2014-01-04 17:00:08 +04:00
|
|
|
// SoftEther VPN Source Code
|
|
|
|
// Cedar Communication Module
|
|
|
|
//
|
|
|
|
// SoftEther VPN Server, Client and Bridge are free software under GPLv2.
|
|
|
|
//
|
|
|
|
// Copyright (c) 2012-2014 Daiyuu Nobori.
|
|
|
|
// Copyright (c) 2012-2014 SoftEther VPN Project, University of Tsukuba, Japan.
|
|
|
|
// Copyright (c) 2012-2014 SoftEther Corporation.
|
|
|
|
//
|
|
|
|
// All Rights Reserved.
|
|
|
|
//
|
|
|
|
// http://www.softether.org/
|
|
|
|
//
|
|
|
|
// Author: Daiyuu Nobori
|
|
|
|
// Comments: Tetsuo Sugiyama, Ph.D.
|
|
|
|
//
|
|
|
|
// This program is free software; you can redistribute it and/or
|
|
|
|
// modify it under the terms of the GNU General Public License
|
|
|
|
// version 2 as published by the Free Software Foundation.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU General Public License version 2
|
|
|
|
// along with this program; if not, write to the Free Software
|
|
|
|
// Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
|
|
|
|
//
|
|
|
|
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
|
|
// EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
|
|
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
|
|
|
|
// IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
|
|
|
|
// CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
|
|
|
|
// TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
|
|
|
|
// SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
//
|
|
|
|
// THE LICENSE AGREEMENT IS ATTACHED ON THE SOURCE-CODE PACKAGE
|
|
|
|
// AS "LICENSE.TXT" FILE. READ THE TEXT FILE IN ADVANCE TO USE THE SOFTWARE.
|
|
|
|
//
|
|
|
|
//
|
|
|
|
// THIS SOFTWARE IS DEVELOPED IN JAPAN, AND DISTRIBUTED FROM JAPAN,
|
|
|
|
// UNDER JAPANESE LAWS. YOU MUST AGREE IN ADVANCE TO USE, COPY, MODIFY,
|
|
|
|
// MERGE, PUBLISH, DISTRIBUTE, SUBLICENSE, AND/OR SELL COPIES OF THIS
|
|
|
|
// SOFTWARE, THAT ANY JURIDICAL DISPUTES WHICH ARE CONCERNED TO THIS
|
|
|
|
// SOFTWARE OR ITS CONTENTS, AGAINST US (SOFTETHER PROJECT, SOFTETHER
|
|
|
|
// CORPORATION, DAIYUU NOBORI OR OTHER SUPPLIERS), OR ANY JURIDICAL
|
|
|
|
// DISPUTES AGAINST US WHICH ARE CAUSED BY ANY KIND OF USING, COPYING,
|
|
|
|
// MODIFYING, MERGING, PUBLISHING, DISTRIBUTING, SUBLICENSING, AND/OR
|
|
|
|
// SELLING COPIES OF THIS SOFTWARE SHALL BE REGARDED AS BE CONSTRUED AND
|
|
|
|
// CONTROLLED BY JAPANESE LAWS, AND YOU MUST FURTHER CONSENT TO
|
|
|
|
// EXCLUSIVE JURISDICTION AND VENUE IN THE COURTS SITTING IN TOKYO,
|
|
|
|
// JAPAN. YOU MUST WAIVE ALL DEFENSES OF LACK OF PERSONAL JURISDICTION
|
|
|
|
// AND FORUM NON CONVENIENS. PROCESS MAY BE SERVED ON EITHER PARTY IN
|
|
|
|
// THE MANNER AUTHORIZED BY APPLICABLE LAW OR COURT RULE.
|
|
|
|
//
|
|
|
|
// USE ONLY IN JAPAN. DO NOT USE IT IN OTHER COUNTRIES. IMPORTING THIS
|
|
|
|
// SOFTWARE INTO OTHER COUNTRIES IS AT YOUR OWN RISK. SOME COUNTRIES
|
|
|
|
// PROHIBIT ENCRYPTED COMMUNICATIONS. USING THIS SOFTWARE IN OTHER
|
|
|
|
// COUNTRIES MIGHT BE RESTRICTED.
|
|
|
|
//
|
|
|
|
//
|
2014-01-15 13:01:42 +04:00
|
|
|
// SOURCE CODE CONTRIBUTION
|
|
|
|
// ------------------------
|
|
|
|
//
|
|
|
|
// Your contribution to SoftEther VPN Project is much appreciated.
|
|
|
|
// Please send patches to us through GitHub.
|
|
|
|
// Read the SoftEther VPN Patch Acceptance Policy in advance:
|
|
|
|
// http://www.softether.org/5-download/src/9.patch
|
|
|
|
//
|
|
|
|
//
|
2014-01-04 17:00:08 +04:00
|
|
|
// DEAR SECURITY EXPERTS
|
|
|
|
// ---------------------
|
|
|
|
//
|
|
|
|
// If you find a bug or a security vulnerability please kindly inform us
|
|
|
|
// about the problem immediately so that we can fix the security problem
|
|
|
|
// to protect a lot of users around the world as soon as possible.
|
|
|
|
//
|
|
|
|
// Our e-mail address for security reports is:
|
|
|
|
// softether-vpn-security [at] softether.org
|
|
|
|
//
|
|
|
|
// Please note that the above e-mail address is not a technical support
|
|
|
|
// inquiry address. If you need technical assistance, please visit
|
|
|
|
// http://www.softether.org/ and ask your question on the users forum.
|
|
|
|
//
|
|
|
|
// Thank you for your cooperation.
|
2014-03-20 00:45:05 +04:00
|
|
|
//
|
|
|
|
//
|
|
|
|
// NO MEMORY OR RESOURCE LEAKS
|
|
|
|
// ---------------------------
|
|
|
|
//
|
|
|
|
// The memory-leaks and resource-leaks verification under the stress
|
|
|
|
// test has been passed before release this source code.
