File:  [ELWIX - Embedded LightWeight unIX -] / embedaddon / ipsec-tools / src / racoon / policy.h
Revision 1.1.1.1 (vendor branch): download - view: text, annotated - select for diffs - revision graph
Tue Feb 21 22:39:10 2012 UTC (12 years, 4 months ago) by misho
Branches: ipsec-tools, MAIN
CVS tags: v0_8_2p2, v0_8_1p0, v0_8_1, v0_8_0p0, v0_8_0, HEAD
ipsec-tools

    1: /*	$NetBSD: policy.h,v 1.8 2008/12/05 06:02:20 tteras Exp $	*/
    2: 
    3: /* Id: policy.h,v 1.5 2004/06/11 16:00:17 ludvigm Exp */
    4: 
    5: /*
    6:  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
    7:  * All rights reserved.
    8:  * 
    9:  * Redistribution and use in source and binary forms, with or without
   10:  * modification, are permitted provided that the following conditions
   11:  * are met:
   12:  * 1. Redistributions of source code must retain the above copyright
   13:  *    notice, this list of conditions and the following disclaimer.
   14:  * 2. Redistributions in binary form must reproduce the above copyright
   15:  *    notice, this list of conditions and the following disclaimer in the
   16:  *    documentation and/or other materials provided with the distribution.
   17:  * 3. Neither the name of the project nor the names of its contributors
   18:  *    may be used to endorse or promote products derived from this software
   19:  *    without specific prior written permission.
   20:  * 
   21:  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
   22:  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
   23:  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
   24:  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
   25:  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
   26:  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
   27:  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
   28:  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
   29:  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
   30:  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
   31:  * SUCH DAMAGE.
   32:  */
   33: 
   34: #ifndef _POLICY_H
   35: #define _POLICY_H
   36: 
   37: #include <sys/queue.h>
   38: 
   39: 
   40: #ifdef HAVE_SECCTX
   41: #define MAX_CTXSTR_SIZE 50
   42: struct security_ctx {
   43: 	u_int8_t ctx_doi;       /* Security Context DOI */
   44: 	u_int8_t ctx_alg;       /* Security Context Algorithm */
   45: 	u_int16_t ctx_strlen;   /* Security Context stringlength
   46: 				 * (includes terminating NULL)
   47: 				 */
   48: 	char ctx_str[MAX_CTXSTR_SIZE];  /* Security Context string */
   49: };
   50: #endif
   51: 
   52: /* refs. ipsec.h */
   53: /*
   54:  * Security Policy Index
   55:  * NOTE: Ensure to be same address family and upper layer protocol.
   56:  * NOTE: ul_proto, port number, uid, gid:
   57:  *	ANY: reserved for waldcard.
   58:  *	0 to (~0 - 1): is one of the number of each value.
   59:  */
   60: struct policyindex {
   61: 	u_int8_t dir;			/* direction of packet flow, see blow */
   62: 	struct sockaddr_storage src;	/* IP src address for SP */
   63: 	struct sockaddr_storage dst;	/* IP dst address for SP */
   64: 	u_int8_t prefs;			/* prefix length in bits for src */
   65: 	u_int8_t prefd;			/* prefix length in bits for dst */
   66: 	u_int16_t ul_proto;		/* upper layer Protocol */
   67: 	u_int32_t priority;		/* priority for the policy */
   68:  	u_int64_t created;		/* Used for generated SPD entries deletion */
   69: #ifdef HAVE_SECCTX
   70: 	struct security_ctx sec_ctx;    /* Security Context */
   71: #endif
   72: };
   73: 
   74: /* Security Policy Data Base */
   75: struct secpolicy {
   76: 	TAILQ_ENTRY(secpolicy) chain;
   77: 
   78: 	struct policyindex spidx;	/* selector */
   79: 	u_int32_t id;			/* It's unique number on the system. */
   80: 
   81: 	u_int policy;		/* DISCARD, NONE or IPSEC, see keyv2.h */
   82: 	struct ipsecrequest *req;
   83: 				/* pointer to the ipsec request tree, */
   84: 				/* if policy == IPSEC else this value == NULL.*/
   85: 
   86: 	/* MIPv6 needs to perform negotiation of SA using different addresses
   87: 	 * than the endpoints of the SA (CoA for the source). In that case,
   88: 	 * MIGRATE msg provides that info (before movement occurs on the MN) */
