Home | History | Annotate | Download | only in Protocol
      1 /** @file
      2   EFI IPsec Configuration Protocol Definition
      3   The EFI_IPSEC_CONFIG_PROTOCOL provides the mechanism to set and retrieve security and
      4   policy related information for the EFI IPsec protocol driver.
      5 
      6   Copyright (c) 2009 - 2011, Intel Corporation. All rights reserved.<BR>
      7   This program and the accompanying materials
      8   are licensed and made available under the terms and conditions of the BSD License
      9   which accompanies this distribution.  The full text of the license may be found at
     10   http://opensource.org/licenses/bsd-license.php
     11 
     12   THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
     13   WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
     14 
     15   @par Revision Reference:
     16   This Protocol is introduced in UEFI Specification 2.2
     17 
     18 **/
     19 
     20 #ifndef __EFI_IPSE_CCONFIG_PROTOCOL_H__
     21 #define __EFI_IPSE_CCONFIG_PROTOCOL_H__
     22 
     23 
     24 #define EFI_IPSEC_CONFIG_PROTOCOL_GUID \
     25   { \
     26     0xce5e5929, 0xc7a3, 0x4602, {0xad, 0x9e, 0xc9, 0xda, 0xf9, 0x4e, 0xbf, 0xcf } \
     27   }
     28 
     29 typedef struct _EFI_IPSEC_CONFIG_PROTOCOL EFI_IPSEC_CONFIG_PROTOCOL;
     30 
     31 ///
     32 /// EFI_IPSEC_CONFIG_DATA_TYPE
     33 ///
     34 typedef enum {
     35   ///
     36   /// The IPsec Security Policy Database (aka SPD) setting.  In IPsec,
     37   /// an essential element of Security Association (SA) processing is
     38   /// underlying SPD that specifies what services are to be offered to
     39   /// IP datagram and in what fashion. The SPD must be consulted
     40   /// during the processing of all traffic (inbound and outbound),
     41   /// including traffic not protected by IPsec, that traverses the IPsec
     42   /// boundary. With this DataType, SetData() function is to set
     43   /// the SPD entry information, which may add one new entry, delete
     44   /// one existed entry or flush the whole database according to the
     45   /// parameter values. The corresponding Data is of type
     46   /// EFI_IPSEC_SPD_DATA
     47   ///
     48   IPsecConfigDataTypeSpd,
     49   ///
     50   /// The IPsec Security Association Database (aka SAD) setting. A
     51   /// SA is a simplex connection that affords security services to the
     52   /// traffic carried by it. Security services are afforded to an SA by the
     53   /// use of AH, or ESP, but not both. The corresponding Data is of
     54   /// type EFI_IPSEC_SAD_DATA.
     55   ///
     56   IPsecConfigDataTypeSad,
     57   ///
     58   /// The IPsec Peer Authorization Database (aka PAD) setting, which
     59   /// provides the link between the SPD and a security association
     60   /// management protocol. The PAD entry specifies the
     61   /// authentication protocol (e.g. IKEv1, IKEv2) method used and the
     62   /// authentication data. The corresponding Data is of type
     63   /// EFI_IPSEC_PAD_DATA.
     64   ///
     65   IPsecConfigDataTypePad,
     66   IPsecConfigDataTypeMaximum
     67 } EFI_IPSEC_CONFIG_DATA_TYPE;
     68 
     69 ///
     70 /// EFI_IP_ADDRESS_INFO
     71 ///
     72 typedef struct _EFI_IP_ADDRESS_INFO {
     73   EFI_IP_ADDRESS  Address;      ///< The IPv4 or IPv6 address
     74   UINT8           PrefixLength; ///< The length of the prefix associated with the Address.
     75 } EFI_IP_ADDRESS_INFO;
     76 
     77 
     78 ///
     79 /// EFI_IPSEC_SPD_SELECTOR
     80 ///
     81 typedef struct _EFI_IPSEC_SPD_SELECTOR {
     82   ///
     83   /// Specifies the actual number of entries in LocalAddress.
     84   ///
     85   UINT32                          LocalAddressCount;
     86   ///
     87   /// A list of ranges of IPv4 or IPv6 addresses, which refers to the
     88   /// addresses being protected by IPsec policy.
     89   ///
     90   EFI_IP_ADDRESS_INFO             *LocalAddress;
     91   ///
     92   /// Specifies the actual number of entries in RemoteAddress.
     93   ///
     94   UINT32                          RemoteAddressCount;
     95   ///
     96   /// A list of ranges of IPv4 or IPv6 addresses, which are peer entities
     97   /// to LocalAddress.
