blob: 228b0b6306b04dcdaf7578606a4b4214b10c92a1 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/* PF_KEY user interface, this is defined by rfc2367 so
2 * do not make arbitrary modifications or else this header
3 * file will not be compliant.
4 */
5
6#ifndef _LINUX_PFKEY2_H
7#define _LINUX_PFKEY2_H
8
9#include <linux/types.h>
10
11#define PF_KEY_V2 2
12#define PFKEYV2_REVISION 199806L
13
14struct sadb_msg {
Arnd Bergmann9adfbfb2009-02-26 00:51:40 +010015 __u8 sadb_msg_version;
16 __u8 sadb_msg_type;
17 __u8 sadb_msg_errno;
18 __u8 sadb_msg_satype;
19 __u16 sadb_msg_len;
20 __u16 sadb_msg_reserved;
21 __u32 sadb_msg_seq;
22 __u32 sadb_msg_pid;
Linus Torvalds1da177e2005-04-16 15:20:36 -070023} __attribute__((packed));
24/* sizeof(struct sadb_msg) == 16 */
25
26struct sadb_ext {
Arnd Bergmann9adfbfb2009-02-26 00:51:40 +010027 __u16 sadb_ext_len;
28 __u16 sadb_ext_type;
Linus Torvalds1da177e2005-04-16 15:20:36 -070029} __attribute__((packed));
30/* sizeof(struct sadb_ext) == 4 */
31
32struct sadb_sa {
Arnd Bergmann9adfbfb2009-02-26 00:51:40 +010033 __u16 sadb_sa_len;
34 __u16 sadb_sa_exttype;
Al Virod29ef862006-11-08 00:23:42 -080035 __be32 sadb_sa_spi;
Arnd Bergmann9adfbfb2009-02-26 00:51:40 +010036 __u8 sadb_sa_replay;
37 __u8 sadb_sa_state;
38 __u8 sadb_sa_auth;
39 __u8 sadb_sa_encrypt;
40 __u32 sadb_sa_flags;
Linus Torvalds1da177e2005-04-16 15:20:36 -070041} __attribute__((packed));
42/* sizeof(struct sadb_sa) == 16 */
43
44struct sadb_lifetime {
Arnd Bergmann9adfbfb2009-02-26 00:51:40 +010045 __u16 sadb_lifetime_len;
46 __u16 sadb_lifetime_exttype;
47 __u32 sadb_lifetime_allocations;
48 __u64 sadb_lifetime_bytes;
49 __u64 sadb_lifetime_addtime;
50 __u64 sadb_lifetime_usetime;
Linus Torvalds1da177e2005-04-16 15:20:36 -070051} __attribute__((packed));
52/* sizeof(struct sadb_lifetime) == 32 */
53
54struct sadb_address {
Arnd Bergmann9adfbfb2009-02-26 00:51:40 +010055 __u16 sadb_address_len;
56 __u16 sadb_address_exttype;
57 __u8 sadb_address_proto;
58 __u8 sadb_address_prefixlen;
59 __u16 sadb_address_reserved;
Linus Torvalds1da177e2005-04-16 15:20:36 -070060} __attribute__((packed));
61/* sizeof(struct sadb_address) == 8 */
62
63struct sadb_key {
Arnd Bergmann9adfbfb2009-02-26 00:51:40 +010064 __u16 sadb_key_len;
65 __u16 sadb_key_exttype;
66 __u16 sadb_key_bits;
67 __u16 sadb_key_reserved;
Linus Torvalds1da177e2005-04-16 15:20:36 -070068} __attribute__((packed));
69/* sizeof(struct sadb_key) == 8 */
70
71struct sadb_ident {
Arnd Bergmann9adfbfb2009-02-26 00:51:40 +010072 __u16 sadb_ident_len;
73 __u16 sadb_ident_exttype;
74 __u16 sadb_ident_type;
75 __u16 sadb_ident_reserved;
76 __u64 sadb_ident_id;
Linus Torvalds1da177e2005-04-16 15:20:36 -070077} __attribute__((packed));
78/* sizeof(struct sadb_ident) == 16 */
79
80struct sadb_sens {
Arnd Bergmann9adfbfb2009-02-26 00:51:40 +010081 __u16 sadb_sens_len;
