| /* |
| * Copyright (c) 2015 Cisco and/or its affiliates. |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at: |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| #ifndef __IPSEC_SPD_H__ |
| #define __IPSEC_SPD_H__ |
| |
| #include <vlib/vlib.h> |
| |
| #define foreach_ipsec_spd_policy_type \ |
| _(IP4_OUTBOUND, "ip4-outbound") \ |
| _(IP6_OUTBOUND, "ip6-outbound") \ |
| _(IP4_INBOUND_PROTECT, "ip4-inbound-protect") \ |
| _(IP6_INBOUND_PROTECT, "ip6-inbound-protect") \ |
| _(IP4_INBOUND_BYPASS, "ip4-inbound-bypass") \ |
| _(IP6_INBOUND_BYPASS, "ip6-inbound-bypass") |
| |
| typedef enum ipsec_spd_policy_t_ |
| { |
| #define _(s,v) IPSEC_SPD_POLICY_##s, |
| foreach_ipsec_spd_policy_type |
| #undef _ |
| IPSEC_SPD_POLICY_N_TYPES, |
| } ipsec_spd_policy_t; |
| |
| #define FOR_EACH_IPSEC_SPD_POLICY_TYPE(_t) \ |
| for (_t = 0; _t < IPSEC_SPD_POLICY_N_TYPES; _t++) |
| |
| /** |
| * @brief A Secruity Policy Database |
| */ |
| typedef struct |
| { |
| /** the User's ID for this policy */ |
| u32 id; |
| /** vectors for each of the policy types */ |
| u32 *policies[IPSEC_SPD_POLICY_N_TYPES]; |
| } ipsec_spd_t; |
| |
| /** |
| * @brief Add/Delete a SPD |
| */ |
| extern int ipsec_add_del_spd (vlib_main_t * vm, u32 spd_id, int is_add); |
| |
| /** |
| * @brief Bind/attach a SPD to an interface |
| */ |
| extern int ipsec_set_interface_spd (vlib_main_t * vm, |
| u32 sw_if_index, u32 spd_id, int is_add); |
| |
| extern u8 *format_ipsec_spd (u8 * s, va_list * args); |
| |
| #endif /* __IPSEC_SPD_H__ */ |
| |
| /* |
| * fd.io coding-style-patch-verification: ON |
| * |
| * Local Variables: |
| * eval: (c-set-style "gnu") |
| * End: |
| */ |