xfrm.h revision de3d12f48ac1869fc9f9cb442b2d692b027d8a14
12a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)#ifndef _LINUX_XFRM_H 22a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)#define _LINUX_XFRM_H 32a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) 42a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)#include <linux/types.h> 52a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) 62a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)/* All of the structures in this file may not change size as they are 72a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) * passed into the kernel from userspace via netlink sockets. 82a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) */ 92a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) 102a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)/* Structure to encapsulate addresses. I do not want to use 112a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) * "standard" structure. My apologies. 122a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) */ 132a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)typedef union 142a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles){ 152a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) __be32 a4; 162a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) __be32 a6[4]; 172a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)} xfrm_address_t; 182a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) 192a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)/* Ident of a specific xfrm_state. It is used on input to lookup 202a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) * the state by (spi,daddr,ah/esp) or to store information about 212a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) * spi, protocol and tunnel address on output. 222a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) */ 232a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)struct xfrm_id 242a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles){ 252a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) xfrm_address_t daddr; 262a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) __be32 spi; 272a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) __u8 proto; 282a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)}; 292a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) 302a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)struct xfrm_sec_ctx { 312a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) __u8 ctx_doi; 32 __u8 ctx_alg; 33 __u16 ctx_len; 34 __u32 ctx_sid; 35 char ctx_str[0]; 36}; 37 38/* Security Context Domains of Interpretation */ 39#define XFRM_SC_DOI_RESERVED 0 40#define XFRM_SC_DOI_LSM 1 41 42/* Security Context Algorithms */ 43#define XFRM_SC_ALG_RESERVED 0 44#define XFRM_SC_ALG_SELINUX 1 45 46/* Selector, used as selector both on policy rules (SPD) and SAs. */ 47 48struct xfrm_selector 49{ 50 xfrm_address_t daddr; 51 xfrm_address_t saddr; 52 __be16 dport; 53 __be16 dport_mask; 54 __be16 sport; 55 __be16 sport_mask; 56 __u16 family; 57 __u8 prefixlen_d; 58 __u8 prefixlen_s; 59 __u8 proto; 60 int ifindex; 61 uid_t user; 62}; 63 64#define XFRM_INF (~(__u64)0) 65 66struct xfrm_lifetime_cfg 67{ 68 __u64 soft_byte_limit; 69 __u64 hard_byte_limit; 70 __u64 soft_packet_limit; 71 __u64 hard_packet_limit; 72 __u64 soft_add_expires_seconds; 73 __u64 hard_add_expires_seconds; 74 __u64 soft_use_expires_seconds; 75 __u64 hard_use_expires_seconds; 76}; 77 78struct xfrm_lifetime_cur 79{ 80 __u64 bytes; 81 __u64 packets; 82 __u64 add_time; 83 __u64 use_time; 84}; 85 86struct xfrm_replay_state 87{ 88 __u32 oseq; 89 __u32 seq; 90 __u32 bitmap; 91}; 92 93struct xfrm_algo { 94 char alg_name[64]; 95 int alg_key_len; /* in bits */ 96 char alg_key[0]; 97}; 98 99struct xfrm_stats { 100 __u32 replay_window; 101 __u32 replay; 102 __u32 integrity_failed; 103}; 104 105enum 106{ 107 XFRM_POLICY_TYPE_MAIN = 0, 108 XFRM_POLICY_TYPE_SUB = 1, 109 XFRM_POLICY_TYPE_MAX = 2 110}; 111 112enum 113{ 114 XFRM_POLICY_IN = 0, 115 XFRM_POLICY_OUT = 1, 116 XFRM_POLICY_FWD = 2, 117 XFRM_POLICY_MAX = 3 118}; 119 120enum 121{ 122 XFRM_SHARE_ANY, /* No limitations */ 123 XFRM_SHARE_SESSION, /* For this session only */ 124 XFRM_SHARE_USER, /* For this user only */ 125 XFRM_SHARE_UNIQUE /* Use once */ 126}; 127 128#define XFRM_MODE_TRANSPORT 0 129#define XFRM_MODE_TUNNEL 1 130#define XFRM_MODE_ROUTEOPTIMIZATION 2 131#define XFRM_MODE_IN_TRIGGER 3 132#define XFRM_MODE_BEET 4 133#define XFRM_MODE_MAX 5 134 135/* Netlink configuration messages. */ 136enum { 137 XFRM_MSG_BASE = 0x10, 138 139 XFRM_MSG_NEWSA = 0x10, 140#define XFRM_MSG_NEWSA XFRM_MSG_NEWSA 141 XFRM_MSG_DELSA, 142#define XFRM_MSG_DELSA XFRM_MSG_DELSA 143 XFRM_MSG_GETSA, 144#define XFRM_MSG_GETSA XFRM_MSG_GETSA 145 146 XFRM_MSG_NEWPOLICY, 147#define XFRM_MSG_NEWPOLICY XFRM_MSG_NEWPOLICY 148 XFRM_MSG_DELPOLICY, 149#define XFRM_MSG_DELPOLICY XFRM_MSG_DELPOLICY 150 XFRM_MSG_GETPOLICY, 151#define XFRM_MSG_GETPOLICY XFRM_MSG_GETPOLICY 152 153 XFRM_MSG_ALLOCSPI, 154#define XFRM_MSG_ALLOCSPI XFRM_MSG_ALLOCSPI 155 XFRM_MSG_ACQUIRE, 156#define XFRM_MSG_ACQUIRE XFRM_MSG_ACQUIRE 157 XFRM_MSG_EXPIRE, 158#define XFRM_MSG_EXPIRE XFRM_MSG_EXPIRE 159 160 XFRM_MSG_UPDPOLICY, 161#define XFRM_MSG_UPDPOLICY XFRM_MSG_UPDPOLICY 162 XFRM_MSG_UPDSA, 163#define XFRM_MSG_UPDSA XFRM_MSG_UPDSA 164 165 XFRM_MSG_POLEXPIRE, 166#define XFRM_MSG_POLEXPIRE XFRM_MSG_POLEXPIRE 167 168 XFRM_MSG_FLUSHSA, 169#define XFRM_MSG_FLUSHSA XFRM_MSG_FLUSHSA 170 XFRM_MSG_FLUSHPOLICY, 171#define XFRM_MSG_FLUSHPOLICY XFRM_MSG_FLUSHPOLICY 172 173 XFRM_MSG_NEWAE, 174#define XFRM_MSG_NEWAE XFRM_MSG_NEWAE 175 XFRM_MSG_GETAE, 176#define XFRM_MSG_GETAE XFRM_MSG_GETAE 177 178 XFRM_MSG_REPORT, 179#define XFRM_MSG_REPORT XFRM_MSG_REPORT 180 181 XFRM_MSG_MIGRATE, 182#define XFRM_MSG_MIGRATE XFRM_MSG_MIGRATE 183 184 XFRM_MSG_NEWSADINFO, 185#define XFRM_MSG_NEWSADINFO XFRM_MSG_NEWSADINFO 186 XFRM_MSG_GETSADINFO, 187#define XFRM_MSG_GETSADINFO