__XFRM_AE_MAX - 1) |
| }; |
| |
| /* Netlink message attributes. */ |
| enum xfrm_attr_type_t { |
| XFRMA_UNSPEC, |
| XFRMA_ALG_AUTH, /* struct xfrm_algo */ |
| XFRMA_ALG_CRYPT, /* struct xfrm_algo */ |
| XFRMA_ALG_COMP, /* struct xfrm_algo */ |
| XFRMA_ENCAP, /* struct xfrm_algo + struct xfrm_encap_tmpl */ |
| XFRMA_TMPL, /* 1 or more struct xfrm_user_tmpl */ |
| XFRMA_SA, |
| XFRMA_POLICY, |
| XFRMA_SEC_CTX, /* struct xfrm_sec_ctx */ |
| XFRMA_LTIME_VAL, |
| XFRMA_REPLAY_VAL, |
| XFRMA_REPLAY_THRESH, |
| XFRMA_ETIMER_THRESH, |
| __XFRMA_MAX |
| |
| #define XFRMA_MAX (__XFRMA_MAX - 1) |
| }; |
| |
| struct xfrm_usersa_info { |
| struct xfrm_selector sel; |
| struct xfrm_id id; |
| xfrm_address_t saddr; |
| struct xfrm_lifetime_cfg lft; |
| struct xfrm_lifetime_cur curlft; |
| struct xfrm_stats stats; |
| __u32 seq; |
| __u32 reqid; |
| __u16 family; |
| __u8 mode; /* 0=transport,1=tunnel */ |
| __u8 replay_window; |
| __u8 flags; |
| #define XFRM_STATE_NOECN 1 |
| #define XFRM_STATE_DECAP_DSCP 2 |
| #define XFRM_STATE_NOPMTUDISC 4 |
| }; |
| |
| struct xfrm_usersa_id { |
| xfrm_address_t daddr; |
| __u32 spi; |
| __u16 family; |
| __u8 proto; |
| }; |
| |
| struct xfrm_aevent_id { |
| struct xfrm_usersa_id sa_id; |
| __u32 flags; |
| }; |
| |
| struct xfrm_userspi_info { |
| struct xfrm_usersa_info info; |
| __u32 min; |
| __u32 max; |
| }; |
| |
| struct xfrm_userpolicy_info { |
| struct xfrm_selector sel; |
| struct xfrm_lifetime_cfg lft; |
| struct xfrm_lifetime_cur curlft; |
| __u32 priority; |
| __u32 index; |
| __u8 dir; |
| __u8 action; |
| #define XFRM_POLICY_ALLOW 0 |
| #define XFRM_POLICY_BLOCK 1 |
| __u8 flags; |
| #define XFRM_POLICY_LOCALOK 1 /* Allow user to override global policy */ |
| __u8 share; |
| }; |
| |
| struct xfrm_userpolicy_id { |
| struct xfrm_selector sel; |
| __u32 index; |
| __u8 dir; |
| }; |
| |
| struct xfrm_user_acquire { |
| struct xfrm_id id; |
| xfrm_address_t saddr; |
| struct xfrm_selector sel; |
| struct xfrm_userpolicy_info policy; |
| __u32 aalgos; |
| __u32 ealgos; |
| __u32 calgos; |
| __u32 seq; |
| }; |
| |
| struct xfrm_user_expire { |
| struct xfrm_usersa_info state; |
| __u8 hard; |
| }; |
| |
| struct xfrm_user_polexpire { |
| struct xfrm_userpolicy_info pol; |
| __u8 hard; |
| }; |
| |
| struct xfrm_usersa_flush { |
| __u8 proto; |
| }; |
| |
| #ifndef __KERNEL__ |
| /* backwards compatibility for userspace */ |
| #define XFRMGRP_ACQUIRE 1 |
| #define XFRMGRP_EXPIRE 2 |
| #define XFRMGRP_SA 4 |
| #define XFRMGRP_POLICY 8 |
| #endif |
| |
| enum xfrm_nlgroups { |
| XFRMNLGRP_NONE, |
| #define XFRMNLGRP_NONE XFRMNLGRP_NONE |
| XFRMNLGRP_ACQUIRE, |
| #define XFRMNLGRP_ACQUIRE XFRMNLGRP_ACQUIRE |
| XFRMNLGRP_EXPIRE, |
| #define XFRMNLGRP_EXPIRE XFRMNLGRP_EXPIRE |
| XFRMNLGRP_SA, |
| #define XFRMNLGRP_SA XFRMNLGRP_SA |
| XFRMNLGRP_POLICY, |
| #define XFRMNLGRP_POLICY XFRMNLGRP_POLICY |
| XFRMNLGRP_AEVENTS, |
| #define XFRMNLGRP_AEVENTS XFRMNLGRP_AEVENTS |
| __XFRMNLGRP_MAX |
| }; |
| #define XFRMNLGRP_MAX (__XFRMNLGRP_MAX - 1) |
| |
| #endif /* _LINUX_XFRM_H */ |