/
ietf_constants.h
1998 lines (1758 loc) · 68.1 KB
/
ietf_constants.h
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
/*
* manifest constants
*
* Copyright (C) 1997 Angelos D. Keromytis.
* Copyright (C) 1998-2002,2013 D. Hugh Redelmeier <hugh@mimosa.com>
* Copyright (C) 2004 Michael Richardson <mcr@xelerance.com>
* Copyright (C) 2012 Avesh Agarwal <avagarwa@redhat.com>
* Copyright (C) 2012 Paul Wouters <paul@libreswan.org>
* Copyright (C) 2012-2015 Paul Wouters <pwouters@redhat.com>
* Copyright (C) 2013 Tuomo Soini <tis@foobar.fi>
* Copyright (C) 2016 Andrew Cagney <cagney@gnu.org>
* Copyright (C) 2017 Sahana Prasad <sahana.prasad07@gmail.com>
* Copyright (C) 2017 Vukasin Karadzic <vukasin.karadzic@gmail.com>
* Copyright (C) 2017 Mayank Totale <mtotale@gmail.com>
* Copyright (C) 2020 Yulia Kuzovkova <ukuzovkova@gmail.com>
*
* This program is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License as published by the
* Free Software Foundation; either version 2 of the License, or (at your
* option) any later version. See <https://www.gnu.org/licenses/gpl2.txt>.
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* for more details.
*
*/
#ifndef _IETF_CONSTANTS_H
#define _IETF_CONSTANTS_H
#include <sys/types.h>
#include <stdint.h> /* XXX: needed but should it? */
/* Group parameters from draft-ietf-ike-01.txt section 6 */
#define MODP_GENERATOR "02" /* HEX! */
/* Diffie-Hellman group 22 generator (RFC 5114) */
#define MODP_GENERATOR_DH22 \
"A4D1CBD5 C3FD3412 6765A442 EFB99905 F8104DD2 58AC507F " \
"D6406CFF 14266D31 266FEA1E 5C41564B 777E690F 5504F213 " \
"160217B4 B01B886A 5E91547F 9E2749F4 D7FBD7D3 B9A92EE1 " \
"909D0D22 63F80A76 A6A24C08 7A091F53 1DBF0A01 69B6A28A " \
"D662A4D1 8E73AFA3 2D779D59 18D08BC8 858F4DCE F97C2A24 " \
"855E6EEB 22B3B2E5"
/* Diffie-Hellman group 23 generator (RFC 5114) */
#define MODP_GENERATOR_DH23 \
"AC4032EF 4F2D9AE3 9DF30B5C 8FFDAC50 6CDEBE7B 89998CAF " \
"74866A08 CFE4FFE3 A6824A4E 10B9A6F0 DD921F01 A70C4AFA " \
"AB739D77 00C29F52 C57DB17C 620A8652 BE5E9001 A8D66AD7 " \
"C1766910 1999024A F4D02727 5AC1348B B8A762D0 521BC98A " \
"E2471504 22EA1ED4 09939D54 DA7460CD B5F6C6B2 50717CBE " \
"F180EB34 118E98D1 19529A45 D6F83456 6E3025E3 16A330EF " \
"BB77A86F 0C1AB15B 051AE3D4 28C8F8AC B70A8137 150B8EEB " \
"10E183ED D19963DD D9E263E4 770589EF 6AA21E7F 5F2FF381 " \
"B539CCE3 409D13CD 566AFBB4 8D6C0191 81E1BCFE 94B30269 " \
"EDFE72FE 9B6AA4BD 7B5A0F1C 71CFFF4C 19C418E1 F6EC0179 " \
"81BC087F 2A7065B3 84B890D3 191F2BFA"
/* Diffie-Hellman group 24 generator (RFC 5114) */
#define MODP_GENERATOR_DH24 \
"3FB32C9B 73134D0B 2E775066 60EDBD48 4CA7B18F 21EF2054 " \
"07F4793A 1A0BA125 10DBC150 77BE463F FF4FED4A AC0BB555 " \
"BE3A6C1B 0C6B47B1 BC3773BF 7E8C6F62 901228F8 C28CBB18 " \
"A55AE313 41000A65 0196F931 C77A57F2 DDF463E5 E9EC144B " \
"777DE62A AAB8A862 8AC376D2 82D6ED38 64E67982 428EBC83 " \
"1D14348F 6F2F9193 B5045AF2 767164E1 DFC967C1 FB3F2E55 " \
"A4BD1BFF E83B9C80 D052B985 D182EA0A DB2A3B73 13D3FE14 " \
"C8484B1E 052588B9 B7D2BBD2 DF016199 ECD06E15 57CD0915 " \
"B3353BBB 64E0EC37 7FD02837 0DF92B52 C7891428 CDC67EB6 " \
"184B523D 1DB246C3 2F630784 90F00EF8 D647D148 D4795451 " \
"5E2327CF EF98C582 664B4C0F 6CC41659"
#if 0 /* too weak - left only as reference */
/* RFC-2049 */
#define MODP768_MODULUS \
"FFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1 " \
"29024E08 8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD " \
"EF9519B3 CD3A431B 302B0A6D F25F1437 4FE1356D 6D51C245 " \
"E485B576 625E7EC6 F44C42E9 A63A3620 FFFFFFFF FFFFFFFF"
#endif
/* RFC-2049 */
/* getting on the weak side now */
#define MODP1024_MODULUS \
"FFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1 " \
"29024E08 8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD " \
"EF9519B3 CD3A431B 302B0A6D F25F1437 4FE1356D 6D51C245 " \
"E485B576 625E7EC6 F44C42E9 A637ED6B 0BFF5CB6 F406B7ED " \
"EE386BFB 5A899FA5 AE9F2411 7C4B1FE6 49286651 ECE65381 " \
"FFFFFFFF FFFFFFFF"
/* RFC-3526 DH5 */
#define MODP1536_MODULUS \
"FFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1 " \
"29024E08 8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD " \
"EF9519B3 CD3A431B 302B0A6D F25F1437 4FE1356D 6D51C245 " \
"E485B576 625E7EC6 F44C42E9 A637ED6B 0BFF5CB6 F406B7ED " \
"EE386BFB 5A899FA5 AE9F2411 7C4B1FE6 49286651 ECE45B3D " \
"C2007CB8 A163BF05 98DA4836 1C55D39A 69163FA8 FD24CF5F " \
"83655D23 DCA3AD96 1C62F356 208552BB 9ED52907 7096966D " \
"670C354E 4ABC9804 F1746C08 CA237327 FFFFFFFF FFFFFFFF "
/* RFC-3526 DH14 */
#define MODP2048_MODULUS \
"FFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1" \