XFRM_MSG_GETSADINFO 188 189 XFRM_MSG_NEWSPDINFO, 190#define XFRM_MSG_NEWSPDINFO XFRM_MSG_NEWSPDINFO 191 XFRM_MSG_GETSPDINFO, 192#define XFRM_MSG_GETSPDINFO XFRM_MSG_GETSPDINFO 193 __XFRM_MSG_MAX 194}; 195#define XFRM_MSG_MAX (__XFRM_MSG_MAX - 1) 196 197#define XFRM_NR_MSGTYPES (XFRM_MSG_MAX + 1 - XFRM_MSG_BASE) 198 199/* 200 * Generic LSM security context for comunicating to user space 201 * NOTE: Same format as sadb_x_sec_ctx 202 */ 203struct xfrm_user_sec_ctx { 204 __u16 len; 205 __u16 exttype; 206 __u8 ctx_alg; /* LSMs: e.g., selinux == 1 */ 207 __u8 ctx_doi; 208 __u16 ctx_len; 209}; 210 211struct xfrm_user_tmpl { 212 struct xfrm_id id; 213 __u16 family; 214 xfrm_address_t saddr; 215 __u32 reqid; 216 __u8 mode; 217 __u8 share; 218 __u8 optional; 219 __u32 aalgos; 220 __u32 ealgos; 221 __u32 calgos; 222}; 223 224struct xfrm_encap_tmpl { 225 __u16 encap_type; 226 __be16 encap_sport; 227 __be16 encap_dport; 228 xfrm_address_t encap_oa; 229}; 230 231/* AEVENT flags */ 232enum xfrm_ae_ftype_t { 233 XFRM_AE_UNSPEC, 234 XFRM_AE_RTHR=1, /* replay threshold*/ 235 XFRM_AE_RVAL=2, /* replay value */ 236 XFRM_AE_LVAL=4, /* lifetime value */ 237 XFRM_AE_ETHR=8, /* expiry timer threshold */ 238 XFRM_AE_CR=16, /* Event cause is replay update */ 239 XFRM_AE_CE=32, /* Event cause is timer expiry */ 240 XFRM_AE_CU=64, /* Event cause is policy update */ 241 __XFRM_AE_MAX 242 243#define XFRM_AE_MAX (__XFRM_AE_MAX - 1) 244}; 245 246struct xfrm_userpolicy_type { 247 __u8 type; 248 __u16 reserved1; 249 __u8 reserved2; 250}; 251 252/* Netlink message attributes. */ 253enum xfrm_attr_type_t { 254 XFRMA_UNSPEC, 255 XFRMA_ALG_AUTH, /* struct xfrm_algo */ 256 XFRMA_ALG_CRYPT, /* struct xfrm_algo */ 257 XFRMA_ALG_COMP, /* struct xfrm_algo */ 258 XFRMA_ENCAP, /* struct xfrm_algo + struct xfrm_encap_tmpl */ 259 XFRMA_TMPL, /* 1 or more struct xfrm_user_tmpl */ 260 XFRMA_SA, 261 XFRMA_POLICY, 262 XFRMA_SEC_CTX, /* struct xfrm_sec_ctx */ 263 XFRMA_LTIME_VAL, 264 XFRMA_REPLAY_VAL, 265 XFRMA_REPLAY_THRESH, 266 XFRMA_ETIMER_THRESH, 267 XFRMA_SRCADDR, /* xfrm_address_t */ 268 XFRMA_COADDR, /* xfrm_address_t */ 269 XFRMA_LASTUSED, 270 XFRMA_POLICY_TYPE, /* struct xfrm_userpolicy_type */ 271 XFRMA_MIGRATE, 272 __XFRMA_MAX 273 274#define XFRMA_MAX (__XFRMA_MAX - 1) 275}; 276 277enum xfrm_sadattr_type_t { 278 XFRMA_SAD_UNSPEC, 279 XFRMA_SAD_CNT, 280 XFRMA_SAD_HINFO, 281 __XFRMA_SAD_MAX 282 283#define XFRMA_SAD_MAX (__XFRMA_SAD_MAX - 1) 284}; 285 286struct xfrmu_sadhinfo { 287 __u32 sadhcnt; /* current hash bkts */ 288 __u32 sadhmcnt; /* max allowed hash bkts */ 289}; 290 291enum xfrm_spdattr_type_t { 292 XFRMA_SPD_UNSPEC, 293 XFRMA_SPD_INFO, 294 XFRMA_SPD_HINFO, 295 __XFRMA_SPD_MAX 296 297#define XFRMA_SPD_MAX (__XFRMA_SPD_MAX - 1) 298}; 299 300struct xfrmu_spdinfo { 301 __u32 incnt; 302 __u32 outcnt; 303 __u32 fwdcnt; 304 __u32 inscnt; 305 __u32 outscnt; 306 __u32 fwdscnt; 307}; 308 309struct xfrmu_spdhinfo { 310 __u32 spdhcnt; 311 __u32 spdhmcnt; 312}; 313 