]> git.saurik.com Git - apple/network_cmds.git/blame - racoon.tproj/oakley.h
network_cmds-115.tar.gz
[apple/network_cmds.git] / racoon.tproj / oakley.h
CommitLineData
7ba0088d
A
1/* $KAME: oakley.h,v 1.27 2001/08/17 10:50:27 sakane Exp $ */
2
3/*
4 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. Neither the name of the project nor the names of its contributors
16 * may be used to endorse or promote products derived from this software
17 * without specific prior written permission.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * SUCH DAMAGE.
30 */
31
32/* refer to RFC 2409 */
33
34/* Attribute Classes */
35#define OAKLEY_ATTR_ENC_ALG 1 /* B */
36#define OAKLEY_ATTR_ENC_ALG_DES 1
37#define OAKLEY_ATTR_ENC_ALG_IDEA 2
38#define OAKLEY_ATTR_ENC_ALG_BLOWFISH 3
39#define OAKLEY_ATTR_ENC_ALG_RC5 4
40#define OAKLEY_ATTR_ENC_ALG_3DES 5
41#define OAKLEY_ATTR_ENC_ALG_CAST 6
42#define OAKLEY_ATTR_ENC_ALG_RIJNDAEL 7
43#define OAKLEY_ATTR_ENC_ALG_AES 7
44 /* 65001 - 65535 Private Use */
45#define OAKLEY_ATTR_HASH_ALG 2 /* B */
46#define OAKLEY_ATTR_HASH_ALG_MD5 1
47#define OAKLEY_ATTR_HASH_ALG_SHA 2
48#define OAKLEY_ATTR_HASH_ALG_TIGER 3
49#define OAKLEY_ATTR_HASH_ALG_SHA2_256 4
50#define OAKLEY_ATTR_HASH_ALG_SHA2_384 5
51#define OAKLEY_ATTR_HASH_ALG_SHA2_512 6
52 /* 65001 - 65535 Private Use */
53#define OAKLEY_ATTR_AUTH_METHOD 3 /* B */
54#define OAKLEY_ATTR_AUTH_METHOD_PSKEY 1
55#define OAKLEY_ATTR_AUTH_METHOD_DSSSIG 2
56#define OAKLEY_ATTR_AUTH_METHOD_RSASIG 3
57#define OAKLEY_ATTR_AUTH_METHOD_RSAENC 4
58#define OAKLEY_ATTR_AUTH_METHOD_RSAREV 5
59#define OAKLEY_ATTR_AUTH_METHOD_EGENC 6
60#define OAKLEY_ATTR_AUTH_METHOD_EGREV 7
61 /* 65001 - 65535 Private Use */
62 /*
63 * The following are valid when the Vendor ID is one of
64 * the following:
65 *
66 * MD5("A GSS-API Authentication Method for IKE")
67 * MD5("GSSAPI") (recognized by Windows 2000)
68 * MD5("MS NT5 ISAKMPOAKLEY") (sent by Windows 2000)
69 */
70#define OAKLEY_ATTR_AUTH_METHOD_GSSAPI_KRB 65001
71#define OAKLEY_ATTR_GRP_DESC 4 /* B */
72#define OAKLEY_ATTR_GRP_DESC_MODP768 1
73#define OAKLEY_ATTR_GRP_DESC_MODP1024 2
74#define OAKLEY_ATTR_GRP_DESC_EC2N155 3
75#define OAKLEY_ATTR_GRP_DESC_EC2N185 4
76#define OAKLEY_ATTR_GRP_DESC_MODP1536 5
77#define OAKLEY_ATTR_GRP_DESC_MODP2048 42048 /* these value are */
78#define OAKLEY_ATTR_GRP_DESC_MODP3072 43072 /* make consensus */
79#define OAKLEY_ATTR_GRP_DESC_MODP4096 44096 /* at the bake off */
80#define OAKLEY_ATTR_GRP_DESC_MODP8192 48192 /* in helsinki */
81#define OAKLEY_ATTR_GRP_DESC_MODP6144 46144 /* XXX */
82 /* 32768 - 65535 Private Use */
83#define OAKLEY_ATTR_GRP_TYPE 5 /* B */
84#define OAKLEY_ATTR_GRP_TYPE_MODP 1
85#define OAKLEY_ATTR_GRP_TYPE_ECP 2
86#define OAKLEY_ATTR_GRP_TYPE_EC2N 3
87 /* 65001 - 65535 Private Use */
88#define OAKLEY_ATTR_GRP_PI 6 /* V */
89#define OAKLEY_ATTR_GRP_GEN_ONE 7 /* V */
90#define OAKLEY_ATTR_GRP_GEN_TWO 8 /* V */
91#define OAKLEY_ATTR_GRP_CURVE_A 9 /* V */
92#define OAKLEY_ATTR_GRP_CURVE_B 10 /* V */
93#define OAKLEY_ATTR_SA_LD_TYPE 11 /* B */
94#define OAKLEY_ATTR_SA_LD_TYPE_DEFAULT 1
95#define OAKLEY_ATTR_SA_LD_TYPE_SEC 1
96#define OAKLEY_ATTR_SA_LD_TYPE_KB 2
97#define OAKLEY_ATTR_SA_LD_TYPE_MAX 3
98 /* 65001 - 65535 Private Use */
99#define OAKLEY_ATTR_SA_LD 12 /* V */
100#define OAKLEY_ATTR_SA_LD_SEC_DEFAULT 28800 /* 8 hours */
101#define OAKLEY_ATTR_PRF 13 /* B */