"29024E08 8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD" \
"EF9519B3 CD3A431B 302B0A6D F25F1437 4FE1356D 6D51C245" \
"E485B576 625E7EC6 F44C42E9 A637ED6B 0BFF5CB6 F406B7ED" \
"EE386BFB 5A899FA5 AE9F2411 7C4B1FE6 49286651 ECE45B3D" \
"C2007CB8 A163BF05 98DA4836 1C55D39A 69163FA8 FD24CF5F" \
"83655D23 DCA3AD96 1C62F356 208552BB 9ED52907 7096966D" \
"670C354E 4ABC9804 F1746C08 CA18217C 32905E46 2E36CE3B" \
"E39E772C 180E8603 9B2783A2 EC07A28F B5C55DF0 6F4C52C9" \
"DE2BCBF6 95581718 3995497C EA956AE5 15D22618 98FA0510" \
"15728E5A 8AACAA68 FFFFFFFF FFFFFFFF"
/* RFC-3526 DH15 */
#define MODP3072_MODULUS \
"FFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1" \
"29024E08 8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD" \
"EF9519B3 CD3A431B 302B0A6D F25F1437 4FE1356D 6D51C245" \
"E485B576 625E7EC6 F44C42E9 A637ED6B 0BFF5CB6 F406B7ED" \
"EE386BFB 5A899FA5 AE9F2411 7C4B1FE6 49286651 ECE45B3D" \
"C2007CB8 A163BF05 98DA4836 1C55D39A 69163FA8 FD24CF5F" \
"83655D23 DCA3AD96 1C62F356 208552BB 9ED52907 7096966D" \
"670C354E 4ABC9804 F1746C08 CA18217C 32905E46 2E36CE3B" \
"E39E772C 180E8603 9B2783A2 EC07A28F B5C55DF0 6F4C52C9" \
"DE2BCBF6 95581718 3995497C EA956AE5 15D22618 98FA0510" \
"15728E5A 8AAAC42D AD33170D 04507A33 A85521AB DF1CBA64" \
"ECFB8504 58DBEF0A 8AEA7157 5D060C7D B3970F85 A6E1E4C7" \
"ABF5AE8C DB0933D7 1E8C94E0 4A25619D CEE3D226 1AD2EE6B" \
"F12FFA06 D98A0864 D8760273 3EC86A64 521F2B18 177B200C" \
"BBE11757 7A615D6C 770988C0 BAD946E2 08E24FA0 74E5AB31" \
"43DB5BFC E0FD108E 4B82D120 A93AD2CA FFFFFFFF FFFFFFFF"
/* RFC-3526 DH16 */
#define MODP4096_MODULUS \
"FFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1" \
"29024E08 8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD" \
"EF9519B3 CD3A431B 302B0A6D F25F1437 4FE1356D 6D51C245" \
"E485B576 625E7EC6 F44C42E9 A637ED6B 0BFF5CB6 F406B7ED" \
"EE386BFB 5A899FA5 AE9F2411 7C4B1FE6 49286651 ECE45B3D" \
"C2007CB8 A163BF05 98DA4836 1C55D39A 69163FA8 FD24CF5F" \
"83655D23 DCA3AD96 1C62F356 208552BB 9ED52907 7096966D" \
"670C354E 4ABC9804 F1746C08 CA18217C 32905E46 2E36CE3B" \
"E39E772C 180E8603 9B2783A2 EC07A28F B5C55DF0 6F4C52C9" \
"DE2BCBF6 95581718 3995497C EA956AE5 15D22618 98FA0510" \
"15728E5A 8AAAC42D AD33170D 04507A33 A85521AB DF1CBA64" \
"ECFB8504 58DBEF0A 8AEA7157 5D060C7D B3970F85 A6E1E4C7" \
"ABF5AE8C DB0933D7 1E8C94E0 4A25619D CEE3D226 1AD2EE6B" \
"F12FFA06 D98A0864 D8760273 3EC86A64 521F2B18 177B200C" \
"BBE11757 7A615D6C 770988C0 BAD946E2 08E24FA0 74E5AB31" \
"43DB5BFC E0FD108E 4B82D120 A9210801 1A723C12 A787E6D7" \
"88719A10 BDBA5B26 99C32718 6AF4E23C 1A946834 B6150BDA" \
"2583E9CA 2AD44CE8 DBBBC2DB 04DE8EF9 2E8EFC14 1FBECAA6" \
"287C5947 4E6BC05D 99B2964F A090C3A2 233BA186 515BE7ED" \
"1F612970 CEE2D7AF B81BDD76 2170481C D0069127 D5B05AA9" \
"93B4EA98 8D8FDDC1 86FFB7DC 90A6C08F 4DF435C9 34063199" \
"FFFFFFFF FFFFFFFF"
/* RFC-3526 DH17 */
#define MODP6144_MODULUS \
"FFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1 29024E08" \
"8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD EF9519B3 CD3A431B" \
"302B0A6D F25F1437 4FE1356D 6D51C245 E485B576 625E7EC6 F44C42E9" \
"A637ED6B 0BFF5CB6 F406B7ED EE386BFB 5A899FA5 AE9F2411 7C4B1FE6" \
"49286651 ECE45B3D C2007CB8 A163BF05 98DA4836 1C55D39A 69163FA8" \
"FD24CF5F 83655D23 DCA3AD96 1C62F356 208552BB 9ED52907 7096966D" \
"670C354E 4ABC9804 F1746C08 CA18217C 32905E46 2E36CE3B E39E772C" \
"180E8603 9B2783A2 EC07A28F B5C55DF0 6F4C52C9 DE2BCBF6 95581718" \
"3995497C EA956AE5 15D22618 98FA0510 15728E5A 8AAAC42D AD33170D" \
"04507A33 A85521AB DF1CBA64 ECFB8504 58DBEF0A 8AEA7157 5D060C7D" \
"B3970F85 A6E1E4C7 ABF5AE8C DB0933D7 1E8C94E0 4A25619D CEE3D226" \
"1AD2EE6B F12FFA06 D98A0864 D8760273 3EC86A64 521F2B18 177B200C" \
"BBE11757 7A615D6C 770988C0 BAD946E2 08E24FA0 74E5AB31 43DB5BFC" \
"E0FD108E 4B82D120 A9210801 1A723C12 A787E6D7 88719A10 BDBA5B26" \
"99C32718 6AF4E23C 1A946834 B6150BDA 2583E9CA 2AD44CE8 DBBBC2DB" \
"04DE8EF9 2E8EFC14 1FBECAA6 287C5947 4E6BC05D 99B2964F A090C3A2" \
"233BA186 515BE7ED 1F612970 CEE2D7AF B81BDD76 2170481C D0069127" \
"D5B05AA9 93B4EA98 8D8FDDC1 86FFB7DC 90A6C08F 4DF435C9 34028492" \
"36C3FAB4 D27C7026 C1D4DCB2 602646DE C9751E76 3DBA37BD F8FF9406" \
"AD9E530E E5DB382F 413001AE B06A53ED 9027D831 179727B0 865A8918" \
"DA3EDBEB CF9B14ED 44CE6CBA CED4BB1B DB7F1447 E6CC254B 33205151" \
"2BD7AF42 6FB8F401 378CD2BF 5983CA01 C64B92EC F032EA15 D1721D03" \
"F482D7CE 6E74FEF6 D55E702F 46980C82 B5A84031 900B1C9E 59E7C97F" \
"BEC7E8F3 23A97A7E 36CC88BE 0F1D45B7 FF585AC5 4BD407B2 2B4154AA" \
"CC8F6D7E BF48E1D8 14CC5ED2 0F8037E0 A79715EE F29BE328 06A1D58B" \
"B7C5DA76 F550AA3D 8A1FBFF0 EB19CCB1 A313D55C DA56C9EC 2EF29632" \
