added AES-192/256 proposals to IKE
[strongswan.git] / src / charon / config / proposal.c
1 /**
2 * @file proposal.c
3 *
4 * @brief Implementation of proposal_t.
5 *
6 */
7
8 /*
9 * Copyright (C) 2006 Martin Willi
10 * Hochschule fuer Technik Rapperswil
11 *
12 * This program is free software; you can redistribute it and/or modify it
13 * under the terms of the GNU General Public License as published by the
14 * Free Software Foundation; either version 2 of the License, or (at your
15 * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
16 *
17 * This program is distributed in the hope that it will be useful, but
18 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
19 * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
20 * for more details.
21 */
22
23 #include <string.h>
24
25 #include "proposal.h"
26
27 #include <daemon.h>
28 #include <utils/linked_list.h>
29 #include <utils/identification.h>
30 #include <utils/lexparser.h>
31 #include <crypto/prfs/prf.h>
32 #include <crypto/crypters/crypter.h>
33 #include <crypto/signers/signer.h>
34
35
36 ENUM(protocol_id_names, PROTO_NONE, PROTO_ESP,
37 "PROTO_NONE",
38 "IKE",
39 "AH",
40 "ESP",
41 );
42
43 ENUM_BEGIN(transform_type_names, UNDEFINED_TRANSFORM_TYPE, UNDEFINED_TRANSFORM_TYPE,
44 "UNDEFINED_TRANSFORM_TYPE");
45 ENUM_NEXT(transform_type_names, ENCRYPTION_ALGORITHM, EXTENDED_SEQUENCE_NUMBERS, UNDEFINED_TRANSFORM_TYPE,
46 "ENCRYPTION_ALGORITHM",
47 "PSEUDO_RANDOM_FUNCTION",
48 "INTEGRITY_ALGORITHM",
49 "DIFFIE_HELLMAN_GROUP",
50 "EXTENDED_SEQUENCE_NUMBERS");
51 ENUM_END(transform_type_names, EXTENDED_SEQUENCE_NUMBERS);
52
53 ENUM(extended_sequence_numbers_names, NO_EXT_SEQ_NUMBERS, EXT_SEQ_NUMBERS,
54 "NO_EXT_SEQ_NUMBERS",
55 "EXT_SEQ_NUMBERS",
56 );
57
58 typedef struct private_proposal_t private_proposal_t;
59
60 /**
61 * Private data of an proposal_t object
62 */
63 struct private_proposal_t {
64
65 /**
66 * Public part
67 */
68 proposal_t public;
69
70 /**
71 * protocol (ESP or AH)
72 */
73 protocol_id_t protocol;
74
75 /**
76 * priority ordered list of encryption algorithms
77 */
78 linked_list_t *encryption_algos;
79
80 /**
81 * priority ordered list of integrity algorithms
82 */
83 linked_list_t *integrity_algos;
84
85 /**
86 * priority ordered list of pseudo random functions
87 */
88 linked_list_t *prf_algos;
89
90 /**
91 * priority ordered list of dh groups
92 */
93 linked_list_t *dh_groups;
94
95 /**
96 * priority ordered list of extended sequence number flags
97 */
98 linked_list_t *esns;
99
100 /**
101 * senders SPI
102 */
103 u_int64_t spi;
104 };
105
106 /**
107 * Add algorithm/keysize to a algorithm list
108 */
109 static void add_algo(linked_list_t *list, u_int16_t algo, size_t key_size)
110 {
111 algorithm_t *algo_key;
112
113 algo_key = malloc_thing(algorithm_t);
114 algo_key->algorithm = algo;
115 algo_key->key_size = key_size;
116 list->insert_last(list, (void*)algo_key);
117 }
118
119 /**
120 * Implements proposal_t.add_algorithm
121 */
122 static void add_algorithm(private_proposal_t *this, transform_type_t type, u_int16_t algo, size_t key_size)
123 {
124 switch (type)
125 {
126 case ENCRYPTION_ALGORITHM:
127 add_algo(this->encryption_algos, algo, key_size);
128 break;
129 case INTEGRITY_ALGORITHM:
130 add_algo(this->integrity_algos, algo, key_size);
131 break;
132 case PSEUDO_RANDOM_FUNCTION:
133 add_algo(this->prf_algos, algo, key_size);
134 break;
135 case DIFFIE_HELLMAN_GROUP:
136 add_algo(this->dh_groups, algo, 0);
137 break;
138 case EXTENDED_SEQUENCE_NUMBERS:
139 add_algo(this->esns, algo, 0);
140 break;
141 default:
142 break;
143 }
144 }
145
146 /**
147 * Implements proposal_t.get_algorithm.
