yuezonghe | 824eb0c | 2024-06-27 02:32:26 -0700 | [diff] [blame] | 1 | /* |
| 2 | * IKEv2 definitions |
| 3 | * Copyright (c) 2007, Jouni Malinen <j@w1.fi> |
| 4 | * |
| 5 | * This software may be distributed under the terms of the BSD license. |
| 6 | * See README for more details. |
| 7 | */ |
| 8 | |
| 9 | #ifndef IKEV2_COMMON_H |
| 10 | #define IKEV2_COMMON_H |
| 11 | |
| 12 | /* |
| 13 | * Nonce length must be at least 16 octets. It must also be at least half the |
| 14 | * key size of the negotiated PRF. |
| 15 | */ |
| 16 | #define IKEV2_NONCE_MIN_LEN 16 |
| 17 | #define IKEV2_NONCE_MAX_LEN 256 |
| 18 | |
| 19 | /* IKE Header - RFC 4306, Sect. 3.1 */ |
| 20 | #ifdef _MSC_VER |
| 21 | #pragma pack(push, 1) |
| 22 | #endif /* _MSC_VER */ |
| 23 | |
| 24 | #define IKEV2_SPI_LEN 8 |
| 25 | |
| 26 | struct ikev2_hdr { |
| 27 | u8 i_spi[IKEV2_SPI_LEN]; /* IKE_SA Initiator's SPI */ |
| 28 | u8 r_spi[IKEV2_SPI_LEN]; /* IKE_SA Responder's SPI */ |
| 29 | u8 next_payload; |
| 30 | u8 version; /* MjVer | MnVer */ |
| 31 | u8 exchange_type; |
| 32 | u8 flags; |
| 33 | u8 message_id[4]; |
| 34 | u8 length[4]; /* total length of HDR + payloads */ |
| 35 | } STRUCT_PACKED; |
| 36 | |
| 37 | struct ikev2_payload_hdr { |
| 38 | u8 next_payload; |
| 39 | u8 flags; |
| 40 | u8 payload_length[2]; /* this payload, including the payload header */ |
| 41 | } STRUCT_PACKED; |
| 42 | |
| 43 | struct ikev2_proposal { |
| 44 | u8 type; /* 0 (last) or 2 (more) */ |
| 45 | u8 reserved; |
| 46 | u8 proposal_length[2]; /* including all transform and attributes */ |
| 47 | u8 proposal_num; |
| 48 | u8 protocol_id; /* IKEV2_PROTOCOL_* */ |
| 49 | u8 spi_size; |
| 50 | u8 num_transforms; |
| 51 | /* SPI of spi_size octets */ |
| 52 | /* Transforms */ |
| 53 | } STRUCT_PACKED; |
| 54 | |
| 55 | struct ikev2_transform { |
| 56 | u8 type; /* 0 (last) or 3 (more) */ |
| 57 | u8 reserved; |
| 58 | u8 transform_length[2]; /* including Header and Attributes */ |
| 59 | u8 transform_type; |
| 60 | u8 reserved2; |
| 61 | u8 transform_id[2]; |
| 62 | /* Transform Attributes */ |
| 63 | } STRUCT_PACKED; |
| 64 | |
| 65 | #ifdef _MSC_VER |
| 66 | #pragma pack(pop) |
| 67 | #endif /* _MSC_VER */ |
| 68 | |
| 69 | |
| 70 | /* Current IKEv2 version from RFC 4306 */ |
| 71 | #define IKEV2_MjVer 2 |
| 72 | #define IKEV2_MnVer 0 |
| 73 | #define IKEV2_VERSION (((IKEV2_MjVer) << 4) | (IKEV2_MnVer)) |
| 74 | |
| 75 | /* IKEv2 Exchange Types */ |
| 76 | enum { |
| 77 | /* 0-33 RESERVED */ |
| 78 | IKE_SA_INIT = 34, |
| 79 | IKE_SA_AUTH = 35, |
| 80 | CREATE_CHILD_SA = 36, |
| 81 | INFORMATION = 37 |
| 82 | /* 38-239 RESERVED TO IANA */ |
| 83 | /* 240-255 Reserved for private use */ |
| 84 | }; |
| 85 | |
| 86 | /* IKEv2 Flags */ |
| 87 | #define IKEV2_HDR_INITIATOR 0x08 |
