]> git.saurik.com Git - apple/ipsec.git/blame - ipsec-tools/Common/libpfkey.h
ipsec-93.6.tar.gz
[apple/ipsec.git] / ipsec-tools / Common / libpfkey.h
CommitLineData
52b7d2ce
A
1/* $Id: libpfkey.h,v 1.8.2.4 2005/12/04 20:41:47 manubsd Exp $ */
2
3/*
4 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. Neither the name of the project nor the names of its contributors
16 * may be used to endorse or promote products derived from this software
17 * without specific prior written permission.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * SUCH DAMAGE.
30 */
31
32#ifndef _LIBPFKEY_H
33#define _LIBPFKEY_H
34
35#ifndef KAME_LIBPFKEY_H
36#define KAME_LIBPFKEY_H
37
38#include "config.h"
39
40#define PRIORITY_LOW 0xC0000000
41#define PRIORITY_DEFAULT 0x80000000
42#define PRIORITY_HIGH 0x40000000
43
44#define PRIORITY_OFFSET_POSITIVE_MAX 0x3fffffff
45#define PRIORITY_OFFSET_NEGATIVE_MAX 0x40000000
46
47struct sadb_msg;
48extern void pfkey_sadump __P((struct sadb_msg *));
49extern void pfkey_sadump_withports __P((struct sadb_msg *));
50extern void pfkey_spdump __P((struct sadb_msg *));
51extern void pfkey_spdump_withports __P((struct sadb_msg *));
52
53struct sockaddr;
54struct sadb_alg;
55
56/* Accomodate different prototypes in <netinet6/ipsec.h> */
57#include <sys/types.h>
58#ifdef HAVE_NETINET6_IPSEC
59# include <netinet6/ipsec.h>
60#else
61# include <netinet/ipsec.h>
62#endif
63
64#ifndef HAVE_IPSEC_POLICY_T
65typedef caddr_t ipsec_policy_t;
66#define __ipsec_const
67#else
68#define __ipsec_const const
69#endif
70
71/* IPsec Library Routines */
72
73int ipsec_check_keylen __P((u_int, u_int, u_int));
74int ipsec_check_keylen2 __P((u_int, u_int, u_int));
75int ipsec_get_keylen __P((u_int, u_int, struct sadb_alg *));
76char *ipsec_dump_policy_withports __P((void *, const char *));
77void ipsec_hexdump __P((const void *, int));
78const char *ipsec_strerror __P((void));
79void kdebug_sadb __P((struct sadb_msg *));
80ipsec_policy_t ipsec_set_policy __P((__ipsec_const char *, int));
81int ipsec_get_policylen __P((ipsec_policy_t));
82char *ipsec_dump_policy __P((ipsec_policy_t, __ipsec_const char *));
83
84/* PFKey Routines */
85
86u_int pfkey_set_softrate __P((u_int, u_int));
87u_int pfkey_get_softrate __P((u_int));
88int pfkey_send_getspi __P((int, u_int, u_int, struct sockaddr *,
89 struct sockaddr *, u_int32_t, u_int32_t, u_int32_t, u_int32_t));
90#ifdef __APPLE__
91int pfkey_send_update __P((int, u_int, u_int, struct sockaddr *,
92 struct sockaddr *, u_int32_t, u_int32_t, u_int,
93 caddr_t, u_int, u_int, u_int, u_int, u_int, u_int32_t, u_int64_t,
94 u_int64_t, u_int64_t, u_int32_t, u_int16_t));
95int pfkey_send_add __P((int, u_int, u_int, struct sockaddr *,
96 struct sockaddr *, u_int32_t, u_int32_t, u_int,
97 caddr_t, u_int, u_int, u_int, u_int, u_int, u_int32_t, u_int64_t,
98 u_int64_t, u_int64_t, u_int32_t, u_int16_t));
99#else
100int pfkey_send_update __P((int, u_int, u_int, struct sockaddr *,
101 struct sockaddr *, u_int32_t, u_int32_t, u_int,
102 caddr_t, u_int, u_int, u_int, u_int, u_int, u_int32_t, u_int64_t,
103 u_int64_t, u_int64_t, u_int32_t));
104int pfkey_send_update_nat __P((int, u_int, u_int, struct sockaddr *,
105 struct sockaddr *, u_int32_t, u_int32_t, u_int,
106 caddr_t, u_int, u_int, u_int, u_int, u_int, u_int32_t, u_int64_t,
107 u_int64_t, u_int64_t, u_int32_t,
