ikev2_common.h revision 09f57babfc1e4473db20ced4f58a4c9f082c8ed8
190dce4d38c5ff5333bea97d859d4e484e27edf0cTorne (Richard Coles)/*
22a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) * IKEv2 definitions
32a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) * Copyright (c) 2007, Jouni Malinen <j@w1.fi>
42a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) *
52385ea399aae016c0806a4f9ef3c9cfe3d2a39dfBen Murdoch * This software may be distributed under the terms of the BSD license.
62a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) * See README for more details.
72a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) */
82a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)
92a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)#ifndef IKEV2_COMMON_H
102a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)#define IKEV2_COMMON_H
112a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)
122a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)/*
132a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) * Nonce length must be at least 16 octets. It must also be at least half the
142a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) * key size of the negotiated PRF.
152a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) */
16#define IKEV2_NONCE_MIN_LEN 16
17#define IKEV2_NONCE_MAX_LEN 256
18
19/* IKE Header - RFC 4306, Sect. 3.1 */
20#ifdef _MSC_VER
21#pragma pack(push, 1)
22#endif /* _MSC_VER */
23
24#define IKEV2_SPI_LEN 8
25
26struct ikev2_hdr {
27	u8 i_spi[IKEV2_SPI_LEN]; /* IKE_SA Initiator's SPI */
28	u8 r_spi[IKEV2_SPI_LEN]; /* IKE_SA Responder's SPI */
29	u8 next_payload;
30	u8 version; /* MjVer | MnVer */
31	u8 exchange_type;
32	u8 flags;
33	u8 message_id[4];
34	u8 length[4]; /* total length of HDR + payloads */
35} STRUCT_PACKED;
36
37struct ikev2_payload_hdr {
38	u8 next_payload;
39	u8 flags;
40	u8 payload_length[2]; /* this payload, including the payload header */
41} STRUCT_PACKED;
42
43struct ikev2_proposal {
44	u8 type; /* 0 (last) or 2 (more) */
45	u8 reserved;
46	u8 proposal_length[2]; /* including all transform and attributes */
47	u8 proposal_num;
48	u8 protocol_id; /* IKEV2_PROTOCOL_* */
49	u8 spi_size;
50	u8 num_transforms;
51	/* SPI of spi_size octets */
52	/* Transforms */
53} STRUCT_PACKED;
54
55struct ikev2_transform {
56	u8 type; /* 0 (last) or 3 (more) */
57	u8 reserved;
58	u8 transform_length[2]; /* including Header and Attributes */
59	u8 transform_type;
60	u8 reserved2;
61	u8 transform_id[2];
62	/* Transform Attributes */
63} STRUCT_PACKED;
64
65#ifdef _MSC_VER
66#pragma pack(pop)
67#endif /* _MSC_VER */
68
69
70/* Current IKEv2 version from RFC 4306 */
71#define IKEV2_MjVer 2
72#define IKEV2_MnVer 0
73#define IKEV2_VERSION (((IKEV2_MjVer) << 4) | (IKEV2_MnVer))
74
75/* IKEv2 Exchange Types */
76enum {
77	/* 0-33 RESERVED */
78	IKE_SA_INIT = 34,
79	IKE_SA_AUTH = 35,
80	CREATE_CHILD_SA = 36,
81	INFORMATION = 37
82	/* 38-239 RESERVED TO IANA */
83	/* 240-255 Reserved for private use */
84};
85
86/* IKEv2 Flags */
87#define IKEV2_HDR_INITIATOR	0x08
88#define IKEV2_HDR_VERSION	0x10
89#define IKEV2_HDR_RESPONSE	0x20
90
91/* Payload Header Flags */
92#define IKEV2_PAYLOAD_FLAGS_CRITICAL 0x01
93
94
95/* EAP-IKEv2 Payload Types (in Next Payload Type field)
96 * http://www.iana.org/assignments/eap-ikev2-payloads */
97enum {