148 */
149 static bool get_algorithm(private_proposal_t *this, transform_type_t type, algorithm_t** algo)
150 {
151 linked_list_t *list;
152 switch (type)
153 {
154 case ENCRYPTION_ALGORITHM:
155 list = this->encryption_algos;
156 break;
157 case INTEGRITY_ALGORITHM:
158 list = this->integrity_algos;
159 break;
160 case PSEUDO_RANDOM_FUNCTION:
161 list = this->prf_algos;
162 break;
163 case DIFFIE_HELLMAN_GROUP:
164 list = this->dh_groups;
165 break;
166 case EXTENDED_SEQUENCE_NUMBERS:
167 list = this->esns;
168 break;
169 default:
170 return FALSE;
171 }
172 if (list->get_first(list, (void**)algo) != SUCCESS)
173 {
174 return FALSE;
175 }
176 return TRUE;
177 }
178
179 /**
180 * Implements proposal_t.create_algorithm_iterator.
181 */
182 static iterator_t *create_algorithm_iterator(private_proposal_t *this, transform_type_t type)
183 {
184 switch (type)
185 {
186 case ENCRYPTION_ALGORITHM:
187 return this->encryption_algos->create_iterator(this->encryption_algos, TRUE);
188 case INTEGRITY_ALGORITHM:
189 return this->integrity_algos->create_iterator(this->integrity_algos, TRUE);
190 case PSEUDO_RANDOM_FUNCTION:
191 return this->prf_algos->create_iterator(this->prf_algos, TRUE);
192 case DIFFIE_HELLMAN_GROUP:
193 return this->dh_groups->create_iterator(this->dh_groups, TRUE);
194 case EXTENDED_SEQUENCE_NUMBERS:
195 return this->esns->create_iterator(this->esns, TRUE);
196 default:
197 break;
198 }
199 return NULL;
200 }
201
202 /**
203 * Find a matching alg/keysize in two linked lists
204 */
205 static bool select_algo(linked_list_t *first, linked_list_t *second, bool *add, u_int16_t *alg, size_t *key_size)
206 {
207 iterator_t *first_iter, *second_iter;
208 algorithm_t *first_alg, *second_alg;
209
210 /* if in both are zero algorithms specified, we HAVE a match */
211 if (first->get_count(first) == 0 && second->get_count(second) == 0)
212 {
213 *add = FALSE;
214 return TRUE;
215 }
216
217 first_iter = first->create_iterator(first, TRUE);
218 second_iter = second->create_iterator(second, TRUE);
219 /* compare algs, order of algs in "first" is preferred */
220 while (first_iter->iterate(first_iter, (void**)&first_alg))
221 {
222 second_iter->reset(second_iter);
223 while (second_iter->iterate(second_iter, (void**)&second_alg))
224 {
225 if (first_alg->algorithm == second_alg->algorithm &&
226 first_alg->key_size == second_alg->key_size)
227 {
228 /* ok, we have an algorithm */
229 *alg = first_alg->algorithm;
230 *key_size = first_alg->key_size;
231 *add = TRUE;
232 first_iter->destroy(first_iter);
233 second_iter->destroy(second_iter);
234 return TRUE;
235 }
236 }
237 }
238 /* no match in all comparisons */
239 first_iter->destroy(first_iter);
240 second_iter->destroy(second_iter);
241 return FALSE;
242 }
243
244 /**
245 * Implements proposal_t.select.