|
2014-01-04 17:00:08 +04:00
|
|
|
|
|
|
|
|
|
|
|
// IPsec_IkePacket.h
|
|
|
|
// Header of IPsec_IkePacket.c
|
|
|
|
|
|
|
|
#ifndef IPSEC_PACKET_H
|
|
|
|
#define IPSEC_PACKET_H
|
|
|
|
|
|
|
|
// Constants
|
|
|
|
#ifdef OS_WIN32
|
|
|
|
#pragma pack(push, 1)
|
|
|
|
#endif // OS_WIN32
|
|
|
|
|
|
|
|
// Maximum hash size
|
|
|
|
#define IKE_MAX_HASH_SIZE 20 // Size of SHA-1 is the maximum for now
|
|
|
|
|
|
|
|
// Maximum block size
|
|
|
|
#define IKE_MAX_BLOCK_SIZE 16 // Size of AES is maximum at the moment
|
|
|
|
|
|
|
|
// Maximum key size
|
|
|
|
#define IKE_MAX_KEY_SIZE 32 // Size of AES-256 is the maximum for now
|
|
|
|
|
|
|
|
// IKE version
|
|
|
|
#define IKE_VERSION 0x10 // 1.0
|
|
|
|
|
|
|
|
// IKE payload type
|
|
|
|
#define IKE_PAYLOAD_NONE 0 // No payload
|
|
|
|
#define IKE_PAYLOAD_SA 1 // SA payload
|
|
|
|
#define IKE_PAYLOAD_PROPOSAL 2 // Proposal payload
|
|
|
|
#define IKE_PAYLOAD_TRANSFORM 3 // Transform payload
|
|
|
|
#define IKE_PAYLOAD_KEY_EXCHANGE 4 // Key exchange payload
|
|
|
|
#define IKE_PAYLOAD_ID 5 // ID payload
|
|
|
|
#define IKE_PAYLOAD_CERT 6 // Certificate payload
|
|
|
|
#define IKE_PAYLOAD_CERT_REQUEST 7 // Certificate request payload
|
|
|
|
#define IKE_PAYLOAD_HASH 8 // Hash payload
|
|
|
|
#define IKE_PAYLOAD_SIGN 9 // Signature payload
|
|
|
|
#define IKE_PAYLOAD_RAND 10 // Random number payload
|
|
|
|
#define IKE_PAYLOAD_NOTICE 11 // Notification Payload
|
|
|
|
#define IKE_PAYLOAD_DELETE 12 // Deletion payload
|
|
|
|
#define IKE_PAYLOAD_VENDOR_ID 13 // Vendor ID payload
|
|
|
|
#define IKE_PAYLOAD_NAT_D 20 // NAT-D payload
|
|
|
|
#define IKE_PAYLOAD_NAT_OA 21 // NAT-OA payload
|
|
|
|
#define IKE_PAYLOAD_NAT_D_DRAFT 130 // NAT-D payload draft
|
|
|
|
#define IKE_PAYLOAD_NAT_OA_DRAFT 16 // NAT-OA payload draft
|
|
|
|
#define IKE_PAYLOAD_NAT_OA_DRAFT_2 131 // NAT-OA payload draft 2
|
|
|
|
|
|
|
|
// Macro to check whether the payload type is supported
|
|
|
|
#define IKE_IS_SUPPORTED_PAYLOAD_TYPE(i) ((((i) >= IKE_PAYLOAD_SA) && ((i) <= IKE_PAYLOAD_VENDOR_ID)) || ((i) == IKE_PAYLOAD_NAT_D) || ((i) == IKE_PAYLOAD_NAT_OA) || ((i) == IKE_PAYLOAD_NAT_OA_DRAFT) || ((i) == IKE_PAYLOAD_NAT_OA_DRAFT_2) || ((i) == IKE_PAYLOAD_NAT_D_DRAFT))
|
|
|
|
|
|
|
|
// IKE header flag
|
|
|
|
#define IKE_HEADER_FLAG_ENCRYPTED 1 // Encryption
|
|
|
|
#define IKE_HEADER_FLAG_COMMIT 2 // Commit
|
|
|
|
#define IKE_HEADER_FLAG_AUTH_ONLY 4 // Only authentication
|
|
|
|
|
|
|
|
// IKE payload common header
|
|
|
|
struct IKE_COMMON_HEADER
|
|
|
|
{
|
|
|
|
UCHAR NextPayload;
|
|
|
|
UCHAR Reserved;
|
|
|
|
USHORT PayloadSize;
|
|
|
|
} GCC_PACKED;
|
|
|
|
|
|
|
|
// IKE SA payload header
|
|
|
|
struct IKE_SA_HEADER
|
|
|
|
{
|
|
|
|
UINT DoI; // DOI value
|
|
|
|
UINT Situation; // Situation value
|
|
|
|
} GCC_PACKED;
|
|
|
|
|
|
|
|
// DOI value in the IKE SA payload
|
|
|
|
#define IKE_SA_DOI_IPSEC 1 // IPsec
|
|
|
|
|
|
|
|
// Situation value in the IKE SA payload
|
|
|
|
#define IKE_SA_SITUATION_IDENTITY 1 // Only authentication
|
|
|
|
|
|
|
|
// IKE proposal payload header
|
|
|
|
struct IKE_PROPOSAL_HEADER
|
|
|
|
{
|
|
|
|
UCHAR Number; // Number
|
|
|
|
UCHAR ProtocolId; // Protocol ID
|
|
|
|
UCHAR SpiSize; // Length of SPI
|
|
|
|
UCHAR NumTransforms; // Transform number
|
|
|
|
} GCC_PACKED;
|
|
|
|
|
|
|
|
// Protocol ID in the IKE proposal payload header
|
|
|
|
#define IKE_PROTOCOL_ID_IKE 1 // IKE
|
|
|
|
#define IKE_PROTOCOL_ID_IPSEC_AH 2 // AH
|
|
|
|
#define IKE_PROTOCOL_ID_IPSEC_ESP 3 // ESP
|
|
|
|
#define IKE_PROTOCOL_ID_IPV4 4 // IP
|
|
|
|
#define IKE_PROTOCOL_ID_IPV6 41 // IPv6
|
|
|
|
|
|
|
|
// IKE transform payload header
|
|
|
|
struct IKE_TRANSFORM_HEADER
|
|
|
|