98	IKEV2_PAYLOAD_NO_NEXT_PAYLOAD = 0,
99	IKEV2_PAYLOAD_SA = 33,
100	IKEV2_PAYLOAD_KEY_EXCHANGE = 34,
101	IKEV2_PAYLOAD_IDi = 35,
102	IKEV2_PAYLOAD_IDr = 36,
103	IKEV2_PAYLOAD_CERTIFICATE = 37,
104	IKEV2_PAYLOAD_CERT_REQ = 38,
105	IKEV2_PAYLOAD_AUTHENTICATION = 39,
106	IKEV2_PAYLOAD_NONCE = 40,
107	IKEV2_PAYLOAD_NOTIFICATION = 41,
108	IKEV2_PAYLOAD_VENDOD_ID = 43,
109	IKEV2_PAYLOAD_ENCRYPTED = 46,
110	IKEV2_PAYLOAD_NEXT_FAST_ID = 121
111};
112
113
114/* IKEv2 Proposal - Protocol ID */
115enum {
116	IKEV2_PROTOCOL_RESERVED = 0,
117	IKEV2_PROTOCOL_IKE = 1, /* IKE is the only one allowed for EAP-IKEv2 */
118	IKEV2_PROTOCOL_AH = 2,
119	IKEV2_PROTOCOL_ESP = 3
120};
121
122
123/* IKEv2 Transform Types */
124enum {
125	IKEV2_TRANSFORM_ENCR = 1,
126	IKEV2_TRANSFORM_PRF = 2,
127	IKEV2_TRANSFORM_INTEG = 3,
128	IKEV2_TRANSFORM_DH = 4,
129	IKEV2_TRANSFORM_ESN = 5
130};
131
132/* IKEv2 Transform Type 1 (Encryption Algorithm) */
133enum {
134	ENCR_DES_IV64 = 1,
135	ENCR_DES = 2,
136	ENCR_3DES = 3,
137	ENCR_RC5 = 4,
138	ENCR_IDEA = 5,
139	ENCR_CAST = 6,
140	ENCR_BLOWFISH = 7,
141	ENCR_3IDEA = 8,
142	ENCR_DES_IV32 = 9,
143	ENCR_NULL = 11,
144	ENCR_AES_CBC = 12,
145	ENCR_AES_CTR = 13
146};
147
148/* IKEv2 Transform Type 2 (Pseudo-random Function) */
149enum {
150	PRF_HMAC_MD5 = 1,
151	PRF_HMAC_SHA1 = 2,
152	PRF_HMAC_TIGER = 3,
153	PRF_AES128_XCBC = 4
154};
155
156/* IKEv2 Transform Type 3 (Integrity Algorithm) */
157enum {
158	AUTH_HMAC_MD5_96 = 1,
159	AUTH_HMAC_SHA1_96 = 2,
160	AUTH_DES_MAC = 3,
161	AUTH_KPDK_MD5 = 4,
162	AUTH_AES_XCBC_96 = 5
163};
164
165/* IKEv2 Transform Type 4 (Diffie-Hellman Group) */
166enum {
167	DH_GROUP1_768BIT_MODP = 1, /* RFC 4306 */
168	DH_GROUP2_1024BIT_MODP = 2, /* RFC 4306 */
169	DH_GROUP5_1536BIT_MODP = 5, /* RFC 3526 */
170	DH_GROUP5_2048BIT_MODP = 14, /* RFC 3526 */
171	DH_GROUP5_3072BIT_MODP = 15, /* RFC 3526 */
172	DH_GROUP5_4096BIT_MODP = 16, /* RFC 3526 */
173	DH_GROUP5_6144BIT_MODP = 17, /* RFC 3526 */
174	DH_GROUP5_8192BIT_MODP = 18 /* RFC 3526 */
175};
176
177
178/* Identification Data Types (RFC 4306, Sect. 3.5) */
179enum {
180	ID_IPV4_ADDR = 1,
181	ID_FQDN = 2,
182	ID_RFC822_ADDR = 3,
183	ID_IPV6_ADDR = 5,
184	ID_DER_ASN1_DN = 9,
185	ID_DER_ASN1_GN= 10,
186	ID_KEY_ID = 11
187};
188
189
190/* Certificate Encoding (RFC 4306, Sect. 3.6) */
191enum {
192	CERT_ENCODING_PKCS7_X509 = 1,
193	CERT_ENCODING_PGP_CERT = 2,
194	CERT_ENCODING_DNS_SIGNED_KEY = 3,
195	/* X.509 Certificate - Signature: DER encoded X.509 certificate whose
196	 * public key is used to validate the sender's AUTH payload */
197	CERT_ENCODING_X509_CERT_SIGN = 4,
198	CERT_ENCODING_KERBEROS_TOKEN = 6,
199	/* DER encoded X.509 certificate revocation list */
200	CERT_ENCODING_CRL = 7,
201	CERT_ENCODING_ARL = 8,
202	CERT_ENCODING_SPKI_CERT = 9,
203	CERT_ENCODING_X509_CERT_ATTR = 10,
204	/* PKCS #1 encoded RSA key */
205	CERT_ENCODING_RAW_RSA_KEY = 11,
206	CERT_ENCODING_HASH_AND_URL_X509_CERT = 12,
207	CERT_ENCODING_HASH_AND_URL_X509_BUNDLE = 13
208};
209
210
211/* Authentication Method (RFC 4306, Sect. 3.8) */
212enum {
213	AUTH_RSA_SIGN = 1,
214	AUTH_SHARED_KEY_MIC = 2,
215	AUTH_DSS_SIGN = 3
216};
217
218
219/* Notify Message Types (RFC 4306, Sect. 3.10.1) */
220enum {
221	UNSUPPORTED_CRITICAL_PAYLOAD = 1,
222	INVALID_IKE_SPI = 4,
223	INVALID_MAJOR_VERSION = 5,
224	INVALID_SYNTAX = 7,
