X-Git-Url: https://git.saurik.com/apple/xnu.git/blobdiff_plain/1c79356b52d46aa6b508fb032f5ae709b1f2897b..bd504ef0e0b883cdd7917b73b3574eb9ce669905:/bsd/netkey/keydb.h diff --git a/bsd/netkey/keydb.h b/bsd/netkey/keydb.h index 4e2160a75..079f6e288 100644 --- a/bsd/netkey/keydb.h +++ b/bsd/netkey/keydb.h @@ -31,10 +31,13 @@ #ifndef _NETKEY_KEYDB_H_ #define _NETKEY_KEYDB_H_ +#include #ifdef KERNEL +#ifdef KERNEL_PRIVATE #include +#include /* Security Assocciation Index */ /* NOTE: Ensure to be same address family */ @@ -57,6 +60,7 @@ struct secashead { struct sadb_ident *identd; /* destination identity */ /* XXX I don't know how to use them. */ + u_int8_t dir; /* IPSEC_DIR_INBOUND or IPSEC_DIR_OUTBOUND */ u_int8_t state; /* MATURE or DEAD. */ LIST_HEAD(_satree, secasvar) savtree[SADB_SASTATE_MAX+1]; /* SA chain */ @@ -65,10 +69,13 @@ struct secashead { struct route sa_route; /* route cache */ }; +typedef int (*utun_is_keepalive_func) __P((void *, void *, u_int16_t, u_int32_t, size_t)); +typedef int (*utun_input_func) __P((void *, void *, protocol_family_t family)); + /* Security Association */ struct secasvar { LIST_ENTRY(secasvar) chain; - + LIST_ENTRY(secasvar) spihash; int refcnt; /* reference count */ u_int8_t state; /* Status of this Association */ @@ -78,19 +85,14 @@ struct secasvar { u_int32_t flags; /* holder for SADB_KEY_FLAGS */ struct sadb_key *key_auth; /* Key for Authentication */ - /* length has been shifted up to 3. */ struct sadb_key *key_enc; /* Key for Encryption */ - /* length has been shifted up to 3. */ caddr_t iv; /* Initilization Vector */ u_int ivlen; /* length of IV */ -#if 0 - caddr_t misc1; - caddr_t misc2; - caddr_t misc3; -#endif + void *sched; /* intermediate encryption key */ + size_t schedlen; struct secreplay *replay; /* replay prevention */ - u_int32_t tick; /* for lifetime */ + long created; /* for lifetime */ struct sadb_lifetime *lft_c; /* CURRENT lifetime, it's constant. */ struct sadb_lifetime *lft_h; /* HARD lifetime */ @@ -100,6 +102,15 @@ struct secasvar { pid_t pid; /* message's pid */ struct secashead *sah; /* back pointer to the secashead */ + + /* Nat Traversal related bits */ + u_int32_t natt_last_activity; + u_int16_t remote_ike_port; + u_int16_t natt_encapsulated_src_port; /* network byte order */ + + void *utun_pcb; + utun_is_keepalive_func utun_is_keepalive_fn; + utun_input_func utun_in_fn; }; /* replay prevention */ @@ -127,7 +138,7 @@ struct secacq { struct secasindex saidx; u_int32_t seq; /* sequence number */ - u_int32_t tick; /* for lifetime */ + long created; /* for lifetime */ int count; /* for lifetime */ }; #endif @@ -143,22 +154,23 @@ struct key_cb { }; /* secpolicy */ -extern struct secpolicy *keydb_newsecpolicy __P((void)); -extern void keydb_delsecpolicy __P((struct secpolicy *)); +extern struct secpolicy *keydb_newsecpolicy(void); +extern void keydb_delsecpolicy(struct secpolicy *); /* secashead */ -extern struct secashead *keydb_newsecashead __P((void)); -extern void keydb_delsecashead __P((struct secashead *)); +extern struct secashead *keydb_newsecashead(void); +// extern void keydb_delsecashead(struct secashead *); // not used /* secasvar */ -extern struct secasvar *keydb_newsecasvar __P((void)); -extern void keydb_refsecasvar __P((struct secasvar *)); -extern void keydb_freesecasvar __P((struct secasvar *)); +// extern struct secasvar *keydb_newsecasvar(void); // not used +// extern void keydb_refsecasvar(struct secasvar *); // not used +// extern void keydb_freesecasvar(struct secasvar *); // not used /* secreplay */ -extern struct secreplay *keydb_newsecreplay __P((size_t)); -extern void keydb_delsecreplay __P((struct secreplay *)); +extern struct secreplay *keydb_newsecreplay(size_t); +extern void keydb_delsecreplay(struct secreplay *); /* secreg */ -extern struct secreg *keydb_newsecreg __P((void)); -extern void keydb_delsecreg __P((struct secreg *)); +// extern struct secreg *keydb_newsecreg(void); // not used +// extern void keydb_delsecreg(struct secreg *); // not used +#endif /* KERNEL_PRIVATE */ #endif /* KERNEL */ #endif /* _NETKEY_KEYDB_H_ */