starter: Parse authby as string.
[strongswan.git] / src / starter / confread.h
1 /* strongSwan IPsec config file parser
2 * Copyright (C) 2001-2002 Mathieu Lafon
3 * Arkoon Network Security
4 *
5 * This program is free software; you can redistribute it and/or modify it
6 * under the terms of the GNU General Public License as published by the
7 * Free Software Foundation; either version 2 of the License, or (at your
8 * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
9 *
10 * This program is distributed in the hope that it will be useful, but
11 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
12 * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
13 * for more details.
14 */
15
16 #ifndef _IPSEC_CONFREAD_H_
17 #define _IPSEC_CONFREAD_H_
18
19 #include <freeswan.h>
20 #include "../pluto/constants.h"
21
22 #include "ipsec-parser.h"
23
24 typedef enum {
25 STARTUP_NO,
26 STARTUP_ADD,
27 STARTUP_ROUTE,
28 STARTUP_START
29 } startup_t;
30
31 typedef enum {
32 STATE_IGNORE,
33 STATE_TO_ADD,
34 STATE_ADDED,
35 STATE_REPLACED,
36 STATE_INVALID
37 } starter_state_t;
38
39 typedef enum {
40 /* shared with ike_version_t */
41 KEY_EXCHANGE_IKE = 0,
42 KEY_EXCHANGE_IKEV1 = 1,
43 KEY_EXCHANGE_IKEV2 = 2,
44 } keyexchange_t;
45
46 typedef enum {
47 STRICT_NO,
48 STRICT_YES,
49 STRICT_IFURI
50 } strict_t;
51
52 typedef struct starter_end starter_end_t;
53
54 struct starter_end {
55 lset_t seen;
56 char *auth;
57 char *auth2;
58 char *id;
59 char *id2;
60 char *rsakey;
61 char *cert;
62 char *cert2;
63 char *ca;
64 char *ca2;
65 char *groups;
66 char *cert_policy;
67 char *iface;
68 char *host;
69 ip_address addr;
70 u_int ikeport;
71 ip_address nexthop;
72 char *subnet;
73 bool has_client;
74 bool has_client_wildcard;
75 bool has_port_wildcard;
76 bool has_natip;
77 bool has_virt;
78 bool modecfg;
79 certpolicy_t sendcert;
80 bool firewall;
81 bool hostaccess;
82 bool allow_any;
83 bool dns_failed;
84 char *updown;
85 u_int16_t port;
86 u_int8_t protocol;
87 char *sourceip;
88 int sourceip_mask;
89 };
90
91 typedef struct also also_t;
92
93 struct also {
94 char *name;
95 bool included;
96 also_t *next;
97 };
98
99 typedef struct starter_conn starter_conn_t;
100
101 struct starter_conn {
102 lset_t seen;
103 char *name;
104 also_t *also;
105 kw_list_t *kw;
106 u_int visit;
107 startup_t startup;
108 starter_state_t state;
109
110 keyexchange_t keyexchange;
111 char *eap_identity;
112 char *aaa_identity;
113 char *xauth_identity;
114 char *authby;
115 lset_t policy;
116 time_t sa_ike_life_seconds;
117 time_t sa_ipsec_life_seconds;
118 time_t sa_rekey_margin;
119 u_int64_t sa_ipsec_life_bytes;
120 u_int64_t sa_ipsec_margin_bytes;
121 u_int64_t sa_ipsec_life_packets;
122 u_int64_t sa_ipsec_margin_packets;
123 unsigned long sa_keying_tries;
124 unsigned long sa_rekey_fuzz;
125 u_int32_t reqid;
126 mark_t mark_in;
127 mark_t mark_out;
128 u_int32_t tfc;
129 sa_family_t addr_family;
130 sa_family_t tunnel_addr_family;
131 bool install_policy;
132 bool aggressive;
133 starter_end_t left, right;
134
135 unsigned long id;
136
137 char *esp;
138 char *ike;
139 char *pfsgroup;
140
141 time_t dpd_delay;
142 time_t dpd_timeout;
143 dpd_action_t dpd_action;
144 int dpd_count;
145
146 dpd_action_t close_action;
147
148 time_t inactivity;
149
150 bool me_mediation;
151 char *me_mediated_by;
152 char *me_peerid;
153
154 starter_conn_t *next;
155 };
156
157 typedef struct starter_ca starter_ca_t;
158
159 struct starter_ca {
160 lset_t seen;
161 char *name;
162 also_t *also;
163 kw_list_t *kw;
164 u_int visit;
165 startup_t startup;
166 starter_state_t state;
167
168 char *cacert;
169 char *ldaphost;
170 char *ldapbase;
171 char *crluri;
172 char *crluri2;
173 char *ocspuri;
174 char *ocspuri2;
175 char *certuribase;
176
177 bool strict;
178
179 starter_ca_t *next;
180 };
181
182 typedef struct starter_config starter_config_t;
183
184 struct starter_config {
185 struct {
186 lset_t seen;
187 char **interfaces;
188 char *dumpdir;
189 bool charonstart;
190 bool plutostart;
191
192 /* pluto/charon keywords */
193 char **plutodebug;
194 char *charondebug;
195 char *prepluto;
196 char *postpluto;
197 char *plutostderrlog;
198 bool uniqueids;
199 u_int overridemtu;
200 time_t crlcheckinterval;
201 bool cachecrls;
202 strict_t strictcrlpolicy;
203 bool nocrsend;
204 bool nat_traversal;
205 time_t keep_alive;
206 u_int force_keepalive;
207 char *virtual_private;
208 char *pkcs11module;
209 char *pkcs11initargs;
210 bool pkcs11keepstate;
211 bool pkcs11proxy;
212
213 /* KLIPS keywords */
214 char **klipsdebug;
215 bool fragicmp;
216 char *packetdefault;
217 bool hidetos;
218 } setup;
219
220 /* number of encountered parsing errors */
221 u_int err;
222 u_int non_fatal_err;
223
224 /* do we parse also statements */
225 bool parse_also;
226
227 /* ca %default */
228 starter_ca_t ca_default;
229
230 /* connections list (without %default) */
231 starter_ca_t *ca_first, *ca_last;
232
233 /* conn %default */
234 starter_conn_t conn_default;
235
236 /* connections list (without %default) */
237 starter_conn_t *conn_first, *conn_last;
238 };
239
240 extern starter_config_t *confread_load(const char *file);
241 extern void confread_free(starter_config_t *cfg);
242
243 #endif /* _IPSEC_CONFREAD_H_ */
244