| 88 | #define IKEV2_HDR_VERSION 0x10 |
| 89 | #define IKEV2_HDR_RESPONSE 0x20 |
| 90 | |
| 91 | /* Payload Header Flags */ |
| 92 | #define IKEV2_PAYLOAD_FLAGS_CRITICAL 0x01 |
| 93 | |
| 94 | |
| 95 | /* EAP-IKEv2 Payload Types (in Next Payload Type field) |
| 96 | * http://www.iana.org/assignments/eap-ikev2-payloads */ |
| 97 | enum { |
| 98 | IKEV2_PAYLOAD_NO_NEXT_PAYLOAD = 0, |
| 99 | IKEV2_PAYLOAD_SA = 33, |
| 100 | IKEV2_PAYLOAD_KEY_EXCHANGE = 34, |
| 101 | IKEV2_PAYLOAD_IDi = 35, |
| 102 | IKEV2_PAYLOAD_IDr = 36, |
| 103 | IKEV2_PAYLOAD_CERTIFICATE = 37, |
| 104 | IKEV2_PAYLOAD_CERT_REQ = 38, |
| 105 | IKEV2_PAYLOAD_AUTHENTICATION = 39, |
| 106 | IKEV2_PAYLOAD_NONCE = 40, |
| 107 | IKEV2_PAYLOAD_NOTIFICATION = 41, |
| 108 | IKEV2_PAYLOAD_VENDOD_ID = 43, |
| 109 | IKEV2_PAYLOAD_ENCRYPTED = 46, |
| 110 | IKEV2_PAYLOAD_NEXT_FAST_ID = 121 |
| 111 | }; |
| 112 | |
| 113 | |
| 114 | /* IKEv2 Proposal - Protocol ID */ |
| 115 | enum { |
| 116 | IKEV2_PROTOCOL_RESERVED = 0, |
| 117 | IKEV2_PROTOCOL_IKE = 1, /* IKE is the only one allowed for EAP-IKEv2 */ |
| 118 | IKEV2_PROTOCOL_AH = 2, |
| 119 | IKEV2_PROTOCOL_ESP = 3 |
| 120 | }; |
| 121 | |
| 122 | |
| 123 | /* IKEv2 Transform Types */ |
| 124 | enum { |
| 125 | IKEV2_TRANSFORM_ENCR = 1, |
| 126 | IKEV2_TRANSFORM_PRF = 2, |
| 127 | IKEV2_TRANSFORM_INTEG = 3, |
| 128 | IKEV2_TRANSFORM_DH = 4, |
| 129 | IKEV2_TRANSFORM_ESN = 5 |
| 130 | }; |
| 131 | |
| 132 | /* IKEv2 Transform Type 1 (Encryption Algorithm) */ |
| 133 | enum { |
| 134 | ENCR_DES_IV64 = 1, |
| 135 | ENCR_DES = 2, |
| 136 | ENCR_3DES = 3, |
| 137 | ENCR_RC5 = 4, |
| 138 | ENCR_IDEA = 5, |
| 139 | ENCR_CAST = 6, |
| 140 | ENCR_BLOWFISH = 7, |
| 141 | ENCR_3IDEA = 8, |
| 142 | ENCR_DES_IV32 = 9, |
| 143 | ENCR_NULL = 11, |
| 144 | ENCR_AES_CBC = 12, |
| 145 | ENCR_AES_CTR = 13 |
| 146 | }; |
| 147 | |
| 148 | /* IKEv2 Transform Type 2 (Pseudo-random Function) */ |
| 149 | enum { |
| 150 | PRF_HMAC_MD5 = 1, |
| 151 | PRF_HMAC_SHA1 = 2, |
| 152 | PRF_HMAC_TIGER = 3, |
| 153 | PRF_AES128_XCBC = 4 |
| 154 | }; |
| 155 | |
| 156 | /* IKEv2 Transform Type 3 (Integrity Algorithm) */ |
| 157 | enum { |
| 158 | AUTH_HMAC_MD5_96 = 1, |
| 159 | AUTH_HMAC_SHA1_96 = 2, |
| 160 | AUTH_DES_MAC = 3, |
| 161 | AUTH_KPDK_MD5 = 4, |
| 162 | AUTH_AES_XCBC_96 = 5 |
| 163 | }; |
| 164 | |
| 165 | /* IKEv2 Transform Type 4 (Diffie-Hellman Group) */ |
| 166 | enum { |
| 167 | DH_GROUP1_768BIT_MODP = 1, /* RFC 4306 */ |
| 168 | DH_GROUP2_1024BIT_MODP = 2, /* RFC 4306 */ |
| 169 | DH_GROUP5_1536BIT_MODP = 5, /* RFC 3526 */ |
| 170 | DH_GROUP5_2048BIT_MODP = 14, /* RFC 3526 */ |
| 171 | DH_GROUP5_3072BIT_MODP = 15, /* RFC 3526 */ |
| 172 | DH_GROUP5_4096BIT_MODP = 16, /* RFC 3526 */ |
| 173 | DH_GROUP5_6144BIT_MODP = 17, /* RFC 3526 */ |
| 174 | DH_GROUP5_8192BIT_MODP = 18 /* RFC 3526 */ |
