139beb93cSSam Leffler /* 239beb93cSSam Leffler * IKEv2 definitions 339beb93cSSam Leffler * Copyright (c) 2007, Jouni Malinen <j@w1.fi> 439beb93cSSam Leffler * 5*f05cddf9SRui Paulo * This software may be distributed under the terms of the BSD license. 6*f05cddf9SRui Paulo * See README for more details. 739beb93cSSam Leffler */ 839beb93cSSam Leffler 939beb93cSSam Leffler #ifndef IKEV2_COMMON_H 1039beb93cSSam Leffler #define IKEV2_COMMON_H 1139beb93cSSam Leffler 1239beb93cSSam Leffler /* 1339beb93cSSam Leffler * Nonce length must be at least 16 octets. It must also be at least half the 1439beb93cSSam Leffler * key size of the negotiated PRF. 1539beb93cSSam Leffler */ 1639beb93cSSam Leffler #define IKEV2_NONCE_MIN_LEN 16 1739beb93cSSam Leffler #define IKEV2_NONCE_MAX_LEN 256 1839beb93cSSam Leffler 1939beb93cSSam Leffler /* IKE Header - RFC 4306, Sect. 3.1 */ 2039beb93cSSam Leffler #ifdef _MSC_VER 2139beb93cSSam Leffler #pragma pack(push, 1) 2239beb93cSSam Leffler #endif /* _MSC_VER */ 2339beb93cSSam Leffler 2439beb93cSSam Leffler #define IKEV2_SPI_LEN 8 2539beb93cSSam Leffler 2639beb93cSSam Leffler struct ikev2_hdr { 2739beb93cSSam Leffler u8 i_spi[IKEV2_SPI_LEN]; /* IKE_SA Initiator's SPI */ 2839beb93cSSam Leffler u8 r_spi[IKEV2_SPI_LEN]; /* IKE_SA Responder's SPI */ 2939beb93cSSam Leffler u8 next_payload; 3039beb93cSSam Leffler u8 version; /* MjVer | MnVer */ 3139beb93cSSam Leffler u8 exchange_type; 3239beb93cSSam Leffler u8 flags; 3339beb93cSSam Leffler u8 message_id[4]; 3439beb93cSSam Leffler u8 length[4]; /* total length of HDR + payloads */ 3539beb93cSSam Leffler } STRUCT_PACKED; 3639beb93cSSam Leffler 3739beb93cSSam Leffler struct ikev2_payload_hdr { 3839beb93cSSam Leffler u8 next_payload; 3939beb93cSSam Leffler u8 flags; 4039beb93cSSam Leffler u8 payload_length[2]; /* this payload, including the payload header */ 4139beb93cSSam Leffler } STRUCT_PACKED; 4239beb93cSSam Leffler 4339beb93cSSam Leffler struct ikev2_proposal { 4439beb93cSSam Leffler u8 type; /* 0 (last) or 2 (more) */ 4539beb93cSSam Leffler u8 reserved; 4639beb93cSSam Leffler u8 proposal_length[2]; /* including all transform and attributes */ 4739beb93cSSam Leffler u8 proposal_num; 4839beb93cSSam Leffler u8 protocol_id; /* IKEV2_PROTOCOL_* */ 4939beb93cSSam Leffler u8 spi_size; 5039beb93cSSam Leffler u8 num_transforms; 5139beb93cSSam Leffler /* SPI of spi_size octets */ 5239beb93cSSam Leffler /* Transforms */ 5339beb93cSSam Leffler } STRUCT_PACKED; 5439beb93cSSam Leffler 5539beb93cSSam Leffler struct ikev2_transform { 5639beb93cSSam Leffler u8 type; /* 0 (last) or 3 (more) */ 5739beb93cSSam Leffler u8 reserved; 