blob: 757a1b72d5105720f96a7390744e6597332aa783 [file] [log] [blame]
Neale Ranns999c8ee2019-02-01 03:31:24 -08001/*
2 * Copyright (c) 2015 Cisco and/or its affiliates.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at:
6 *
7 * http://www.apache.org/licenses/LICENSE-2.0
8 *
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
14 */
15#ifndef __IPSEC_SPD_H__
16#define __IPSEC_SPD_H__
17
18#include <vlib/vlib.h>
19
Neale Rannsa09c1ff2019-02-04 01:10:30 -080020#define foreach_ipsec_spd_policy_type \
21 _(IP4_OUTBOUND, "ip4-outbound") \
22 _(IP6_OUTBOUND, "ip6-outbound") \
23 _(IP4_INBOUND_PROTECT, "ip4-inbound-protect") \
24 _(IP6_INBOUND_PROTECT, "ip6-inbound-protect") \
25 _(IP4_INBOUND_BYPASS, "ip4-inbound-bypass") \
ShivaShankarK05464832020-04-14 14:01:03 +053026 _(IP6_INBOUND_BYPASS, "ip6-inbound-bypass") \
27 _(IP4_INBOUND_DISCARD, "ip4-inbound-discard") \
28 _(IP6_INBOUND_DISCARD, "ip6-inbound-discard")
Neale Rannsa09c1ff2019-02-04 01:10:30 -080029
30typedef enum ipsec_spd_policy_t_
31{
32#define _(s,v) IPSEC_SPD_POLICY_##s,
33 foreach_ipsec_spd_policy_type
34#undef _
35 IPSEC_SPD_POLICY_N_TYPES,
Neale Ranns9f231d42019-03-19 10:06:00 +000036} ipsec_spd_policy_type_t;
Neale Rannsa09c1ff2019-02-04 01:10:30 -080037
38#define FOR_EACH_IPSEC_SPD_POLICY_TYPE(_t) \
39 for (_t = 0; _t < IPSEC_SPD_POLICY_N_TYPES; _t++)
Neale Ranns999c8ee2019-02-01 03:31:24 -080040
Neale Ranns9f231d42019-03-19 10:06:00 +000041extern u8 *format_ipsec_policy_type (u8 * s, va_list * args);
42
Neale Ranns999c8ee2019-02-01 03:31:24 -080043/**
44 * @brief A Secruity Policy Database
45 */
Neale Rannsa09c1ff2019-02-04 01:10:30 -080046typedef struct
Neale Ranns999c8ee2019-02-01 03:31:24 -080047{
Neale Rannsa09c1ff2019-02-04 01:10:30 -080048 /** the User's ID for this policy */
Neale Ranns999c8ee2019-02-01 03:31:24 -080049 u32 id;
Neale Rannsa09c1ff2019-02-04 01:10:30 -080050 /** vectors for each of the policy types */
51 u32 *policies[IPSEC_SPD_POLICY_N_TYPES];
Neale Ranns999c8ee2019-02-01 03:31:24 -080052} ipsec_spd_t;
53
54/**
55 * @brief Add/Delete a SPD
56 */
57extern int ipsec_add_del_spd (vlib_main_t * vm, u32 spd_id, int is_add);
58
59/**
60 * @brief Bind/attach a SPD to an interface
61 */
62extern int ipsec_set_interface_spd (vlib_main_t * vm,
63 u32 sw_if_index, u32 spd_id, int is_add);
64
Neale Rannsa09c1ff2019-02-04 01:10:30 -080065extern u8 *format_ipsec_spd (u8 * s, va_list * args);
66
Zachary Leaf7cd35f52021-06-25 08:11:15 -050067extern u8 *format_ipsec_out_spd_flow_cache (u8 *s, va_list *args);
68extern u8 *format_ipsec_in_spd_flow_cache (u8 *s, va_list *args);
Govindarajan Mohandoss6d7dfcb2021-03-19 19:20:49 +000069
Neale Ranns999c8ee2019-02-01 03:31:24 -080070#endif /* __IPSEC_SPD_H__ */
71
72/*
73 * fd.io coding-style-patch-verification: ON
74 *
75 * Local Variables:
76 * eval: (c-set-style "gnu")
77 * End:
78 */