246 */
247 static proposal_t *select_proposal(private_proposal_t *this, private_proposal_t *other)
248 {
249 proposal_t *selected;
250 u_int16_t algo;
251 size_t key_size;
252 bool add;
253
254 DBG2(DBG_CFG, "selecting proposal:");
255
256 /* check protocol */
257 if (this->protocol != other->protocol)
258 {
259 DBG2(DBG_CFG, " protocol mismatch, skipping");
260 return NULL;
261 }
262
263 selected = proposal_create(this->protocol);
264
265 /* select encryption algorithm */
266 if (select_algo(this->encryption_algos, other->encryption_algos, &add, &algo, &key_size))
267 {
268 if (add)
269 {
270 selected->add_algorithm(selected, ENCRYPTION_ALGORITHM, algo, key_size);
271 }
272 }
273 else
274 {
275 selected->destroy(selected);
276 DBG2(DBG_CFG, " no acceptable ENCRYPTION_ALGORITHM found, skipping");
277 return NULL;
278 }
279 /* select integrity algorithm */
280 if (select_algo(this->integrity_algos, other->integrity_algos, &add, &algo, &key_size))
281 {
282 if (add)
283 {
284 selected->add_algorithm(selected, INTEGRITY_ALGORITHM, algo, key_size);
285 }
286 }
287 else
288 {
289 selected->destroy(selected);
290 DBG2(DBG_CFG, " no acceptable INTEGRITY_ALGORITHM found, skipping");
291 return NULL;
292 }
293 /* select prf algorithm */
294 if (select_algo(this->prf_algos, other->prf_algos, &add, &algo, &key_size))
295 {
296 if (add)
297 {
298 selected->add_algorithm(selected, PSEUDO_RANDOM_FUNCTION, algo, key_size);
299 }
300 }
301 else
302 {
303 selected->destroy(selected);
304 DBG2(DBG_CFG, " no acceptable PSEUDO_RANDOM_FUNCTION found, skipping");
305 return NULL;
306 }
307 /* select a DH-group */
308 if (select_algo(this->dh_groups, other->dh_groups, &add, &algo, &key_size))
309 {
310 if (add)
311 {
312 selected->add_algorithm(selected, DIFFIE_HELLMAN_GROUP, algo, 0);
313 }
314 }
315 else
316 {
317 selected->destroy(selected);
318 DBG2(DBG_CFG, " no acceptable DIFFIE_HELLMAN_GROUP found, skipping");
319 return NULL;
320 }
321 /* select if we use ESNs */
322 if (select_algo(this->esns, other->esns, &add, &algo, &key_size))
323 {
324 if (add)
325 {
326 selected->add_algorithm(selected, EXTENDED_SEQUENCE_NUMBERS, algo, 0);
327 }
328 }
329 else
330 {
331 selected->destroy(selected);
332 DBG2(DBG_CFG, " no acceptable EXTENDED_SEQUENCE_NUMBERS found, skipping");
333 return NULL;
334 }
335 DBG2(DBG_CFG, " proposal matches");
336
337 /* apply SPI from "other" */
338 selected->set_spi(selected, other->spi);
339
340 /* everything matched, return new proposal */
341 return selected;
342 }
343
344 /**
345 * Implements proposal_t.get_protocols.
346 */
347 static protocol_id_t get_protocol(private_proposal_t *this)
348 {
349 return this->protocol;
350 }
351
352 /**
353 * Implements proposal_t.set_spi.
354 */
355 static void set_spi(private_proposal_t *this, u_int64_t spi)
356 {
357 this->spi = spi;
358 }
359
360 /**
361 * Implements proposal_t.get_spi.
