Annotation of embedaddon/ipsec-tools/src/racoon/remoteconf.h, revision 1.1.1.1

1.1       misho       1: /*     $NetBSD: remoteconf.h,v 1.16 2011/03/14 15:50:36 vanhu Exp $    */
                      2: 
                      3: /* Id: remoteconf.h,v 1.26 2006/05/06 15:52:44 manubsd Exp */
                      4: 
                      5: /*
                      6:  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
                      7:  * All rights reserved.
                      8:  * 
                      9:  * Redistribution and use in source and binary forms, with or without
                     10:  * modification, are permitted provided that the following conditions
                     11:  * are met:
                     12:  * 1. Redistributions of source code must retain the above copyright
                     13:  *    notice, this list of conditions and the following disclaimer.
                     14:  * 2. Redistributions in binary form must reproduce the above copyright
                     15:  *    notice, this list of conditions and the following disclaimer in the
                     16:  *    documentation and/or other materials provided with the distribution.
                     17:  * 3. Neither the name of the project nor the names of its contributors
                     18:  *    may be used to endorse or promote products derived from this software
                     19:  *    without specific prior written permission.
                     20:  * 
                     21:  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
                     22:  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
                     23:  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
                     24:  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
                     25:  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
                     26:  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
                     27:  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
                     28:  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
                     29:  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
                     30:  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
                     31:  * SUCH DAMAGE.
                     32:  */
                     33: 
                     34: #ifndef _REMOTECONF_H
                     35: #define _REMOTECONF_H
                     36: 
                     37: /* remote configuration */
                     38: 
                     39: #include <sys/queue.h>
                     40: #include "genlist.h"
                     41: #ifdef ENABLE_HYBRID
                     42: #include "isakmp_var.h"
                     43: #include "isakmp_xauth.h"
                     44: #endif
                     45: 
                     46: struct ph1handle;
                     47: struct secprotospec;
                     48: 
                     49: struct etypes {
                     50:        int type;
                     51:        struct etypes *next;
                     52: };
                     53: 
                     54: /* ISAKMP SA specification */
                     55: struct isakmpsa {
                     56:        int prop_no;
                     57:        int trns_no;
                     58:        time_t lifetime;
                     59:        size_t lifebyte;
                     60:        int enctype;
                     61:        int encklen;
                     62:        int authmethod;
                     63:        int hashtype;
                     64:        int vendorid;
                     65: #ifdef HAVE_GSSAPI
                     66:        vchar_t *gssid;
                     67: #endif
                     68:        int dh_group;                   /* don't use it if aggressive mode */
                     69:        struct dhgroup *dhgrp;          /* don't use it if aggressive mode */
                     70: 
                     71:        struct isakmpsa *next;          /* next transform */
                     72: };
                     73: 
                     74: /* Certificate information */
                     75: struct rmconf_cert {
                     76:        vchar_t *data;                  /* certificate payload */
                     77:        char *filename;                 /* name of local file */
                     78: };
                     79: 
                     80: /* Script hooks */
                     81: #define SCRIPT_PHASE1_UP       0
                     82: #define SCRIPT_PHASE1_DOWN     1
                     83: #define SCRIPT_PHASE1_DEAD     2
                     84: #define SCRIPT_MAX             2
                     85: extern char *script_names[SCRIPT_MAX + 1];
                     86: 
                     87: struct remoteconf {
                     88:        char *name;                     /* remote configuration name */
                     89:        struct sockaddr *remote;        /* remote IP address */
                     90:                                        /* if family is AF_UNSPEC, that is
                     91:                                         * for anonymous configuration. */
                     92: 
                     93:        struct etypes *etypes;          /* exchange type list. the head
                     94:                                         * is a type to be sent first. */
                     95:        int doitype;                    /* doi type */
                     96:        int sittype;                    /* situation type */
                     97: 
                     98:        int idvtype;                    /* my identifier type */
                     99:        vchar_t *idv;                   /* my identifier */
                    100:        vchar_t *key;                   /* my pre-shared key */
                    101:        struct genlist *idvl_p;         /* peer's identifiers list */
                    102: 
                    103:        char *myprivfile;               /* file name of my private key file */
                    104:        char *mycertfile;               /* file name of my certificate */
                    105:        vchar_t *mycert;                /* my certificate */
                    106:        char *peerscertfile;            /* file name of peer's certifcate */
                    107:        vchar_t *peerscert;             /* peer's certificate */
                    108:        char *cacertfile;               /* file name of CA */
                    109:        vchar_t *cacert;                /* CA certificate */
                    110: 
                    111:        int send_cert;                  /* send to CERT or not */
                    112:        int send_cr;                    /* send to CR or not */
                    113:        int match_empty_cr;             /* does this match if CR is empty */
                    114:        int verify_cert;                /* verify a CERT strictly */
                    115:        int verify_identifier;          /* vefify the peer's identifier */
                    116:        int nonce_size;                 /* the number of bytes of nonce */
                    117:        int passive;                    /* never initiate */
                    118:        int ike_frag;                   /* IKE fragmentation */
                    119:        int esp_frag;                   /* ESP fragmentation */
                    120:        int mode_cfg;                   /* Gets config through mode config */
                    121:        int support_proxy;              /* support mip6/proxy */
