1 /*- 2 * Copyright (c) 1999-2002 Robert N. M. Watson 3 * Copyright (c) 2001-2004 Networks Associates Technology, Inc. 4 * All rights reserved. 5 * 6 * This software was developed by Robert Watson for the TrustedBSD Project. 7 * 8 * This software was developed for the FreeBSD Project in part by Network 9 * Associates Laboratories, the Security Research Division of Network 10 * Associates, Inc. under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), 11 * as part of the DARPA CHATS research program. 12 * 13 * Redistribution and use in source and binary forms, with or without 14 * modification, are permitted provided that the following conditions 15 * are met: 16 * 1. Redistributions of source code must retain the above copyright 17 * notice, this list of conditions and the following disclaimer. 18 * 2. Redistributions in binary form must reproduce the above copyright 19 * notice, this list of conditions and the following disclaimer in the 20 * documentation and/or other materials provided with the distribution. 21 * 22 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 23 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 24 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 25 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 26 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 27 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 28 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 29 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 30 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 31 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 32 * SUCH DAMAGE. 33 */ 34 /* 35 * Definitions for the TrustedBSD Biba integrity policy module. 36 */ 37 #ifndef _SYS_SECURITY_MAC_BIBA_H 38 #define _SYS_SECURITY_MAC_BIBA_H 39 40 #define MAC_BIBA_EXTATTR_NAMESPACE EXTATTR_NAMESPACE_SYSTEM 41 #define MAC_BIBA_EXTATTR_NAME "mac_biba" 42 43 #define MAC_BIBA_LABEL_NAME "biba" 44 45 #define MAC_BIBA_FLAG_EFFECTIVE 0x00000001 /* mb_effective initialized */ 46 #define MAC_BIBA_FLAG_RANGE 0x00000002 /* mb_range* initialized */ 47 #define MAC_BIBA_FLAGS_BOTH (MAC_BIBA_FLAG_EFFECTIVE | MAC_BIBA_FLAG_RANGE) 48 49 #define MAC_BIBA_TYPE_UNDEF 0 /* Undefined */ 50 #define MAC_BIBA_TYPE_GRADE 1 /* Hierarchal grade with mb_grade. */ 51 #define MAC_BIBA_TYPE_LOW 2 /* Dominated by any 52 * MAC_BIBA_TYPE_LABEL. */ 53 #define MAC_BIBA_TYPE_HIGH 3 /* Dominates any 54 * MAC_BIBA_TYPE_LABEL. */ 55 #define MAC_BIBA_TYPE_EQUAL 4 /* Equivalent to any 56 * MAC_BIBA_TYPE_LABEL. */ 57 58 /* 59 * Structures and constants associated with a Biba Integrity policy. 60 * mac_biba represents a Biba label, with mb_type determining its properties, 61 * and mb_grade represents the hierarchal grade if valid for the current 62 * mb_type. 63 */ 64 65 #define MAC_BIBA_MAX_COMPARTMENTS 256 66 67 struct mac_biba_element { 68 u_short mbe_type; 69 u_short mbe_grade; 70 u_char mbe_compartments[MAC_BIBA_MAX_COMPARTMENTS >> 3]; 71 }; 72 73 /* 74 * Biba labels consist of two components: an effective label, and a label 75 * range. Depending on the context, one or both may be used; the mb_flags 76 * field permits the provider to indicate what fields are intended for 77 * use. 78 */ 79 struct mac_biba { 80 int mb_flags; 81 struct mac_biba_element mb_effective; 82 struct mac_biba_element mb_rangelow, mb_rangehigh; 83 }; 84 85 /* 86 * Biba compartments bit test/set macros. 87 * The range is 1 to MAC_BIBA_MAX_COMPARTMENTS. 88 */ 89 #define MAC_BIBA_BIT_TEST(b, w) \ 90 ((w)[(((b) - 1) >> 3)] & (1 << (((b) - 1) & 7))) 91 #define MAC_BIBA_BIT_SET(b, w) \ 92 ((w)[(((b) - 1) >> 3)] |= (1 << (((b) - 1) & 7))) 93 #define MAC_BIBA_BIT_SET_EMPTY(set) biba_bit_set_empty(set) 94 95 #endif /* !_SYS_SECURITY_MAC_BIBA_H */ 96