362 */
363 static u_int64_t get_spi(private_proposal_t *this)
364 {
365 return this->spi;
366 }
367
368 /**
369 * Clone a algorithm list
370 */
371 static void clone_algo_list(linked_list_t *list, linked_list_t *clone_list)
372 {
373 algorithm_t *algo, *clone_algo;
374 iterator_t *iterator = list->create_iterator(list, TRUE);
375 while (iterator->iterate(iterator, (void**)&algo))
376 {
377 clone_algo = malloc_thing(algorithm_t);
378 memcpy(clone_algo, algo, sizeof(algorithm_t));
379 clone_list->insert_last(clone_list, (void*)clone_algo);
380 }
381 iterator->destroy(iterator);
382 }
383
384 /**
385 * Implements proposal_t.clone
386 */
387 static proposal_t *clone_(private_proposal_t *this)
388 {
389 private_proposal_t *clone = (private_proposal_t*)proposal_create(this->protocol);
390
391 clone_algo_list(this->encryption_algos, clone->encryption_algos);
392 clone_algo_list(this->integrity_algos, clone->integrity_algos);
393 clone_algo_list(this->prf_algos, clone->prf_algos);
394 clone_algo_list(this->dh_groups, clone->dh_groups);
395 clone_algo_list(this->esns, clone->esns);
396
397 clone->spi = this->spi;
398
399 return &clone->public;
400 }
401
402 static status_t add_string_algo(private_proposal_t *this, chunk_t alg)
403 {
404 if (strncmp(alg.ptr, "null", alg.len) == 0)
405 {
406 add_algorithm(this, ENCRYPTION_ALGORITHM, ENCR_NULL, 0);
407 }
408 else if (strncmp(alg.ptr, "aes128", alg.len) == 0)
409 {
410 add_algorithm(this, ENCRYPTION_ALGORITHM, ENCR_AES_CBC, 128);
411 }
412 else if (strncmp(alg.ptr, "aes192", alg.len) == 0)
413 {
414 add_algorithm(this, ENCRYPTION_ALGORITHM, ENCR_AES_CBC, 192);
415 }
416 else if (strncmp(alg.ptr, "aes256", alg.len) == 0)
417 {
418 add_algorithm(this, ENCRYPTION_ALGORITHM, ENCR_AES_CBC, 256);
419 }
420 else if (strncmp(alg.ptr, "3des", alg.len) == 0)
421 {
422 add_algorithm(this, ENCRYPTION_ALGORITHM, ENCR_3DES, 0);
423 }
424 /* blowfish only uses some predefined key sizes yet */
425 else if (strncmp(alg.ptr, "blowfish128", alg.len) == 0)
426 {
427 add_algorithm(this, ENCRYPTION_ALGORITHM, ENCR_BLOWFISH, 128);
428 }
429 else if (strncmp(alg.ptr, "blowfish192", alg.len) == 0)
430 {
431 add_algorithm(this, ENCRYPTION_ALGORITHM, ENCR_BLOWFISH, 192);
432 }
433 else if (strncmp(alg.ptr, "blowfish256", alg.len) == 0)
434 {
435 add_algorithm(this, ENCRYPTION_ALGORITHM, ENCR_BLOWFISH, 256);
436 }
437 else if (strncmp(alg.ptr, "sha", alg.len) == 0 ||
438 strncmp(alg.ptr, "sha1", alg.len) == 0)
439 {
440 /* sha means we use SHA for both, PRF and AUTH */
441 add_algorithm(this, INTEGRITY_ALGORITHM, AUTH_HMAC_SHA1_96, 0);
442 if (this->protocol == PROTO_IKE)
443 {
444 add_algorithm(this, PSEUDO_RANDOM_FUNCTION, PRF_HMAC_SHA1, 0);
445 }
446 }
447 else if (strncmp(alg.ptr, "sha256", alg.len) == 0)
448 {
449 add_algorithm(this, INTEGRITY_ALGORITHM, AUTH_HMAC_SHA2_256_128, 0);
450 if (this->protocol == PROTO_IKE)
451 {
452 add_algorithm(this, PSEUDO_RANDOM_FUNCTION, PRF_HMAC_SHA2_256, 0);
453 }
454 }
455 else if (strncmp(alg.ptr, "sha384", alg.len) == 0)
456 {
457 add_algorithm(this, INTEGRITY_ALGORITHM, AUTH_HMAC_SHA2_384_192, 0);
458 if (this->protocol == PROTO_IKE)
459 {
460 add_algorithm(this, PSEUDO_RANDOM_FUNCTION, PRF_HMAC_SHA2_384, 0);