5839beb93cSSam Leffler u8 transform_length[2]; /* including Header and Attributes */ 5939beb93cSSam Leffler u8 transform_type; 6039beb93cSSam Leffler u8 reserved2; 6139beb93cSSam Leffler u8 transform_id[2]; 6239beb93cSSam Leffler /* Transform Attributes */ 6339beb93cSSam Leffler } STRUCT_PACKED; 6439beb93cSSam Leffler 6539beb93cSSam Leffler #ifdef _MSC_VER 6639beb93cSSam Leffler #pragma pack(pop) 6739beb93cSSam Leffler #endif /* _MSC_VER */ 6839beb93cSSam Leffler 6939beb93cSSam Leffler 7039beb93cSSam Leffler /* Current IKEv2 version from RFC 4306 */ 7139beb93cSSam Leffler #define IKEV2_MjVer 2 7239beb93cSSam Leffler #define IKEV2_MnVer 0 7339beb93cSSam Leffler #define IKEV2_VERSION (((IKEV2_MjVer) << 4) | (IKEV2_MnVer)) 7439beb93cSSam Leffler 7539beb93cSSam Leffler /* IKEv2 Exchange Types */ 7639beb93cSSam Leffler enum { 7739beb93cSSam Leffler /* 0-33 RESERVED */ 7839beb93cSSam Leffler IKE_SA_INIT = 34, 7939beb93cSSam Leffler IKE_SA_AUTH = 35, 8039beb93cSSam Leffler CREATE_CHILD_SA = 36, 8139beb93cSSam Leffler INFORMATION = 37 8239beb93cSSam Leffler /* 38-239 RESERVED TO IANA */ 8339beb93cSSam Leffler /* 240-255 Reserved for private use */ 8439beb93cSSam Leffler }; 8539beb93cSSam Leffler 8639beb93cSSam Leffler /* IKEv2 Flags */ 8739beb93cSSam Leffler #define IKEV2_HDR_INITIATOR 0x08 8839beb93cSSam Leffler #define IKEV2_HDR_VERSION 0x10 8939beb93cSSam Leffler #define IKEV2_HDR_RESPONSE 0x20 9039beb93cSSam Leffler 9139beb93cSSam Leffler /* Payload Header Flags */ 9239beb93cSSam Leffler #define IKEV2_PAYLOAD_FLAGS_CRITICAL 0x01 9339beb93cSSam Leffler 9439beb93cSSam Leffler 9539beb93cSSam Leffler /* EAP-IKEv2 Payload Types (in Next Payload Type field) 9639beb93cSSam Leffler * http://www.iana.org/assignments/eap-ikev2-payloads */ 9739beb93cSSam Leffler enum { 9839beb93cSSam Leffler IKEV2_PAYLOAD_NO_NEXT_PAYLOAD = 0, 9939beb93cSSam Leffler IKEV2_PAYLOAD_SA = 33, 10039beb93cSSam Leffler IKEV2_PAYLOAD_KEY_EXCHANGE = 34, 10139beb93cSSam Leffler IKEV2_PAYLOAD_IDi = 35, 10239beb93cSSam Leffler IKEV2_PAYLOAD_IDr = 36, 10339beb93cSSam Leffler IKEV2_PAYLOAD_CERTIFICATE = 37, 10439beb93cSSam Leffler IKEV2_PAYLOAD_CERT_REQ = 38, 10539beb93cSSam Leffler IKEV2_PAYLOAD_AUTHENTICATION = 39, 10639beb93cSSam Leffler IKEV2_PAYLOAD_NONCE = 40, 10739beb93cSSam Leffler IKEV2_PAYLOAD_NOTIFICATION = 41, 10839beb93cSSam Leffler IKEV2_PAYLOAD_VENDOD_ID = 43, 10939beb93cSSam Leffler IKEV2_PAYLOAD_ENCRYPTED = 46, 11039beb93cSSam Leffler IKEV2_PAYLOAD_NEXT_FAST_ID = 121 11139beb93cSSam Leffler }; 11239beb93cSSam Leffler 11339beb93cSSam Leffler 11439beb93cSSam Leffler /* IKEv2 Proposal - Protocol ID */ 11539beb93cSSam