apple: Redefine some additional clashing Mach types
[strongswan.git] / src / libcharon / sa / task.h
1 /*
2 * Copyright (C) 2007 Tobias Brunner
3 * Copyright (C) 2006 Martin Willi
4 * Hochschule fuer Technik Rapperswil
5 *
6 * This program is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the
8 * Free Software Foundation; either version 2 of the License, or (at your
9 * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
10 *
11 * This program is distributed in the hope that it will be useful, but
12 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
13 * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
14 * for more details.
15 */
16
17 /**
18 * @defgroup task task
19 * @{ @ingroup sa
20 */
21
22 #ifndef TASK_H_
23 #define TASK_H_
24
25 #include <utils/utils.h>
26
27 typedef enum task_type_t task_type_t;
28 typedef struct task_t task_t;
29
30 #include <library.h>
31 #include <sa/ike_sa.h>
32 #include <encoding/message.h>
33
34 /**
35 * Different kinds of tasks.
36 */
37 enum task_type_t {
38 /** establish an unauthenticated IKE_SA */
39 TASK_IKE_INIT,
40 /** detect NAT situation */
41 TASK_IKE_NATD,
42 /** handle MOBIKE stuff */
43 TASK_IKE_MOBIKE,
44 /** authenticate the initiated IKE_SA */
45 TASK_IKE_AUTH,
46 /** AUTH_LIFETIME negotiation, RFC4478 */
47 TASK_IKE_AUTH_LIFETIME,
48 /** certificate processing before authentication (certreqs, cert parsing) */
49 TASK_IKE_CERT_PRE,
50 /** certificate processing after authentication (certs payload generation) */
51 TASK_IKE_CERT_POST,
52 /** Configuration payloads, virtual IP and such */
53 TASK_IKE_CONFIG,
54 /** rekey an IKE_SA */
55 TASK_IKE_REKEY,
56 /** reestablish a complete IKE_SA */
57 TASK_IKE_REAUTH,
58 /** delete an IKE_SA */
59 TASK_IKE_DELETE,
60 /** liveness check */
61 TASK_IKE_DPD,
62 /** Vendor ID processing */
63 TASK_IKE_VENDOR,
64 #ifdef ME
65 /** handle ME stuff */
66 TASK_IKE_ME,
67 #endif /* ME */
68 /** establish a CHILD_SA within an IKE_SA */
69 TASK_CHILD_CREATE,
70 /** delete an established CHILD_SA */
71 TASK_CHILD_DELETE,
72 /** rekey a CHILD_SA */
73 TASK_CHILD_REKEY,
74 /** IKEv1 main mode */
75 TASK_MAIN_MODE,
76 /** IKEv1 aggressive mode */
77 TASK_AGGRESSIVE_MODE,
78 /** IKEv1 informational exchange */
79 TASK_INFORMATIONAL,
80 /** IKEv1 delete using an informational */
81 TASK_ISAKMP_DELETE,
82 /** IKEv1 XAUTH authentication */
83 TASK_XAUTH,
84 /** IKEv1 Mode Config */
85 TASK_MODE_CONFIG,
86 /** IKEv1 quick mode */
87 TASK_QUICK_MODE,
88 /** IKEv1 delete of a quick mode SA */
89 TASK_QUICK_DELETE,
90 /** IKEv1 vendor ID payload handling */
91 TASK_ISAKMP_VENDOR,
92 /** IKEv1 NAT detection */
93 TASK_ISAKMP_NATD,
94 /** IKEv1 DPD */
95 TASK_ISAKMP_DPD,
96 /** IKEv1 pre-authentication certificate handling */
97 TASK_ISAKMP_CERT_PRE,
98 /** IKEv1 post-authentication certificate handling */
99 TASK_ISAKMP_CERT_POST,
100 };
101
102 /**
103 * enum names for task_type_t.
104 */
105 extern enum_name_t *task_type_names;
106
107 /**
108 * Interface for a task, an operation handled within exchanges.
109 *
110 * A task is an elemantary operation. It may be handled by a single or by
111 * multiple exchanges. An exchange may even complete multiple tasks.
112 * A task has a build() and an process() operation. The build() operation
113 * creates payloads and adds it to the message. The process() operation
114 * inspects a message and handles its payloads. An initiator of an exchange
115 * first calls build() to build the request, and processes the response message
116 * with the process() method.
117 * A responder does the opposite; it calls process() first to handle an incoming
118 * request and secondly calls build() to build an appropriate response.
119 * Both methods return either SUCCESS, NEED_MORE or FAILED. A SUCCESS indicates
120 * that the task completed, even when the task completed unsuccessfully. The
121 * manager then removes the task from the list. A NEED_MORE is returned when
122 * the task needs further build()/process() calls to complete, the manager
123 * leaves the taks in the queue. A returned FAILED indicates a critical failure.
124 * The manager closes the IKE_SA whenever a task returns FAILED.
125 */
126 struct task_t {
127
128 /**
129 * Build a request or response message for this task.
130 *
131 * @param message message to add payloads to
132 * @return
133 * - FAILED if a critical error occurred
134 * - DESTROY_ME if IKE_SA has been properly deleted
135 * - NEED_MORE if another call to build/process needed
136 * - ALREADY_DONE to cancel task processing
137 * - SUCCESS if task completed
138 */
139 status_t (*build) (task_t *this, message_t *message);
140
141 /**
142 * Process a request or response message for this task.
143 *
144 * @param message message to read payloads from
145 * @return
146 * - FAILED if a critical error occurred
147 * - DESTROY_ME if IKE_SA has been properly deleted
148 * - NEED_MORE if another call to build/process needed
149 * - ALREADY_DONE to cancel task processing
150 * - SUCCESS if task completed
151 */
152 status_t (*process) (task_t *this, message_t *message);
153
154 /**
155 * Get the type of the task implementation.
156 */
157 task_type_t (*get_type) (task_t *this);
158
159 /**
160 * Migrate a task to a new IKE_SA.
161 *
162 * After migrating a task, it goes back to a state where it can be
163 * used again to initate an exchange. This is useful when a task
164 * has to get migrated to a new IKE_SA.
165 * A special usage is when a INVALID_KE_PAYLOAD is received. A call
166 * to reset resets the task, but uses another DH group for the next
167 * try.
168 * The ike_sa is the new IKE_SA this task belongs to and operates on.
169 *
170 * @param ike_sa new IKE_SA this task works for
171 */
172 void (*migrate) (task_t *this, ike_sa_t *ike_sa);
173
174 /**
175 * Destroys a task_t object.
176 */
177 void (*destroy) (task_t *this);
178 };
179
180 #endif /** TASK_H_ @}*/