461 }
462 }
463 else if (strncmp(alg.ptr, "sha512", alg.len) == 0)
464 {
465 add_algorithm(this, INTEGRITY_ALGORITHM, AUTH_HMAC_SHA2_512_256, 0);
466 if (this->protocol == PROTO_IKE)
467 {
468 add_algorithm(this, PSEUDO_RANDOM_FUNCTION, PRF_HMAC_SHA2_512, 0);
469 }
470 }
471 else if (strncmp(alg.ptr, "md5", alg.len) == 0)
472 {
473 add_algorithm(this, INTEGRITY_ALGORITHM, AUTH_HMAC_MD5_96, 0);
474 if (this->protocol == PROTO_IKE)
475 {
476 add_algorithm(this, PSEUDO_RANDOM_FUNCTION, PRF_HMAC_MD5, 0);
477 }
478 }
479 else if (strncmp(alg.ptr, "modp768", alg.len) == 0)
480 {
481 add_algorithm(this, DIFFIE_HELLMAN_GROUP, MODP_768_BIT, 0);
482 }
483 else if (strncmp(alg.ptr, "modp1024", alg.len) == 0)
484 {
485 add_algorithm(this, DIFFIE_HELLMAN_GROUP, MODP_1024_BIT, 0);
486 }
487 else if (strncmp(alg.ptr, "modp1536", alg.len) == 0)
488 {
489 add_algorithm(this, DIFFIE_HELLMAN_GROUP, MODP_1536_BIT, 0);
490 }
491 else if (strncmp(alg.ptr, "modp2048", alg.len) == 0)
492 {
493 add_algorithm(this, DIFFIE_HELLMAN_GROUP, MODP_2048_BIT, 0);
494 }
495 else if (strncmp(alg.ptr, "modp4096", alg.len) == 0)
496 {
497 add_algorithm(this, DIFFIE_HELLMAN_GROUP, MODP_4096_BIT, 0);
498 }
499 else if (strncmp(alg.ptr, "modp8192", alg.len) == 0)
500 {
501 add_algorithm(this, DIFFIE_HELLMAN_GROUP, MODP_8192_BIT, 0);
502 }
503 else
504 {
505 return FAILED;
506 }
507 return SUCCESS;
508 }
509
510 /**
511 * Implements proposal_t.destroy.
512 */
513 static void destroy(private_proposal_t *this)
514 {
515 this->encryption_algos->destroy_function(this->encryption_algos, free);
516 this->integrity_algos->destroy_function(this->integrity_algos, free);
517 this->prf_algos->destroy_function(this->prf_algos, free);
518 this->dh_groups->destroy_function(this->dh_groups, free);
519 this->esns->destroy_function(this->esns, free);
520 free(this);
521 }
522
523 /*
524 * Describtion in header-file
525 */
526 proposal_t *proposal_create(protocol_id_t protocol)
527 {
528 private_proposal_t *this = malloc_thing(private_proposal_t);
529
530 this->public.add_algorithm = (void (*)(proposal_t*,transform_type_t,u_int16_t,size_t))add_algorithm;
531 this->public.create_algorithm_iterator = (iterator_t* (*)(proposal_t*,transform_type_t))create_algorithm_iterator;
532 this->public.get_algorithm = (bool (*)(proposal_t*,transform_type_t,algorithm_t**))get_algorithm;
533 this->public.select = (proposal_t* (*)(proposal_t*,proposal_t*))select_proposal;
534 this->public.get_protocol = (protocol_id_t(*)(proposal_t*))get_protocol;
535 this->public.set_spi = (void(*)(proposal_t*,u_int64_t))set_spi;
536 this->public.get_spi = (u_int64_t(*)(proposal_t*))get_spi;
537 this->public.clone = (proposal_t*(*)(proposal_t*))clone_;
538 this->public.destroy = (void(*)(proposal_t*))destroy;
539
540 this->spi = 0;
541 this->protocol = protocol;
542
543 this->encryption_algos = linked_list_create();
544 this->integrity_algos = linked_list_create();
545 this->prf_algos = linked_list_create();
546 this->dh_groups = linked_list_create();
547 this->esns = linked_list_create();
548
549 return &this->public;
550 }
551
552 /*
553 * Describtion in header-file
554 */
555 proposal_t *proposal_create_default(protocol_id_t protocol)