Leffler enum { 11639beb93cSSam Leffler IKEV2_PROTOCOL_RESERVED = 0, 11739beb93cSSam Leffler IKEV2_PROTOCOL_IKE = 1, /* IKE is the only one allowed for EAP-IKEv2 */ 11839beb93cSSam Leffler IKEV2_PROTOCOL_AH = 2, 11939beb93cSSam Leffler IKEV2_PROTOCOL_ESP = 3 12039beb93cSSam Leffler }; 12139beb93cSSam Leffler 12239beb93cSSam Leffler 12339beb93cSSam Leffler /* IKEv2 Transform Types */ 12439beb93cSSam Leffler enum { 12539beb93cSSam Leffler IKEV2_TRANSFORM_ENCR = 1, 12639beb93cSSam Leffler IKEV2_TRANSFORM_PRF = 2, 12739beb93cSSam Leffler IKEV2_TRANSFORM_INTEG = 3, 12839beb93cSSam Leffler IKEV2_TRANSFORM_DH = 4, 12939beb93cSSam Leffler IKEV2_TRANSFORM_ESN = 5 13039beb93cSSam Leffler }; 13139beb93cSSam Leffler 132*f05cddf9SRui Paulo /* IKEv2 Transform Type 1 (Encryption Algorithm) */ 13339beb93cSSam Leffler enum { 13439beb93cSSam Leffler ENCR_DES_IV64 = 1, 13539beb93cSSam Leffler ENCR_DES = 2, 13639beb93cSSam Leffler ENCR_3DES = 3, 13739beb93cSSam Leffler ENCR_RC5 = 4, 13839beb93cSSam Leffler ENCR_IDEA = 5, 13939beb93cSSam Leffler ENCR_CAST = 6, 14039beb93cSSam Leffler ENCR_BLOWFISH = 7, 14139beb93cSSam Leffler ENCR_3IDEA = 8, 14239beb93cSSam Leffler ENCR_DES_IV32 = 9, 14339beb93cSSam Leffler ENCR_NULL = 11, 14439beb93cSSam Leffler ENCR_AES_CBC = 12, 14539beb93cSSam Leffler ENCR_AES_CTR = 13 14639beb93cSSam Leffler }; 14739beb93cSSam Leffler 14839beb93cSSam Leffler /* IKEv2 Transform Type 2 (Pseudo-random Function) */ 14939beb93cSSam Leffler enum { 15039beb93cSSam Leffler PRF_HMAC_MD5 = 1, 15139beb93cSSam Leffler PRF_HMAC_SHA1 = 2, 15239beb93cSSam Leffler PRF_HMAC_TIGER = 3, 15339beb93cSSam Leffler PRF_AES128_XCBC = 4 15439beb93cSSam Leffler }; 15539beb93cSSam Leffler 15639beb93cSSam Leffler /* IKEv2 Transform Type 3 (Integrity Algorithm) */ 15739beb93cSSam Leffler enum { 15839beb93cSSam Leffler AUTH_HMAC_MD5_96 = 1, 15939beb93cSSam Leffler AUTH_HMAC_SHA1_96 = 2, 16039beb93cSSam Leffler AUTH_DES_MAC = 3, 16139beb93cSSam Leffler AUTH_KPDK_MD5 = 4, 16239beb93cSSam Leffler AUTH_AES_XCBC_96 = 5 16339beb93cSSam Leffler }; 16439beb93cSSam Leffler 16539beb93cSSam Leffler /* IKEv2 Transform Type 4 (Diffie-Hellman Group) */ 16639beb93cSSam Leffler enum { 16739beb93cSSam Leffler DH_GROUP1_768BIT_MODP = 1, /* RFC 4306 */ 16839beb93cSSam Leffler DH_GROUP2_1024BIT_MODP = 2, /* RFC 4306 */ 16939beb93cSSam Leffler DH_GROUP5_1536BIT_MODP = 5, /* RFC 3526 */ 17039beb93cSSam Leffler DH_GROUP5_2048BIT_MODP = 14, /* RFC 3526 */ 17139beb93cSSam Leffler DH_GROUP5_3072BIT_MODP = 15, /* RFC 3526 */ 17239beb93cSSam Leffler DH_GROUP5_4096BIT_MODP = 16, /* RFC 3526 */ 17339beb93cSSam Leffler DH_GROUP5_6144BIT_MODP = 