82 __u16 sadb_sens_exttype;
83 __u32 sadb_sens_dpd;
84 __u8 sadb_sens_sens_level;
85 __u8 sadb_sens_sens_len;
86 __u8 sadb_sens_integ_level;
87 __u8 sadb_sens_integ_len;
88 __u32 sadb_sens_reserved;
Linus Torvalds1da177e2005-04-16 15:20:36 -070089} __attribute__((packed));
90/* sizeof(struct sadb_sens) == 16 */
91
92/* followed by:
Arnd Bergmann9adfbfb2009-02-26 00:51:40 +010093 __u64 sadb_sens_bitmap[sens_len];
94 __u64 sadb_integ_bitmap[integ_len]; */
Linus Torvalds1da177e2005-04-16 15:20:36 -070095
96struct sadb_prop {
Arnd Bergmann9adfbfb2009-02-26 00:51:40 +010097 __u16 sadb_prop_len;
98 __u16 sadb_prop_exttype;
99 __u8 sadb_prop_replay;
100 __u8 sadb_prop_reserved[3];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700101} __attribute__((packed));
102/* sizeof(struct sadb_prop) == 8 */
103
104/* followed by:
105 struct sadb_comb sadb_combs[(sadb_prop_len +
Arnd Bergmann9adfbfb2009-02-26 00:51:40 +0100106 sizeof(__u64) - sizeof(struct sadb_prop)) /
Alexey Dobriyan323579882006-01-15 02:12:54 +0100107 sizeof(struct sadb_comb)]; */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700108
109struct sadb_comb {
Arnd Bergmann9adfbfb2009-02-26 00:51:40 +0100110 __u8 sadb_comb_auth;
111 __u8 sadb_comb_encrypt;
112 __u16 sadb_comb_flags;
113 __u16 sadb_comb_auth_minbits;
114 __u16 sadb_comb_auth_maxbits;
115 __u16 sadb_comb_encrypt_minbits;
116 __u16 sadb_comb_encrypt_maxbits;
117 __u32 sadb_comb_reserved;
118 __u32 sadb_comb_soft_allocations;
119 __u32 sadb_comb_hard_allocations;
120 __u64 sadb_comb_soft_bytes;
121 __u64 sadb_comb_hard_bytes;
122 __u64 sadb_comb_soft_addtime;
123 __u64 sadb_comb_hard_addtime;
124 __u64 sadb_comb_soft_usetime;
125 __u64 sadb_comb_hard_usetime;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700126} __attribute__((packed));
127/* sizeof(struct sadb_comb) == 72 */
128
129struct sadb_supported {
Arnd Bergmann9adfbfb2009-02-26 00:51:40 +0100130 __u16 sadb_supported_len;
131 __u16 sadb_supported_exttype;
132 __u32 sadb_supported_reserved;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700133} __attribute__((packed));
134/* sizeof(struct sadb_supported) == 8 */
135
136/* followed by:
137 struct sadb_alg sadb_algs[(sadb_supported_len +
Arnd Bergmann9adfbfb2009-02-26 00:51:40 +0100138 sizeof(__u64) - sizeof(struct sadb_supported)) /
Linus Torvalds1da177e2005-04-16 15:20:36 -0700139 sizeof(struct sadb_alg)]; */
140
141struct sadb_alg {
Arnd Bergmann9adfbfb2009-02-26 00:51:40 +0100142 __u8 sadb_alg_id;
143 __u8 sadb_alg_ivlen;
144 __u16 sadb_alg_minbits;
145 __u16 sadb_alg_maxbits;
146 __u16 sadb_alg_reserved;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700147} __attribute__((packed));
148/* sizeof(struct sadb_alg) == 8 */
149
150struct sadb_spirange {
Arnd Bergmann9adfbfb2009-02-26 00:51:40 +0100151 __u16 sadb_spirange_len;
152 __u16 sadb_spirange_exttype;
