]> git.saurik.com Git - apple/network_cmds.git/blob - racoon.tproj/ipsec_doi.h
network_cmds-245.tar.gz
[apple/network_cmds.git] / racoon.tproj / ipsec_doi.h
1 /* $KAME: ipsec_doi.h,v 1.34 2001/08/16 06:20:35 itojun Exp $ */
2
3 /*
4 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. Neither the name of the project nor the names of its contributors
16 * may be used to endorse or promote products derived from this software
17 * without specific prior written permission.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * SUCH DAMAGE.
30 */
31
32 #ifndef __IPSEC_DOI_H__
33 #define __IPSEC_DOI_H__
34
35 /* refered to RFC2407 */
36
37 #define IPSEC_DOI 1
38
39 /* 4.2 IPSEC Situation Definition */
40 #define IPSECDOI_SIT_IDENTITY_ONLY 0x00000001
41 #define IPSECDOI_SIT_SECRECY 0x00000002
42 #define IPSECDOI_SIT_INTEGRITY 0x00000004
43
44 /* 4.4.1 IPSEC Security Protocol Identifiers */
45 /* 4.4.2 IPSEC ISAKMP Transform Values */
46 #define IPSECDOI_PROTO_ISAKMP 1
47 #define IPSECDOI_KEY_IKE 1
48
49 /* 4.4.1 IPSEC Security Protocol Identifiers */
50 #define IPSECDOI_PROTO_IPSEC_AH 2
51 /* 4.4.3 IPSEC AH Transform Values */
52 #define IPSECDOI_AH_MD5 2
53 #define IPSECDOI_AH_SHA 3
54 #define IPSECDOI_AH_DES 4
55 #define IPSECDOI_AH_SHA2_256 5
56 #define IPSECDOI_AH_SHA2_384 6
57 #define IPSECDOI_AH_SHA2_512 7
58
59 /* 4.4.1 IPSEC Security Protocol Identifiers */
60 #define IPSECDOI_PROTO_IPSEC_ESP 3
61 /* 4.4.4 IPSEC ESP Transform Identifiers */
62 #define IPSECDOI_ESP_DES_IV64 1
63 #define IPSECDOI_ESP_DES 2
64 #define IPSECDOI_ESP_3DES 3
65 #define IPSECDOI_ESP_RC5 4
66 #define IPSECDOI_ESP_IDEA 5
67 #define IPSECDOI_ESP_CAST 6
68 #define IPSECDOI_ESP_BLOWFISH 7
69 #define IPSECDOI_ESP_3IDEA 8
70 #define IPSECDOI_ESP_DES_IV32 9
71 #define IPSECDOI_ESP_RC4 10
72 #define IPSECDOI_ESP_NULL 11
73 #define IPSECDOI_ESP_RIJNDAEL 12
74 #define IPSECDOI_ESP_AES 12
75 #if 1
76 /* draft-ietf-ipsec-ciph-aes-cbc-00.txt */
77 #define IPSECDOI_ESP_TWOFISH 253
78 #else
79 /* SSH uses these value for now */
80 #define IPSECDOI_ESP_TWOFISH 250
81 #endif
82
83 /* 4.4.1 IPSEC Security Protocol Identifiers */
84 #define IPSECDOI_PROTO_IPCOMP 4
85 /* 4.4.5 IPSEC IPCOMP Transform Identifiers */
86 #define IPSECDOI_IPCOMP_OUI 1
87 #define IPSECDOI_IPCOMP_DEFLATE 2
88 #define IPSECDOI_IPCOMP_LZS 3
89
90 /* 4.5 IPSEC Security Association Attributes */
91 /* NOTE: default value is not included in a packet. */
92 #define IPSECDOI_ATTR_SA_LD_TYPE 1 /* B */
93 #define IPSECDOI_ATTR_SA_LD_TYPE_DEFAULT 1
94 #define IPSECDOI_ATTR_SA_LD_TYPE_SEC 1
95 #define IPSECDOI_ATTR_SA_LD_TYPE_KB 2
96 #define IPSECDOI_ATTR_SA_LD_TYPE_MAX 3
97 #define IPSECDOI_ATTR_SA_LD 2 /* V */