{
|
|
|
|
UCHAR Number; // Number
|
|
|
|
UCHAR TransformId; // Transform ID
|
|
|
|
USHORT Reserved; // Reserved
|
|
|
|
} GCC_PACKED;
|
|
|
|
|
|
|
|
// Transform ID (Phase 1) in IKE transform payload header
|
|
|
|
#define IKE_TRANSFORM_ID_P1_KEY_IKE 1 // IKE
|
|
|
|
|
|
|
|
// Transform ID (Phase 2) in IKE transform payload header
|
|
|
|
#define IKE_TRANSFORM_ID_P2_ESP_DES 2 // DES-CBC
|
|
|
|
#define IKE_TRANSFORM_ID_P2_ESP_3DES 3 // 3DES-CBC
|
|
|
|
#define IKE_TRANSFORM_ID_P2_ESP_CAST 6 // CAST
|
|
|
|
#define IKE_TRANSFORM_ID_P2_ESP_BLOWFISH 7 // BLOWFISH
|
|
|
|
#define IKE_TRANSFORM_ID_P2_ESP_AES 12 // AES
|
|
|
|
|
|
|
|
// IKE transform value (fixed length)
|
|
|
|
struct IKE_TRANSFORM_VALUE
|
|
|
|
{
|
|
|
|
UCHAR AfBit; // AF bit (0: Fixed length, 1: Variable length)
|
|
|
|
UCHAR Type; // Type
|
|
|
|
USHORT Value; // Value data (16bit)
|
|
|
|
} GCC_PACKED;
|
|
|
|
|
|
|
|
// The Type value in IKE transform value (Phase 1)
|
|
|
|
#define IKE_TRANSFORM_VALUE_P1_CRYPTO 1 // Encryption algorithm
|
|
|
|
#define IKE_TRANSFORM_VALUE_P1_HASH 2 // Hash algorithm
|
|
|
|
#define IKE_TRANSFORM_VALUE_P1_AUTH_METHOD 3 // Authentication method
|
|
|
|
#define IKE_TRANSFORM_VALUE_P1_DH_GROUP 4 // DH group number
|
|
|
|
#define IKE_TRANSFORM_VALUE_P1_LIFE_TYPE 11 // Expiration date type
|
|
|
|
#define IKE_TRANSFORM_VALUE_P1_LIFE_VALUE 12 // Expiration date
|
|
|
|
#define IKE_TRANSFORM_VALUE_P1_KET_SIZE 14 // Key size
|
|
|
|
|
|
|
|
// The Type value in IKE transform values (Phase 2)
|
|
|
|
#define IKE_TRANSFORM_VALUE_P2_LIFE_TYPE 1 // Expiration date type
|
|
|
|
#define IKE_TRANSFORM_VALUE_P2_LIFE_VALUE 2 // Expiration date
|
|
|
|
#define IKE_TRANSFORM_VALUE_P2_DH_GROUP 3 // DH group number
|
|
|
|
#define IKE_TRANSFORM_VALUE_P2_CAPSULE 4 // Encapsulation mode
|
|
|
|
#define IKE_TRANSFORM_VALUE_P2_HMAC 5 // HMAC algorithm
|
|
|
|
#define IKE_TRANSFORM_VALUE_P2_KEY_SIZE 6 // Key size
|
|
|
|
|
|
|
|
// Phase 1: The encryption algorithm in the IKE transform value
|
|
|
|
#define IKE_P1_CRYPTO_DES_CBC 1
|
|
|
|
#define IKE_P1_CRYPTO_BLOWFISH 3
|
|
|
|
#define IKE_P1_CRYPTO_3DES_CBC 5
|
|
|
|
#define IKE_P1_CRYPTO_CAST_CBC 6
|
|
|
|
#define IKE_P1_CRYPTO_AES_CBC 7
|
|
|
|
|
|
|
|
// Phase 1: The hash algorithm in IKE transform value
|
|
|
|
#define IKE_P1_HASH_MD5 1
|
|
|
|
#define IKE_P1_HASH_SHA1 2
|
|
|
|
|
|
|
|
// Phase 1: The authentication method in the IKE transform value
|
|
|
|
#define IKE_P1_AUTH_METHOD_PRESHAREDKEY 1
|
|
|
|
#define IKE_P1_AUTH_METHOD_RSA_SIGN 3
|
|
|
|
|
|
|
|
// Phase 1: The DH group number in the IKE transform value
|
|
|
|
#define IKE_P1_DH_GROUP_768_MODP 1
|
|
|
|
#define IKE_P1_DH_GROUP_1024_MODP 2
|
|
|
|
#define IKE_P1_DH_GROUP_1536_MODP 5
|
|
|
|
|
|
|
|
// Phase 1: The expiration date type in IKE transform value
|
|
|
|
#define IKE_P1_LIFE_TYPE_SECONDS 1
|
|
|
|
#define IKE_P1_LIFE_TYPE_KILOBYTES 2
|
|
|
|
|
|
|
|
// Phase 2: The HMAC algorithm in IPsec transform value
|
|
|
|
#define IKE_P2_HMAC_MD5_96 1
|
|
|
|
#define IKE_P2_HMAC_SHA1_96 2
|
|
|
|
|
|
|
|
// Phase 2: The DH group number in the IPsec transform value
|
|
|
|
#define IKE_P2_DH_GROUP_768_MODP 1
|
|
|
|
#define IKE_P2_DH_GROUP_1024_MODP 2
|
|
|
|
#define IKE_P2_DH_GROUP_1536_MODP 5
|
|
|
|
|
|
|
|
// Phase 2: The encapsulation mode in IPsec transform value
|
|
|
|
#define IKE_P2_CAPSULE_TUNNEL 1
|
|
|
|
#define IKE_P2_CAPSULE_TRANSPORT 2
|
|
|
|
#define IKE_P2_CAPSULE_NAT_TUNNEL_1 3
|
|
|
|
#define IKE_P2_CAPSULE_NAT_TUNNEL_2 61443
|
|
|
|
#define IKE_P2_CAPSULE_NAT_TRANSPORT_1 4
|
|
|
|
#define IKE_P2_CAPSULE_NAT_TRANSPORT_2 61444
|
|
|
|
|
|
|
|
// Phase 2: The expiration date type in IPsec transform value
|
|
|