| 175 | }; |
| 176 | |
| 177 | |
| 178 | /* Identification Data Types (RFC 4306, Sect. 3.5) */ |
| 179 | enum { |
| 180 | ID_IPV4_ADDR = 1, |
| 181 | ID_FQDN = 2, |
| 182 | ID_RFC822_ADDR = 3, |
| 183 | ID_IPV6_ADDR = 5, |
| 184 | ID_DER_ASN1_DN = 9, |
| 185 | ID_DER_ASN1_GN= 10, |
| 186 | ID_KEY_ID = 11 |
| 187 | }; |
| 188 | |
| 189 | |
| 190 | /* Certificate Encoding (RFC 4306, Sect. 3.6) */ |
| 191 | enum { |
| 192 | CERT_ENCODING_PKCS7_X509 = 1, |
| 193 | CERT_ENCODING_PGP_CERT = 2, |
| 194 | CERT_ENCODING_DNS_SIGNED_KEY = 3, |
| 195 | /* X.509 Certificate - Signature: DER encoded X.509 certificate whose |
| 196 | * public key is used to validate the sender's AUTH payload */ |
| 197 | CERT_ENCODING_X509_CERT_SIGN = 4, |
| 198 | CERT_ENCODING_KERBEROS_TOKEN = 6, |
| 199 | /* DER encoded X.509 certificate revocation list */ |
| 200 | CERT_ENCODING_CRL = 7, |
| 201 | CERT_ENCODING_ARL = 8, |
| 202 | CERT_ENCODING_SPKI_CERT = 9, |
| 203 | CERT_ENCODING_X509_CERT_ATTR = 10, |
| 204 | /* PKCS #1 encoded RSA key */ |
| 205 | CERT_ENCODING_RAW_RSA_KEY = 11, |
| 206 | CERT_ENCODING_HASH_AND_URL_X509_CERT = 12, |
| 207 | CERT_ENCODING_HASH_AND_URL_X509_BUNDLE = 13 |
| 208 | }; |
| 209 | |
| 210 | |
| 211 | /* Authentication Method (RFC 4306, Sect. 3.8) */ |
| 212 | enum { |
| 213 | AUTH_RSA_SIGN = 1, |
| 214 | AUTH_SHARED_KEY_MIC = 2, |
| 215 | AUTH_DSS_SIGN = 3 |
| 216 | }; |
| 217 | |
| 218 | |
| 219 | /* Notify Message Types (RFC 4306, Sect. 3.10.1) */ |
| 220 | enum { |
| 221 | UNSUPPORTED_CRITICAL_PAYLOAD = 1, |
| 222 | INVALID_IKE_SPI = 4, |
| 223 | INVALID_MAJOR_VERSION = 5, |
| 224 | INVALID_SYNTAX = 7, |
| 225 | INVALID_MESSAGE_ID = 9, |
| 226 | INVALID_SPI = 11, |
| 227 | NO_PROPOSAL_CHOSEN = 14, |
| 228 | INVALID_KE_PAYLOAD = 17, |
| 229 | AUTHENTICATION_FAILED = 24, |
| 230 | SINGLE_PAIR_REQUIRED = 34, |
| 231 | NO_ADDITIONAL_SAS = 35, |
| 232 | INTERNAL_ADDRESS_FAILURE = 36, |
| 233 | FAILED_CP_REQUIRED = 37, |
| 234 | TS_UNACCEPTABLE = 38, |
| 235 | INVALID_SELECTORS = 39 |
| 236 | }; |
| 237 | |
| 238 | |
| 239 | struct ikev2_keys { |
| 240 | u8 *SK_d, *SK_ai, *SK_ar, *SK_ei, *SK_er, *SK_pi, *SK_pr; |
| 241 | size_t SK_d_len, SK_integ_len, SK_encr_len, SK_prf_len; |
| 242 | }; |
| 243 | |
| 244 | |
| 245 | int ikev2_keys_set(struct ikev2_keys *keys); |
| 246 | void ikev2_free_keys(struct ikev2_keys *keys); |
| 247 | |
| 248 | |
| 249 | /* Maximum hash length for supported hash algorithms */ |
| 250 | #define IKEV2_MAX_HASH_LEN 20 |
| 251 | |
| 252 | struct ikev2_integ_alg { |
| 253 | int id; |
| 254 | size_t key_len; |
| 255 | size_t hash_len; |
| 256 | }; |
| 257 | |
| 258 | struct ikev2_prf_alg { |
| 259 | int id; |
| 260 | size_t key_len; |
| 261 | size_t hash_len; |
| 262 | }; |
| 263 | |
