ikev2.h 1.4 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859
  1. /*
  2. * IKEv2 responder (RFC 4306) for EAP-IKEV2
  3. * Copyright (c) 2007, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #ifndef IKEV2_H
  9. #define IKEV2_H
  10. #include "eap_common/ikev2_common.h"
  11. struct ikev2_proposal_data {
  12. u8 proposal_num;
  13. int integ;
  14. int prf;
  15. int encr;
  16. int dh;
  17. };
  18. struct ikev2_responder_data {
  19. enum { SA_INIT, SA_AUTH, CHILD_SA, NOTIFY, IKEV2_DONE, IKEV2_FAILED }
  20. state;
  21. u8 i_spi[IKEV2_SPI_LEN];
  22. u8 r_spi[IKEV2_SPI_LEN];
  23. u8 i_nonce[IKEV2_NONCE_MAX_LEN];
  24. size_t i_nonce_len;
  25. u8 r_nonce[IKEV2_NONCE_MAX_LEN];
  26. size_t r_nonce_len;
  27. struct wpabuf *i_dh_public;
  28. struct wpabuf *r_dh_private;
  29. struct ikev2_proposal_data proposal;
  30. const struct dh_group *dh;
  31. struct ikev2_keys keys;
  32. u8 *IDi;
  33. size_t IDi_len;
  34. u8 IDi_type;
  35. u8 *IDr;
  36. size_t IDr_len;
  37. struct wpabuf *r_sign_msg;
  38. struct wpabuf *i_sign_msg;
  39. u8 *shared_secret;
  40. size_t shared_secret_len;
  41. enum { PEER_AUTH_CERT, PEER_AUTH_SECRET } peer_auth;
  42. u8 *key_pad;
  43. size_t key_pad_len;
  44. u16 error_type;
  45. enum { LAST_MSG_SA_INIT, LAST_MSG_SA_AUTH } last_msg;
  46. };
  47. void ikev2_responder_deinit(struct ikev2_responder_data *data);
  48. int ikev2_responder_process(struct ikev2_responder_data *data,
  49. const struct wpabuf *buf);
  50. struct wpabuf * ikev2_responder_build(struct ikev2_responder_data *data);
  51. #endif /* IKEV2_H */