"387FE8D7 6E3C0468 043E8F66 3F4860EE 12BF2D5B 0B7474D6 E694F91E" \
"6DCC4024 FFFFFFFF FFFFFFFF"
/* RFC-3526 DH18 */
#define MODP8192_MODULUS \
"FFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1" \
"29024E08 8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD" \
"EF9519B3 CD3A431B 302B0A6D F25F1437 4FE1356D 6D51C245" \
"E485B576 625E7EC6 F44C42E9 A637ED6B 0BFF5CB6 F406B7ED" \
"EE386BFB 5A899FA5 AE9F2411 7C4B1FE6 49286651 ECE45B3D" \
"C2007CB8 A163BF05 98DA4836 1C55D39A 69163FA8 FD24CF5F" \
"83655D23 DCA3AD96 1C62F356 208552BB 9ED52907 7096966D" \
"670C354E 4ABC9804 F1746C08 CA18217C 32905E46 2E36CE3B" \
"E39E772C 180E8603 9B2783A2 EC07A28F B5C55DF0 6F4C52C9" \
"DE2BCBF6 95581718 3995497C EA956AE5 15D22618 98FA0510" \
"15728E5A 8AAAC42D AD33170D 04507A33 A85521AB DF1CBA64" \
"ECFB8504 58DBEF0A 8AEA7157 5D060C7D B3970F85 A6E1E4C7" \
"ABF5AE8C DB0933D7 1E8C94E0 4A25619D CEE3D226 1AD2EE6B" \
"F12FFA06 D98A0864 D8760273 3EC86A64 521F2B18 177B200C" \
"BBE11757 7A615D6C 770988C0 BAD946E2 08E24FA0 74E5AB31" \
"43DB5BFC E0FD108E 4B82D120 A9210801 1A723C12 A787E6D7" \
"88719A10 BDBA5B26 99C32718 6AF4E23C 1A946834 B6150BDA" \
"2583E9CA 2AD44CE8 DBBBC2DB 04DE8EF9 2E8EFC14 1FBECAA6" \
"287C5947 4E6BC05D 99B2964F A090C3A2 233BA186 515BE7ED" \
"1F612970 CEE2D7AF B81BDD76 2170481C D0069127 D5B05AA9" \
"93B4EA98 8D8FDDC1 86FFB7DC 90A6C08F 4DF435C9 34028492" \
"36C3FAB4 D27C7026 C1D4DCB2 602646DE C9751E76 3DBA37BD" \
"F8FF9406 AD9E530E E5DB382F 413001AE B06A53ED 9027D831" \
"179727B0 865A8918 DA3EDBEB CF9B14ED 44CE6CBA CED4BB1B" \
"DB7F1447 E6CC254B 33205151 2BD7AF42 6FB8F401 378CD2BF" \
"5983CA01 C64B92EC F032EA15 D1721D03 F482D7CE 6E74FEF6" \
"D55E702F 46980C82 B5A84031 900B1C9E 59E7C97F BEC7E8F3" \
"23A97A7E 36CC88BE 0F1D45B7 FF585AC5 4BD407B2 2B4154AA" \
"CC8F6D7E BF48E1D8 14CC5ED2 0F8037E0 A79715EE F29BE328" \
"06A1D58B B7C5DA76 F550AA3D 8A1FBFF0 EB19CCB1 A313D55C" \
"DA56C9EC 2EF29632 387FE8D7 6E3C0468 043E8F66 3F4860EE" \
"12BF2D5B 0B7474D6 E694F91E 6DBE1159 74A3926F 12FEE5E4" \
"38777CB6 A932DF8C D8BEC4D0 73B931BA 3BC832B6 8D9DD300" \
"741FA7BF 8AFC47ED 2576F693 6BA42466 3AAB639C 5AE4F568" \
"3423B474 2BF1C978 238F16CB E39D652D E3FDB8BE FC848AD9" \
"22222E04 A4037C07 13EB57A8 1A23F0C7 3473FC64 6CEA306B" \
"4BCBC886 2F8385DD FA9D4B7F A2C087E8 79683303 ED5BDD3A" \
"062B3CF5 B3A278A6 6D2A13F8 3F44F82D DF310EE0 74AB6A36" \
"4597E899 A0255DC1 64F31CC5 0846851D F9AB4819 5DED7EA1" \
"B1D510BD 7EE74D73 FAF36BC3 1ECFA268 359046F4 EB879F92" \
"4009438B 481C6CD7 889A002E D5EE382B C9190DA6 FC026E47" \
"9558E447 5677E9AA 9E3050E2 765694DF C81F56E8 80B96E71" \
"60C980DD 98EDD3DF FFFFFFFF FFFFFFFF"
/* Diffie-Hellman group 22 prime (RFC 5114) */
#define MODP1024_MODULUS_DH22 \
"B10B8F96 A080E01D DE92DE5E AE5D54EC 52C99FBC FB06A3C6 " \
"9A6A9DCA 52D23B61 6073E286 75A23D18 9838EF1E 2EE652C0 " \
"13ECB4AE A9061123 24975C3C D49B83BF ACCBDD7D 90C4BD70 " \
"98488E9C 219A7372 4EFFD6FA E5644738 FAA31A4F F55BCCC0 " \
"A151AF5F 0DC8B4BD 45BF37DF 365C1A65 E68CFDA7 6D4DA708 " \
"DF1FB2BC 2E4A4371"
/* Diffie-Hellman group 23 prime (RFC 5114) */
#define MODP2048_MODULUS_DH23 \
"AD107E1E 9123A9D0 D660FAA7 9559C51F A20D64E5 683B9FD1 " \
"B54B1597 B61D0A75 E6FA141D F95A56DB AF9A3C40 7BA1DF15 " \
"EB3D688A 309C180E 1DE6B85A 1274A0A6 6D3F8152 AD6AC212 " \
"9037C9ED EFDA4DF8 D91E8FEF 55B7394B 7AD5B7D0 B6C12207 " \
"C9F98D11 ED34DBF6 C6BA0B2C 8BBC27BE 6A00E0A0 B9C49708 " \
"B3BF8A31 70918836 81286130 BC8985DB 1602E714 415D9330 " \
"278273C7 DE31EFDC 7310F712 1FD5A074 15987D9A DC0A486D " \
"CDF93ACC 44328387 315D75E1 98C641A4 80CD86A1 B9E587E8 " \
"BE60E69C C928B2B9 C52172E4 13042E9B 23F10B0E 16E79763 " \
"C9B53DCF 4BA80A29 E3FB73C1 6B8E75B9 7EF363E2 FFA31F71 " \
"CF9DE538 4E71B81C 0AC4DFFE 0C10E64F"
/* Diffie-Hellman group 24 prime (RFC 5114) */
#define MODP2048_MODULUS_DH24 \
"87A8E61D B4B6663C FFBBD19C 65195999 8CEEF608 660DD0F2 " \
"5D2CEED4 435E3B00 E00DF8F1 D61957D4 FAF7DF45 61B2AA30 " \
"16C3D911 34096FAA 3BF4296D 830E9A7C 209E0C64 97517ABD " \
"5A8A9D30 6BCF67ED 91F9E672 5B4758C0 22E0B1EF 4275BF7B " \
"6C5BFC11 D45F9088 B941F54E B1E59BB8 BC39A0BF 12307F5C " \
"4FDB70C5 81B23F76 B63ACAE1 CAA6B790 2D525267 35488A0E " \
"F13C6D9A 51BFA4AB 3AD83477 96524D8E F6A167B5 A41825D9 " \
"67E144E5 14056425 1CCACB83 E6B486F6 B3CA3F79 71506026 " \
"C0B857F6 89962856 DED4010A BD0BE621 C3A3960A 54E710C3 " \
"75F26375 D7014103 A4B54330 C198AF12 6116D227 6E11715F " \
"693877FA D7EF09CA DB094AE9 1E1A1597"
#define LOCALSECRETSIZE BYTES_FOR_BITS(256)
/* Limits on nonce sizes */
/*
* IKEv1 RFC-2409:
* The length of nonce payload MUST be between 8 and 256 bytes inclusive.
