]> git.saurik.com Git - apple/ipsec.git/blob - ipsec-tools/Common/libpfkey.h
ipsec-93.6.tar.gz
[apple/ipsec.git] / ipsec-tools / Common / libpfkey.h
1 /* $Id: libpfkey.h,v 1.8.2.4 2005/12/04 20:41:47 manubsd Exp $ */
2
3 /*
4 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. Neither the name of the project nor the names of its contributors
16 * may be used to endorse or promote products derived from this software
17 * without specific prior written permission.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * SUCH DAMAGE.
30 */
31
32 #ifndef _LIBPFKEY_H
33 #define _LIBPFKEY_H
34
35 #ifndef KAME_LIBPFKEY_H
36 #define KAME_LIBPFKEY_H
37
38 #include "config.h"
39
40 #define PRIORITY_LOW 0xC0000000
41 #define PRIORITY_DEFAULT 0x80000000
42 #define PRIORITY_HIGH 0x40000000
43
44 #define PRIORITY_OFFSET_POSITIVE_MAX 0x3fffffff
45 #define PRIORITY_OFFSET_NEGATIVE_MAX 0x40000000
46
47 struct sadb_msg;
48 extern void pfkey_sadump __P((struct sadb_msg *));
49 extern void pfkey_sadump_withports __P((struct sadb_msg *));
50 extern void pfkey_spdump __P((struct sadb_msg *));
51 extern void pfkey_spdump_withports __P((struct sadb_msg *));
52
53 struct sockaddr;
54 struct sadb_alg;
55
56 /* Accomodate different prototypes in <netinet6/ipsec.h> */
57 #include <sys/types.h>
58 #ifdef HAVE_NETINET6_IPSEC
59 # include <netinet6/ipsec.h>
60 #else
61 # include <netinet/ipsec.h>
62 #endif
63
64 #ifndef HAVE_IPSEC_POLICY_T
65 typedef caddr_t ipsec_policy_t;
66 #define __ipsec_const
67 #else
68 #define __ipsec_const const
69 #endif
70
71 /* IPsec Library Routines */
72
73 int ipsec_check_keylen __P((u_int, u_int, u_int));
74 int ipsec_check_keylen2 __P((u_int, u_int, u_int));
75 int ipsec_get_keylen __P((u_int, u_int, struct sadb_alg *));
76 char *ipsec_dump_policy_withports __P((void *, const char *));
77 void ipsec_hexdump __P((const void *, int));
78 const char *ipsec_strerror __P((void));
79 void kdebug_sadb __P((struct sadb_msg *));
80 ipsec_policy_t ipsec_set_policy __P((__ipsec_const char *, int));
81 int ipsec_get_policylen __P((ipsec_policy_t));
82 char *ipsec_dump_policy __P((ipsec_policy_t, __ipsec_const char *));
83
84 /* PFKey Routines */
85
86 u_int pfkey_set_softrate __P((u_int, u_int));
87 u_int pfkey_get_softrate __P((u_int));
88 int pfkey_send_getspi __P((int, u_int, u_int, struct sockaddr *,
89 struct sockaddr *, u_int32_t, u_int32_t, u_int32_t, u_int32_t));
90 #ifdef __APPLE__
91 int pfkey_send_update __P((int, u_int, u_int, struct sockaddr *,
92 struct sockaddr *, u_int32_t, u_int32_t, u_int,
93 caddr_t, u_int, u_int, u_int, u_int, u_int, u_int32_t, u_int64_t,
94 u_int64_t, u_int64_t, u_int32_t, u_int16_t));
95 int pfkey_send_add __P((int, u_int, u_int, struct sockaddr *,
96 struct sockaddr *, u_int32_t, u_int32_t, u_int,
97 caddr_t, u_int, u_int, u_int, u_int, u_int, u_int32_t, u_int64_t,
98 u_int64_t, u_int64_t, u_int32_t, u_int16_t));
99 #else
100 int pfkey_send_update __P((int, u_int, u_int, struct sockaddr *,
101 struct sockaddr *, u_int32_t, u_int32_t, u_int,
102 caddr_t, u_int, u_int, u_int, u_int, u_int, u_int32_t, u_int64_t,
103 u_int64_t, u_int64_t, u_int32_t));
104 int pfkey_send_update_nat __P((int, u_int, u_int, struct sockaddr *,
105 struct sockaddr *, u_int32_t, u_int32_t, u_int,
106 caddr_t, u_int, u_int, u_int, u_int, u_int, u_int32_t, u_int64_t,
107 u_int64_t, u_int64_t, u_int32_t,