225	INVALID_MESSAGE_ID = 9,
226	INVALID_SPI = 11,
227	NO_PROPOSAL_CHOSEN = 14,
228	INVALID_KE_PAYLOAD = 17,
229	AUTHENTICATION_FAILED = 24,
230	SINGLE_PAIR_REQUIRED = 34,
231	NO_ADDITIONAL_SAS = 35,
232	INTERNAL_ADDRESS_FAILURE = 36,
233	FAILED_CP_REQUIRED = 37,
234	TS_UNACCEPTABLE = 38,
235	INVALID_SELECTORS = 39
236};
237
238
239struct ikev2_keys {
240	u8 *SK_d, *SK_ai, *SK_ar, *SK_ei, *SK_er, *SK_pi, *SK_pr;
241	size_t SK_d_len, SK_integ_len, SK_encr_len, SK_prf_len;
242};
243
244
245int ikev2_keys_set(struct ikev2_keys *keys);
246void ikev2_free_keys(struct ikev2_keys *keys);
247
248
249/* Maximum hash length for supported hash algorithms */
250#define IKEV2_MAX_HASH_LEN 20
251
252struct ikev2_integ_alg {
253	int id;
254	size_t key_len;
255	size_t hash_len;
256};
257
258struct ikev2_prf_alg {
259	int id;
260	size_t key_len;
261	size_t hash_len;
262};
263
264struct ikev2_encr_alg {
265	int id;
266	size_t key_len;
267	size_t block_size;
268};
269
270const struct ikev2_integ_alg * ikev2_get_integ(int id);
271int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data,
272		     size_t data_len, u8 *hash);
273const struct ikev2_prf_alg * ikev2_get_prf(int id);
274int ikev2_prf_hash(int alg, const u8 *key, size_t key_len,
275		   size_t num_elem, const u8 *addr[], const size_t *len,
276		   u8 *hash);
277int ikev2_prf_plus(int alg, const u8 *key, size_t key_len,
278		   const u8 *data, size_t data_len,
279		   u8 *out, size_t out_len);
280const struct ikev2_encr_alg * ikev2_get_encr(int id);
281int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
282		       const u8 *plain, u8 *crypt, size_t len);
283int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
284		       const u8 *crypt, u8 *plain, size_t len);
285
286int ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg,
287			   const u8 *ID, size_t ID_len, u8 ID_type,
288			   struct ikev2_keys *keys, int initiator,
289			   const u8 *shared_secret, size_t shared_secret_len,
290			   const u8 *nonce, size_t nonce_len,
291			   const u8 *key_pad, size_t key_pad_len,
292			   u8 *auth_data);
293
294
295struct ikev2_payloads {
296	const u8 *sa;
297	size_t sa_len;
298	const u8 *ke;
299	size_t ke_len;
300	const u8 *idi;
301	size_t idi_len;
302	const u8 *idr;
303	size_t idr_len;
304	const u8 *cert;
305	size_t cert_len;
306	const u8 *auth;
307	size_t auth_len;
308	const u8 *nonce;
309	size_t nonce_len;
310	const u8 *encrypted;
311	size_t encrypted_len;
312	u8 encr_next_payload;
313	const u8 *notification;
314	size_t notification_len;
315};
316
317int ikev2_parse_payloads(struct ikev2_payloads *payloads,
318			 u8 next_payload, const u8 *pos, const u8 *end);
319
320u8 * ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys,
321			   int initiator, const struct ikev2_hdr *hdr,
322			   const u8 *encrypted, size_t encrypted_len,
323			   size_t *res_len);
324void ikev2_update_hdr(struct wpabuf *msg);
325int ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys,
326			  int initiator, struct wpabuf *msg,
327			  struct wpabuf *plain, u8 next_payload);
328int ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf,
329			 const struct ikev2_integ_alg *integ,
330			 const struct ikev2_encr_alg *encr,
331			 const u8 *skeyseed, const u8 *data, size_t data_len,
332			 struct ikev2_keys *keys);
333
334#endif /* IKEV2_COMMON_H */
335