*/
#define IKEv1_MINIMUM_NONCE_SIZE 8 /* bytes */
#define IKEv1_MAXIMUM_NONCE_SIZE 256 /* bytes */
/*
* IKEv2 RFC-7296:
* Nonces used in IKEv2 MUST be randomly chosen, MUST be at least 128 bits
* in size, and MUST be at least half the key size of the negotiated
* pseudorandom function (PRF). However, the initiator chooses the nonce
* before the outcome of the negotiation is known. Because of that, the
* nonce has to be long enough for all the PRFs being proposed.
*/
#define IKEv2_MINIMUM_NONCE_SIZE 16 /* bytes */
#define IKEv2_MAXIMUM_NONCE_SIZE 256 /* bytes */
/* Default is based on minimum IKEv2 requirement */
#define DEFAULT_NONCE_SIZE 32 /* bytes */
/*
* Security Parameter Index (SPI):
*
* The IKE SA's SPI, which is a fixed part of the IKEv1/IKEv2 message
* header, is 8 bytes long.
*
* The CHILD SA's SPI is 4 bytes (IKEv2: 3.3.1. Proposal
* Substructure).
*
* XXX:
*
* IKEv1, presumably as a way to ensure maximum confusion, used the
* term "cookie" when describing the IKE SA's SPI in the message
* header, and the term SPI when describing IKE SPIs (yes, one or two)
* within a payload (the term "cookie" is included as a parenthetical
* clarification).
*
* IKEv1, instead consistently uses SPI for both the IKE and CHILD
* SAs, that is both when describing the message header and the
* contents of payloads. Unfortunately, IKEv2 then went on to use
* term "cookie" when describing its new cookie mechanism (implemented
* with notifications).
*
* This would have all been ok if FreeS/WAN had used the term SPI in
* its code.
*
* It didn't.
*
* Instead it choose to use the word "cookie". Hence lingering
* presence of things like [ir]cookie, the macro COOKIE_SIZE (below),
* and IKEv1 centric types such as ipsec_spi_t in the code.
*/
#define IKE_SA_SPI_SIZE 8
#define CHILD_SA_SPI_SIZE 4
#define MAX_SPI_SIZE IKE_SA_SPI_SIZE
#define COOKIE_SIZE IKE_SA_SPI_SIZE
#define INTERNAL_IP6_ADDRESS_SIZE 17
#define INTERNL_IP6_PREFIX_LEN_SIZE 1
#define INTERNL_IP6_PREFIX_LEN 128
#define INTERNL_IP4_PREFIX_LEN 32
/*
* XXX:
*
* For IKEv1, the maximum number of SPI bytes in some payloads. For
* instance: rfc2408: 4.6.3.1 RESPONDER-LIFETIME: either sixteen (16)
* (two eight-octet ISAKMP cookies) or four (4) (one IPSEC SPI)
*
* XXX: this desperately needs a better name. In IKEv2 SPI size
* always refers to the size of one SPI and never a pair.
*/
#define MAX_ISAKMP_SPI_SIZE (2 * IKE_SA_SPI_SIZE)
/* IKEv2 DOS COOKIE */
#define IKEv2_MAX_COOKIE_SIZE 64
/* Various IETF defined key lengths */
/* AES-CBC RFC 3602 The _only_ valid values are 128, 192 and 256 bits */
#define AES_KEY_MIN_LEN 128 /* bits */
#define AES_KEY_DEF_LEN 128 /* bits */
#define AES_KEY_MAX_LEN 256 /* bits */
/*
* https://tools.ietf.org/html/rfc3566#section-4.1
*/
#define AES_XCBC_DIGEST_SIZE BYTES_FOR_BITS(128)
#define AES_XCBC_DIGEST_SIZE_TRUNC BYTES_FOR_BITS(96)
/* AES-CTR RFC 3686 The _only_ valid values are 128, 192 and 256 bits */
#define AES_CTR_SALT_BYTES 4
#define AES_CTR_KEY_MIN_LEN 128 /* bits */
#define AES_CTR_KEY_DEF_LEN 128 /* bits */
#define AES_CTR_KEY_MAX_LEN 256 /* bits */
/*
* RFC 4106 AES GCM
* https://tools.ietf.org/html/rfc4106#section-8.1
*/
#define AES_GCM_SALT_BYTES 4
#define AES_GCM_KEY_MIN_LEN 128 /* bits */
#define AES_GCM_KEY_DEF_LEN 128 /* bits */
#define AES_GCM_KEY_MAX_LEN 256 /* bits */
/*
* RFC 4309 AES CCM
* https://tools.ietf.org/html/rfc4309#section-7.1
*/
#define AES_CCM_SALT_BYTES 3
#define AES_CCM_KEY_MIN_LEN 128 /* bits */
#define AES_CCM_KEY_DEF_LEN 128 /* bits */
#define AES_CCM_KEY_MAX_LEN 256 /* bits */
/* The _only_ valid values are 128, 192 and 256 bits */
#define AEAD_AES_KEY_MIN_LEN 128 /* bits */
#define AEAD_AES_KEY_DEF_LEN 128 /* bits */
#define AEAD_AES_KEY_MAX_LEN 256 /* bits */
/* AES-GMAC RFC 4543 The _only_ valid values are 128, 192 and 256 bits */
#define AES_GMAC_KEY_MIN_LEN 128 /* bits */
#define AES_GMAC_KEY_DEF_LEN 128 /* bits */
#define AES_GMAC_KEY_MAX_LEN 256 /* bits */
/* SEED-CBC RFC 4196 The _only_ valid value is 128 */
#define SEED_KEY_MIN_LEN 128 /* bits */
#define SEED_KEY_DEF_LEN 128 /* bits */
#define SEED_KEY_MAX_LEN 128 /* bits */
/*
* https://tools.ietf.org/html/rfc2451#section-2.2
* ESP_CAST is the cast5 algorithm, not cast6
* We avoid cast-128 padding by enforcing a minimum of 128
*/
#define CAST_KEY_DEF_LEN 128 /* bits */
/*
* RFC 2451 - Blowfish accepts key sizes 40-448, default is 128
* 128,192 and 256 are the only commonly used ones
*/
/*
* TWOFISH-CBC is a 128-bit block cipher with variable-length key up to 256 bits
* default is 128. 128, 192 and 256 are the only commonly used ones
*/
#define TWOFISH_KEY_MIN_LEN 128 /* bits */
#define TWOFISH_KEY_DEF_LEN 128 /* bits */
#define TWOFISH_KEY_MAX_LEN 256 /* bits */
/*
* SERPENT default 128, 128, 192 and 256 are the only commonly used ones
*/
#define SERPENT_KEY_MIN_LEN 128 /* bits */
#define SERPENT_KEY_DEF_LEN 128 /* bits */
#define SERPENT_KEY_MAX_LEN 256 /* bits */
/*
* Camellia CBC and CTR - RFC 5529
* 128 (default), 192 and 256
*/
#define CAMELLIA_KEY_MIN_LEN 128 /* bits */
#define CAMELLIA_KEY_DEF_LEN 128 /* bits */
#define CAMELLIA_KEY_MAX_LEN 256 /* bits */
#define CAMELLIA_CTR_KEY_MIN_LEN 128 /* bits */
#define CAMELLIA_CTR_KEY_DEF_LEN 128 /* bits */
#define CAMELLIA_CTR_KEY_MAX_LEN 256 /* bits */
/* ought to be supplied by md5.h */
#define MD5_DIGEST_SIZE BYTES_FOR_BITS(128)
/* IKEV2 integrity algorithms */
#define MD5_DIGEST_SIZE_96 BYTES_FOR_BITS(96)
/* ought to be supplied by sha1.h */
#define SHA1_DIGEST_SIZE BYTES_FOR_BITS(160)
#define SHA1_BLOCK_SIZE BYTES_FOR_BITS(512)
/* IKEV2 integrity algorithms */
#define SHA1_DIGEST_SIZE_96 BYTES_FOR_BITS(96)
#define SHA2_256_DIGEST_SIZE BYTES_FOR_BITS(256) /* sha2.h */
#define SHA2_384_DIGEST_SIZE BYTES_FOR_BITS(384)
#define SHA2_512_DIGEST_SIZE BYTES_FOR_BITS(512)
/* not in blapit.h */
#define DES_CBC_BLOCK_SIZE BYTES_FOR_BITS(64)
#define AES_CBC_BLOCK_SIZE BYTES_FOR_BITS(128)
#define TWOFISH_CBC_BLOCK_SIZE BYTES_FOR_BITS(128)
/* SERPENT_CBC_BLOCK_SIZE: BYTES_FOR_BITS(128) */
/*
* hand-computed max of *_CBC_BLOCK_SIZE
* Needs to be a compile-time constant for array allocation.