                    122: #define GENERATE_POLICY_NONE   0
                    123: #define GENERATE_POLICY_REQUIRE        1
                    124: #define GENERATE_POLICY_UNIQUE 2
                    125:        int gen_policy;                 /* generate policy if no policy found */
                    126:        int ini_contact;                /* initial contact */
                    127:        int pcheck_level;               /* level of propocl checking */
                    128:        int nat_traversal;              /* NAT-Traversal */
                    129:        vchar_t *script[SCRIPT_MAX + 1];/* script hooks paths */
                    130:        int dh_group;                   /* use it when only aggressive mode */
                    131:        struct dhgroup *dhgrp;          /* use it when only aggressive mode */
                    132:                                        /* above two can't be defined by user*/
                    133: 
                    134:        int dpd;                                /* Negociate DPD support ? */
                    135:        int dpd_retry;                  /* in seconds */
                    136:        int dpd_interval;               /* in seconds */
                    137:        int dpd_maxfails;
                    138: 
                    139:        int rekey;                      /* rekey ph1 when active ph2s? */
                    140: #define REKEY_OFF              FALSE
                    141: #define REKEY_ON               TRUE
                    142: #define REKEY_FORCE            2
                    143: 
                    144:        uint32_t ph1id; /* ph1id to be matched with sainfo sections */
                    145: 
                    146:        int weak_phase1_check;          /* act on unencrypted deletions ? */
                    147: 
                    148:        struct isakmpsa *proposal;      /* proposal list */
                    149:        struct remoteconf *inherited_from;      /* the original rmconf 
                    150:                                                   from which this one 
                    151:                                                   was inherited */
                    152: 
                    153:        time_t lifetime;                /* for isakmp/ipsec */
                    154:        int lifebyte;                   /* for isakmp/ipsec */
                    155:        struct secprotospec *spspec;    /* the head is always current spec. */
                    156: 
                    157:        struct genlist  *rsa_private,   /* lists of PlainRSA keys to use */
                    158:                        *rsa_public;
                    159: 
                    160: #ifdef ENABLE_HYBRID
                    161:        struct xauth_rmconf *xauth;
                    162: #endif
                    163: 
                    164:        TAILQ_ENTRY(remoteconf) chain;  /* next remote conf */
                    165: };
                    166: 
                    167: #define RMCONF_NONCE_SIZE(rmconf) \
                    168:        (rmconf != NULL ? rmconf->nonce_size : DEFAULT_NONCE_SIZE)
                    169: 
                    170: struct dhgroup;
                    171: 
                    172: struct idspec {
                    173:        int idtype;                     /* identifier type */
                    174:        vchar_t *id;                    /* identifier */
                    175: };
                    176: 
                    177: struct rmconfselector {
                    178:        int flags;
                    179:        struct sockaddr *remote;
                    180:        int etype;
                    181:        struct isakmpsa *approval;
                    182:        vchar_t *identity;
                    183:        vchar_t *certificate_request;
                    184: };
                    185: 
                    186: extern void rmconf_selector_from_ph1 __P((struct rmconfselector *rmsel,
                    187:                                          struct ph1handle *iph1));
                    188: extern int enumrmconf __P((struct rmconfselector *rmsel,
                    189:                           int (* enum_func)(struct remoteconf *rmconf, void *arg),
                    190:                           void *enum_arg));
                    191: 
                    192: #define GETRMCONF_F_NO_ANONYMOUS       0x0001
                    193: #define GETRMCONF_F_NO_PASSIVE         0x0002
                    194: 
                    195: #define RMCONF_ERR_MULTIPLE            ((struct remoteconf *) -1)
                    196: 
                    197: extern int rmconf_match_identity __P((struct remoteconf *rmconf,
                    198:                                      vchar_t *id_p));
                    199: extern struct remoteconf *getrmconf __P((struct sockaddr *remote, int flags));
                    200: extern struct remoteconf *getrmconf_by_ph1 __P((struct ph1handle *iph1));
                    201: extern struct remoteconf *getrmconf_by_name __P((const char *name));
                    202: 
                    203: extern struct remoteconf *newrmconf __P((void));
                    204: extern struct remoteconf *duprmconf_shallow __P((struct remoteconf *));
                    205: extern int duprmconf_finish __P((struct remoteconf *));
                    206: extern void delrmconf __P((struct remoteconf *));
                    207: extern void deletypes __P((struct etypes *));
                    208: extern struct etypes * dupetypes __P((struct etypes *));
                    209: extern void insrmconf __P((struct remoteconf *));
                    210: extern void remrmconf __P((struct remoteconf *));
                    211: extern void flushrmconf __P((void));
                    212: extern void dupspspec_list __P((struct remoteconf *, struct remoteconf *));
                    213: extern void flushspspec __P((struct remoteconf *));
                    214: extern void initrmconf __P((void));
                    215: extern void rmconf_start_reload __P((void));
                    216: extern void rmconf_finish_reload __P((void));
                    217: 
                    218: extern int check_etypeok __P((struct remoteconf *, void *));
                    219: 
                    220: extern struct isakmpsa *newisakmpsa __P((void));
                    221: extern struct isakmpsa *dupisakmpsa __P((struct isakmpsa *));
                    222: extern void delisakmpsa __P((struct isakmpsa *));
                    223: extern void insisakmpsa __P((struct isakmpsa *, struct remoteconf *));
                    224: #ifdef ENABLE_HYBRID
                    225: extern int isakmpsa_switch_authmethod __P((int authmethod));
                    226: #else
                    227: static inline int isakmpsa_switch_authmethod(int authmethod)
                    228: {
                    229:        return authmethod;
                    230: }
                    231: #endif
                    232: extern struct isakmpsa * checkisakmpsa __P((int pcheck,
                    233:                                            struct isakmpsa *proposal,
                    234:                                            struct isakmpsa *acceptable));
                    235: 
                    236: 
                    237: extern void dumprmconf __P((void));
                    238: 
                    239: extern struct idspec *newidspec __P((void));
                    240: 
                    241: extern vchar_t *script_path_add __P((vchar_t *));
                    242: 
                    243: #endif /* _REMOTECONF_H */

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>