108 u_int8_t, u_int16_t, u_int16_t, struct sockaddr *, u_int16_t));
109 int pfkey_send_add __P((int, u_int, u_int, struct sockaddr *,
110 struct sockaddr *, u_int32_t, u_int32_t, u_int,
111 caddr_t, u_int, u_int, u_int, u_int, u_int, u_int32_t, u_int64_t,
112 u_int64_t, u_int64_t, u_int32_t));
113 int pfkey_send_add_nat __P((int, u_int, u_int, struct sockaddr *,
114 struct sockaddr *, u_int32_t, u_int32_t, u_int,
115 caddr_t, u_int, u_int, u_int, u_int, u_int, u_int32_t, u_int64_t,
116 u_int64_t, u_int64_t, u_int32_t,
117 u_int8_t, u_int16_t, u_int16_t, struct sockaddr *, u_int16_t));
118 #endif /*__APPLE__ */
119
120 int pfkey_send_delete __P((int, u_int, u_int,
121 struct sockaddr *, struct sockaddr *, u_int32_t));
122 int pfkey_send_delete_all __P((int, u_int, u_int,
123 struct sockaddr *, struct sockaddr *));
124 int pfkey_send_get __P((int, u_int, u_int,
125 struct sockaddr *, struct sockaddr *, u_int32_t));
126 int pfkey_send_register __P((int, u_int));
127 int pfkey_recv_register __P((int));
128 int pfkey_set_supported __P((struct sadb_msg *, int));
129 int pfkey_send_flush __P((int, u_int));
130 int pfkey_send_dump __P((int, u_int));
131 int pfkey_send_promisc_toggle __P((int, int));
132 int pfkey_send_spdadd __P((int, struct sockaddr *, u_int,
133 struct sockaddr *, u_int, u_int, caddr_t, int, u_int32_t));
134 int pfkey_send_spdadd2 __P((int, struct sockaddr *, u_int,
135 struct sockaddr *, u_int, u_int, u_int64_t, u_int64_t,
136 caddr_t, int, u_int32_t));
137 int pfkey_send_spdupdate __P((int, struct sockaddr *, u_int,
138 struct sockaddr *, u_int, u_int, caddr_t, int, u_int32_t));
139 int pfkey_send_spdupdate2 __P((int, struct sockaddr *, u_int,
140 struct sockaddr *, u_int, u_int, u_int64_t, u_int64_t,
141 caddr_t, int, u_int32_t));
142 int pfkey_send_spddelete __P((int, struct sockaddr *, u_int,
143 struct sockaddr *, u_int, u_int, caddr_t, int, u_int32_t));
144 int pfkey_send_spddelete2 __P((int, u_int32_t));
145 int pfkey_send_spdget __P((int, u_int32_t));
146 int pfkey_send_spdsetidx __P((int, struct sockaddr *, u_int,
147 struct sockaddr *, u_int, u_int, caddr_t, int, u_int32_t));
148 int pfkey_send_spdflush __P((int));
149 int pfkey_send_spddump __P((int));
150
151 int pfkey_open __P((void));
152 void pfkey_close __P((int));
153 struct sadb_msg *pfkey_recv __P((int));
154 int pfkey_send __P((int, struct sadb_msg *, int));
155 int pfkey_align __P((struct sadb_msg *, caddr_t *));
156 int pfkey_check __P((caddr_t *));
157 int pfkey_send_getsastats __P((int, u_int32_t, u_int64_t [], u_int32_t, u_int8_t, struct sastat [], u_int32_t));
158
159 #ifndef __SYSDEP_SA_LEN__
160 #define __SYSDEP_SA_LEN__
161 #include <netinet/in.h>
162
163 #ifndef IPPROTO_IPV4
164 #define IPPROTO_IPV4 IPPROTO_IPIP
165 #endif
166
167 #ifndef IPPROTO_IPCOMP
168 #define IPPROTO_IPCOMP IPPROTO_COMP
169 #endif
170
171 static __inline u_int8_t
172 sysdep_sa_len (const struct sockaddr *sa)
173 {
174 #ifdef __linux__
175 switch (sa->sa_family)
176 {
177 case AF_INET:
178 return sizeof (struct sockaddr_in);
179 case AF_INET6:
180 return sizeof (struct sockaddr_in6);
181 }
182 // log_print ("sysdep_sa_len: unknown sa family %d", sa->sa_family);
183 return sizeof (struct sockaddr_in);
184 #else
185 return sa->sa_len;
186 #endif
187 }
188 #endif
189
190 #endif /* KAME_LIBPFKEY_H */
191
192 #endif /* _LIBPFKEY_H */