     98   ///
     99   EFI_IP_ADDRESS_INFO             *RemoteAddress;
    100   ///
    101   /// Next layer protocol. Obtained from the IPv4 Protocol or the IPv6
    102   /// Next Header fields. The next layer protocol is whatever comes
    103   /// after any IP extension headers that are present. A zero value is a
    104   /// wildcard that matches any value in NextLayerProtocol field.
    105   ///
    106   UINT16                          NextLayerProtocol;
    107   ///
    108   /// Local Port if the Next Layer Protocol uses two ports (as do TCP,
    109   /// UDP, and others). A zero value is a wildcard that matches any
    110   /// value in LocalPort field.
    111   ///
    112   UINT16                          LocalPort;
    113   ///
    114   /// A designed port range size. The start port is LocalPort, and
    115   /// the total number of ports is described by LocalPortRange.
    116   /// This field is ignored if NextLayerProtocol does not use
    117   /// ports.
    118   ///
    119   UINT16                          LocalPortRange;
    120   ///
    121   /// Remote Port if the Next Layer Protocol uses two ports. A zero
    122   /// value is a wildcard that matches any value in RemotePort field.
    123   ///
    124   UINT16                          RemotePort;
    125   ///
    126   /// A designed port range size. The start port is RemotePort, and
    127   /// the total number of ports is described by RemotePortRange.
    128   /// This field is ignored if NextLayerProtocol does not use ports.
    129   ///
    130   UINT16                          RemotePortRange;
    131 } EFI_IPSEC_SPD_SELECTOR;
    132 
    133 ///
    134 /// EFI_IPSEC_TRAFFIC_DIR
    135 /// represents the directionality in an SPD entry.
    136 ///
    137 typedef enum {
    138   ///
    139   /// The EfiIPsecInBound refers to traffic entering an IPsec implementation via
    140   /// the unprotected interface or emitted by the implementation on the unprotected
    141   /// side of the boundary and directed towards the protected interface.
    142   ///
    143   EfiIPsecInBound,
    144   ///
    145   /// The EfiIPsecOutBound refers to traffic entering the implementation via
    146   /// the protected interface, or emitted by the implementation on the protected side
    147   /// of the boundary and directed toward the unprotected interface.
    148   ///
    149   EfiIPsecOutBound
    150 } EFI_IPSEC_TRAFFIC_DIR;
    151 
    152 ///
    153 /// EFI_IPSEC_ACTION
    154 /// represents three possible processing choices.
    155 ///
    156 typedef enum {
    157   ///
    158   /// Refers to traffic that is not allowed to traverse the IPsec boundary.
    159   ///
    160   EfiIPsecActionDiscard,
    161   ///
    162   /// Refers to traffic that is allowed to cross the IPsec boundary
    163   /// without protection.
    164   ///
    165   EfiIPsecActionBypass,
    166   ///
    167   /// Refers to traffic that is afforded IPsec protection, and for such
    168   /// traffic the SPD must specify the security protocols to be
    169   /// employed, their mode, security service options, and the
    170   /// cryptographic algorithms to be used.
    171   ///
    172   EfiIPsecActionProtect
    173 } EFI_IPSEC_ACTION;
    174 
    175 ///
    176 /// EFI_IPSEC_SA_LIFETIME
    177 /// defines the lifetime of an SA, which represents when a SA must be
    178 /// replaced or terminated. A value of all 0 for each field removes
    179 /// the limitation of a SA lifetime.
    180 ///
    181 typedef struct _EFI_IPSEC_SA_LIFETIME {
    182   ///
    183   /// The number of bytes to which the IPsec cryptographic algorithm
    184   /// can be applied. For ESP, this is the encryption algorithm and for
    185   /// AH, this is the authentication algorithm. The ByteCount
    186   /// includes pad bytes for cryptographic operations.
    187   ///
    188   UINT64        ByteCount;
    189   ///
    190   /// A time interval in second that warns the implementation to
    191   /// initiate action such as setting up a replacement SA.
    192   ///
    193   UINT64        SoftLifetime;
    194   ///
    195   /// A time interval in second when the current SA ends and is
    196   /// destroyed.
    197   ///
    198   UINT64        HardLifetime;
    199 } EFI_IPSEC_SA_LIFETIME;
    200 
    201 ///
    202 /// EFI_IPSEC_MODE
    203 /// There are two modes of IPsec operation: transport mode and tunnel mode. In
    204 /// EfiIPsecTransport mode, AH and ESP provide protection primarily for next layer protocols;
    205 /// In EfiIPsecTunnel mode, AH and ESP are applied to tunneled IP packets.