| 264 | struct ikev2_encr_alg { |
| 265 | int id; |
| 266 | size_t key_len; |
| 267 | size_t block_size; |
| 268 | }; |
| 269 | |
| 270 | const struct ikev2_integ_alg * ikev2_get_integ(int id); |
| 271 | int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data, |
| 272 | size_t data_len, u8 *hash); |
| 273 | const struct ikev2_prf_alg * ikev2_get_prf(int id); |
| 274 | int ikev2_prf_hash(int alg, const u8 *key, size_t key_len, |
| 275 | size_t num_elem, const u8 *addr[], const size_t *len, |
| 276 | u8 *hash); |
| 277 | int ikev2_prf_plus(int alg, const u8 *key, size_t key_len, |
| 278 | const u8 *data, size_t data_len, |
| 279 | u8 *out, size_t out_len); |
| 280 | const struct ikev2_encr_alg * ikev2_get_encr(int id); |
| 281 | int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, |
| 282 | const u8 *plain, u8 *crypt, size_t len); |
| 283 | int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, |
| 284 | const u8 *crypt, u8 *plain, size_t len); |
| 285 | |
| 286 | int ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, |
| 287 | const u8 *ID, size_t ID_len, u8 ID_type, |
| 288 | struct ikev2_keys *keys, int initiator, |
| 289 | const u8 *shared_secret, size_t shared_secret_len, |
| 290 | const u8 *nonce, size_t nonce_len, |
| 291 | const u8 *key_pad, size_t key_pad_len, |
| 292 | u8 *auth_data); |
| 293 | |
| 294 | |
| 295 | struct ikev2_payloads { |
| 296 | const u8 *sa; |
| 297 | size_t sa_len; |
| 298 | const u8 *ke; |
| 299 | size_t ke_len; |
| 300 | const u8 *idi; |
| 301 | size_t idi_len; |
| 302 | const u8 *idr; |
| 303 | size_t idr_len; |
| 304 | const u8 *cert; |
| 305 | size_t cert_len; |
| 306 | const u8 *auth; |
| 307 | size_t auth_len; |
| 308 | const u8 *nonce; |
| 309 | size_t nonce_len; |
| 310 | const u8 *encrypted; |
| 311 | size_t encrypted_len; |
| 312 | u8 encr_next_payload; |
| 313 | const u8 *notification; |
| 314 | size_t notification_len; |
| 315 | }; |
| 316 | |
| 317 | int ikev2_parse_payloads(struct ikev2_payloads *payloads, |
| 318 | u8 next_payload, const u8 *pos, const u8 *end); |
| 319 | |
| 320 | u8 * ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, |
| 321 | int initiator, const struct ikev2_hdr *hdr, |
| 322 | const u8 *encrypted, size_t encrypted_len, |
| 323 | size_t *res_len); |
| 324 | void ikev2_update_hdr(struct wpabuf *msg); |
| 325 | int ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, |
| 326 | int initiator, struct wpabuf *msg, |
| 327 | struct wpabuf *plain, u8 next_payload); |
| 328 | int ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, |
| 329 | const struct ikev2_integ_alg *integ, |
| 330 | const struct ikev2_encr_alg *encr, |
| 331 | const u8 *skeyseed, const u8 *data, size_t data_len, |
| 332 | struct ikev2_keys *keys); |
| 333 | |
| 334 | #endif /* IKEV2_COMMON_H */ |