556 {
557 private_proposal_t *this = (private_proposal_t*)proposal_create(protocol);
558
559 switch (protocol)
560 {
561 case PROTO_IKE:
562 add_algorithm(this, ENCRYPTION_ALGORITHM, ENCR_AES_CBC, 128);
563 add_algorithm(this, ENCRYPTION_ALGORITHM, ENCR_AES_CBC, 192);
564 add_algorithm(this, ENCRYPTION_ALGORITHM, ENCR_AES_CBC, 256);
565 add_algorithm(this, ENCRYPTION_ALGORITHM, ENCR_3DES, 0);
566 add_algorithm(this, INTEGRITY_ALGORITHM, AUTH_HMAC_SHA2_256_128, 0);
567 add_algorithm(this, INTEGRITY_ALGORITHM, AUTH_HMAC_SHA1_96, 0);
568 add_algorithm(this, INTEGRITY_ALGORITHM, AUTH_HMAC_MD5_96, 0);
569 add_algorithm(this, INTEGRITY_ALGORITHM, AUTH_HMAC_SHA2_384_192, 0);
570 add_algorithm(this, INTEGRITY_ALGORITHM, AUTH_HMAC_SHA2_512_256, 0);
571 add_algorithm(this, PSEUDO_RANDOM_FUNCTION, PRF_HMAC_SHA2_256, 0);
572 add_algorithm(this, PSEUDO_RANDOM_FUNCTION, PRF_HMAC_SHA1, 0);
573 add_algorithm(this, PSEUDO_RANDOM_FUNCTION, PRF_HMAC_MD5, 0);
574 add_algorithm(this, PSEUDO_RANDOM_FUNCTION, PRF_HMAC_SHA2_384, 0);
575 add_algorithm(this, PSEUDO_RANDOM_FUNCTION, PRF_HMAC_SHA2_512, 0);
576 add_algorithm(this, DIFFIE_HELLMAN_GROUP, MODP_2048_BIT, 0);
577 add_algorithm(this, DIFFIE_HELLMAN_GROUP, MODP_1536_BIT, 0);
578 add_algorithm(this, DIFFIE_HELLMAN_GROUP, MODP_1024_BIT, 0);
579 add_algorithm(this, DIFFIE_HELLMAN_GROUP, MODP_4096_BIT, 0);
580 add_algorithm(this, DIFFIE_HELLMAN_GROUP, MODP_8192_BIT, 0);
581 break;
582 case PROTO_ESP:
583 add_algorithm(this, ENCRYPTION_ALGORITHM, ENCR_AES_CBC, 128);
584 add_algorithm(this, ENCRYPTION_ALGORITHM, ENCR_AES_CBC, 192);
585 add_algorithm(this, ENCRYPTION_ALGORITHM, ENCR_AES_CBC, 256);
586 add_algorithm(this, ENCRYPTION_ALGORITHM, ENCR_3DES, 0);
587 add_algorithm(this, ENCRYPTION_ALGORITHM, ENCR_BLOWFISH, 256);
588 add_algorithm(this, INTEGRITY_ALGORITHM, AUTH_HMAC_SHA1_96, 0);
589 add_algorithm(this, INTEGRITY_ALGORITHM, AUTH_HMAC_MD5_96, 0);
590 add_algorithm(this, EXTENDED_SEQUENCE_NUMBERS, NO_EXT_SEQ_NUMBERS, 0);
591 break;
592 case PROTO_AH:
593 add_algorithm(this, INTEGRITY_ALGORITHM, AUTH_HMAC_SHA1_96, 0);
594 add_algorithm(this, INTEGRITY_ALGORITHM, AUTH_HMAC_MD5_96, 0);
595 add_algorithm(this, EXTENDED_SEQUENCE_NUMBERS, NO_EXT_SEQ_NUMBERS, 0);
596 break;
597 default:
598 break;
599 }
600
601 return &this->public;
602 }
603
604 /*
605 * Describtion in header-file
606 */
607 proposal_t *proposal_create_from_string(protocol_id_t protocol, const char *algs)
608 {
609 private_proposal_t *this = (private_proposal_t*)proposal_create(protocol);
610 chunk_t string = {(void*)algs, strlen(algs)};
611 chunk_t alg;
612 status_t status = SUCCESS;
613
614 eat_whitespace(&string);
615 if (string.len < 1)
616 {
617 destroy(this);
618 return NULL;
619 }
620
621 /* get all tokens, separated by '-' */
622 while (extract_token(&alg, '-', &string))
623 {
624 status |= add_string_algo(this, alg);
625 }
626 if (string.len)
627 {
628 status |= add_string_algo(this, string);
629 }
630 if (status != SUCCESS)
631 {
632 destroy(this);
633 return NULL;
634 }
635
636 if (protocol == PROTO_AH || protocol == PROTO_ESP)
637 {
638 add_algorithm(this, EXTENDED_SEQUENCE_NUMBERS, NO_EXT_SEQ_NUMBERS, 0);
639 }
640 return &this->public;
641 }