    206 ///
    207 typedef enum {
    208   EfiIPsecTransport,
    209   EfiIPsecTunnel
    210 } EFI_IPSEC_MODE;
    211 
    212 ///
    213 /// EFI_IPSEC_TUNNEL_DF_OPTION
    214 /// The option of copying the DF bit from an outbound package to
    215 /// the tunnel mode header that it emits, when traffic is carried
    216 /// via a tunnel mode SA. This applies to SAs where both inner and
    217 /// outer headers are IPv4.
    218 ///
    219 typedef enum {
    220   EfiIPsecTunnelClearDf,  ///< Clear DF bit from inner header.
    221   EfiIPsecTunnelSetDf,    ///< Set DF bit from inner header.
    222   EfiIPsecTunnelCopyDf    ///< Copy DF bit from inner header.
    223 } EFI_IPSEC_TUNNEL_DF_OPTION;
    224 
    225 ///
    226 /// EFI_IPSEC_TUNNEL_OPTION
    227 ///
    228 typedef struct _EFI_IPSEC_TUNNEL_OPTION {
    229   ///
    230   /// Local tunnel address when IPsec mode is EfiIPsecTunnel.
    231   ///
    232   EFI_IP_ADDRESS              LocalTunnelAddress;
    233   ///
    234   /// Remote tunnel address when IPsec mode is EfiIPsecTunnel.
    235   ///
    236   EFI_IP_ADDRESS              RemoteTunnelAddress;
    237   ///
    238   /// The option of copying the DF bit from an outbound package
    239   /// to the tunnel mode header that it emits, when traffic is
    240   /// carried via a tunnel mode SA.
    241   ///
    242   EFI_IPSEC_TUNNEL_DF_OPTION  DF;
    243 } EFI_IPSEC_TUNNEL_OPTION;
    244 
    245 ///
    246 /// EFI_IPSEC_PROTOCOL_TYPE
    247 ///
    248 typedef enum {
    249   EfiIPsecAH,  ///< IP Authentication Header protocol which is specified in RFC 4302.
    250   EfiIPsecESP  ///< IP Encapsulating Security Payload which is specified in RFC 4303.
    251 } EFI_IPSEC_PROTOCOL_TYPE;
    252 
    253 ///
    254 /// EFI_IPSEC_PROCESS_POLICY
    255 /// describes a policy list for traffic processing.
    256 ///
    257 typedef struct _EFI_IPSEC_PROCESS_POLICY {
    258   ///
    259   /// Extended Sequence Number. Is this SA using extended sequence
    260   /// numbers. 64 bit counter is used if TRUE.
    261   ///
    262   BOOLEAN                 ExtSeqNum;
    263   ///
    264   /// A flag indicating whether overflow of the sequence number
    265   /// counter should generate an auditable event and prevent
    266   /// transmission of additional packets on the SA, or whether rollover
    267   /// is permitted.
    268   ///
    269   BOOLEAN                 SeqOverflow;
    270   ///
    271   /// Is this SA using stateful fragment checking. TRUE represents
    272   /// stateful fragment checking.
    273   ///
    274   BOOLEAN                 FragCheck;
    275   ///
    276   /// A time interval after which a SA must be replaced with a new SA
    277   /// (and new SPI) or terminated.
    278   ///
    279   EFI_IPSEC_SA_LIFETIME   SaLifetime;
    280   ///
    281   /// IPsec mode: tunnel or transport.
    282   ///
    283   EFI_IPSEC_MODE          Mode;
    284   ///
    285   /// Tunnel Option. TunnelOption is ignored if Mode is EfiIPsecTransport.
    286   ///
    287   EFI_IPSEC_TUNNEL_OPTION *TunnelOption;
    288   ///
    289   /// IPsec protocol: AH or ESP
    290   ///
    291   EFI_IPSEC_PROTOCOL_TYPE Proto;
    292   ///
    293   /// Cryptographic algorithm type used for authentication.
    294   ///
    295   UINT8                   AuthAlgoId;
    296   ///
    297   /// Cryptographic algorithm type used for encryption. EncAlgo is
    298   /// NULL when IPsec protocol is AH. For ESP protocol, EncAlgo
    299   /// can also be used to describe the algorithm if a combined mode
    300   /// algorithm is used.
    301   ///
    302   UINT8                   EncAlgoId;
    303 } EFI_IPSEC_PROCESS_POLICY;
    304 
    305 ///
    306 /// EFI_IPSEC_SA_ID
    307 /// A triplet to identify an SA, consisting of the following members.
    308 ///
    309 typedef struct _EFI_IPSEC_SA_ID {
    310   ///
    311   /// Security Parameter Index (aka SPI).  An arbitrary 32-bit value
    312   /// that is used by a receiver to identity the SA to which an incoming
    313   /// package should be bound.
