NetBSD/crypto/dist/kame/racoon/algorithm.h
2001-08-31 09:59:03 +00:00

191 lines
5.0 KiB
C

/* $KAME: algorithm.h,v 1.19 2001/08/16 06:17:12 sakane Exp $ */
/*
* Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. Neither the name of the project nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*/
/* algorithm class */
enum {
algclass_ipsec_enc,
algclass_ipsec_auth,
algclass_ipsec_comp,
algclass_isakmp_enc,
algclass_isakmp_hash,
algclass_isakmp_dh,
algclass_isakmp_ameth, /* authentication method. */
#define MAXALGCLASS 7
};
#define ALG_DEFAULT_KEYLEN 64
#define ALGTYPE_NOTHING 0
/* algorithm type */
enum {
algtype_nothing = 0,
/* enc */
algtype_des_iv64,
algtype_des,
algtype_3des,
algtype_rc5,
algtype_idea,
algtype_cast128,
algtype_blowfish,
algtype_3idea,
algtype_des_iv32,
algtype_rc4,
algtype_null_enc,
algtype_rijndael,
algtype_twofish,
/* ipsec auth */
algtype_hmac_md5,
algtype_hmac_sha1,
algtype_des_mac,
algtype_kpdk,
algtype_non_auth,
algtype_hmac_sha2_256,
algtype_hmac_sha2_384,
algtype_hmac_sha2_512,
/* ipcomp */
algtype_oui,
algtype_deflate,
algtype_lzs,
/* hash */
algtype_md5,
algtype_sha1,
algtype_tiger,
algtype_sha2_256,
algtype_sha2_384,
algtype_sha2_512,
/* dh_group */
algtype_modp768,
algtype_modp1024,
algtype_ec2n155,
algtype_ec2n185,
algtype_modp1536,
algtype_modp2048,
algtype_modp3072,
algtype_modp4096,
algtype_modp8192,
/* authentication method. */
algtype_psk,
algtype_dsssig,
algtype_rsasig,
algtype_rsaenc,
algtype_rsarev,
algtype_gssapikrb
};
struct hmac_algorithm {
char *name;
int type;
int doi;
caddr_t (*init) __P((vchar_t *));
void (*update) __P((caddr_t, vchar_t *));
vchar_t *(*final) __P((caddr_t));
int (*hashlen) __P((void));
vchar_t *(*one) __P((vchar_t *, vchar_t *));
};
struct hash_algorithm {
char *name;
int type;
int doi;
caddr_t (*init) __P((void));
void (*update) __P((caddr_t, vchar_t *));
vchar_t *(*final) __P((caddr_t));
int (*hashlen) __P((void));
vchar_t *(*one) __P((vchar_t *));
};
struct enc_algorithm {
char *name;
int type;
int doi;
int blocklen;
vchar_t *(*encrypt) __P((vchar_t *, vchar_t *, vchar_t *));
vchar_t *(*decrypt) __P((vchar_t *, vchar_t *, vchar_t *));
int (*weakkey) __P((vchar_t *));
int (*keylen) __P((int));
};
/* dh group */
struct dh_algorithm {
char *name;
int type;
int doi;
struct dhgroup *dhgroup;
};
/* ipcomp, auth meth, dh group */
struct misc_algorithm {
char *name;
int type;
int doi;
};
extern int alg_oakley_hashdef_ok __P((int));
extern int alg_oakley_hashdef_doi __P((int));
extern int alg_oakley_hashdef_hashlen __P((int));
extern vchar_t *alg_oakley_hashdef_one __P((int, vchar_t *));
extern int alg_oakley_hmacdef_doi __P((int));
extern vchar_t *alg_oakley_hmacdef_one __P((int, vchar_t *, vchar_t *));
extern int alg_oakley_encdef_ok __P((int));
extern int alg_oakley_encdef_doi __P((int));
extern int alg_oakley_encdef_keylen __P((int, int));
extern int alg_oakley_encdef_blocklen __P((int));
extern vchar_t *alg_oakley_encdef_decrypt __P((int, vchar_t *, vchar_t *, vchar_t *));
extern vchar_t *alg_oakley_encdef_encrypt __P((int, vchar_t *, vchar_t *, vchar_t *));
extern int alg_ipsec_encdef_doi __P((int));
extern int alg_ipsec_encdef_keylen __P((int, int));
extern int alg_ipsec_hmacdef_doi __P((int));
extern int alg_ipsec_hmacdef_hashlen __P((int));
extern int alg_ipsec_compdef_doi __P((int));
extern int alg_oakley_dhdef_doi __P((int));
extern int alg_oakley_dhdef_ok __P((int));
extern struct dhgroup *alg_oakley_dhdef_group __P((int));
extern int alg_oakley_authdef_doi __P((int));
extern int default_keylen __P((int, int));
extern int check_keylen __P((int, int, int));
extern int algtype2doi __P((int, int));
extern int algclass2doi __P((int));