*/
#define MAX_CBC_BLOCK_SIZE BYTES_FOR_BITS(128)
#define DSS_QBITS 160 /* bits in DSS's "q" (FIPS 186-1) */
/* RFC 2404 "HMAC-SHA-1-96" section 3 */
#define HMAC_SHA1_KEY_LEN SHA1_DIGEST_SIZE /* bytes */
/* RFC 2403 "HMAC-MD5-96" section 3 */
#define HMAC_MD5_KEY_LEN MD5_DIGEST_SIZE /* bytes */
#define IKE_UDP_PORT 500
#define NAT_IKE_UDP_PORT 4500 /* RFC-3947 */
/* RFC3948: bytes of zeros, same size as ESP SPI */
#define NON_ESP_MARKER_SIZE 4
/* RFC8229: prefix at start of tcp stream (no NUL) */
#define IKE_IN_TCP_PREFIX { 'I', 'K', 'E', 'T', 'C', 'P', }
/* ICMP type number for neighbor discovery */
#define ICMP_NEIGHBOR_DISCOVERY 34816
#define ICMP_NEIGHBOR_SOLICITATION 34560
/* Version numbers - IKEv1 */
#define ISAKMP_MAJOR_VERSION 0x1
#define ISAKMP_MINOR_VERSION 0x0
/* version numbers - IKEv2 */
#define IKEv2_MAJOR_VERSION 0x2
#define IKEv2_MINOR_VERSION 0x0
/* Domain of Interpretation */
#define ISAKMP_DOI_ISAKMP 0
#define ISAKMP_DOI_IPSEC 1
/* IPsec DOI things */
#define IPSEC_DOI_SITUATION_LENGTH 4
#define IPSEC_DOI_LDI_LENGTH 4
#define IPSEC_DOI_SPI_SIZE 4
/*
* SPI value 0 is invalid and values 1-255 are reserved to IANA.
* ESP: RFC 2402 2.4; AH: RFC 2406 2.1
* IPComp RFC 2393 substitutes a CPI in the place of an SPI.
* see also draft-shacham-ippcp-rfc2393bis-05.txt.
* We (Libreswan) reserve 0x100 to 0xFFF for manual keying, so
* Pluto won't generate these values.
*/
#define IPSEC_DOI_SPI_MIN 0x100
#define IPSEC_DOI_SPI_OUR_MIN 0x1000
/*
* Payload types
* RFC2408 Internet Security Association and Key Management Protocol (ISAKMP)
* section 3.1
*
* RESERVED 14-127
* Private USE 128-255
*/
enum next_payload_types_ikev1 {
ISAKMP_NEXT_NONE = 0, /* No other payload following - See also v2_PROPOSAL_LAST */
ISAKMP_NEXT_SA = 1, /* Security Association */
ISAKMP_NEXT_P = 2, /* Proposal - See also v2_PROPOSAL_NON_LAST */
ISAKMP_NEXT_T = 3, /* Transform */
ISAKMP_NEXT_KE = 4, /* Key Exchange */
ISAKMP_NEXT_ID = 5, /* Identification */
ISAKMP_NEXT_CERT = 6, /* Certificate */
ISAKMP_NEXT_CR = 7, /* Certificate Request */
ISAKMP_NEXT_HASH = 8, /* Hash */
ISAKMP_NEXT_SIG = 9, /* Signature */
ISAKMP_NEXT_NONCE = 10, /* Nonce */
ISAKMP_NEXT_N = 11, /* Notification */
ISAKMP_NEXT_D = 12, /* Delete */
ISAKMP_NEXT_VID = 13, /* Vendor ID */
ISAKMP_NEXT_MCFG_ATTR = 14, /* Mode config Attribute */
/* NAT-Traversal: NAT-D (bad drafts) Conflicts with RFC 3547 (not 3947!) and RFC 6407 */
/* old value: ISAKMP_NEXT_NATD_BADDRAFTS = 15 */
ISAKMP_NEXT_SAK = 15, /* SA KEK Payload - RFC 6407 */
ISAKMP_NEXT_TEK = 16, /* SA TEK Payload - RFC 6407 */
ISAKMP_NEXT_KD = 17, /* Key Download - RFC 3547 */
ISAKMP_NEXT_SEQ = 18, /* Sequence Number - RFC 3547 */
ISAKMP_NEXT_POP = 19, /* Proof of Possession - RFC 3547 */
ISAKMP_NEXT_NATD_RFC = 20, /* NAT-Traversal: NAT-D RFC 3947 */
ISAKMP_NEXT_NATOA_RFC = 21, /* NAT-Traversal: NAT-OA RFC 3947 */
ISAKMP_NEXT_GAP = 22, /* Group Associated Policy = RFC 6407 */
/* 23-127 Unassigned */
/* 128 - 255 Private Use */
ISAKMP_NEXT_NATD_DRAFTS = 130, /* NAT-Traversal: NAT-D (drafts) */
ISAKMP_NEXT_NATOA_DRAFTS = 131, /* NAT-Traversal: NAT-OA (drafts) */
/* Cisco/Microsoft proprietary IKE fragmentation */
ISAKMP_NEXT_IKE_FRAGMENTATION = 132,
ISAKMP_NEXT_ROOF /* roof on payload types */
};
enum ikev2_last_proposal {
/* if there is a next proposal, then the lp needs to be set right */
v2_PROPOSAL_LAST = 0, /* matches IKEv1 ISAKMP_NEXT_NONE by design */
v2_PROPOSAL_NON_LAST = 2 /* matches IKEv1 ISAKMP_NEXT_P by design */
};
enum ikev2_last_transform {
/* if there is a next transform, then the lt needs to be set right */
v2_TRANSFORM_LAST = 0, /* matches IKEv1 ISAKMP_NEXT_NONE by design */
v2_TRANSFORM_NON_LAST = 3 /* matches IKEv1 ISAKMP_NEXT_T by design */
};
enum next_payload_types_ikev2 {
ISAKMP_NEXT_v2NONE = 0,
/* 1 - 32 Reserved for IKEv1 */
ISAKMP_NEXT_v2SA = 33, /* Security Association */
ISAKMP_NEXT_v2KE = 34, /* Key Exchange payload */
ISAKMP_NEXT_v2IDi = 35, /* ID payload - initiator */
ISAKMP_NEXT_v2IDr = 36, /* ID payload - responder */
ISAKMP_NEXT_v2CERT = 37, /* CERTificate */
ISAKMP_NEXT_v2CERTREQ = 38, /* CERTificate REQuest */
ISAKMP_NEXT_v2AUTH = 39, /* AUTHentication */
ISAKMP_NEXT_v2Ni = 40, /* Nonce - initiator */
ISAKMP_NEXT_v2Nr = ISAKMP_NEXT_v2Ni, /* Nonce - responder */
ISAKMP_NEXT_v2N = 41, /* Notify */
ISAKMP_NEXT_v2D = 42, /* Delete */
ISAKMP_NEXT_v2V = 43, /* Vendor ID */
ISAKMP_NEXT_v2TSi = 44, /* Traffic Selector - initiator */
ISAKMP_NEXT_v2TSr = 45, /* Traffic Selector - responder */
ISAKMP_NEXT_v2SK = 46, /* Encrypted payload */
ISAKMP_NEXT_v2CP = 47, /* Configuration Payload (MODECFG) */
ISAKMP_NEXT_v2EAP = 48, /* Extensible Authentication Payload */
ISAKMP_NEXT_v2GSPM = 49, /* RFC-6467 Generic Secure Password Method */
ISAKMP_NEXT_v2IDG = 50, /* Group Identification draft-yeung-g-ikev2 */