98 #define IPSECDOI_ATTR_SA_LD_SEC_DEFAULT 28800 /* 8 hours */
99 #define IPSECDOI_ATTR_SA_LD_KB_MAX (~(1 << ((sizeof(int) << 3) - 1)))
100 #define IPSECDOI_ATTR_GRP_DESC 3 /* B */
101 #define IPSECDOI_ATTR_ENC_MODE 4 /* B */
102 /* default value: host dependent */
103 #define IPSECDOI_ATTR_ENC_MODE_ANY 0 /* NOTE:internal use */
104 #define IPSECDOI_ATTR_ENC_MODE_TUNNEL 1
105 #define IPSECDOI_ATTR_ENC_MODE_TRNS 2
106 #define IPSECDOI_ATTR_ENC_MODE_UDP_TUNNEL 3 /* UDP Encapsulated IPSec, NAT-T */
107 #define IPSECDOI_ATTR_ENC_MODE_UDP_TRNS 4 /* UDP Encapsulated IPSec, NAT-T */
108 #define IPSECDOI_ATTR_AUTH 5 /* B */
109 /* 0 means not to use authentication. */
110 #define IPSECDOI_ATTR_AUTH_HMAC_MD5 1
111 #define IPSECDOI_ATTR_AUTH_HMAC_SHA1 2
112 #define IPSECDOI_ATTR_AUTH_DES_MAC 3
113 #define IPSECDOI_ATTR_AUTH_KPDK 4 /*RFC-1826(Key/Pad/Data/Key)*/
114 #define IPSECDOI_ATTR_SHA2_256 5
115 #define IPSECDOI_ATTR_SHA2_384 6
116 #define IPSECDOI_ATTR_SHA2_512 7
117 #define IPSECDOI_ATTR_AUTH_NONE 254 /* NOTE:internal use */
118 /*
119 * When negotiating ESP without authentication, the Auth
120 * Algorithm attribute MUST NOT be included in the proposal.
121 * When negotiating ESP without confidentiality, the Auth
122 * Algorithm attribute MUST be included in the proposal and
123 * the ESP transform ID must be ESP_NULL.
124 */
125 #define IPSECDOI_ATTR_KEY_LENGTH 6 /* B */
126 #define IPSECDOI_ATTR_KEY_ROUNDS 7 /* B */
127 #define IPSECDOI_ATTR_COMP_DICT_SIZE 8 /* B */
128 #define IPSECDOI_ATTR_COMP_PRIVALG 9 /* V */
129
130 /* 4.6.1 Security Association Payload */
131 struct ipsecdoi_pl_sa {
132 struct isakmp_gen h;
133 struct ipsecdoi_sa_b {
134 u_int32_t doi; /* Domain of Interpretation */
135 u_int32_t sit; /* Situation */
136 } b;
137 /* followed by Leveled Domain Identifier and so on. */
138 } __attribute__((__packed__));
139
140 struct ipsecdoi_secrecy_h {
141 u_int16_t len;
142 u_int16_t reserved;
143 /* followed by the value */
144 } __attribute__((__packed__));
145
146 /* 4.6.2 Identification Payload Content */
147 struct ipsecdoi_pl_id {
148 struct isakmp_gen h;
149 struct ipsecdoi_id_b {
150 u_int8_t type; /* ID Type */
151 u_int8_t proto_id; /* Protocol ID */
152 u_int16_t port; /* Port */
153 } b;
154 /* followed by Identification Data */
155 } __attribute__((__packed__));
156
157 #define IPSECDOI_ID_IPV4_ADDR 1
158 #define IPSECDOI_ID_FQDN 2
159 #define IPSECDOI_ID_USER_FQDN 3
160 #define IPSECDOI_ID_IPV4_ADDR_SUBNET 4
161 #define IPSECDOI_ID_IPV6_ADDR 5
162 #define IPSECDOI_ID_IPV6_ADDR_SUBNET 6
163 #define IPSECDOI_ID_IPV4_ADDR_RANGE 7
164 #define IPSECDOI_ID_IPV6_ADDR_RANGE 8
165 #define IPSECDOI_ID_DER_ASN1_DN 9