|
#define IKE_P2_LIFE_TYPE_SECONDS 1
|
|
|
|
#define IKE_P2_LIFE_TYPE_KILOBYTES 2
|
|
|
|
|
|
|
|
|
|
|
|
// IKE ID payload header
|
|
|
|
struct IKE_ID_HEADER
|
|
|
|
{
|
|
|
|
UCHAR IdType; // Type of ID
|
|
|
|
UCHAR ProtocolId; // Protocol ID
|
|
|
|
USHORT Port; // Port
|
|
|
|
} GCC_PACKED;
|
|
|
|
|
|
|
|
// Type of ID in the IKE ID payload header
|
|
|
|
#define IKE_ID_IPV4_ADDR 1 // IPv4 address (32 bit)
|
|
|
|
#define IKE_ID_FQDN 2 // FQDN
|
|
|
|
#define IKE_ID_USER_FQDN 3 // User FQDN
|
|
|
|
#define IKE_ID_IPV4_ADDR_SUBNET 4 // IPv4 + subnet (64 bit)
|
|
|
|
#define IKE_ID_IPV6_ADDR 5 // IPv6 address (128 bit)
|
|
|
|
#define IKE_ID_IPV6_ADDR_SUBNET 6 // IPv6 + subnet (256 bit)
|
|
|
|
#define IKE_ID_DER_ASN1_DN 9 // X.500 Distinguished Name
|
|
|
|
#define IKE_ID_DER_ASN1_GN 10 // X.500 General Name
|
|
|
|
#define IKE_ID_KEY_ID 11 // Key
|
|
|
|
|
|
|
|
// The protocol ID in the IKE ID payload
|
|
|
|
#define IKE_ID_PROTOCOL_UDP IP_PROTO_UDP // UDP
|
|
|
|
|
|
|
|
// IKE certificate payload header
|
|
|
|
struct IKE_CERT_HEADER
|
|
|
|
{
|
|
|
|
UCHAR CertType; // Certificate Type
|
|
|
|
} GCC_PACKED;
|
|
|
|
|
|
|
|
// The certificate type in IKE certificate payload header
|
|
|
|
#define IKE_CERT_TYPE_X509 4 // X.509 certificate (for digital signature)
|
|
|
|
|
|
|
|
// IKE certificate payload header
|
|
|
|
struct IKE_CERT_REQUEST_HEADER
|
|
|
|
{
|
|
|
|
UCHAR CertType; // Certificate Type
|
|
|
|
} GCC_PACKED;
|
|
|
|
|
|
|
|
// IKE notification payload header
|
|
|
|
struct IKE_NOTICE_HEADER
|
|
|
|
{
|
|
|
|
UINT DoI; // DOI value
|
|
|
|
UCHAR ProtocolId; // Protocol ID
|
|
|
|
// Same to the protocol ID in the IKE proposal payload header
|
|
|
|
UCHAR SpiSize; // SPI size
|
|
|
|
USHORT MessageType; // Message type
|
|
|
|
} GCC_PACKED;
|
|
|
|
|
|
|
|
// IKE Deletion payload header
|
|
|
|
struct IKE_DELETE_HEADER
|
|
|
|
{
|
|
|
|
UINT DoI; // DOI value
|
|
|
|
UCHAR ProtocolId; // Protocol ID
|
|
|
|
// Same to the protocol ID in the IKE proposal payload header
|
|
|
|
UCHAR SpiSize; // SPI size
|
|
|
|
USHORT NumSpis; // SPI number
|
|
|
|
} GCC_PACKED;
|
|
|
|
|
|
|
|
// IKE NAT-OA payload header
|
|
|
|
struct IKE_NAT_OA_HEADER
|
|
|
|
{
|
|
|
|
UCHAR IdType; // Type of ID
|
|
|
|
UCHAR Reserved1;
|
|
|
|
USHORT Reserved2;
|
|
|
|
} GCC_PACKED;
|
|
|
|
|
|
|
|
|
|
|
|
#ifdef OS_WIN32
|
|
|
|
#pragma pack(pop)
|
|
|
|
#endif // OS_WIN32
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
//
|
|
|
|
// IKE internal data structure
|
|
|
|
//
|
|
|
|
|
|
|
|
// IKE packet SA payload
|
|
|
|
struct IKE_PACKET_SA_PAYLOAD
|
|
|
|
{
|
|
|
|
LIST *PayloadList; // Proposal payload list
|
|
|
|
};
|
|
|
|
|
|
|
|
// IKE proposal packet payload
|
|
|
|
struct IKE_PACKET_PROPOSAL_PAYLOAD
|
|
|
|
{
|
|
|
|
UCHAR Number; // Number
|
|
|
|
UCHAR ProtocolId; // Protocol ID
|
|
|
|
BUF *Spi; // SPI data
|
|
|
|
|
|
|
|
LIST *PayloadList; // Payload list
|
|
|
|
};
|
|
|
|
|
|
|
|
// IKE packet transform payload
|
|
|
|
struct IKE_PACKET_TRANSFORM_PAYLOAD
|
|
|
|
{
|
|
|
|
UCHAR Number; // Number
|
|
|
|
UCHAR TransformId; // Transform ID
|
|
|
|
|
|
|
|
LIST *ValueList; // Value list
|
|
|
|
};
|
|
|
|
|
|
|
|
// IKE packet transform value
|
|
|
|
struct IKE_PACKET_TRANSFORM_VALUE
|
|
|
|
{
|
|
|
|
UCHAR Type; // Type
|
|
|
|
UINT Value; // Value
|
|
|
|
};
|
|
|
|
|
|
|
|
// IKE generic data payload
|
|
|
|
struct IKE_PACKET_DATA_PAYLOAD
|
|
|
|
{
|
|
|
|
BUF *Data; // Generic data
|
|
|
|
};
|
|
|
|
|
|
|
|
// IKE packet ID payload
|
|
|
|
struct IKE_PACKET_ID_PAYLOAD
|
|
|
|
{
|
|
|
|
UCHAR Type; // Type
|
|
|
|
UCHAR ProtocolId; // Protocol ID
|
|
|
|
USHORT Port; // Port number
|
|
|
|
BUF *IdData; // ID data