153 __u32 sadb_spirange_min;
154 __u32 sadb_spirange_max;
155 __u32 sadb_spirange_reserved;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700156} __attribute__((packed));
157/* sizeof(struct sadb_spirange) == 16 */
158
159struct sadb_x_kmprivate {
Arnd Bergmann9adfbfb2009-02-26 00:51:40 +0100160 __u16 sadb_x_kmprivate_len;
161 __u16 sadb_x_kmprivate_exttype;
162 __u32 sadb_x_kmprivate_reserved;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700163} __attribute__((packed));
164/* sizeof(struct sadb_x_kmprivate) == 8 */
165
166struct sadb_x_sa2 {
Arnd Bergmann9adfbfb2009-02-26 00:51:40 +0100167 __u16 sadb_x_sa2_len;
168 __u16 sadb_x_sa2_exttype;
169 __u8 sadb_x_sa2_mode;
170 __u8 sadb_x_sa2_reserved1;
171 __u16 sadb_x_sa2_reserved2;
172 __u32 sadb_x_sa2_sequence;
173 __u32 sadb_x_sa2_reqid;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700174} __attribute__((packed));
175/* sizeof(struct sadb_x_sa2) == 16 */
176
177struct sadb_x_policy {
Arnd Bergmann9adfbfb2009-02-26 00:51:40 +0100178 __u16 sadb_x_policy_len;
179 __u16 sadb_x_policy_exttype;
180 __u16 sadb_x_policy_type;
181 __u8 sadb_x_policy_dir;
182 __u8 sadb_x_policy_reserved;
183 __u32 sadb_x_policy_id;
184 __u32 sadb_x_policy_priority;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700185} __attribute__((packed));
186/* sizeof(struct sadb_x_policy) == 16 */
187
188struct sadb_x_ipsecrequest {
Arnd Bergmann9adfbfb2009-02-26 00:51:40 +0100189 __u16 sadb_x_ipsecrequest_len;
190 __u16 sadb_x_ipsecrequest_proto;
191 __u8 sadb_x_ipsecrequest_mode;
192 __u8 sadb_x_ipsecrequest_level;
193 __u16 sadb_x_ipsecrequest_reserved1;
194 __u32 sadb_x_ipsecrequest_reqid;
195 __u32 sadb_x_ipsecrequest_reserved2;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700196} __attribute__((packed));
197/* sizeof(struct sadb_x_ipsecrequest) == 16 */
198
199/* This defines the TYPE of Nat Traversal in use. Currently only one
200 * type of NAT-T is supported, draft-ietf-ipsec-udp-encaps-06
201 */
202struct sadb_x_nat_t_type {
Arnd Bergmann9adfbfb2009-02-26 00:51:40 +0100203 __u16 sadb_x_nat_t_type_len;
204 __u16 sadb_x_nat_t_type_exttype;
205 __u8 sadb_x_nat_t_type_type;
206 __u8 sadb_x_nat_t_type_reserved[3];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700207} __attribute__((packed));
208/* sizeof(struct sadb_x_nat_t_type) == 8 */
209
210/* Pass a NAT Traversal port (Source or Dest port) */
211struct sadb_x_nat_t_port {
Arnd Bergmann9adfbfb2009-02-26 00:51:40 +0100212 __u16 sadb_x_nat_t_port_len;
213 __u16 sadb_x_nat_t_port_exttype;
Al Virod29ef862006-11-08 00:23:42 -0800214 __be16 sadb_x_nat_t_port_port;
Arnd Bergmann9adfbfb2009-02-26 00:51:40 +0100215 __u16 sadb_x_nat_t_port_reserved;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700216} __attribute__((packed));
217/* sizeof(struct sadb_x_nat_t_port) == 8 */
218