166 #define IPSECDOI_ID_DER_ASN1_GN 10
167 #define IPSECDOI_ID_KEY_ID 11
168
169 /* compressing doi type, it's internal use. */
170 #define IDTYPE_FQDN 0
171 #define IDTYPE_USERFQDN 1
172 #define IDTYPE_KEYID 2
173 #define IDTYPE_ADDRESS 3
174 #define IDTYPE_ASN1DN 4
175
176 /* shared secret type, it's internal use. */
177 #define SECRETTYPE_USE 0
178 #define SECRETTYPE_KEY 1
179 #define SECRETTYPE_KEYCHAIN 2
180
181 /* verification modules */
182 #define VERIFICATION_MODULE_OPENSSL 0
183 #define VERIFICATION_MODULE_SEC_FRAMEWORK 1
184
185 /* verification options */
186 #define VERIFICATION_OPTION_NONE 0
187 #define VERIFICATION_OPTION_PEERS_IDENTIFIER 1
188 #define VERIFICATION_OPTION_OPEN_DIR 2
189
190 /* The use for checking proposal payload. This is not exchange type. */
191 #define IPSECDOI_TYPE_PH1 0
192 #define IPSECDOI_TYPE_PH2 1
193
194 struct isakmpsa;
195 struct ipsecdoi_pl_sa;
196 struct saprop;
197 struct saproto;
198 struct satrns;
199 struct prop_pair;
200
201 extern int ipsecdoi_checkph1proposal __P((vchar_t *, struct ph1handle *));
202 extern int ipsecdoi_selectph2proposal __P((struct ph2handle *));
203 extern int ipsecdoi_checkph2proposal __P((struct ph2handle *));
204
205 extern struct prop_pair **get_proppair __P((vchar_t *, int));
206 extern vchar_t *get_sabyproppair __P((struct prop_pair *, struct ph1handle *));
207 extern int ipsecdoi_updatespi __P((struct ph2handle *iph2));
208 extern vchar_t *get_sabysaprop __P((struct saprop *, vchar_t *));
209 extern int ipsecdoi_checkid1 __P((struct ph1handle *));
210 extern int ipsecdoi_setid1 __P((struct ph1handle *));
211 extern int set_identifier __P((vchar_t **, int, vchar_t *));
212 extern int ipsecdoi_setid2 __P((struct ph2handle *));
213 extern vchar_t *ipsecdoi_sockaddr2id __P((struct sockaddr *, u_int, u_int));
214 extern int ipsecdoi_id2sockaddr __P((vchar_t *, struct sockaddr *,
215 u_int8_t *, u_int16_t *));
216 extern const char *ipsecdoi_id2str __P((const vchar_t *));
217
218 extern vchar_t *ipsecdoi_setph1proposal __P((struct isakmpsa *));
219 extern int ipsecdoi_setph2proposal __P((struct ph2handle *));
220 extern int ipsecdoi_transportmode __P((struct ph2handle *));
221 extern int ipsecdoi_get_defaultlifetime __P((void));
222 extern int ipsecdoi_checkalgtypes __P((int, int, int, int));
223 extern int ipproto2doi __P((int));
224 extern int doi2ipproto __P((int));
225
226 extern int ipsecdoi_t2satrns __P((struct isakmp_pl_t *,
227 struct saprop *, struct saproto *, struct satrns *));
228 extern int ipsecdoi_authalg2trnsid __P((int));
229 extern int idtype2doi __P((int));
230 extern int doi2idtype __P((int));
231
232
233 #endif /* __IPSEC_DOI_H__ */
234