   89: 	struct sockaddr *local;
   90: 	struct sockaddr *remote;
   91: };
   92: 
   93: /* Security Assocciation Index */
   94: /* NOTE: Ensure to be same address family */
   95: struct secasindex {
   96: 	struct sockaddr_storage src;	/* srouce address for SA */
   97: 	struct sockaddr_storage dst;	/* destination address for SA */
   98: 	u_int16_t proto;		/* IPPROTO_ESP or IPPROTO_AH */
   99: 	u_int8_t mode;			/* mode of protocol, see ipsec.h */
  100: 	u_int32_t reqid;		/* reqid id who owned this SA */
  101: 					/* see IPSEC_MANUAL_REQID_MAX. */
  102: };
  103: 
  104: /* Request for IPsec */
  105: struct ipsecrequest {
  106: 	struct ipsecrequest *next;
  107: 				/* pointer to next structure */
  108: 				/* If NULL, it means the end of chain. */
  109: 
  110: 	struct secasindex saidx;/* hint for search proper SA */
  111: 				/* if __ss_len == 0 then no address specified.*/
  112: 	u_int level;		/* IPsec level defined below. */
  113: 
  114: 	struct secpolicy *sp;	/* back pointer to SP */
  115: };
  116: 
  117: #ifdef HAVE_PFKEY_POLICY_PRIORITY
  118: #define KEY_SETSECSPIDX(_dir, s, d, ps, pd, ulp, _priority, _created, idx)              \
  119: do {                                                                         \
  120: 	bzero((idx), sizeof(struct policyindex));                            \
  121: 	(idx)->dir = (_dir);                                                 \
  122: 	(idx)->prefs = (ps);                                                 \
  123: 	(idx)->prefd = (pd);                                                 \
  124: 	(idx)->ul_proto = (ulp);                                             \
  125: 	(idx)->priority = (_priority);                                        \
  126: 	(idx)->created = (_created);                                        \
  127: 	memcpy(&(idx)->src, (s), sysdep_sa_len((struct sockaddr *)(s)));          \
  128: 	memcpy(&(idx)->dst, (d), sysdep_sa_len((struct sockaddr *)(d)));          \
  129: } while (0)
  130: #else
  131: #define KEY_SETSECSPIDX(_dir, s, d, ps, pd, ulp, _created, idx)              \
  132: do {                                                                         \
  133: 	bzero((idx), sizeof(struct policyindex));                            \
  134: 	(idx)->dir = (_dir);                                                 \
  135: 	(idx)->prefs = (ps);                                                 \
  136: 	(idx)->prefd = (pd);                                                 \
  137: 	(idx)->ul_proto = (ulp);                                             \
  138: 	(idx)->created = (_created);                                        \
  139: 	memcpy(&(idx)->src, (s), sysdep_sa_len((struct sockaddr *)(s)));          \
  140: 	memcpy(&(idx)->dst, (d), sysdep_sa_len((struct sockaddr *)(d)));          \
  141: } while (0)
  142: #endif
  143: 
  144: struct ph2handle;
  145: struct policyindex;
  146: extern struct secpolicy *getsp __P((struct policyindex *));
  147: extern struct secpolicy *getsp_r __P((struct policyindex *));
  148: struct secpolicy *getspbyspid __P((u_int32_t));
  149: extern int cmpspidxstrict __P((struct policyindex *, struct policyindex *));
  150: extern int cmpspidxwild __P((struct policyindex *, struct policyindex *));
  151: extern struct secpolicy *newsp __P((void));
  152: extern void delsp __P((struct secpolicy *));
  153: extern void delsp_bothdir __P((struct policyindex *));
  154: extern void inssp __P((struct secpolicy *));
  155: extern void remsp __P((struct secpolicy *));
  156: extern void flushsp __P((void));
  157: extern void initsp __P((void));
  158: extern struct ipsecrequest *newipsecreq __P((void));
  159: 
  160: extern const char *spidx2str __P((const struct policyindex *));
  161: #ifdef HAVE_SECCTX
  162: #include <selinux/selinux.h>
  163: extern int get_security_context __P((vchar_t *, struct policyindex *));
  164: extern void init_avc __P((void));
  165: extern int within_range __P((security_context_t, security_context_t));
  166: extern void set_secctx_in_proposal __P((struct ph2handle *, struct policyindex));
  167: #endif
  168: 
  169: #endif /* _POLICY_H */

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>