102#define OAKLEY_ATTR_KEY_LEN 14 /* B */
103#define OAKLEY_ATTR_FIELD_SIZE 15 /* B */
104#define OAKLEY_ATTR_GRP_ORDER 16 /* V */
105#define OAKLEY_ATTR_BLOCK_SIZE 17 /* B */
106 /* 16384 - 32767 Private Use */
107
108 /*
109 * The following are valid when the Vendor ID is one of
110 * the following:
111 *
112 * MD5("A GSS-API Authentication Method for IKE")
113 * MD5("GSSAPI") (recognized by Windows 2000)
114 * MD5("MS NT5 ISAKMPOAKLEY") (sent by Windows 2000)
115 */
116#define OAKLEY_ATTR_GSS_ID 16384
117
118#define MAXPADLWORD 20
119
120struct dhgroup {
121 int type;
122 vchar_t *prime;
123 int gen1;
124 int gen2;
125 vchar_t *curve_a;
126 vchar_t *curve_b;
127 vchar_t *order;
128};
129
130/* certificate holder */
131typedef struct cert_t_tag {
132 u_int8_t type; /* type of CERT, must be same to pl->v[0]*/
133 vchar_t cert; /* pointer to the CERT */
134 vchar_t *pl; /* CERT payload minus isakmp general header */
135} cert_t;
136
137struct ph1handle;
138struct ph2handle;
139struct isakmp_ivm;
140
141extern int oakley_get_defaultlifetime __P((void));
142
143extern int oakley_dhinit __P((void));
144extern void oakley_dhgrp_free __P((struct dhgroup *));
145extern int oakley_dh_compute __P((const struct dhgroup *,
146 vchar_t *, vchar_t *, vchar_t *, vchar_t **));
147extern int oakley_dh_generate __P((const struct dhgroup *,
148 vchar_t **, vchar_t **));
149extern int oakley_setdhgroup __P((int, struct dhgroup **));
150
151extern vchar_t *oakley_prf __P((vchar_t *, vchar_t *, struct ph1handle *));
152extern vchar_t *oakley_hash __P((vchar_t *, struct ph1handle *));
153
154extern int oakley_compute_keymat __P((struct ph2handle *, int));
155
156#if notyet
157extern vchar_t *oakley_compute_hashx __P((void));
158#endif
159extern vchar_t *oakley_compute_hash3 __P((struct ph1handle *,
160 u_int32_t, vchar_t *));
161extern vchar_t *oakley_compute_hash1 __P((struct ph1handle *,
162 u_int32_t, vchar_t *));
163extern vchar_t *oakley_ph1hash_common __P((struct ph1handle *, int));
164extern vchar_t *oakley_ph1hash_base_i __P((struct ph1handle *, int));
165extern vchar_t *oakley_ph1hash_base_r __P((struct ph1handle *, int));
166
167extern int oakley_validate_auth __P((struct ph1handle *));
168#ifdef HAVE_SIGNING_C
169extern int oakley_getmycert __P((struct ph1handle *));
170extern int oakley_getsign __P((struct ph1handle *));
171extern vchar_t *oakley_getcr __P((struct ph1handle *));
172extern int oakley_checkcr __P((struct ph1handle *));
173#endif
174extern int oakley_needcr __P((int));
175struct isakmp_gen;
176extern int oakley_savecert __P((struct ph1handle *, struct isakmp_gen *));
177extern int oakley_savecr __P((struct ph1handle *, struct isakmp_gen *));
178
179extern int oakley_skeyid __P((struct ph1handle *));
180extern int oakley_skeyid_dae __P((struct ph1handle *));
181
182extern int oakley_compute_enckey __P((struct ph1handle *));
183extern cert_t *oakley_newcert __P((void));
184extern void oakley_delcert __P((cert_t *));
185extern int oakley_newiv __P((struct ph1handle *));
186extern struct isakmp_ivm *oakley_newiv2 __P((struct ph1handle *, u_int32_t));
187extern void oakley_delivm __P((struct isakmp_ivm *));
188extern vchar_t *oakley_do_decrypt __P((struct ph1handle *,
189 vchar_t *, vchar_t *, vchar_t *));
190extern vchar_t *oakley_do_encrypt __P((struct ph1handle *,
191 vchar_t *, vchar_t *, vchar_t *));