108 u_int8_t, u_int16_t, u_int16_t, struct sockaddr *, u_int16_t));
109int pfkey_send_add __P((int, u_int, u_int, struct sockaddr *,
110 struct sockaddr *, u_int32_t, u_int32_t, u_int,
111 caddr_t, u_int, u_int, u_int, u_int, u_int, u_int32_t, u_int64_t,
112 u_int64_t, u_int64_t, u_int32_t));
113int pfkey_send_add_nat __P((int, u_int, u_int, struct sockaddr *,
114 struct sockaddr *, u_int32_t, u_int32_t, u_int,
115 caddr_t, u_int, u_int, u_int, u_int, u_int, u_int32_t, u_int64_t,
116 u_int64_t, u_int64_t, u_int32_t,
117 u_int8_t, u_int16_t, u_int16_t, struct sockaddr *, u_int16_t));
118#endif /*__APPLE__ */
119
120int pfkey_send_delete __P((int, u_int, u_int,
121 struct sockaddr *, struct sockaddr *, u_int32_t));
122int pfkey_send_delete_all __P((int, u_int, u_int,
123 struct sockaddr *, struct sockaddr *));
124int pfkey_send_get __P((int, u_int, u_int,
125 struct sockaddr *, struct sockaddr *, u_int32_t));
126int pfkey_send_register __P((int, u_int));
127int pfkey_recv_register __P((int));
128int pfkey_set_supported __P((struct sadb_msg *, int));
129int pfkey_send_flush __P((int, u_int));
130int pfkey_send_dump __P((int, u_int));
131int pfkey_send_promisc_toggle __P((int, int));
132int pfkey_send_spdadd __P((int, struct sockaddr *, u_int,
133 struct sockaddr *, u_int, u_int, caddr_t, int, u_int32_t));
134int pfkey_send_spdadd2 __P((int, struct sockaddr *, u_int,
135 struct sockaddr *, u_int, u_int, u_int64_t, u_int64_t,
136 caddr_t, int, u_int32_t));
137int pfkey_send_spdupdate __P((int, struct sockaddr *, u_int,
138 struct sockaddr *, u_int, u_int, caddr_t, int, u_int32_t));
139int pfkey_send_spdupdate2 __P((int, struct sockaddr *, u_int,
140 struct sockaddr *, u_int, u_int, u_int64_t, u_int64_t,
141 caddr_t, int, u_int32_t));
142int pfkey_send_spddelete __P((int, struct sockaddr *, u_int,
143 struct sockaddr *, u_int, u_int, caddr_t, int, u_int32_t));
144int pfkey_send_spddelete2 __P((int, u_int32_t));
145int pfkey_send_spdget __P((int, u_int32_t));
146int pfkey_send_spdsetidx __P((int, struct sockaddr *, u_int,
147 struct sockaddr *, u_int, u_int, caddr_t, int, u_int32_t));
148int pfkey_send_spdflush __P((int));
149int pfkey_send_spddump __P((int));
150
151int pfkey_open __P((void));
152void pfkey_close __P((int));
153struct sadb_msg *pfkey_recv __P((int));
154int pfkey_send __P((int, struct sadb_msg *, int));
155int pfkey_align __P((struct sadb_msg *, caddr_t *));
156int pfkey_check __P((caddr_t *));
d1e348cf 157int pfkey_send_getsastats __P((int, u_int32_t, u_int64_t [], u_int32_t, u_int8_t, struct sastat [], u_int32_t));
52b7d2ce
A
158
159#ifndef __SYSDEP_SA_LEN__
160#define __SYSDEP_SA_LEN__
161#include <netinet/in.h>
162
163#ifndef IPPROTO_IPV4
164#define IPPROTO_IPV4 IPPROTO_IPIP
165#endif
166
167#ifndef IPPROTO_IPCOMP
168#define IPPROTO_IPCOMP IPPROTO_COMP
169#endif
170
171static __inline u_int8_t
172sysdep_sa_len (const struct sockaddr *sa)
173{
174#ifdef __linux__
175 switch (sa->sa_family)
176 {
177 case AF_INET:
178 return sizeof (struct sockaddr_in);
179 case AF_INET6:
180 return sizeof (struct sockaddr_in6);
181 }
182 // log_print ("sysdep_sa_len: unknown sa family %d", sa->sa_family);
183 return sizeof (struct sockaddr_in);
184#else
185 return sa->sa_len;
186#endif
187}
188#endif
189
190#endif /* KAME_LIBPFKEY_H */
191
192#endif /* _LIBPFKEY_H */