314struct xfrm_usersa_info { 315 struct xfrm_selector sel; 316 struct xfrm_id id; 317 xfrm_address_t saddr; 318 struct xfrm_lifetime_cfg lft; 319 struct xfrm_lifetime_cur curlft; 320 struct xfrm_stats stats; 321 __u32 seq; 322 __u32 reqid; 323 __u16 family; 324 __u8 mode; /* XFRM_MODE_xxx */ 325 __u8 replay_window; 326 __u8 flags; 327#define XFRM_STATE_NOECN 1 328#define XFRM_STATE_DECAP_DSCP 2 329#define XFRM_STATE_NOPMTUDISC 4 330#define XFRM_STATE_WILDRECV 8 331}; 332 333struct xfrm_usersa_id { 334 xfrm_address_t daddr; 335 __be32 spi; 336 __u16 family; 337 __u8 proto; 338}; 339 340struct xfrm_aevent_id { 341 struct xfrm_usersa_id sa_id; 342 xfrm_address_t saddr; 343 __u32 flags; 344 __u32 reqid; 345}; 346 347struct xfrm_userspi_info { 348 struct xfrm_usersa_info info; 349 __u32 min; 350 __u32 max; 351}; 352 353struct xfrm_userpolicy_info { 354 struct xfrm_selector sel; 355 struct xfrm_lifetime_cfg lft; 356 struct xfrm_lifetime_cur curlft; 357 __u32 priority; 358 __u32 index; 359 __u8 dir; 360 __u8 action; 361#define XFRM_POLICY_ALLOW 0 362#define XFRM_POLICY_BLOCK 1 363 __u8 flags; 364#define XFRM_POLICY_LOCALOK 1 /* Allow user to override global policy */ 365 __u8 share; 366}; 367 368struct xfrm_userpolicy_id { 369 struct xfrm_selector sel; 370 __u32 index; 371 __u8 dir; 372}; 373 374struct xfrm_user_acquire { 375 struct xfrm_id id; 376 xfrm_address_t saddr; 377 struct xfrm_selector sel; 378 struct xfrm_userpolicy_info policy; 379 __u32 aalgos; 380 __u32 ealgos; 381 __u32 calgos; 382 __u32 seq; 383}; 384 385struct xfrm_user_expire { 386 struct xfrm_usersa_info state; 387 __u8 hard; 388}; 389 390struct xfrm_user_polexpire { 391 struct xfrm_userpolicy_info pol; 392 __u8 hard; 393}; 394 395struct xfrm_usersa_flush { 396 __u8 proto; 397}; 398 399struct xfrm_user_report { 400 __u8 proto; 401 struct xfrm_selector sel; 402}; 403 404struct xfrm_user_migrate { 405 xfrm_address_t old_daddr; 406 xfrm_address_t old_saddr; 407 xfrm_address_t new_daddr; 408 xfrm_address_t new_saddr; 409 __u8 proto; 410 __u8 mode; 411 __u16 reserved; 412 __u32 reqid; 413 __u16 old_family; 414 __u16 new_family; 415}; 416 417/* backwards compatibility for userspace */ 418#define XFRMGRP_ACQUIRE 1 419#define XFRMGRP_EXPIRE 2 420#define XFRMGRP_SA 4 421#define XFRMGRP_POLICY 8 422#define XFRMGRP_REPORT 0x20 423 424enum xfrm_nlgroups { 425 XFRMNLGRP_NONE, 426#define XFRMNLGRP_NONE XFRMNLGRP_NONE 427 XFRMNLGRP_ACQUIRE, 428#define XFRMNLGRP_ACQUIRE XFRMNLGRP_ACQUIRE 429 XFRMNLGRP_EXPIRE, 430#define XFRMNLGRP_EXPIRE XFRMNLGRP_EXPIRE 431 XFRMNLGRP_SA, 432#define XFRMNLGRP_SA XFRMNLGRP_SA 433 XFRMNLGRP_POLICY, 434#define XFRMNLGRP_POLICY XFRMNLGRP_POLICY 435 XFRMNLGRP_AEVENTS, 436#define XFRMNLGRP_AEVENTS XFRMNLGRP_AEVENTS 437 XFRMNLGRP_REPORT, 438#define XFRMNLGRP_REPORT XFRMNLGRP_REPORT 439 XFRMNLGRP_MIGRATE, 440#define XFRMNLGRP_MIGRATE XFRMNLGRP_MIGRATE 441 __XFRMNLGRP_MAX 442}; 443#define XFRMNLGRP_MAX (__XFRMNLGRP_MAX - 1) 444 445#endif /* _LINUX_XFRM_H */ 446