summaryrefslogtreecommitdiff
path: root/src/libcharon/config/backend.h
blob: aca3352ba7599b0b64d611496fda7f19d1bd0e5c (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
/*
 * Copyright (C) 2007-2008 Martin Willi
 * Hochschule fuer Technik Rapperswil
 *
 * This program is free software; you can redistribute it and/or modify it
 * under the terms of the GNU General Public License as published by the
 * Free Software Foundation; either version 2 of the License, or (at your
 * option) any later version.  See <http://www.fsf.org/copyleft/gpl.txt>.
 *
 * This program is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
 * or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
 * for more details.
 */

/**
 * @defgroup backend backend
 * @{ @ingroup config
 */

#ifndef BACKEND_H_
#define BACKEND_H_

typedef struct backend_t backend_t;

#include <library.h>
#include <config/ike_cfg.h>
#include <config/peer_cfg.h>
#include <collections/linked_list.h>

/**
 * The interface for a configuration backend.
 *
 * A configuration backend is loaded into the backend_manager. It does the actual
 * configuration lookup for the method it implements. See backend_manager_t for
 * more information.
 */
struct backend_t {

	/**
	 * Create an enumerator over all IKE configs matching two hosts.
	 *
	 * Hosts may be NULL to get all.
	 *
	 * There is no requirement for the backend to filter the configurations
	 * using the supplied hosts; but it may do so if it increases lookup times
	 * (e.g. include hosts in SQL query).
	 *
	 * @param me		address of local host
	 * @param other		address of remote host
	 * @return			enumerator over ike_cfg_t's
	 */
	enumerator_t* (*create_ike_cfg_enumerator)(backend_t *this,
											   host_t *me, host_t *other);
	/**
	 * Create an enumerator over all peer configs matching two identities.
	 *
	 * IDs may be NULL to get all.
	 *
	 * As configurations are looked up in the first authentication round (when
	 * multiple authentication), the backend implementation should compare
	 * the identities to the first auth_cfgs only.
	 * There is no requirement for the backend to filter the configurations
	 * using the supplied identities; but it may do so if it increases lookup
	 * times (e.g. include hosts in SQL query).
	 *
	 * @param me		identity of ourself
	 * @param other		identity of remote host
	 * @return			enumerator over peer_cfg_t
	 */
	enumerator_t* (*create_peer_cfg_enumerator)(backend_t *this,
												identification_t *me,
												identification_t *other);
	/**
	 * Get a peer_cfg identified by it's name, or a name of its children.
	 *
	 * @param name				name of peer/child cfg
	 * @return					matching peer_config, or NULL if none found
	 */
	peer_cfg_t *(*get_peer_cfg_by_name)(backend_t *this, char *name);
};

#endif /** BACKEND_H_ @}*/