ISAKMP_NEXT_v2GSA = 51, /* Group Security Association draft-yeung-g-ikev2 */
ISAKMP_NEXT_v2KD = 52, /* Key Download draft-yeung-g-ikev2 */
ISAKMP_NEXT_v2SKF = 53, /* Encrypted and Authenticated Fragment fragment */
/* 54-127 Unassigned */
/* 128 - 255 Private Use */
/* Cisco/Microsoft proprietary IKE fragmentation - private use for libreswan */
ISAKMP_NEXT_v2IKE_FRAGMENTATION = 132,
ISAKMP_NEXT_v2ROOF, /* roof on payload types */
};
#define ISAKMP_v2PAYLOAD_TYPE_BASE ISAKMP_NEXT_v2SA /* lowest value of a v2 payload type */
/*
* Value to use when emitting a payload that the other end won't
* recognize forcing it down the unknown (and not just unsupported)
* payload code path:
*
* - fills the entire 8-bit field (so signed vs unsigned overflows)
*
* - too big to fit in an lset_t (so would overflow that code)
*
* - not "known" by pluto (so enum name lookups fail)
*
* - since it isn't known, it is also, by definition unsupported
*/
#define ISAKMP_NEXT_v2UNKNOWN 255
/*
* These values are to be used within the Type field of an Attribute (14)
* ISAKMP payload.
*/
#define ISAKMP_CFG_REQUEST 1
#define ISAKMP_CFG_REPLY 2
#define ISAKMP_CFG_SET 3
#define ISAKMP_CFG_ACK 4
/* Mode Config attribute values */
#define INTERNAL_IP4_ADDRESS 1
#define INTERNAL_IP4_NETMASK 2
#define INTERNAL_IP4_DNS 3
#define INTERNAL_IP4_NBNS 4 /* unused by us, WINS is long dead */
#define INTERNAL_ADDRESS_EXPIRY 5
#define INTERNAL_IP4_DHCP 6
#define APPLICATION_VERSION 7
#define INTERNAL_IP6_ADDRESS 8
#define INTERNAL_IP6_NETMASK 9
#define INTERNAL_IP6_DNS 10
#define INTERNAL_IP6_NBNS 11
#define INTERNAL_IP6_DHCP 12
#define INTERNAL_IP4_SUBNET 13
#define SUPPORTED_ATTRIBUTES 14
#define INTERNAL_IP6_SUBNET 15
#define MIP6_HOME_PREFIX 16
#define INTERNAL_IP6_LINK 17
#define INTERNAL_IP6_PREFIX 18
#define HOME_AGENT_ADDRESS 19
/* 65001 - 65535 Private Use */
#define FICTIVE_AUTH_METHOD_XAUTH_PSKEY_I 65500
/* extended authentication modes */
#define XAUTH_AUTH_INIT_PSK 65001
#define XAUTH_AUTH_RESP_PSK 65002
#define XAUTH_AUTH_INIT_DSS 65003
#define XAUTH_AUTH_RESP_DSS 65004
#define XAUTH_AUTH_INIT_RSA 65005
#define XAUTH_AUTH_RESP_RSA 65006
#define XAUTH_AUTH_INIT_RSA_ENC 65007
#define XAUTH_AUTH_RESP_RSA_ENC 65008
#define XAUTH_AUTH_INIT_RSA_REV 65009
#define XAUTH_AUTH_RESP_RSA_REV 65010
/*
* GSS mode - should only be allowed after receiving vendorids:
* MD5("A GSS-API Authentication Method for IKE")
* MD5("GSSAPI") (recognized by Windows 2000)
* MD5("MS NT5 ISAKMPOAKLEY") (sent by Windows 2000)
*/
/*
* Note: OAKLEY_ATTR_AUTH_METHOD_GSSAPI_KRB conflicts
* with XAUTH_AUTH_INIT_PSK
*/
#define OAKLEY_ATTR_AUTH_METHOD_GSSAPI_KRB 65001
#define OAKLEY_ATTR_GSS_ID 16384
#define MAXPADLWORD 20
/* hybrid authentication modes */
#define HYBRID_AUTH_INIT_RSA 64221
#define HYBRID_AUTH_RESP_RSA 64222
#define HYBRID_AUTH_INIT_DSS 64223
#define HYBRID_AUTH_RESP_DSS 64224
/* XAUTH attribute values (draft-ietf-ipsec-isakmp-xauth-06 4.2) */
#define XAUTH_TYPE 16520
#define XAUTH_USER_NAME 16521
#define XAUTH_USER_PASSWORD 16522
#define XAUTH_PASSCODE 16523
#define XAUTH_MESSAGE 16524
#define XAUTH_CHALLENGE 16525
#define XAUTH_DOMAIN 16526
#define XAUTH_STATUS 16527
#define XAUTH_NEXT_PIN 16528
#define XAUTH_ANSWER 16529
/* Values of XAUTH_STATUS attribute (draft-ietf-ipsec-isakmp-xauth-06 4.2) */
#define XAUTH_STATUS_FAIL 0
#define XAUTH_STATUS_OK 1
/* Values of XAUTH_TYPE attributes */
#define XAUTH_TYPE_GENERIC 0
#define XAUTH_TYPE_CHAP 1
#define XAUTH_TYPE_OTP 2
#define XAUTH_TYPE_SKEY 3
/* proprietary Microsoft attributes */
#define INTERNAL_IP4_SERVER 23456
#define INTERNAL_IP6_SERVER 23457
/* Unity (Cisco) Mode Config attribute values */
#define MODECFG_BANNER 28672
#define CISCO_SAVE_PW 28673
#define MODECFG_DOMAIN 28674
#define CISCO_SPLIT_DNS 28675
#define CISCO_SPLIT_INC 28676
#define CISCO_UDP_ENCAP_PORT 28677
#define CISCO_SPLIT_EXCLUDE 28678
#define CISCO_DO_PFS 28679
#define CISCO_FW_TYPE 28680
#define CISCO_BACKUP_SERVER 28681
#define CISCO_DDNS_HOSTNAME 28682
#define CISCO_UNKNOWN_SEEN_ON_IPHONE 28683
/* checkpoint extended authentication attributes */
#define CHKPT_TYPE 13
#define CHKPT_USER_NAME 14
#define CHKPT_USER_PASSWORD 15
#define CHKPT_MESSAGE 17
#define CHKPT_CHALLENGE 18
#define CHKPT_STATUS 20
/* checkpoint configuration attributes */
#define CHKPT_DEF_DOMAIN 16387
#define CHKPT_MAC_ADDRESS 16388
#define CHKPT_MARCIPAN_REASON_CODE 16389
#define CHKPT_UNKNOWN1 16400
#define CHKPT_UNKNOWN2 16401
#define CHKPT_UNKNOWN3 16402
/*
* Exchange types
* RFC2408 "Internet Security Association and Key Management Protocol (ISAKMP)"
* section 3.1
*
* ISAKMP Future Use 6 - 31
* DOI Specific Use 32 - 239
* Private Use 240 - 255
*
* Note: draft-ietf-ipsec-dhless-enc-mode-00.txt Appendix A
* defines "DHless RSA Encryption" as 6.