    314   ///
    315   UINT32                          Spi;
    316   ///
    317   /// IPsec protocol: AH or ESP
    318   ///
    319   EFI_IPSEC_PROTOCOL_TYPE         Proto;
    320   ///
    321   /// Destination IP address.
    322   ///
    323   EFI_IP_ADDRESS                  DestAddress;
    324 } EFI_IPSEC_SA_ID;
    325 
    326 
    327 #define MAX_PEERID_LEN     128
    328 
    329 ///
    330 /// EFI_IPSEC_SPD_DATA
    331 ///
    332 typedef struct _EFI_IPSEC_SPD_DATA {
    333   ///
    334   /// A null-terminated ASCII name string which is used as a symbolic
    335   /// identifier for an IPsec Local or Remote address.
    336   ///
    337   UINT8                           Name[MAX_PEERID_LEN];
    338   ///
    339   /// Bit-mapped list describing Populate from Packet flags. When
    340   /// creating a SA, if PackageFlag bit is set to TRUE, instantiate
    341   /// the selector from the corresponding field in the package that
    342   /// triggered the creation of the SA, else from the value(s) in the
    343   /// corresponding SPD entry. The PackageFlag bit setting for
    344   /// corresponding selector field of EFI_IPSEC_SPD_SELECTOR:
    345   ///     Bit 0: EFI_IPSEC_SPD_SELECTOR.LocalAddress
    346   ///     Bit 1: EFI_IPSEC_SPD_SELECTOR.RemoteAddress
    347   ///     Bit 2:
    348   /// EFI_IPSEC_SPD_SELECTOR.NextLayerProtocol
    349   ///     Bit 3: EFI_IPSEC_SPD_SELECTOR.LocalPort
    350   ///     Bit 4: EFI_IPSEC_SPD_SELECTOR.RemotePort
    351   ///     Others: Reserved.
    352   ///
    353   UINT32                          PackageFlag;
    354   ///
    355   /// The traffic direction of data gram.
    356   ///
    357   EFI_IPSEC_TRAFFIC_DIR           TrafficDirection;
    358   ///
    359   /// Processing choices to indicate which action is required by this
    360   /// policy.
    361   ///
    362   EFI_IPSEC_ACTION                Action;
    363   ///
    364   /// The policy and rule information for a SPD entry.
    365   ///
    366   EFI_IPSEC_PROCESS_POLICY        *ProcessingPolicy;
    367   ///
    368   /// Specifies the actual number of entries in SaId list.
    369   ///
    370   UINTN                           SaIdCount;
    371   ///
    372   /// The SAD entry used for the traffic processing. The
    373   /// existed SAD entry links indicate this is the manual key case.
    374   ///
    375   EFI_IPSEC_SA_ID                 SaId[1];
    376 } EFI_IPSEC_SPD_DATA;
    377 
    378 ///
    379 /// EFI_IPSEC_AH_ALGO_INFO
    380 /// The security algorithm selection for IPsec AH authentication.
    381 /// The required authentication algorithm is specified in RFC 4305.
    382 ///
    383 typedef struct _EFI_IPSEC_AH_ALGO_INFO {
    384   UINT8                           AuthAlgoId;
    385   UINTN                           AuthKeyLength;
    386   VOID                            *AuthKey;
    387 } EFI_IPSEC_AH_ALGO_INFO;
    388 
    389 ///
    390 /// EFI_IPSEC_ESP_ALGO_INFO
    391 /// The security algorithm selection for IPsec ESP encryption and authentication.
    392 /// The required authentication algorithm is specified in RFC 4305.
    393 /// EncAlgoId fields can also specify an ESP combined mode algorithm
    394 /// (e.g. AES with CCM mode, specified in RFC 4309), which provides both
    395 /// confidentiality and authentication services.
    396 ///
    397 typedef struct _EFI_IPSEC_ESP_ALGO_INFO {
    398   UINT8                     EncAlgoId;
    399   UINTN                     EncKeyLength;
    400   VOID                      *EncKey;
    401   UINT8                     AuthAlgoId;
    402   UINTN                     AuthKeyLength;
    403   VOID                      *AuthKey;
    404 } EFI_IPSEC_ESP_ALGO_INFO;
    405 
    406 ///
    407 /// EFI_IPSEC_ALGO_INFO
    408 ///
    409 typedef union {
    410   EFI_IPSEC_AH_ALGO_INFO          AhAlgoInfo;
    411   EFI_IPSEC_ESP_ALGO_INFO         EspAlgoInfo;
    412 } EFI_IPSEC_ALGO_INFO;
    413 
    414 ///
    415 /// EFI_IPSEC_SA_DATA
    416 ///
    417 typedef struct _EFI_IPSEC_SA_DATA {
    418   ///
    419   /// IPsec mode: tunnel or transport.