17, /* RFC 3526 */ 17439beb93cSSam Leffler DH_GROUP5_8192BIT_MODP = 18 /* RFC 3526 */ 17539beb93cSSam Leffler }; 17639beb93cSSam Leffler 17739beb93cSSam Leffler 17839beb93cSSam Leffler /* Identification Data Types (RFC 4306, Sect. 3.5) */ 17939beb93cSSam Leffler enum { 18039beb93cSSam Leffler ID_IPV4_ADDR = 1, 18139beb93cSSam Leffler ID_FQDN = 2, 18239beb93cSSam Leffler ID_RFC822_ADDR = 3, 18339beb93cSSam Leffler ID_IPV6_ADDR = 5, 18439beb93cSSam Leffler ID_DER_ASN1_DN = 9, 18539beb93cSSam Leffler ID_DER_ASN1_GN= 10, 18639beb93cSSam Leffler ID_KEY_ID = 11 18739beb93cSSam Leffler }; 18839beb93cSSam Leffler 18939beb93cSSam Leffler 19039beb93cSSam Leffler /* Certificate Encoding (RFC 4306, Sect. 3.6) */ 19139beb93cSSam Leffler enum { 19239beb93cSSam Leffler CERT_ENCODING_PKCS7_X509 = 1, 19339beb93cSSam Leffler CERT_ENCODING_PGP_CERT = 2, 19439beb93cSSam Leffler CERT_ENCODING_DNS_SIGNED_KEY = 3, 19539beb93cSSam Leffler /* X.509 Certificate - Signature: DER encoded X.509 certificate whose 19639beb93cSSam Leffler * public key is used to validate the sender's AUTH payload */ 19739beb93cSSam Leffler CERT_ENCODING_X509_CERT_SIGN = 4, 19839beb93cSSam Leffler CERT_ENCODING_KERBEROS_TOKEN = 6, 19939beb93cSSam Leffler /* DER encoded X.509 certificate revocation list */ 20039beb93cSSam Leffler CERT_ENCODING_CRL = 7, 20139beb93cSSam Leffler CERT_ENCODING_ARL = 8, 20239beb93cSSam Leffler CERT_ENCODING_SPKI_CERT = 9, 20339beb93cSSam Leffler CERT_ENCODING_X509_CERT_ATTR = 10, 20439beb93cSSam Leffler /* PKCS #1 encoded RSA key */ 20539beb93cSSam Leffler CERT_ENCODING_RAW_RSA_KEY = 11, 20639beb93cSSam Leffler CERT_ENCODING_HASH_AND_URL_X509_CERT = 12, 20739beb93cSSam Leffler CERT_ENCODING_HASH_AND_URL_X509_BUNDLE = 13 20839beb93cSSam Leffler }; 20939beb93cSSam Leffler 21039beb93cSSam Leffler 21139beb93cSSam Leffler /* Authentication Method (RFC 4306, Sect. 3.8) */ 21239beb93cSSam Leffler enum { 21339beb93cSSam Leffler AUTH_RSA_SIGN = 1, 21439beb93cSSam Leffler AUTH_SHARED_KEY_MIC = 2, 21539beb93cSSam Leffler AUTH_DSS_SIGN = 3 21639beb93cSSam Leffler }; 21739beb93cSSam Leffler 21839beb93cSSam Leffler 21939beb93cSSam Leffler /* Notify Message Types (RFC 4306, Sect. 3.10.1) */ 22039beb93cSSam Leffler enum { 22139beb93cSSam Leffler UNSUPPORTED_CRITICAL_PAYLOAD = 1, 22239beb93cSSam Leffler INVALID_IKE_SPI = 4, 22339beb93cSSam Leffler INVALID_MAJOR_VERSION = 5, 22439beb93cSSam Leffler INVALID_SYNTAX = 7, 22539beb93cSSam Leffler INVALID_MESSAGE_ID = 9, 22639beb93cSSam Leffler INVALID_SPI = 11, 22739beb93cSSam Leffler NO_PROPOSAL_CHOSEN = 14, 22839beb93cSSam Leffler INVALID_KE_PAYLOAD = 17, 22939beb93cSSam