*/
enum isakmp_xchg_type {
ISAKMP_XCHG_NONE = 0,
ISAKMP_XCHG_BASE = 1,
ISAKMP_XCHG_IDPROT = 2, /* ID Protection */
ISAKMP_XCHG_AO = 3, /* Authentication Only */
ISAKMP_XCHG_AGGR = 4, /* Aggressive */
ISAKMP_XCHG_INFO = 5, /* Informational */
ISAKMP_XCHG_MODE_CFG = 6, /* Mode Config */
/* Private exchanges to pluto -- openswan mistakenly uses these */
ISAKMP_XCHG_STOLEN_BY_OPENSWAN_FOR_ECHOREQUEST = 30, /* Echo Request */
ISAKMP_XCHG_STOLEN_BY_OPENSWAN_FOR_ECHOREPLY = 31, /* Echo Reply */
/* Extra exchange types, defined by Oakley
* RFC2409 "The Internet Key Exchange (IKE)", near end of Appendix A
*/
ISAKMP_XCHG_QUICK = 32, /* Oakley Quick Mode */
ISAKMP_XCHG_NGRP = 33, /* Oakley New Group Mode */
/* IKEv2 things */
ISAKMP_v2_IKE_SA_INIT = 34,
ISAKMP_v2_IKE_AUTH = 35,
ISAKMP_v2_CREATE_CHILD_SA = 36,
ISAKMP_v2_INFORMATIONAL = 37,
ISAKMP_v2_IKE_SESSION_RESUME = 38, /* RFC 5723 */
ISAKMP_v2_GSA_AUTH = 39, /* draft-yeung-g-ikev2 */
ISAKMP_v2_GSA_REGISTRATION = 40, /* draft-yeung-g-ikev2 */
ISAKMP_v2_GSA_REKEY = 41, /* draft-yeung-g-ikev2 */
ISAKMP_v2_UNASSIGNED_42 = 42, /* avoid hole in enum */
ISAKMP_v2_IKE_INTERMEDIATE = 43, /* draft-ietf-ipsecme-ikev2-intermediate */
/* 42, 44 - 239 Unassigned */
/* 240 - 255 Private Use */
/* libreswan private use */
ISAKMP_XCHG_ECHOREQUEST_PRIVATE = 244, /* Private Echo Request */
ISAKMP_XCHG_ECHOREPLY_PRIVATE = 245, /* Private Echo Reply */
};
/*
* ISAKMP header flag bits
*/
enum isakmp_header_flags {
ISAKMP_FLAGS_v1_ENCRYPTION_IX = 0, /* IKEv1 encrypt */
ISAKMP_FLAGS_v1_COMMIT_IX = 1, /* IKEv1 commit - unused */
ISAKMP_FLAGS_v1_AUTH_IX = 2, /* IKEv1 authonly - unused */
ISAKMP_FLAGS_v2_IKE_I_IX = 3, /* IKEv2 Original Initiator */
ISAKMP_FLAGS_v2_VER_IX = 4, /* IKEv2 Version flag */
ISAKMP_FLAGS_v2_MSG_R_IX = 5, /* IKEv2 Message response */
ISAKMP_FLAGS_RESERVED_BIT6_IX = 6, /* RESERVED */
ISAKMP_FLAGS_RESERVED_BIT7_IX = 7, /* RESERVED */
};
#define ISAKMP_FLAGS_v1_ENCRYPTION (1<<ISAKMP_FLAGS_v1_ENCRYPTION_IX)
#define ISAKMP_FLAGS_v1_COMMIT (1<<ISAKMP_FLAGS_v1_COMMIT_IX)
#define ISAKMP_FLAGS_v1_AUTH (1<<ISAKMP_FLAGS_v1_AUTH_IX)
#define ISAKMP_FLAGS_v2_IKE_I (1<<ISAKMP_FLAGS_v2_IKE_I_IX)
#define ISAKMP_FLAGS_v2_VER (1<<ISAKMP_FLAGS_v2_VER_IX)
#define ISAKMP_FLAGS_v2_MSG_R (1<<ISAKMP_FLAGS_v2_MSG_R_IX)
#define ISAKMP_FLAGS_RESERVED_BIT6 (1<<ISAKMP_FLAGS_RESERVED_BIT6_IX)
#define ISAKMP_FLAGS_RESERVED_BIT7 (1<<ISAKMP_FLAGS_RESERVED_BIT7_IX)
extern const struct enum_names isakmp_flag_names;
/* IKEv2 header field sizes and offsets from the start of the header */
#define ADJ_LENGTH_SIZE 4
#define ADJ_LENGTH_OFFSET 24
#define EXCH_TYPE_OFFSET 18
/* SK payload header field sizes */
#define SK_HEADER_SIZE 4
#define ADJ_PAYLOAD_LENGTH_SIZE 2
/*
* Situation definition for IPsec DOI.
