]> git.saurik.com Git - apple/ipsec.git/blame_incremental - ipsec-tools/racoon/sainfo.h
ipsec-332.100.1.tar.gz
[apple/ipsec.git] / ipsec-tools / racoon / sainfo.h
... / ...
CommitLineData
1/* $NetBSD: sainfo.h,v 1.5 2006/10/03 08:01:56 vanhu Exp $ */
2
3/* Id: sainfo.h,v 1.5 2006/07/09 17:19:38 manubsd Exp */
4
5/*
6 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
7 * All rights reserved.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the project nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 */
33
34#ifndef _SAINFO_H
35#define _SAINFO_H
36
37#include <sys/queue.h>
38
39/* SA info */
40struct sainfo {
41 vchar_t *idsrc;
42 vchar_t *iddst;
43 /*
44 * idsrc and iddst are constructed body of ID payload.
45 * that is (struct ipsecdoi_id_b) + ID value.
46 * If idsrc == NULL, that is anonymous entry.
47 */
48
49#ifdef ENABLE_HYBRID
50 vchar_t *group;
51#endif
52
53 time_t lifetime;
54 int lifebyte;
55 int pfs_group; /* only use when pfs is required. */
56 vchar_t *id_i; /* identifier of the authorized initiator */
57 struct sainfoalg *algs[MAXALGCLASS];
58 int dynamic; /* created through vpn control socket */
59 int in_list;
60 int refcount;
61 LIST_ENTRY(sainfo) chain;
62};
63
64/* algorithm type */
65struct sainfoalg {
66 int alg;
67 int encklen; /* key length of encryption algorithm */
68 struct sainfoalg *next;
69};
70
71extern struct sainfo *getsainfo (const vchar_t *,
72 const vchar_t *, const vchar_t *, int);
73extern struct sainfo *getsainfo_by_dst_id (const vchar_t *, const vchar_t *);
74extern struct sainfo *create_sainfo (void);
75extern void delsainfo (struct sainfo *);
76extern void inssainfo (struct sainfo *);
77extern void remsainfo (struct sainfo *);
78void retain_sainfo(struct sainfo *si);
79void release_sainfo(struct sainfo *si);
80extern void flushsainfo (void);
81extern void flushsainfo_dynamic (u_int32_t);
82extern void initsainfo (void);
83extern struct sainfoalg *newsainfoalg (void);
84extern void delsainfoalg (struct sainfoalg *);
85extern void inssainfoalg (struct sainfoalg **, struct sainfoalg *);
86extern const char * sainfo2str (const struct sainfo *);
87
88#endif /* _SAINFO_H */