Leffler AUTHENTICATION_FAILED = 24, 23039beb93cSSam Leffler SINGLE_PAIR_REQUIRED = 34, 23139beb93cSSam Leffler NO_ADDITIONAL_SAS = 35, 23239beb93cSSam Leffler INTERNAL_ADDRESS_FAILURE = 36, 23339beb93cSSam Leffler FAILED_CP_REQUIRED = 37, 23439beb93cSSam Leffler TS_UNACCEPTABLE = 38, 23539beb93cSSam Leffler INVALID_SELECTORS = 39 23639beb93cSSam Leffler }; 23739beb93cSSam Leffler 23839beb93cSSam Leffler 23939beb93cSSam Leffler struct ikev2_keys { 24039beb93cSSam Leffler u8 *SK_d, *SK_ai, *SK_ar, *SK_ei, *SK_er, *SK_pi, *SK_pr; 24139beb93cSSam Leffler size_t SK_d_len, SK_integ_len, SK_encr_len, SK_prf_len; 24239beb93cSSam Leffler }; 24339beb93cSSam Leffler 24439beb93cSSam Leffler 24539beb93cSSam Leffler int ikev2_keys_set(struct ikev2_keys *keys); 24639beb93cSSam Leffler void ikev2_free_keys(struct ikev2_keys *keys); 24739beb93cSSam Leffler 24839beb93cSSam Leffler 24939beb93cSSam Leffler /* Maximum hash length for supported hash algorithms */ 25039beb93cSSam Leffler #define IKEV2_MAX_HASH_LEN 20 25139beb93cSSam Leffler 25239beb93cSSam Leffler struct ikev2_integ_alg { 25339beb93cSSam Leffler int id; 25439beb93cSSam Leffler size_t key_len; 25539beb93cSSam Leffler size_t hash_len; 25639beb93cSSam Leffler }; 25739beb93cSSam Leffler 25839beb93cSSam Leffler struct ikev2_prf_alg { 25939beb93cSSam Leffler int id; 26039beb93cSSam Leffler size_t key_len; 26139beb93cSSam Leffler size_t hash_len; 26239beb93cSSam Leffler }; 26339beb93cSSam Leffler 26439beb93cSSam Leffler struct ikev2_encr_alg { 26539beb93cSSam Leffler int id; 26639beb93cSSam Leffler size_t key_len; 26739beb93cSSam Leffler size_t block_size; 26839beb93cSSam Leffler }; 26939beb93cSSam Leffler 27039beb93cSSam Leffler const struct ikev2_integ_alg * ikev2_get_integ(int id); 27139beb93cSSam Leffler int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data, 27239beb93cSSam Leffler size_t data_len, u8 *hash); 27339beb93cSSam Leffler const struct ikev2_prf_alg * ikev2_get_prf(int id); 27439beb93cSSam Leffler int ikev2_prf_hash(int alg, const u8 *key, size_t key_len, 27539beb93cSSam Leffler size_t num_elem, const u8 *addr[], const size_t *len, 27639beb93cSSam Leffler u8 *hash); 27739beb93cSSam Leffler int ikev2_prf_plus(int alg, const u8 *key, size_t key_len, 27839beb93cSSam Leffler const u8 *data, size_t data_len, 27939beb93cSSam Leffler u8 *out, size_t out_len); 28039beb93cSSam Leffler const struct ikev2_encr_alg * ikev2_get_encr(int id); 28139beb93cSSam Leffler int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, 28239beb93cSSam Leffler const u8 *plain, u8 *crypt, size_t len); 28339beb93cSSam Leffler