Trent Jaegerdf718372005-12-13 23:12:27 -0800219/* Generic LSM security context */
220struct sadb_x_sec_ctx {
Arnd Bergmann9adfbfb2009-02-26 00:51:40 +0100221 __u16 sadb_x_sec_len;
222 __u16 sadb_x_sec_exttype;
223 __u8 sadb_x_ctx_alg; /* LSMs: e.g., selinux == 1 */
224 __u8 sadb_x_ctx_doi;
225 __u16 sadb_x_ctx_len;
Trent Jaegerdf718372005-12-13 23:12:27 -0800226} __attribute__((packed));
227/* sizeof(struct sadb_sec_ctx) = 8 */
228
Arnaud Ebalard13c1d182008-10-05 13:33:42 -0700229/* Used by MIGRATE to pass addresses IKE will use to perform
230 * negotiation with the peer */
231struct sadb_x_kmaddress {
Arnd Bergmann9adfbfb2009-02-26 00:51:40 +0100232 __u16 sadb_x_kmaddress_len;
233 __u16 sadb_x_kmaddress_exttype;
234 __u32 sadb_x_kmaddress_reserved;
Arnaud Ebalard13c1d182008-10-05 13:33:42 -0700235} __attribute__((packed));
236/* sizeof(struct sadb_x_kmaddress) == 8 */
237
Linus Torvalds1da177e2005-04-16 15:20:36 -0700238/* Message types */
239#define SADB_RESERVED 0
240#define SADB_GETSPI 1
241#define SADB_UPDATE 2
242#define SADB_ADD 3
243#define SADB_DELETE 4
244#define SADB_GET 5
245#define SADB_ACQUIRE 6
246#define SADB_REGISTER 7
247#define SADB_EXPIRE 8
248#define SADB_FLUSH 9
249#define SADB_DUMP 10
250#define SADB_X_PROMISC 11
251#define SADB_X_PCHANGE 12
252#define SADB_X_SPDUPDATE 13
253#define SADB_X_SPDADD 14
254#define SADB_X_SPDDELETE 15
255#define SADB_X_SPDGET 16
256#define SADB_X_SPDACQUIRE 17
257#define SADB_X_SPDDUMP 18
258#define SADB_X_SPDFLUSH 19
259#define SADB_X_SPDSETIDX 20
260#define SADB_X_SPDEXPIRE 21
261#define SADB_X_SPDDELETE2 22
262#define SADB_X_NAT_T_NEW_MAPPING 23
Shinta Sugimoto08de61b2007-02-08 13:14:33 -0800263#define SADB_X_MIGRATE 24
264#define SADB_MAX 24
Linus Torvalds1da177e2005-04-16 15:20:36 -0700265
266/* Security Association flags */
267#define SADB_SAFLAGS_PFS 1
Herbert Xudd871472005-06-20 13:21:43 -0700268#define SADB_SAFLAGS_NOPMTUDISC 0x20000000
Linus Torvalds1da177e2005-04-16 15:20:36 -0700269#define SADB_SAFLAGS_DECAP_DSCP 0x40000000
270#define SADB_SAFLAGS_NOECN 0x80000000
271
272/* Security Association states */
273#define SADB_SASTATE_LARVAL 0
274#define SADB_SASTATE_MATURE 1
275#define SADB_SASTATE_DYING 2
276#define SADB_SASTATE_DEAD 3
277#define SADB_SASTATE_MAX 3
278
279/* Security Association types */
280#define SADB_SATYPE_UNSPEC 0
281#define SADB_SATYPE_AH 2
282#define SADB_SATYPE_ESP 3
283#define SADB_SATYPE_RSVP 5
284#define SADB_SATYPE_OSPFV2 6
285#define SADB_SATYPE_RIPV2 7
286#define SADB_SATYPE_MIP 8
287#define SADB_X_SATYPE_IPCOMP 9
288#define SADB_SATYPE_MAX 9
289
290/* Authentication algorithms */
291#define SADB_AALG_NONE 0
292#define SADB_AALG_MD5HMAC 2
293#define SADB_AALG_SHA1HMAC 3
294#define SADB_X_AALG_SHA2_256HMAC 5
295#define SADB_X_AALG_SHA2_384HMAC 6
296#define SADB_X_AALG_SHA2_512HMAC 7
297#define SADB_X_AALG_RIPEMD160HMAC 8