|
|
|
|
char StrData[128]; // Data of the result of converting to a string
|
|
|
|
};
|
|
|
|
|
|
|
|
// IKE packet certificate payload
|
|
|
|
struct IKE_PACKET_CERT_PAYLOAD
|
|
|
|
{
|
|
|
|
UCHAR CertType; // Certificate type
|
|
|
|
BUF *CertData; // Certificate data
|
|
|
|
};
|
|
|
|
|
|
|
|
// IKE packet certificate request payload
|
|
|
|
struct IKE_PACKET_CERT_REQUEST_PAYLOAD
|
|
|
|
{
|
|
|
|
UCHAR CertType; // Certificate type
|
|
|
|
BUF *Data; // Request data
|
|
|
|
};
|
|
|
|
|
|
|
|
// IKE packet notification payload
|
|
|
|
struct IKE_PACKET_NOTICE_PAYLOAD
|
|
|
|
{
|
|
|
|
UCHAR ProtocolId; // Protocol ID
|
|
|
|
USHORT MessageType; // Message type
|
|
|
|
BUF *Spi; // SPI data
|
|
|
|
BUF *MessageData; // Message data
|
|
|
|
};
|
|
|
|
|
|
|
|
// IKE notification message type
|
|
|
|
// Error
|
|
|
|
#define IKE_NOTICE_ERROR_INVALID_COOKIE 4 // Invalid cookie
|
|
|
|
#define IKE_NOTICE_ERROR_INVALID_EXCHANGE_TYPE 7 // Invalid exchange type
|
|
|
|
#define IKE_NOTICE_ERROR_INVALID_SPI 11 // Invalid SPI
|
|
|
|
#define IKE_NOTICE_ERROR_NO_PROPOSAL_CHOSEN 14 // There is nothing worth mentioning in the presented proposal
|
|
|
|
|
|
|
|
// DPD
|
|
|
|
#define IKE_NOTICE_DPD_REQUEST 36136 // R-U-THERE
|
|
|
|
#define IKE_NOTICE_DPD_RESPONSE 36137 // R-U-THERE-ACK
|
|
|
|
|
|
|
|
|
|
|
|
// IKE packet deletion payload
|
|
|
|
struct IKE_PACKET_DELETE_PAYLOAD
|
|
|
|
{
|
|
|
|
UCHAR ProtocolId; // Protocol ID
|
|
|
|
LIST *SpiList; // SPI list
|
|
|
|
};
|
|
|
|
|
|
|
|
// IKE NAT-OA payload
|
|
|
|
struct IKE_PACKET_NAT_OA_PAYLOAD
|
|
|
|
{
|
|
|
|
IP IpAddress; // IP address
|
|
|
|
};
|
|
|
|
|
|
|
|
// IKE packet payload
|
|
|
|
struct IKE_PACKET_PAYLOAD
|
|
|
|
{
|
|
|
|
UCHAR PayloadType; // Payload type
|
|
|
|
UCHAR Padding[3];
|
|
|
|
BUF *BitArray; // Bit array
|
|
|
|
|
|
|
|
union
|
|
|
|
{
|
|
|
|
IKE_PACKET_SA_PAYLOAD Sa; // SA payload
|
|
|
|
IKE_PACKET_PROPOSAL_PAYLOAD Proposal; // Proposal payload
|
|
|
|
IKE_PACKET_TRANSFORM_PAYLOAD Transform; // Transform payload
|
|
|
|
IKE_PACKET_DATA_PAYLOAD KeyExchange; // Key exchange payload
|
|
|
|
IKE_PACKET_ID_PAYLOAD Id; // ID payload
|
|
|
|
IKE_PACKET_CERT_PAYLOAD Cert; // Certificate payload
|
|
|
|
IKE_PACKET_CERT_REQUEST_PAYLOAD CertRequest; // Certificate request payload
|
|
|
|
IKE_PACKET_DATA_PAYLOAD Hash; // Hash payload
|
|
|
|
IKE_PACKET_DATA_PAYLOAD Sign; // Signature payload
|
|
|
|
IKE_PACKET_DATA_PAYLOAD Rand; // Random number payload
|
|
|
|
IKE_PACKET_NOTICE_PAYLOAD Notice; // Notification Payload
|
|
|
|
IKE_PACKET_DELETE_PAYLOAD Delete; // Deletion payload
|
|
|
|
IKE_PACKET_DATA_PAYLOAD VendorId; // Vendor ID payload
|
|
|
|
IKE_PACKET_NAT_OA_PAYLOAD NatOa; // NAT-OA payload
|
|
|
|
IKE_PACKET_DATA_PAYLOAD GeneralData; // Generic data payload
|
|
|
|
} Payload;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct IKE_PACKET
|
|
|
|
{
|
|
|
|
UINT64 InitiatorCookie; // Initiator cookie
|
|
|
|
UINT64 ResponderCookie; // Responder cookie
|
|
|
|
UCHAR ExchangeType; // Exchange type
|
|
|
|
bool FlagEncrypted; // Encryption flag
|
|
|
|
bool FlagCommit; // Commit flag
|
|
|
|
bool FlagAuthOnly; // Flag only authentication
|
|
|
|
UINT MessageId; // Message ID
|
|
|
|
LIST *PayloadList; // Payload list
|
|
|
|
BUF *DecryptedPayload; // Decrypted payload
|
|
|
|
UINT MessageSize; // Original size
|
|
|
|
};
|
|
|
|
|
|
|
|
// IKE P1 key set
|
|
|
|
struct IKE_P1_KEYSET
|
|
|
|
{
|
|
|
|
BUF *SKEYID_d; // IPsec SA key
|
|
|
|
BUF *SKEYID_a; // IKE SA authentication key
|
|
|
|
BUF *SKEYID_e; // IKE SA encryption key
|
|
|
|
};
|
|
|
|
|
|
|
|
// Number and name of the encryption algorithm for IKE
|
|
|
|
#define IKE_CRYPTO_DES_ID 0
