blob: 1e6c2c3bc90ca2dfb8661558e664dd213d6cd799 [file] [log] [blame]
Neale Ranns999c8ee2019-02-01 03:31:24 -08001/*
2 * Copyright (c) 2015 Cisco and/or its affiliates.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at:
6 *
7 * http://www.apache.org/licenses/LICENSE-2.0
8 *
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
14 */
15#ifndef __IPSEC_SPD_H__
16#define __IPSEC_SPD_H__
17
18#include <vlib/vlib.h>
19
Neale Rannsa09c1ff2019-02-04 01:10:30 -080020#define foreach_ipsec_spd_policy_type \
21 _(IP4_OUTBOUND, "ip4-outbound") \
22 _(IP6_OUTBOUND, "ip6-outbound") \
23 _(IP4_INBOUND_PROTECT, "ip4-inbound-protect") \
24 _(IP6_INBOUND_PROTECT, "ip6-inbound-protect") \
25 _(IP4_INBOUND_BYPASS, "ip4-inbound-bypass") \
26 _(IP6_INBOUND_BYPASS, "ip6-inbound-bypass")
27
28typedef enum ipsec_spd_policy_t_
29{
30#define _(s,v) IPSEC_SPD_POLICY_##s,
31 foreach_ipsec_spd_policy_type
32#undef _
33 IPSEC_SPD_POLICY_N_TYPES,
Neale Ranns9f231d42019-03-19 10:06:00 +000034} ipsec_spd_policy_type_t;
Neale Rannsa09c1ff2019-02-04 01:10:30 -080035
36#define FOR_EACH_IPSEC_SPD_POLICY_TYPE(_t) \
37 for (_t = 0; _t < IPSEC_SPD_POLICY_N_TYPES; _t++)
Neale Ranns999c8ee2019-02-01 03:31:24 -080038
Neale Ranns9f231d42019-03-19 10:06:00 +000039extern u8 *format_ipsec_policy_type (u8 * s, va_list * args);
40
Neale Ranns999c8ee2019-02-01 03:31:24 -080041/**
42 * @brief A Secruity Policy Database
43 */
Neale Rannsa09c1ff2019-02-04 01:10:30 -080044typedef struct
Neale Ranns999c8ee2019-02-01 03:31:24 -080045{
Neale Rannsa09c1ff2019-02-04 01:10:30 -080046 /** the User's ID for this policy */
Neale Ranns999c8ee2019-02-01 03:31:24 -080047 u32 id;
Neale Rannsa09c1ff2019-02-04 01:10:30 -080048 /** vectors for each of the policy types */
49 u32 *policies[IPSEC_SPD_POLICY_N_TYPES];
Neale Ranns999c8ee2019-02-01 03:31:24 -080050} ipsec_spd_t;
51
52/**
53 * @brief Add/Delete a SPD
54 */
55extern int ipsec_add_del_spd (vlib_main_t * vm, u32 spd_id, int is_add);
56
57/**
58 * @brief Bind/attach a SPD to an interface
59 */
60extern int ipsec_set_interface_spd (vlib_main_t * vm,
61 u32 sw_if_index, u32 spd_id, int is_add);
62
Neale Rannsa09c1ff2019-02-04 01:10:30 -080063extern u8 *format_ipsec_spd (u8 * s, va_list * args);
64
Neale Ranns999c8ee2019-02-01 03:31:24 -080065#endif /* __IPSEC_SPD_H__ */
66
67/*
68 * fd.io coding-style-patch-verification: ON
69 *
70 * Local Variables:
71 * eval: (c-set-style "gnu")
72 * End:
73 */