    420   ///
    421   EFI_IPSEC_MODE                  Mode;
    422   ///
    423   /// Sequence Number Counter. A 64-bit counter used to generate the
    424   /// sequence number field in AH or ESP headers.
    425   ///
    426   UINT64                          SNCount;
    427   ///
    428   /// Anti-Replay Window. A 64-bit counter and a bit-map used to
    429   /// determine whether an inbound AH or ESP packet is a replay.
    430   ///
    431   UINT8                           AntiReplayWindows;
    432   ///
    433   /// AH/ESP cryptographic algorithm, key and parameters.
    434   ///
    435   EFI_IPSEC_ALGO_INFO             AlgoInfo;
    436   ///
    437   /// Lifetime of this SA.
    438   ///
    439   EFI_IPSEC_SA_LIFETIME           SaLifetime;
    440   ///
    441   /// Any observed path MTU and aging variables. The Path MTU
    442   /// processing is defined in section 8 of RFC 4301.
    443   ///
    444   UINT32                          PathMTU;
    445   ///
    446   /// Link to one SPD entry.
    447   ///
    448   EFI_IPSEC_SPD_SELECTOR          *SpdSelector;
    449   ///
    450   /// Indication of whether it's manually set or negotiated automatically.
    451   /// If ManualSet is FALSE, the corresponding SA entry is inserted through
    452   /// IKE protocol negotiation.
    453   ///
    454   BOOLEAN                         ManualSet;
    455 } EFI_IPSEC_SA_DATA;
    456 
    457 ///
    458 /// EFI_IPSEC_SA_DATA2
    459 ///
    460 typedef struct _EFI_IPSEC_SA_DATA2 {
    461   ///
    462   /// IPsec mode: tunnel or transport
    463   ///
    464   EFI_IPSEC_MODE             Mode;
    465   ///
    466   /// Sequence Number Counter. A 64-bit counter used to generate the sequence
    467   /// number field in AH or ESP headers.
    468   ///
    469   UINT64                     SNCount;
    470   ///
    471   /// Anti-Replay Window. A 64-bit counter and a bit-map used to determine
    472   /// whether an inbound AH or ESP packet is a replay.
    473   ///
    474   UINT8                      AntiReplayWindows;
    475   ///
    476   /// AH/ESP cryptographic algorithm, key and parameters.
    477   ///
    478   EFI_IPSEC_ALGO_INFO        AlgoInfo;
    479   ///
    480   /// Lifetime of this SA.
    481   ///
    482   EFI_IPSEC_SA_LIFETIME      SaLifetime;
    483   ///
    484   /// Any observed path MTU and aging variables. The Path MTU processing is
    485   /// defined in section 8 of RFC 4301.
    486   ///
    487   UINT32                     PathMTU;
    488   ///
    489   /// Link to one SPD entry
    490   ///
    491   EFI_IPSEC_SPD_SELECTOR     *SpdSelector;
    492   ///
    493   /// Indication of whether it's manually set or negotiated automatically.
    494   /// If ManualSet is FALSE, the corresponding SA entry is inserted through IKE
    495   /// protocol negotiation
    496   ///
    497   BOOLEAN                    ManualSet;
    498   ///
    499   /// The tunnel header IP source address.
    500   ///
    501   EFI_IP_ADDRESS             TunnelSourceAddress;
    502   ///
    503   /// The tunnel header IP destination address.
    504   ///
    505   EFI_IP_ADDRESS             TunnelDestinationAddress;
    506 } EFI_IPSEC_SA_DATA2;
    507 
    508 
    509 ///
    510 /// EFI_IPSEC_PAD_ID
    511 /// specifies the identifier for PAD entry, which is also used for SPD lookup.
    512 /// IpAddress Pointer to the IPv4 or IPv6 address range.
    513 ///
    514 typedef struct _EFI_IPSEC_PAD_ID {
    515   ///
    516   /// Flag to identify which type of PAD Id is used.
    517   ///
    518   BOOLEAN               PeerIdValid;
    519   union {
    520     ///
    521     /// Pointer to the IPv4 or IPv6 address range.
