]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blame - include/linux/xfrm.h
[XFRM]: Prevent off-by-one access to xfrm_dispatch
[mirror_ubuntu-jammy-kernel.git] / include / linux / xfrm.h
CommitLineData
1da177e4
LT
1#ifndef _LINUX_XFRM_H
2#define _LINUX_XFRM_H
3
4#include <linux/types.h>
5
6/* All of the structures in this file may not change size as they are
7 * passed into the kernel from userspace via netlink sockets.
8 */
9
10/* Structure to encapsulate addresses. I do not want to use
11 * "standard" structure. My apologies.
12 */
13typedef union
14{
15 __u32 a4;
16 __u32 a6[4];
17} xfrm_address_t;
18
19/* Ident of a specific xfrm_state. It is used on input to lookup
20 * the state by (spi,daddr,ah/esp) or to store information about
21 * spi, protocol and tunnel address on output.
22 */
23struct xfrm_id
24{
25 xfrm_address_t daddr;
26 __u32 spi;
27 __u8 proto;
28};
29
30/* Selector, used as selector both on policy rules (SPD) and SAs. */
31
32struct xfrm_selector
33{
34 xfrm_address_t daddr;
35 xfrm_address_t saddr;
36 __u16 dport;
37 __u16 dport_mask;
38 __u16 sport;
39 __u16 sport_mask;
40 __u16 family;
41 __u8 prefixlen_d;
42 __u8 prefixlen_s;
43 __u8 proto;
44 int ifindex;
45 uid_t user;
46};
47
48#define XFRM_INF (~(__u64)0)
49
50struct xfrm_lifetime_cfg
51{
52 __u64 soft_byte_limit;
53 __u64 hard_byte_limit;
54 __u64 soft_packet_limit;
55 __u64 hard_packet_limit;
56 __u64 soft_add_expires_seconds;
57 __u64 hard_add_expires_seconds;
58 __u64 soft_use_expires_seconds;
59 __u64 hard_use_expires_seconds;
60};
61
62struct xfrm_lifetime_cur
63{
64 __u64 bytes;
65 __u64 packets;
66 __u64 add_time;
67 __u64 use_time;
68};
69
70struct xfrm_replay_state
71{
72 __u32 oseq;
73 __u32 seq;
74 __u32 bitmap;
75};
76
77struct xfrm_algo {
78 char alg_name[64];
79 int alg_key_len; /* in bits */
80 char alg_key[0];
81};
82
83struct xfrm_stats {
84 __u32 replay_window;
85 __u32 replay;
86 __u32 integrity_failed;
87};
88
89enum
90{
91 XFRM_POLICY_IN = 0,
92 XFRM_POLICY_OUT = 1,
93 XFRM_POLICY_FWD = 2,
94 XFRM_POLICY_MAX = 3
95};
96
97enum
98{
99 XFRM_SHARE_ANY, /* No limitations */
100 XFRM_SHARE_SESSION, /* For this session only */
101 XFRM_SHARE_USER, /* For this user only */
102 XFRM_SHARE_UNIQUE /* Use once */
103};
104
105/* Netlink configuration messages. */
106enum {
107 XFRM_MSG_BASE = 0x10,
108
109 XFRM_MSG_NEWSA = 0x10,
110#define XFRM_MSG_NEWSA XFRM_MSG_NEWSA
111 XFRM_MSG_DELSA,
112#define XFRM_MSG_DELSA XFRM_MSG_DELSA
113 XFRM_MSG_GETSA,
114#define XFRM_MSG_GETSA XFRM_MSG_GETSA
115
116 XFRM_MSG_NEWPOLICY,
117#define XFRM_MSG_NEWPOLICY XFRM_MSG_NEWPOLICY
118 XFRM_MSG_DELPOLICY,
119#define XFRM_MSG_DELPOLICY XFRM_MSG_DELPOLICY
120 XFRM_MSG_GETPOLICY,
121#define XFRM_MSG_GETPOLICY XFRM_MSG_GETPOLICY
122
123 XFRM_MSG_ALLOCSPI,
124#define XFRM_MSG_ALLOCSPI XFRM_MSG_ALLOCSPI
125 XFRM_MSG_ACQUIRE,
126#define XFRM_MSG_ACQUIRE XFRM_MSG_ACQUIRE
127 XFRM_MSG_EXPIRE,