|
|
|
|
#define IKE_CRYPTO_DES_STRING "DES-CBC"
|
|
|
|
|
|
|
|
#define IKE_CRYPTO_3DES_ID 1
|
|
|
|
#define IKE_CRYPTO_3DES_STRING "3DES-CBC"
|
|
|
|
|
|
|
|
#define IKE_CRYPTO_AES_ID 2
|
|
|
|
#define IKE_CRYPTO_AES_STRING "AES-CBC"
|
|
|
|
|
|
|
|
#define IKE_CRYPTO_BLOWFISH_ID 3
|
|
|
|
#define IKE_CRYPTO_BLOWFISH_STRING "Blowfish-CBC"
|
|
|
|
|
|
|
|
#define IKE_CRYPTO_CAST_ID 4
|
|
|
|
#define IKE_CRYPTO_CAST_STRING "CAST-128-CBC"
|
|
|
|
|
|
|
|
// Number and name of the IKE hash algorithm
|
|
|
|
#define IKE_HASH_MD5_ID 0
|
|
|
|
#define IKE_HASH_MD5_STRING "MD5"
|
|
|
|
|
|
|
|
#define IKE_HASH_SHA1_ID 1
|
|
|
|
#define IKE_HASH_SHA1_STRING "SHA-1"
|
|
|
|
|
|
|
|
// Number and name of DH algorithm for IKE
|
|
|
|
#define IKE_DH_1_ID 0
|
|
|
|
#define IKE_DH_1_STRING "MODP 768 (Group 1)"
|
|
|
|
|
|
|
|
#define IKE_DH_2_ID 1
|
|
|
|
#define IKE_DH_2_STRING "MODP 1024 (Group 2)"
|
|
|
|
|
|
|
|
#define IKE_DH_5_ID 2
|
|
|
|
#define IKE_DH_5_STRING "MODP 1536 (Group 5)"
|
|
|
|
|
|
|
|
|
|
|
|
// Encryption algorithm for IKE
|
|
|
|
struct IKE_CRYPTO
|
|
|
|
{
|
|
|
|
UINT CryptoId; // ID
|
|
|
|
char *Name; // Name
|
|
|
|
UINT KeySizes[16]; // Key size candidate
|
|
|
|
UINT BlockSize; // Block size
|
|
|
|
bool VariableKeySize; // Whether the key size is variable
|
|
|
|
};
|
|
|
|
|
|
|
|
// IKE encryption key
|
|
|
|
struct IKE_CRYPTO_KEY
|
|
|
|
{
|
|
|
|
IKE_CRYPTO *Crypto;
|
|
|
|
void *Data; // Key data
|
|
|
|
UINT Size; // Key size
|
|
|
|
|
|
|
|
DES_KEY_VALUE *DesKey1, *DesKey2, *DesKey3; // DES key
|
|
|
|
AES_KEY_VALUE *AesKey; // AES key
|
|
|
|
};
|
|
|
|
|
|
|
|
// IKE hash algorithm
|
|
|
|
struct IKE_HASH
|
|
|
|
{
|
|
|
|
UINT HashId; // ID
|
|
|
|
char *Name; // Name
|
|
|
|
UINT HashSize; // Output size
|
|
|
|
};
|
|
|
|
|
|
|
|
// DH algorithm for IKE
|
|
|
|
struct IKE_DH
|
|
|
|
{
|
|
|
|
UINT DhId; // ID
|
|
|
|
char *Name; // Name
|
|
|
|
UINT KeySize; // Key size
|
|
|
|
};
|
|
|
|
|
|
|
|
#define MAX_IKE_ENGINE_ELEMENTS 16
|
|
|
|
|
|
|
|
// Encryption engine for IKE
|
|
|
|
struct IKE_ENGINE
|
|
|
|
{
|
|
|
|
IKE_CRYPTO *IkeCryptos[MAX_IKE_ENGINE_ELEMENTS]; // Encryption algorithm list that is used in the IKE
|
|
|
|
IKE_HASH *IkeHashes[MAX_IKE_ENGINE_ELEMENTS]; // Hash algorithm list that is used in the IKE
|
|
|
|
IKE_DH *IkeDhs[MAX_IKE_ENGINE_ELEMENTS]; // DH algorithm list that is used in the IKE
|
|
|
|
|
|
|
|
IKE_CRYPTO *EspCryptos[MAX_IKE_ENGINE_ELEMENTS]; // Encryption algorithm list that is used by ESP
|
|
|
|
IKE_HASH *EspHashes[MAX_IKE_ENGINE_ELEMENTS]; // Hash algorithm list that is used by ESP
|
|
|
|
IKE_DH *EspDhs[MAX_IKE_ENGINE_ELEMENTS]; // DH algorithm list that is used by ESP
|
|
|
|
|
|
|
|
LIST *CryptosList;
|
|
|
|
LIST *HashesList;
|
|
|
|
LIST *DhsList;
|
|
|
|
};
|
|
|
|
|
|
|
|
// IKE encryption parameters
|
|
|
|
struct IKE_CRYPTO_PARAM
|
|
|
|
{
|
|
|
|
IKE_CRYPTO_KEY *Key; // Key
|
|
|
|
UCHAR Iv[IKE_MAX_BLOCK_SIZE]; // IV
|
|
|
|
UCHAR NextIv[IKE_MAX_BLOCK_SIZE]; // IV to be used next
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
// Function prototype
|
|
|
|
IKE_PACKET *IkeParseHeader(void *data, UINT size, IKE_CRYPTO_PARAM *cparam);
|
|
|
|
IKE_PACKET *IkeParse(void *data, UINT size, IKE_CRYPTO_PARAM *cparam);
|
|
|
|
IKE_PACKET *IkeParseEx(void *data, UINT size, IKE_CRYPTO_PARAM *cparam, bool header_only);
|
|
|
|
void IkeFree(IKE_PACKET *p);
|
|
|
|
IKE_PACKET *IkeNew(UINT64 init_cookie, UINT64 resp_cookie, UCHAR exchange_type,
|
|
|
|
bool encrypted, bool commit, bool auth_only, UINT msg_id,
|
|
|
|
LIST *payload_list);
|
|
|
|
|
|
|
|
void IkeDebugPrintPayloads(LIST *o, UINT depth);
|
|
|
|
void IkeDebugUdpSendRawPacket(IKE_PACKET *p);
|
|
|
|