    522     ///
    523     EFI_IP_ADDRESS_INFO   IpAddress;
    524     ///
    525     /// Pointer to a null terminated ASCII string
    526     /// representing the symbolic names. A PeerId can be a DNS
    527     /// name, Distinguished Name, RFC 822 email address or Key ID
    528     /// (specified in section 4.4.3.1 of RFC 4301)
    529     ///
    530     UINT8                 PeerId[MAX_PEERID_LEN];
    531   } Id;
    532 } EFI_IPSEC_PAD_ID;
    533 
    534 ///
    535 /// EFI_IPSEC_CONFIG_SELECTOR
    536 /// describes the expected IPsec configuration data selector
    537 /// of type EFI_IPSEC_CONFIG_DATA_TYPE.
    538 ///
    539 typedef union {
    540   EFI_IPSEC_SPD_SELECTOR              SpdSelector;
    541   EFI_IPSEC_SA_ID                     SaId;
    542   EFI_IPSEC_PAD_ID                    PadId;
    543 } EFI_IPSEC_CONFIG_SELECTOR;
    544 
    545 ///
    546 /// EFI_IPSEC_AUTH_PROTOCOL_TYPE
    547 /// defines the possible authentication protocol for IPsec
    548 /// security association management.
    549 ///
    550 typedef enum {
    551   EfiIPsecAuthProtocolIKEv1,
    552   EfiIPsecAuthProtocolIKEv2,
    553   EfiIPsecAuthProtocolMaximum
    554 } EFI_IPSEC_AUTH_PROTOCOL_TYPE;
    555 
    556 ///
    557 /// EFI_IPSEC_AUTH_METHOD
    558 ///
    559 typedef enum {
    560   ///
    561   /// Using Pre-shared Keys for manual security associations.
    562   ///
    563   EfiIPsecAuthMethodPreSharedSecret,
    564   ///
    565   /// IKE employs X.509 certificates for SA establishment.
    566   ///
    567   EfiIPsecAuthMethodCertificates,
    568   EfiIPsecAuthMethodMaximum
    569 } EFI_IPSEC_AUTH_METHOD;
    570 
    571 ///
    572 /// EFI_IPSEC_PAD_DATA
    573 ///
    574 typedef struct _EFI_IPSEC_PAD_DATA {
    575   ///
    576   /// Authentication Protocol for IPsec security association  management.
    577   ///
    578   EFI_IPSEC_AUTH_PROTOCOL_TYPE  AuthProtocol;
    579   ///
    580   /// Authentication method used.
    581   ///
    582   EFI_IPSEC_AUTH_METHOD         AuthMethod;
    583   ///
    584   /// The IKE ID payload will be used as a symbolic name for SPD
    585   /// lookup if IkeIdFlag is TRUE. Otherwise, the remote IP
    586   /// address provided in traffic selector playloads will be used.
    587   ///
    588   BOOLEAN                       IkeIdFlag;
    589   ///
    590   /// The size of Authentication data buffer, in bytes.
    591   ///
    592   UINTN                         AuthDataSize;
    593   ///
    594   /// Buffer for Authentication data, (e.g., the pre-shared secret or the
    595   /// trust anchor relative to which the peer's certificate will be
    596   /// validated).
    597   ///
    598   VOID                          *AuthData;
    599   ///
    600   /// The size of RevocationData, in bytes
    601   ///
    602   UINTN                         RevocationDataSize;
    603   ///
    604   /// Pointer to CRL or OCSP data, if certificates are used for
    605   /// authentication method.
    606   ///
    607   VOID                          *RevocationData;
    608 } EFI_IPSEC_PAD_DATA;
    609 
    610 
    611 /**
    612   Set the security association, security policy and peer authorization configuration
    613   information for the EFI IPsec driver.
    614 
    615   This function is used to set the IPsec configuration information of type DataType for
    616   the EFI IPsec driver.
    617   The IPsec configuration data has a unique selector/identifier separately to identify
    618   a data entry. The selector structure depends on DataType's definition.
    619   Using SetData() with a Data of NULL causes the IPsec configuration data entry identified
    620   by DataType and Selector to be deleted.
    621 
    622   @param[in] This               Pointer to the EFI_IPSEC_CONFIG_PROTOCOL instance.
    623   @param[in] DataType           The type of data to be set.
    624   @param[in] Selector           Pointer to an entry selector on operated configuration data
    625                                 specified by DataType. A NULL Selector causes the entire
    626                                 specified-type configuration information to be flushed.
    627   @param[in] Data               The data buffer to be set. The structure of the data buffer is
    628                                 associated with the DataType.
    629   @param[in] InsertBefore       Pointer to one entry selector which describes the expected
    630                                 position the new data entry will be added. If InsertBefore is NULL,
    631                                 the new entry will be appended the end of database.
    632 
    633   @retval EFI_SUCCESS           The specified configuration entry data is set successfully.
