1/*-
 2 * Copyright (c) 1999-2002 Robert N. M. Watson
 3 * Copyright (c) 2001-2004 Networks Associates Technology, Inc.
 4 * All rights reserved.
 5 *
 6 * This software was developed by Robert Watson for the TrustedBSD Project.
 7 *
 8 * This software was developed for the FreeBSD Project in part by Network
 9 * Associates Laboratories, the Security Research Division of Network
10 * Associates, Inc. under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"),
11 * as part of the DARPA CHATS research program.
12 *
13 * Redistribution and use in source and binary forms, with or without
14 * modification, are permitted provided that the following conditions
15 * are met:
16 * 1. Redistributions of source code must retain the above copyright
17 *    notice, this list of conditions and the following disclaimer.
18 * 2. Redistributions in binary form must reproduce the above copyright
19 *    notice, this list of conditions and the following disclaimer in the
20 *    documentation and/or other materials provided with the distribution.
21 *
22 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
23 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
26 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 * SUCH DAMAGE.
33 */
34/*
35 * Definitions for the TrustedBSD Biba integrity policy module.
36 */
37#ifndef _SYS_SECURITY_MAC_BIBA_H
38#define	_SYS_SECURITY_MAC_BIBA_H
39
40#define	MAC_BIBA_EXTATTR_NAMESPACE	EXTATTR_NAMESPACE_SYSTEM
41#define	MAC_BIBA_EXTATTR_NAME		"mac_biba"
42
43#define	MAC_BIBA_LABEL_NAME		"biba"
44
45#define	MAC_BIBA_FLAG_EFFECTIVE	0x00000001	/* mb_effective initialized */
46#define	MAC_BIBA_FLAG_RANGE	0x00000002	/* mb_range* initialized */
47#define	MAC_BIBA_FLAGS_BOTH	(MAC_BIBA_FLAG_EFFECTIVE | MAC_BIBA_FLAG_RANGE)
48
49#define	MAC_BIBA_TYPE_UNDEF	0	/* Undefined */
50#define	MAC_BIBA_TYPE_GRADE	1	/* Hierarchal grade with mb_grade. */
51#define	MAC_BIBA_TYPE_LOW	2	/* Dominated by any
52					 * MAC_BIBA_TYPE_LABEL. */
53#define	MAC_BIBA_TYPE_HIGH	3	/* Dominates any
54					 * MAC_BIBA_TYPE_LABEL. */
55#define	MAC_BIBA_TYPE_EQUAL	4	/* Equivalent to any
56					 * MAC_BIBA_TYPE_LABEL. */
57
58/*
59 * Structures and constants associated with a Biba Integrity policy.
60 * mac_biba represents a Biba label, with mb_type determining its properties,
61 * and mb_grade represents the hierarchal grade if valid for the current
62 * mb_type.
63 */
64
65#define	MAC_BIBA_MAX_COMPARTMENTS	256
66
67struct mac_biba_element {
68	u_short	mbe_type;
69	u_short	mbe_grade;
70	u_char	mbe_compartments[MAC_BIBA_MAX_COMPARTMENTS >> 3];
71};
72
73/*
74 * Biba labels consist of two components: an effective label, and a label
75 * range.  Depending on the context, one or both may be used; the mb_flags
76 * field permits the provider to indicate what fields are intended for
77 * use.
78 */
79struct mac_biba {
80	int			mb_flags;
81	struct mac_biba_element	mb_effective;
82	struct mac_biba_element	mb_rangelow, mb_rangehigh;
83};
84
85/*
86 * Biba compartments bit test/set macros.
87 * The range is 1 to MAC_BIBA_MAX_COMPARTMENTS.
88 */
89#define	MAC_BIBA_BIT_TEST(b, w) \
90	((w)[(((b) - 1) >> 3)] & (1 << (((b) - 1) & 7)))
91#define	MAC_BIBA_BIT_SET(b, w) \
92	((w)[(((b) - 1) >> 3)] |= (1 << (((b) - 1) & 7)))
93#define	MAC_BIBA_BIT_SET_EMPTY(set)	biba_bit_set_empty(set)
94
95#endif /* !_SYS_SECURITY_MAC_BIBA_H */