*/
extern const struct enum_names sit_bit_names;
enum sit_bits {
SIT_IDENTITY_ONLY_IX = 0,
SIT_SECRECY_IX = 1,
SIT_INTEGRITY_IX = 2,
};
#define SIT_IDENTITY_ONLY (1<<SIT_IDENTITY_ONLY_IX)
#define SIT_SECRECY (1<<SIT_SECRECY_IX)
#define SIT_INTEGRITY (1<<SIT_INTEGRITY_IX)
/*
* See https://tools.ietf.org/html/rfc5996#section-3.2
* Critical bit in each payload is only one defined
*/
extern struct enum_names const payload_flag_names;
enum {
ISAKMP_PAYLOAD_FLAG_LIBRESWAN_BOGUS_IX = 0,
ISAKMP_PAYLOAD_FLAG_CRITICAL_IX = 7,
};
#define ISAKMP_PAYLOAD_NONCRITICAL 0x00
#define ISAKMP_PAYLOAD_CRITICAL (1<<ISAKMP_PAYLOAD_FLAG_CRITICAL_IX) /*0x80*/
/* These are followed by 7 more bits, currently RESERVED */
/* Note we use 1 of those bits for IMPAIR-SEND-BOGUS-ISAKMP-FLAG */
#define ISAKMP_PAYLOAD_FLAG_LIBRESWAN_BOGUS (1<<ISAKMP_PAYLOAD_FLAG_LIBRESWAN_BOGUS_IX) /*0x01*/
/*
* Protocol IDs
* RFC2407 The Internet IP security Domain of Interpretation for ISAKMP 4.4.1
*/
/*
* extern enum_names protocol_names;
*/
#define PROTO_RESERVED 0
#define PROTO_ISAKMP 1
#define PROTO_IPSEC_AH 2
#define PROTO_IPSEC_ESP 3
#define PROTO_IPCOMP 4 /* only in IKEv1 */
/*
* IKEv2 Security Protocol Identifiers - RFC 5996
*
* https://www.iana.org/assignments/ikev2-parameters/ikev2-parameters.xhtml#ikev2-parameters-18
*
* According to the IKEv2 RFC, these values are stored in 'Protocol
* ID' field of a payload (see: 3.3.1. Proposal Substructure; 3.10.
* Notify Payload; 3.11. Delete Payload).
*
* The value '0' is a little odd. While IANA lists it as Reserved, a
* notify payload must use that value for notifications that do not
* include an SPI. Hence 'NONE' is used.
*/
enum ikev2_sec_proto_id {
IKEv2_SEC_PROTO_NONE = 0,
#define PROTO_v2_RESERVED IKEv2_SEC_PROTO_NONE
IKEv2_SEC_PROTO_IKE = 1,
IKEv2_SEC_PROTO_AH = 2,
#define PROTO_v2_AH IKEv2_SEC_PROTO_AH
IKEv2_SEC_PROTO_ESP = 3,
#define PROTO_v2_ESP IKEv2_SEC_PROTO_ESP
IKEv2_SEC_FC_ESP_HEADER = 4, /* RFC 4595 */
IKEv2_SEC_FC_CT_AUTHENTICATION = 5, /* RFC 4595 */
/* 6 - 200 Unassigned */
/* 201 - 255 Private use */
};
/*
* IKEv2 proposal
* See https://www.iana.org/assignments/ikev2-parameters
* Assume indexing is [1..IKEv2_TRANS_TYPE_ROOF)
*/
enum ikev2_trans_type {
IKEv2_TRANS_TYPE_ENCR = 1,
IKEv2_TRANS_TYPE_PRF = 2,
IKEv2_TRANS_TYPE_INTEG = 3,
IKEv2_TRANS_TYPE_DH = 4, /* same as in IKEv1 */
IKEv2_TRANS_TYPE_ESN = 5,
IKEv2_TRANS_TYPE_ROOF
};
/*
* IKE and ESP encryption algorithms (note iana lists two table columns for these)
* https://www.iana.org/assignments/ikev2-parameters/ikev2-parameters.xhtml#ikev2-parameters-5
* (TODO: rename this to ikev2_encr_esp_ike)
*/
enum ikev2_trans_type_encr {
IKEv2_ENCR_reserved = 0,
IKEv2_ENCR_DES_IV64 = 1,
IKEv2_ENCR_DES = 2,
IKEv2_ENCR_3DES = 3,
IKEv2_ENCR_RC5 = 4,
IKEv2_ENCR_IDEA = 5,
IKEv2_ENCR_CAST = 6,
IKEv2_ENCR_BLOWFISH = 7,
IKEv2_ENCR_3IDEA = 8,
IKEv2_ENCR_DES_IV32 = 9,
IKEv2_ENCR_RES10 = 10,
IKEv2_ENCR_NULL = 11,
IKEv2_ENCR_AES_CBC = 12,
IKEv2_ENCR_AES_CTR = 13,
IKEv2_ENCR_AES_CCM_8 = 14,
IKEv2_ENCR_AES_CCM_12 = 15,
IKEv2_ENCR_AES_CCM_16 = 16,
IKEv2_UNUSED_17 = 17,
IKEv2_ENCR_AES_GCM_8 = 18,
IKEv2_ENCR_AES_GCM_12 = 19,
IKEv2_ENCR_AES_GCM_16 = 20,
IKEv2_ENCR_NULL_AUTH_AES_GMAC = 21,
IKEv2_RESERVED_IEEE_P1619_XTS_AES = 22,
IKEv2_ENCR_CAMELLIA_CBC = 23,
IKEv2_ENCR_CAMELLIA_CTR = 24,
IKEv2_ENCR_CAMELLIA_CCM_A = 25, /* CAMELLIA_CCM_8 RFC 5529 */
IKEv2_ENCR_CAMELLIA_CCM_B = 26, /* CAMELLIA_CCM_12 RFC 5529 */
IKEv2_ENCR_CAMELLIA_CCM_C = 27, /* CAMELLIA_CCM_16 RFC 5529 */
IKEv2_ENCR_CHACHA20_POLY1305 = 28, /* RFC7634 */
IKEv2_ENCR_PSTATS_ROOF,
/* 29 - 1023 Reserved to IANA */
/* 1024 - 65535 Private Use */
IKEv2_ENCR_SERPENT_CBC = 65004,
IKEv2_ENCR_TWOFISH_CBC = 65005,
IKEv2_ENCR_TWOFISH_CBC_SSH = 65289,
IKEv2_ENCR_INVALID = 65536,
};
enum ikev2_trans_type_prf {
IKEv2_PRF_HMAC_MD5 = 1, /* RFC2104 */
IKEv2_PRF_HMAC_SHA1 = 2, /* RFC2104 */
IKEv2_PRF_HMAC_TIGER = 3, /* RFC2104 */
IKEv2_PRF_AES128_XCBC = 4, /* RFC4434 */
IKEv2_PRF_HMAC_SHA2_256 = 5, /* RFC4868 */
IKEv2_PRF_HMAC_SHA2_384 = 6, /* RFC4868 */
IKEv2_PRF_HMAC_SHA2_512 = 7, /* RFC4868 */
IKEv2_PRF_AES128_CMAC = 8, /* RFC4615 */
IKEv2_PRF_9_INVALID = 9,
IKEv2_PRF_PSTATS_ROOF,
/* 9 - 1023 Reserved to IANA RFC4306 */
/* 1024 - 65535 Private Use RFC4306 */
IKEv2_PRF_INVALID = 65536
};
enum ikev2_trans_type_integ {
IKEv2_AUTH_NONE = 0, /* RFC4306 */
IKEv2_AUTH_HMAC_MD5_96 = 1, /* RFC2403 */