int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, 28439beb93cSSam Leffler const u8 *crypt, u8 *plain, size_t len); 28539beb93cSSam Leffler 28639beb93cSSam Leffler int ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, 28739beb93cSSam Leffler const u8 *ID, size_t ID_len, u8 ID_type, 28839beb93cSSam Leffler struct ikev2_keys *keys, int initiator, 28939beb93cSSam Leffler const u8 *shared_secret, size_t shared_secret_len, 29039beb93cSSam Leffler const u8 *nonce, size_t nonce_len, 29139beb93cSSam Leffler const u8 *key_pad, size_t key_pad_len, 29239beb93cSSam Leffler u8 *auth_data); 29339beb93cSSam Leffler 29439beb93cSSam Leffler 29539beb93cSSam Leffler struct ikev2_payloads { 29639beb93cSSam Leffler const u8 *sa; 29739beb93cSSam Leffler size_t sa_len; 29839beb93cSSam Leffler const u8 *ke; 29939beb93cSSam Leffler size_t ke_len; 30039beb93cSSam Leffler const u8 *idi; 30139beb93cSSam Leffler size_t idi_len; 30239beb93cSSam Leffler const u8 *idr; 30339beb93cSSam Leffler size_t idr_len; 30439beb93cSSam Leffler const u8 *cert; 30539beb93cSSam Leffler size_t cert_len; 30639beb93cSSam Leffler const u8 *auth; 30739beb93cSSam Leffler size_t auth_len; 30839beb93cSSam Leffler const u8 *nonce; 30939beb93cSSam Leffler size_t nonce_len; 31039beb93cSSam Leffler const u8 *encrypted; 31139beb93cSSam Leffler size_t encrypted_len; 31239beb93cSSam Leffler u8 encr_next_payload; 31339beb93cSSam Leffler const u8 *notification; 31439beb93cSSam Leffler size_t notification_len; 31539beb93cSSam Leffler }; 31639beb93cSSam Leffler 31739beb93cSSam Leffler int ikev2_parse_payloads(struct ikev2_payloads *payloads, 31839beb93cSSam Leffler u8 next_payload, const u8 *pos, const u8 *end); 31939beb93cSSam Leffler 32039beb93cSSam Leffler u8 * ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, 32139beb93cSSam Leffler int initiator, const struct ikev2_hdr *hdr, 32239beb93cSSam Leffler const u8 *encrypted, size_t encrypted_len, 32339beb93cSSam Leffler size_t *res_len); 32439beb93cSSam Leffler void ikev2_update_hdr(struct wpabuf *msg); 32539beb93cSSam Leffler int ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys, 32639beb93cSSam Leffler int initiator, struct wpabuf *msg, 32739beb93cSSam Leffler struct wpabuf *plain, u8 next_payload); 32839beb93cSSam Leffler int ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, 32939beb93cSSam Leffler const struct ikev2_integ_alg *integ, 33039beb93cSSam Leffler const struct ikev2_encr_alg *encr, 33139beb93cSSam Leffler const u8 *skeyseed, const u8 *data, size_t data_len, 33239beb93cSSam Leffler struct ikev2_keys *keys); 33339beb93cSSam Leffler 33439beb93cSSam Leffler #endif /* IKEV2_COMMON_H */ 335