|
|
|
|
BUF *IkeEncrypt(void *data, UINT size, IKE_CRYPTO_PARAM *cparam);
|
|
|
|
BUF *IkeEncryptWithPadding(void *data, UINT size, IKE_CRYPTO_PARAM *cparam);
|
|
|
|
BUF *IkeDecrypt(void *data, UINT size, IKE_CRYPTO_PARAM *cparam);
|
|
|
|
|
|
|
|
LIST *IkeParsePayloadList(void *data, UINT size, UCHAR first_payload);
|
|
|
|
LIST *IkeParsePayloadListEx(void *data, UINT size, UCHAR first_payload, UINT *total_read_size);
|
|
|
|
void IkeFreePayloadList(LIST *o);
|
|
|
|
UINT IkeGetPayloadNum(LIST *o, UINT payload_type);
|
|
|
|
IKE_PACKET_PAYLOAD *IkeGetPayload(LIST *o, UINT payload_type, UINT index);
|
|
|
|
|
|
|
|
IKE_PACKET_PAYLOAD *IkeParsePayload(UINT payload_type, BUF *b);
|
|
|
|
void IkeFreePayload(IKE_PACKET_PAYLOAD *p);
|
|
|
|
bool IkeParseDataPayload(IKE_PACKET_DATA_PAYLOAD *t, BUF *b);
|
|
|
|
void IkeFreeDataPayload(IKE_PACKET_DATA_PAYLOAD *t);
|
|
|
|
bool IkeParseSaPayload(IKE_PACKET_SA_PAYLOAD *t, BUF *b);
|
|
|
|
void IkeFreeSaPayload(IKE_PACKET_SA_PAYLOAD *t);
|
|
|
|
bool IkeParseProposalPayload(IKE_PACKET_PROPOSAL_PAYLOAD *t, BUF *b);
|
|
|
|
void IkeFreeProposalPayload(IKE_PACKET_PROPOSAL_PAYLOAD *t);
|
|
|
|
bool IkeParseTransformPayload(IKE_PACKET_TRANSFORM_PAYLOAD *t, BUF *b);
|
|
|
|
void IkeFreeTransformPayload(IKE_PACKET_TRANSFORM_PAYLOAD *t);
|
|
|
|
LIST *IkeParseTransformValueList(BUF *b);
|
|
|
|
void IkeFreeTransformValueList(LIST *o);
|
|
|
|
bool IkeParseIdPayload(IKE_PACKET_ID_PAYLOAD *t, BUF *b);
|
|
|
|
void IkeFreeIdPayload(IKE_PACKET_ID_PAYLOAD *t);
|
|
|
|
bool IkeParseCertPayload(IKE_PACKET_CERT_PAYLOAD *t, BUF *b);
|
|
|
|
void IkeFreeCertPayload(IKE_PACKET_CERT_PAYLOAD *t);
|
|
|
|
bool IkeParseCertRequestPayload(IKE_PACKET_CERT_REQUEST_PAYLOAD *t, BUF *b);
|
|
|
|
void IkeFreeCertRequestPayload(IKE_PACKET_CERT_REQUEST_PAYLOAD *t);
|
|
|
|
bool IkeParseNoticePayload(IKE_PACKET_NOTICE_PAYLOAD *t, BUF *b);
|
|
|
|
void IkeFreeNoticePayload(IKE_PACKET_NOTICE_PAYLOAD *t);
|
|
|
|
bool IkeParseDeletePayload(IKE_PACKET_DELETE_PAYLOAD *t, BUF *b);
|
|
|
|
void IkeFreeDeletePayload(IKE_PACKET_DELETE_PAYLOAD *t);
|
|
|
|
bool IkeParseNatOaPayload(IKE_PACKET_NAT_OA_PAYLOAD *t, BUF *b);
|
|
|
|
|
|
|
|
|
|
|
|
bool IkeCompareHash(IKE_PACKET_PAYLOAD *hash_payload, void *hash_data, UINT hash_size);
|
|
|
|
|
|
|
|
IKE_PACKET_PAYLOAD *IkeNewPayload(UINT payload_type);
|
|
|
|
IKE_PACKET_PAYLOAD *IkeNewDataPayload(UCHAR payload_type, void *data, UINT size);
|
|
|
|
IKE_PACKET_PAYLOAD *IkeNewNatOaPayload(UCHAR payload_type, IP *ip);
|
|
|
|
IKE_PACKET_PAYLOAD *IkeNewSaPayload(LIST *payload_list);
|
|
|
|
IKE_PACKET_PAYLOAD *IkeNewProposalPayload(UCHAR number, UCHAR protocol_id, void *spi, UINT spi_size, LIST *payload_list);
|
|
|
|
IKE_PACKET_PAYLOAD *IkeNewTransformPayload(UCHAR number, UCHAR transform_id, LIST *value_list);
|
|
|
|
IKE_PACKET_TRANSFORM_VALUE *IkeNewTransformValue(UCHAR type, UINT value);
|
|
|
|
IKE_PACKET_PAYLOAD *IkeNewIdPayload(UCHAR id_type, UCHAR protocol_id, USHORT port, void *id_data, UINT id_size);
|
|
|
|
IKE_PACKET_PAYLOAD *IkeNewCertPayload(UCHAR cert_type, void *cert_data, UINT cert_size);
|
|
|
|
IKE_PACKET_PAYLOAD *IkeNewCertRequestPayload(UCHAR cert_type, void *data, UINT size);
|
|
|
|
IKE_PACKET_PAYLOAD *IkeNewNoticePayload(UCHAR protocol_id, USHORT message_type,
|
|
|
|
void *spi, UINT spi_size,
|
|
|
|
void *message, UINT message_size);
|
|
|
|
IKE_PACKET_PAYLOAD *IkeNewDeletePayload(UCHAR protocol_id, LIST *spi_list);
|
|
|
|
|
|
|
|
IKE_PACKET_PAYLOAD *IkeNewNoticeErrorInvalidCookiePayload(UINT64 init_cookie, UINT64 resp_cookie);
|
|
|
|
IKE_PACKET_PAYLOAD *IkeNewNoticeErrorInvalidExchangeTypePayload(UINT64 init_cookie, UINT64 resp_cookie, UCHAR exchange_type);