128#define XFRM_MSG_EXPIRE XFRM_MSG_EXPIRE
129
130 XFRM_MSG_UPDPOLICY,
131#define XFRM_MSG_UPDPOLICY XFRM_MSG_UPDPOLICY
132 XFRM_MSG_UPDSA,
133#define XFRM_MSG_UPDSA XFRM_MSG_UPDSA
134
135 XFRM_MSG_POLEXPIRE,
136#define XFRM_MSG_POLEXPIRE XFRM_MSG_POLEXPIRE
137
138 XFRM_MSG_FLUSHSA,
139#define XFRM_MSG_FLUSHSA XFRM_MSG_FLUSHSA
140 XFRM_MSG_FLUSHPOLICY,
141#define XFRM_MSG_FLUSHPOLICY XFRM_MSG_FLUSHPOLICY
142
526bdb80 143 __XFRM_MSG_MAX
1da177e4 144};
526bdb80 145#define XFRM_MSG_MAX (__XFRM_MSG_MAX - 1)
1da177e4
LT
146
147struct xfrm_user_tmpl {
148 struct xfrm_id id;
149 __u16 family;
150 xfrm_address_t saddr;
151 __u32 reqid;
152 __u8 mode;
153 __u8 share;
154 __u8 optional;
155 __u32 aalgos;
156 __u32 ealgos;
157 __u32 calgos;
158};
159
160struct xfrm_encap_tmpl {
161 __u16 encap_type;
162 __u16 encap_sport;
163 __u16 encap_dport;
164 xfrm_address_t encap_oa;
165};
166
167/* Netlink message attributes. */
168enum xfrm_attr_type_t {
169 XFRMA_UNSPEC,
170 XFRMA_ALG_AUTH, /* struct xfrm_algo */
171 XFRMA_ALG_CRYPT, /* struct xfrm_algo */
172 XFRMA_ALG_COMP, /* struct xfrm_algo */
173 XFRMA_ENCAP, /* struct xfrm_algo + struct xfrm_encap_tmpl */
174 XFRMA_TMPL, /* 1 or more struct xfrm_user_tmpl */
175 __XFRMA_MAX
176
177#define XFRMA_MAX (__XFRMA_MAX - 1)
178};
179
180struct xfrm_usersa_info {
181 struct xfrm_selector sel;
182 struct xfrm_id id;
183 xfrm_address_t saddr;
184 struct xfrm_lifetime_cfg lft;
185 struct xfrm_lifetime_cur curlft;
186 struct xfrm_stats stats;
187 __u32 seq;
188 __u32 reqid;
189 __u16 family;
190 __u8 mode; /* 0=transport,1=tunnel */
191 __u8 replay_window;
192 __u8 flags;
193#define XFRM_STATE_NOECN 1
194#define XFRM_STATE_DECAP_DSCP 2
195};
196
197struct xfrm_usersa_id {
198 xfrm_address_t daddr;
199 __u32 spi;
200 __u16 family;
201 __u8 proto;
202};
203
204struct xfrm_userspi_info {
205 struct xfrm_usersa_info info;
206 __u32 min;
207 __u32 max;
208};
209
210struct xfrm_userpolicy_info {
211 struct xfrm_selector sel;
212 struct xfrm_lifetime_cfg lft;
213 struct xfrm_lifetime_cur curlft;
214 __u32 priority;
215 __u32 index;
216 __u8 dir;
217 __u8 action;
218#define XFRM_POLICY_ALLOW 0
219#define XFRM_POLICY_BLOCK 1
220 __u8 flags;
221#define XFRM_POLICY_LOCALOK 1 /* Allow user to override global policy */
222 __u8 share;
223};
224
225struct xfrm_userpolicy_id {
226 struct xfrm_selector sel;
227 __u32 index;
228 __u8 dir;
229};
230
231struct xfrm_user_acquire {
232 struct xfrm_id id;
233 xfrm_address_t saddr;
234 struct xfrm_selector sel;
235 struct xfrm_userpolicy_info policy;
236 __u32 aalgos;
237 __u32 ealgos;
238 __u32 calgos;
239 __u32 seq;
240};
241
242struct xfrm_user_expire {
243 struct xfrm_usersa_info state;
244 __u8 hard;
245};
246
247struct xfrm_user_polexpire {
248 struct xfrm_userpolicy_info pol;
249 __u8 hard;
250};
251
252struct xfrm_usersa_flush {
253 __u8 proto;
254};
255
256#define XFRMGRP_ACQUIRE 1
257#define XFRMGRP_EXPIRE 2
258
259#endif /* _LINUX_XFRM_H */