Kazunori MIYAZAWA7cf4c1a2006-10-28 13:21:22 +1000298#define SADB_X_AALG_AES_XCBC_MAC 9
Linus Torvalds1da177e2005-04-16 15:20:36 -0700299#define SADB_X_AALG_NULL 251 /* kame */
300#define SADB_AALG_MAX 251
301
302/* Encryption algorithms */
303#define SADB_EALG_NONE 0
304#define SADB_EALG_DESCBC 2
305#define SADB_EALG_3DESCBC 3
306#define SADB_X_EALG_CASTCBC 6
307#define SADB_X_EALG_BLOWFISHCBC 7
308#define SADB_EALG_NULL 11
309#define SADB_X_EALG_AESCBC 12
Joy Latten405137d2008-02-07 23:11:56 -0800310#define SADB_X_EALG_AESCTR 13
Herbert Xu1a6509d2008-01-28 19:37:29 -0800311#define SADB_X_EALG_AES_CCM_ICV8 14
312#define SADB_X_EALG_AES_CCM_ICV12 15
313#define SADB_X_EALG_AES_CCM_ICV16 16
314#define SADB_X_EALG_AES_GCM_ICV8 18
315#define SADB_X_EALG_AES_GCM_ICV12 19
316#define SADB_X_EALG_AES_GCM_ICV16 20
Noriaki TAKAMIYA390fbd12006-10-22 15:02:48 +1000317#define SADB_X_EALG_CAMELLIACBC 22
Linus Torvalds1da177e2005-04-16 15:20:36 -0700318#define SADB_EALG_MAX 253 /* last EALG */
319/* private allocations should use 249-255 (RFC2407) */
320#define SADB_X_EALG_SERPENTCBC 252 /* draft-ietf-ipsec-ciph-aes-cbc-00 */
321#define SADB_X_EALG_TWOFISHCBC 253 /* draft-ietf-ipsec-ciph-aes-cbc-00 */
322
323/* Compression algorithms */
324#define SADB_X_CALG_NONE 0
325#define SADB_X_CALG_OUI 1
326#define SADB_X_CALG_DEFLATE 2
327#define SADB_X_CALG_LZS 3
328#define SADB_X_CALG_LZJH 4
329#define SADB_X_CALG_MAX 4
330
331/* Extension Header values */
332#define SADB_EXT_RESERVED 0
333#define SADB_EXT_SA 1
334#define SADB_EXT_LIFETIME_CURRENT 2
335#define SADB_EXT_LIFETIME_HARD 3
336#define SADB_EXT_LIFETIME_SOFT 4
337#define SADB_EXT_ADDRESS_SRC 5
338#define SADB_EXT_ADDRESS_DST 6
339#define SADB_EXT_ADDRESS_PROXY 7
340#define SADB_EXT_KEY_AUTH 8
341#define SADB_EXT_KEY_ENCRYPT 9
342#define SADB_EXT_IDENTITY_SRC 10
343#define SADB_EXT_IDENTITY_DST 11
344#define SADB_EXT_SENSITIVITY 12
345#define SADB_EXT_PROPOSAL 13
346#define SADB_EXT_SUPPORTED_AUTH 14
347#define SADB_EXT_SUPPORTED_ENCRYPT 15
348#define SADB_EXT_SPIRANGE 16
349#define SADB_X_EXT_KMPRIVATE 17
350#define SADB_X_EXT_POLICY 18
351#define SADB_X_EXT_SA2 19
352/* The next four entries are for setting up NAT Traversal */
353#define SADB_X_EXT_NAT_T_TYPE 20
354#define SADB_X_EXT_NAT_T_SPORT 21
355#define SADB_X_EXT_NAT_T_DPORT 22
356#define SADB_X_EXT_NAT_T_OA 23
Trent Jaegerdf718372005-12-13 23:12:27 -0800357#define SADB_X_EXT_SEC_CTX 24
Arnaud Ebalard13c1d182008-10-05 13:33:42 -0700358/* Used with MIGRATE to pass @ to IKE for negotiation */
359#define SADB_X_EXT_KMADDRESS 25
360#define SADB_EXT_MAX 25
Linus Torvalds1da177e2005-04-16 15:20:36 -0700361
362/* Identity Extension values */
363#define SADB_IDENTTYPE_RESERVED 0
364#define SADB_IDENTTYPE_PREFIX 1
365#define SADB_IDENTTYPE_FQDN 2
366#define SADB_IDENTTYPE_USERFQDN 3
367#define SADB_IDENTTYPE_MAX 3
368
369#endif /* !(_LINUX_PFKEY2_H) */