Annotation of embedaddon/ipsec-tools/src/racoon/policy.h, revision 1.1

1.1     ! misho       1: /*     $NetBSD: policy.h,v 1.8 2008/12/05 06:02:20 tteras Exp $        */
        !             2: 
        !             3: /* Id: policy.h,v 1.5 2004/06/11 16:00:17 ludvigm Exp */
        !             4: 
        !             5: /*
        !             6:  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
        !             7:  * All rights reserved.
        !             8:  * 
        !             9:  * Redistribution and use in source and binary forms, with or without
        !            10:  * modification, are permitted provided that the following conditions
        !            11:  * are met:
        !            12:  * 1. Redistributions of source code must retain the above copyright
        !            13:  *    notice, this list of conditions and the following disclaimer.
        !            14:  * 2. Redistributions in binary form must reproduce the above copyright
        !            15:  *    notice, this list of conditions and the following disclaimer in the
        !            16:  *    documentation and/or other materials provided with the distribution.
        !            17:  * 3. Neither the name of the project nor the names of its contributors
        !            18:  *    may be used to endorse or promote products derived from this software
        !            19:  *    without specific prior written permission.
        !            20:  * 
        !            21:  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
        !            22:  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
        !            23:  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
        !            24:  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
        !            25:  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
        !            26:  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
        !            27:  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
        !            28:  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
        !            29:  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
        !            30:  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
        !            31:  * SUCH DAMAGE.
        !            32:  */
        !            33: 
        !            34: #ifndef _POLICY_H
        !            35: #define _POLICY_H
        !            36: 
        !            37: #include <sys/queue.h>
        !            38: 
        !            39: 
        !            40: #ifdef HAVE_SECCTX
        !            41: #define MAX_CTXSTR_SIZE 50
        !            42: struct security_ctx {
        !            43:        u_int8_t ctx_doi;       /* Security Context DOI */
        !            44:        u_int8_t ctx_alg;       /* Security Context Algorithm */
        !            45:        u_int16_t ctx_strlen;   /* Security Context stringlength
        !            46:                                 * (includes terminating NULL)
        !            47:                                 */
        !            48:        char ctx_str[MAX_CTXSTR_SIZE];  /* Security Context string */
        !            49: };
        !            50: #endif
        !            51: 
        !            52: /* refs. ipsec.h */
        !            53: /*
        !            54:  * Security Policy Index
        !            55:  * NOTE: Ensure to be same address family and upper layer protocol.
        !            56:  * NOTE: ul_proto, port number, uid, gid:
        !            57:  *     ANY: reserved for waldcard.
        !            58:  *     0 to (~0 - 1): is one of the number of each value.
        !            59:  */
        !            60: struct policyindex {
        !            61:        u_int8_t dir;                   /* direction of packet flow, see blow */
        !            62:        struct sockaddr_storage src;    /* IP src address for SP */
        !            63:        struct sockaddr_storage dst;    /* IP dst address for SP */
        !            64:        u_int8_t prefs;                 /* prefix length in bits for src */
        !            65:        u_int8_t prefd;                 /* prefix length in bits for dst */
        !            66:        u_int16_t ul_proto;             /* upper layer Protocol */
        !            67:        u_int32_t priority;             /* priority for the policy */
        !            68:        u_int64_t created;              /* Used for generated SPD entries deletion */
        !            69: #ifdef HAVE_SECCTX
        !            70:        struct security_ctx sec_ctx;    /* Security Context */
        !            71: #endif
        !            72: };
        !            73: 
        !            74: /* Security Policy Data Base */
        !            75: struct secpolicy {
        !            76:        TAILQ_ENTRY(secpolicy) chain;
        !            77: 
        !            78:        struct policyindex spidx;       /* selector */
        !            79:        u_int32_t id;                   /* It's unique number on the system. */
        !            80: 
        !            81:        u_int policy;           /* DISCARD, NONE or IPSEC, see keyv2.h */
        !            82:        struct ipsecrequest *req;
        !            83:                                /* pointer to the ipsec request tree, */
        !            84:                                /* if policy == IPSEC else this value == NULL.*/
        !            85: 
        !            86:        /* MIPv6 needs to perform negotiation of SA using different addresses
        !            87:         * than the endpoints of the SA (CoA for the source). In that case,
        !            88:         * MIGRATE msg provides that info (before movement occurs on the MN) */
        !            89:        struct sockaddr *local;
