1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92
|
/* Kernel algorithm DB, for libreswan
*
* Author: JuanJo Ciarlante <jjo-ipsec@mendoza.gov.ar>
* Copyright (C) 2013 Paul Wouters <pwouters@redhat.com>
* Copyright (C) 2013 D. Hugh Redelmeier <hugh@mimosa.com>
* Copyright (C) 2017-2018 Andrew Cagney
*
* This program is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License as published by the
* Free Software Foundation; either version 2 of the License, or (at your
* option) any later version. See <https://www.gnu.org/licenses/gpl2.txt>.
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* for more details.
*/
#ifndef KERNEL_ALG_H
#define KERNEL_ALG_H
#include <stdbool.h>
/*
* This is a database of algorithms supported by the kernel and,
* hence, can be negotiated for ESP and AH. For instance, using
* PF_KEY (rfc2367), it is theoretically possible to query the kernel
* for supported algorithms and key sizes and use that to populate
* this database.
*
* Of course reality steps in:
*
* - there's a race between the kernel loading a crypto module and
* this database being populated (suspect it gets populated when the
* first connection is initiated?)
*
* - there's often a gap between what PF_KEY returns and what the
* kernel can support (linux works around this by hardwiring
* entries)
*
* - there's often a gap between what the PF_KEY headers say is
* supported and what the kernel supports (linux works around this
* by having pluto local headers)
*
* - is there an XFRM way to query what the kernel supports? I
* suspect linux still uses PF_KEY.
*
* - while PF_KEY returns key sizes (minbits, maxbits), the
* information is ignored and instead the ike_alg DB is consulted
* for this information (suspect that while PF_KEY was written to
* support variable length keys only fix sized keys have ever been
* used - 128 192 256 - and PF_KEY can't describe that
*
*/
struct ike_alg; /* forward declaration */
struct alg_info; /* forward declaration */
struct esp_info; /* forward declaration */
struct alg_info_ike; /* forward declaration */
struct alg_info_esp; /* forward declaration */
struct dh_desc;
struct encrypt_desc;
struct integ_desc;
struct ipcomp_desc;
extern bool kernel_alg_is_ok(const struct ike_alg *alg);
extern bool kernel_alg_dh_ok(const struct dh_desc *dh);
extern bool kernel_alg_encrypt_ok(const struct encrypt_desc *encrypt);
extern bool kernel_alg_integ_ok(const struct integ_desc *integ);
extern bool kernel_alg_ipcomp_ok(const struct ipcomp_desc *integ);
bool kernel_alg_encrypt_key_size(const struct encrypt_desc *encrypt,
int keylen, size_t *key_size);
int kernel_alg_encrypt_count(void);
int kernel_alg_integ_count(void);
int kernel_alg_ipcomp_count(void);
const struct encrypt_desc **next_kernel_encrypt_desc(const struct encrypt_desc **last);
const struct integ_desc **next_kernel_integ_desc(const struct integ_desc **last);
const struct ipcomp_desc **next_kernel_ipcomp_desc(const struct ipcomp_desc **last);
void kernel_alg_init(void);
void kernel_alg_add(const struct ike_alg *alg);
void kernel_integ_add(const struct integ_desc *integ);
void kernel_encrypt_add(const struct encrypt_desc *encrypt);
void kernel_ipcomp_add(const struct ipcomp_desc *encrypt);
#endif
|