    634   @retval EFI_INVALID_PARAMETER One or more of the following are TRUE:
    635                                 - This is NULL.
    636   @retval EFI_UNSUPPORTED       The specified DataType is not supported.
    637   @retval EFI_OUT_OF_RESOURCED  The required system resource could not be allocated.
    638 
    639 **/
    640 typedef
    641 EFI_STATUS
    642 (EFIAPI *EFI_IPSEC_CONFIG_SET_DATA)(
    643   IN EFI_IPSEC_CONFIG_PROTOCOL        *This,
    644   IN EFI_IPSEC_CONFIG_DATA_TYPE       DataType,
    645   IN EFI_IPSEC_CONFIG_SELECTOR        *Selector,
    646   IN VOID                             *Data,
    647   IN EFI_IPSEC_CONFIG_SELECTOR        *InsertBefore   OPTIONAL
    648   );
    649 
    650 /**
    651   Return the configuration value for the EFI IPsec driver.
    652 
    653   This function lookup the data entry from IPsec database or IKEv2 configuration
    654   information. The expected data type and unique identification are described in
    655   DataType and Selector parameters.
    656 
    657   @param[in]      This          Pointer to the EFI_IPSEC_CONFIG_PROTOCOL instance.
    658   @param[in]      DataType      The type of data to retrieve.
    659   @param[in]      Selector      Pointer to an entry selector which is an identifier of the IPsec
    660                                 configuration data entry.
    661   @param[in, out] DataSize      On output the size of data returned in Data.
    662   @param[out]     Data          The buffer to return the contents of the IPsec configuration data.
    663                                 The type of the data buffer is associated with the DataType.
    664 
    665   @retval EFI_SUCCESS           The specified configuration data is got successfully.
    666   @retval EFI_INVALID_PARAMETER One or more of the followings are TRUE:
    667                                 - This is NULL.
    668                                 - Selector is NULL.
    669                                 - DataSize is NULL.
    670                                 - Data is NULL and *DataSize is not zero
    671   @retval EFI_NOT_FOUND         The configuration data specified by Selector is not found.
    672   @retval EFI_UNSUPPORTED       The specified DataType is not supported.
    673   @retval EFI_BUFFER_TOO_SMALL  The DataSize is too small for the result. DataSize has been
    674                                 updated with the size needed to complete the request.
    675 
    676 **/
    677 typedef
    678 EFI_STATUS
    679 (EFIAPI *EFI_IPSEC_CONFIG_GET_DATA)(
    680   IN EFI_IPSEC_CONFIG_PROTOCOL        *This,
    681   IN EFI_IPSEC_CONFIG_DATA_TYPE       DataType,
    682   IN EFI_IPSEC_CONFIG_SELECTOR        *Selector,
    683   IN OUT UINTN                        *DataSize,
    684   OUT VOID                            *Data
    685   );
    686 
    687 /**
    688   Enumerates the current selector for IPsec configuration data entry.
    689 
    690   This function is called multiple times to retrieve the entry Selector in IPsec
    691   configuration database. On each call to GetNextSelector(), the next entry
    692   Selector are retrieved into the output interface.
    693 
    694   If the entire IPsec configuration database has been iterated, the error
    695   EFI_NOT_FOUND is returned.
    696   If the Selector buffer is too small for the next Selector copy, an
    697   EFI_BUFFER_TOO_SMALL error is returned, and SelectorSize is updated to reflect
    698   the size of buffer needed.
    699 
    700   On the initial call to GetNextSelector() to start the IPsec configuration database
    701   search, a pointer to the buffer with all zero value is passed in Selector. Calls
    702   to SetData() between calls to GetNextSelector may produce unpredictable results.
    703 
    704   @param[in]      This          Pointer to the EFI_IPSEC_CONFIG_PROTOCOL instance.
    705   @param[in]      DataType      The type of IPsec configuration data to retrieve.
    706   @param[in, out] SelectorSize  The size of the Selector buffer.
    707   @param[in, out] Selector      On input, supplies the pointer to last Selector that was
    708                                 returned by GetNextSelector().
    709                                 On output, returns one copy of the current entry Selector
    710                                 of a given DataType.
    711 
    712   @retval EFI_SUCCESS           The specified configuration data is got successfully.
    713   @retval EFI_INVALID_PARAMETER One or more of the followings are TRUE:
    714                                 - This is NULL.
    715                                 - SelectorSize is NULL.
    716                                 - Selector is NULL.
    717   @retval EFI_NOT_FOUND         The next configuration data entry was not found.
    718   @retval EFI_UNSUPPORTED       The specified DataType is not supported.