|
|
|
|
IKE_PACKET_PAYLOAD *IkeNewNoticeErrorInvalidSpiPayload(UINT spi);
|
|
|
|
IKE_PACKET_PAYLOAD *IkeNewNoticeErrorNoProposalChosenPayload(bool quick_mode, UINT64 init_cookie, UINT64 resp_cookie);
|
|
|
|
IKE_PACKET_PAYLOAD *IkeNewNoticeDpdPayload(bool ack, UINT64 init_cookie, UINT64 resp_cookie, UINT seq_no);
|
|
|
|
|
|
|
|
UCHAR IkeGetFirstPayloadType(LIST *o);
|
|
|
|
BUF *IkeBuild(IKE_PACKET *p, IKE_CRYPTO_PARAM *cparam);
|
|
|
|
BUF *IkeBuildEx(IKE_PACKET *p, IKE_CRYPTO_PARAM *cparam, bool use_original_decrypted);
|
|
|
|
BUF *IkeBuildPayloadList(LIST *o);
|
|
|
|
BUF *IkeBuildPayload(IKE_PACKET_PAYLOAD *p);
|
|
|
|
BUF *IkeBuildDataPayload(IKE_PACKET_DATA_PAYLOAD *t);
|
|
|
|
BUF *IkeBuildSaPayload(IKE_PACKET_SA_PAYLOAD *t);
|
|
|
|
BUF *IkeBuildProposalPayload(IKE_PACKET_PROPOSAL_PAYLOAD *t);
|
|
|
|
BUF *IkeBuildTransformPayload(IKE_PACKET_TRANSFORM_PAYLOAD *t);
|
|
|
|
BUF *IkeBuildTransformValue(IKE_PACKET_TRANSFORM_VALUE *v);
|
|
|
|
BUF *IkeBuildTransformValueList(LIST *o);
|
|
|
|
BUF *IkeBuildIdPayload(IKE_PACKET_ID_PAYLOAD *t);
|
|
|
|
BUF *IkeBuildCertPayload(IKE_PACKET_CERT_PAYLOAD *t);
|
|
|
|
BUF *IkeBuildCertRequestPayload(IKE_PACKET_CERT_REQUEST_PAYLOAD *t);
|
|
|
|
BUF *IkeBuildNoticePayload(IKE_PACKET_NOTICE_PAYLOAD *t);
|
|
|
|
BUF *IkeBuildDeletePayload(IKE_PACKET_DELETE_PAYLOAD *t);
|
|
|
|
|
|
|
|
BUF *IkeBuildTransformPayload(IKE_PACKET_TRANSFORM_PAYLOAD *t);
|
|
|
|
UINT IkeGetTransformValue(IKE_PACKET_TRANSFORM_PAYLOAD *t, UINT type, UINT index);
|
|
|
|
UINT IkeGetTransformValueNum(IKE_PACKET_TRANSFORM_PAYLOAD *t, UINT type);
|
|
|
|
|
|
|
|
UCHAR IkeStrToPhase1CryptId(char *name);
|
|
|
|
UCHAR IkeStrToPhase1HashId(char *name);
|
|
|
|
UCHAR IkeStrToPhase2CryptId(char *name);
|
|
|
|
UCHAR IkeStrToPhase2HashId(char *name);
|
|
|
|
BUF *IkeStrToPassword(char *str);
|
|
|
|
UINT IkePhase1CryptIdToKeySize(UCHAR id);
|
|
|
|
UINT IkePhase2CryptIdToKeySize(UCHAR id);
|
|
|
|
|
|
|
|
UINT IkeNewSpi();
|
|
|
|
|
|
|
|
IKE_ENGINE *NewIkeEngine();
|
|
|
|
IKE_CRYPTO *NewIkeCrypto(IKE_ENGINE *e, UINT crypto_id, char *name, UINT *key_sizes, UINT num_key_sizes, UINT block_size);
|
|
|
|
IKE_HASH *NewIkeHash(IKE_ENGINE *e, UINT hash_id, char *name, UINT size);
|
|
|
|
IKE_DH *NewIkeDh(IKE_ENGINE *e, UINT dh_id, char *name, UINT key_size);
|
|
|
|
void FreeIkeEngine(IKE_ENGINE *e);
|
|
|
|
void FreeIkeCrypto(IKE_CRYPTO *c);
|
|
|
|
void FreeIkeHash(IKE_HASH *h);
|
|
|
|
void FreeIkeDh(IKE_DH *d);
|
|
|
|
IKE_CRYPTO *GetIkeCrypto(IKE_ENGINE *e, bool for_esp, UINT i);
|
|
|
|
IKE_HASH *GetIkeHash(IKE_ENGINE *e, bool for_esp, UINT i);
|
|
|
|
IKE_DH *GetIkeDh(IKE_ENGINE *e, bool for_esp, UINT i);
|
|
|
|
|
|
|
|
void IkeHash(IKE_HASH *h, void *dst, void *src, UINT size);
|
|
|
|
void IkeHMac(IKE_HASH *h, void *dst, void *key, UINT key_size, void *data, UINT data_size);
|
|
|
|
void IkeHMacBuf(IKE_HASH *h, void *dst, BUF *key, BUF *data);
|
|
|
|
|
|
|
|
IKE_CRYPTO_KEY *IkeNewKey(IKE_CRYPTO *c, void *data, UINT size);
|
|
|
|
bool IkeCheckKeySize(IKE_CRYPTO *c, UINT size);
|
|
|
|
void IkeFreeKey(IKE_CRYPTO_KEY *k);
|
|
|
|
void IkeCryptoEncrypt(IKE_CRYPTO_KEY *k, void *dst, void *src, UINT size, void *ivec);
|
|
|
|
void IkeCryptoDecrypt(IKE_CRYPTO_KEY *k, void *dst, void *src, UINT size, void *ivec);
|
|
|
|
|
|
|
|
DH_CTX *IkeDhNewCtx(IKE_DH *d);
|
|
|
|
void IkeDhFreeCtx(DH_CTX *dh);
|
|
|
|
|
|
|
|
|
|
|
|
#endif // IPSEC_PACKET_H
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
// Developed by SoftEther VPN Project at University of Tsukuba in Japan.
|
|
|
|
// Department of Computer Science has dozens of overly-enthusiastic geeks.
|
|
|
|
// Join us: http://www.tsukuba.ac.jp/english/admission/
|