        !            90:        struct sockaddr *remote;
        !            91: };
        !            92: 
        !            93: /* Security Assocciation Index */
        !            94: /* NOTE: Ensure to be same address family */
        !            95: struct secasindex {
        !            96:        struct sockaddr_storage src;    /* srouce address for SA */
        !            97:        struct sockaddr_storage dst;    /* destination address for SA */
        !            98:        u_int16_t proto;                /* IPPROTO_ESP or IPPROTO_AH */
        !            99:        u_int8_t mode;                  /* mode of protocol, see ipsec.h */
        !           100:        u_int32_t reqid;                /* reqid id who owned this SA */
        !           101:                                        /* see IPSEC_MANUAL_REQID_MAX. */
        !           102: };
        !           103: 
        !           104: /* Request for IPsec */
        !           105: struct ipsecrequest {
        !           106:        struct ipsecrequest *next;
        !           107:                                /* pointer to next structure */
        !           108:                                /* If NULL, it means the end of chain. */
        !           109: 
        !           110:        struct secasindex saidx;/* hint for search proper SA */
        !           111:                                /* if __ss_len == 0 then no address specified.*/
        !           112:        u_int level;            /* IPsec level defined below. */
        !           113: 
        !           114:        struct secpolicy *sp;   /* back pointer to SP */
        !           115: };
        !           116: 
        !           117: #ifdef HAVE_PFKEY_POLICY_PRIORITY
        !           118: #define KEY_SETSECSPIDX(_dir, s, d, ps, pd, ulp, _priority, _created, idx)              \
        !           119: do {                                                                         \
        !           120:        bzero((idx), sizeof(struct policyindex));                            \
        !           121:        (idx)->dir = (_dir);                                                 \
        !           122:        (idx)->prefs = (ps);                                                 \
        !           123:        (idx)->prefd = (pd);                                                 \
        !           124:        (idx)->ul_proto = (ulp);                                             \
        !           125:        (idx)->priority = (_priority);                                        \
        !           126:        (idx)->created = (_created);                                        \
        !           127:        memcpy(&(idx)->src, (s), sysdep_sa_len((struct sockaddr *)(s)));          \
        !           128:        memcpy(&(idx)->dst, (d), sysdep_sa_len((struct sockaddr *)(d)));          \
        !           129: } while (0)
        !           130: #else
        !           131: #define KEY_SETSECSPIDX(_dir, s, d, ps, pd, ulp, _created, idx)              \
        !           132: do {                                                                         \
        !           133:        bzero((idx), sizeof(struct policyindex));                            \
        !           134:        (idx)->dir = (_dir);                                                 \
        !           135:        (idx)->prefs = (ps);                                                 \
        !           136:        (idx)->prefd = (pd);                                                 \
        !           137:        (idx)->ul_proto = (ulp);                                             \
        !           138:        (idx)->created = (_created);                                        \
        !           139:        memcpy(&(idx)->src, (s), sysdep_sa_len((struct sockaddr *)(s)));          \
        !           140:        memcpy(&(idx)->dst, (d), sysdep_sa_len((struct sockaddr *)(d)));          \
        !           141: } while (0)
        !           142: #endif
        !           143: 
        !           144: struct ph2handle;
        !           145: struct policyindex;
        !           146: extern struct secpolicy *getsp __P((struct policyindex *));
        !           147: extern struct secpolicy *getsp_r __P((struct policyindex *));
        !           148: struct secpolicy *getspbyspid __P((u_int32_t));
        !           149: extern int cmpspidxstrict __P((struct policyindex *, struct policyindex *));
        !           150: extern int cmpspidxwild __P((struct policyindex *, struct policyindex *));
        !           151: extern struct secpolicy *newsp __P((void));
        !           152: extern void delsp __P((struct secpolicy *));
        !           153: extern void delsp_bothdir __P((struct policyindex *));
        !           154: extern void inssp __P((struct secpolicy *));
        !           155: extern void remsp __P((struct secpolicy *));
        !           156: extern void flushsp __P((void));
        !           157: extern void initsp __P((void));
        !           158: extern struct ipsecrequest *newipsecreq __P((void));
        !           159: 
        !           160: extern const char *spidx2str __P((const struct policyindex *));
        !           161: #ifdef HAVE_SECCTX
        !           162: #include <selinux/selinux.h>
        !           163: extern int get_security_context __P((vchar_t *, struct policyindex *));
        !           164: extern void init_avc __P((void));
        !           165: extern int within_range __P((security_context_t, security_context_t));
        !           166: extern void set_secctx_in_proposal __P((struct ph2handle *, struct policyindex));
        !           167: #endif
        !           168: 
        !           169: #endif /* _POLICY_H */

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>