    719   @retval EFI_BUFFER_TOO_SMALL  The SelectorSize is too small for the result. This parameter
    720                                 has been updated with the size needed to complete the search
    721                                 request.
    722 
    723 **/
    724 typedef
    725 EFI_STATUS
    726 (EFIAPI *EFI_IPSEC_CONFIG_GET_NEXT_SELECTOR)(
    727   IN EFI_IPSEC_CONFIG_PROTOCOL        *This,
    728   IN EFI_IPSEC_CONFIG_DATA_TYPE       DataType,
    729   IN OUT UINTN                        *SelectorSize,
    730   IN OUT EFI_IPSEC_CONFIG_SELECTOR    *Selector
    731   );
    732 
    733 /**
    734   Register an event that is to be signaled whenever a configuration process on the
    735   specified IPsec configuration information is done.
    736 
    737   This function registers an event that is to be signaled whenever a configuration
    738   process on the specified IPsec configuration data is done (e.g. IPsec security
    739   policy database configuration is ready). An event can be registered for different
    740   DataType simultaneously and the caller is responsible for determining which type
    741   of configuration data causes the signaling of the event in such case.
    742 
    743   @param[in] This               Pointer to the EFI_IPSEC_CONFIG_PROTOCOL instance.
    744   @param[in] DataType           The type of data to be registered the event for.
    745   @param[in] Event              The event to be registered.
    746 
    747   @retval EFI_SUCCESS           The event is registered successfully.
    748   @retval EFI_INVALID_PARAMETER This is NULL or Event is NULL.
    749   @retval EFI_ACCESS_DENIED     The Event is already registered for the DataType.
    750   @retval EFI_UNSUPPORTED       The notify registration unsupported or the specified
    751                                 DataType is not supported.
    752 
    753 **/
    754 typedef
    755 EFI_STATUS
    756 (EFIAPI *EFI_IPSEC_CONFIG_REGISTER_NOTIFY)(
    757   IN EFI_IPSEC_CONFIG_PROTOCOL        *This,
    758   IN EFI_IPSEC_CONFIG_DATA_TYPE       DataType,
    759   IN EFI_EVENT                        Event
    760   );
    761 
    762 /**
    763   Remove the specified event that is previously registered on the specified IPsec
    764   configuration data.
    765 
    766   This function removes a previously registered event for the specified configuration data.
    767 
    768   @param[in] This               Pointer to the EFI_IPSEC_CONFIG_PROTOCOL instance.
    769   @param[in] DataType           The configuration data type to remove the registered event for.
    770   @param[in] Event              The event to be unregistered.
    771 
    772   @retval EFI_SUCCESS           The event is removed successfully.
    773   @retval EFI_NOT_FOUND         The Event specified by DataType could not be found in the
    774                                 database.
    775   @retval EFI_INVALID_PARAMETER This is NULL or Event is NULL.
    776   @retval EFI_UNSUPPORTED       The notify registration unsupported or the specified
    777                                 DataType is not supported.
    778 
    779 **/
    780 typedef
    781 EFI_STATUS
    782 (EFIAPI *EFI_IPSEC_CONFIG_UNREGISTER_NOTIFY)(
    783   IN EFI_IPSEC_CONFIG_PROTOCOL        *This,
    784   IN EFI_IPSEC_CONFIG_DATA_TYPE       DataType,
    785   IN EFI_EVENT                        Event
    786   );
    787 
    788 ///
    789 /// EFI_IPSEC_CONFIG_PROTOCOL
    790 /// provides the ability to set and lookup the IPsec SAD (Security Association Database),
    791 /// SPD (Security Policy Database) data entry and configure the security association
    792 /// management protocol such as IKEv2. This protocol is used as the central
    793 /// repository of any policy-specific configuration for EFI IPsec driver.
    794 /// EFI_IPSEC_CONFIG_PROTOCOL can be bound to both IPv4 and IPv6 stack. User can use this
    795 /// protocol for IPsec configuration in both IPv4 and IPv6 environment.
    796 ///
    797 struct _EFI_IPSEC_CONFIG_PROTOCOL {
    798   EFI_IPSEC_CONFIG_SET_DATA           SetData;
    799   EFI_IPSEC_CONFIG_GET_DATA           GetData;
    800   EFI_IPSEC_CONFIG_GET_NEXT_SELECTOR  GetNextSelector;
    801   EFI_IPSEC_CONFIG_REGISTER_NOTIFY    RegisterDataNotify;
    802   EFI_IPSEC_CONFIG_UNREGISTER_NOTIFY  UnregisterDataNotify;
    803 };
    804 
    805 extern EFI_GUID gEfiIpSecConfigProtocolGuid;
    806 
    807 #endif
    808