Annotation of embedaddon/strongswan/src/libsimaka/simaka_crypto.h, revision 1.1

1.1     ! misho       1: /*
        !             2:  * Copyright (C) 2009 Martin Willi
        !             3:  * HSR Hochschule fuer Technik Rapperswil
        !             4:  *
        !             5:  * This program is free software; you can redistribute it and/or modify it
        !             6:  * under the terms of the GNU General Public License as published by the
        !             7:  * Free Software Foundation; either version 2 of the License, or (at your
        !             8:  * option) any later version.  See <http://www.fsf.org/copyleft/gpl.txt>.
        !             9:  *
        !            10:  * This program is distributed in the hope that it will be useful, but
        !            11:  * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
        !            12:  * or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
        !            13:  * for more details.
        !            14:  */
        !            15: 
        !            16: /**
        !            17:  * @defgroup simaka_crypto simaka_crypto
        !            18:  * @{ @ingroup libsimaka
        !            19:  */
        !            20: 
        !            21: #ifndef SIMAKA_CRYPTO_H_
        !            22: #define SIMAKA_CRYPTO_H_
        !            23: 
        !            24: #include <library.h>
        !            25: 
        !            26: typedef struct simaka_crypto_t simaka_crypto_t;
        !            27: 
        !            28: /**
        !            29:  * EAP-SIM/AKA crypto helper and key derivation class.
        !            30:  */
        !            31: struct simaka_crypto_t {
        !            32: 
        !            33:        /**
        !            34:         * Get the signer to use for AT_MAC calculation/verification.
        !            35:         *
        !            36:         * @return              signer reference, NULL if no keys have been derived
        !            37:         */
        !            38:        signer_t* (*get_signer)(simaka_crypto_t *this);
        !            39: 
        !            40:        /**
        !            41:         * Get the signer to use for AT_ENCR_DATA encryption/decryption.
        !            42:         *
        !            43:         * @return              crypter reference, NULL if no keys have been derived
        !            44:         */
        !            45:        crypter_t* (*get_crypter)(simaka_crypto_t *this);
        !            46: 
        !            47:        /**
        !            48:         * Get the random number generator.
        !            49:         *
        !            50:         * @return              rng reference
        !            51:         */
        !            52:        rng_t* (*get_rng)(simaka_crypto_t *this);
        !            53: 
        !            54:        /**
        !            55:         * Derive keys after full authentication.
        !            56:         *
        !            57:         * This methods derives the k_encr/k_auth keys and loads them into the
        !            58:         * internal crypter/signer instances. The passed data is method specific:
        !            59:         * For EAP-SIM, it is "n*Kc|NONCE_MT|Version List|Selected Version", for
        !            60:         * EAP-AKA it is "IK|CK".
        !            61:         *
        !            62:         * @param id    peer identity
        !            63:         * @param data  method specific data
        !            64:         * @param mk    chunk receiving allocated master key MK
        !            65:         * @param msk   chunk receiving allocated MSK
        !            66:         * @return              TRUE if keys allocated and derived successfully
        !            67:         */
        !            68:        bool (*derive_keys_full)(simaka_crypto_t *this, identification_t *id,
        !            69:                                                         chunk_t data, chunk_t *mk, chunk_t *msk);
        !            70: 
        !            71:        /**
        !            72:         * Derive k_encr/k_auth keys from MK using fast reauthentication.
        !            73:         *
        !            74:         * This methods derives the k_encr/k_auth keys and loads them into the
        !            75:         * internal crypter/signer instances.
        !            76:         *
        !            77:         * @param mk    master key
        !            78:         * @return              TRUE if keys derived successfully
        !            79:         */
        !            80:        bool (*derive_keys_reauth)(simaka_crypto_t *this, chunk_t mk);
        !            81: 
        !            82:        /**
        !            83:         * Derive MSK using fast reauthentication.
        !            84:         *
        !            85:         * @param id            fast reauthentication identity
        !            86:         * @param counter       fast reauthentication counter value, network order
        !            87:         * @param nonce_s       server generated NONCE_S value
        !            88:         * @param mk            master key of last full authentication
        !            89:         * @param msk           chunk receiving allocated MSK
        !            90:         * @return                      TRUE if MSK allocated and derived successfully
        !            91:         */
        !            92:        bool (*derive_keys_reauth_msk)(simaka_crypto_t *this,
        !            93:                                                                   identification_t *id, chunk_t counter,
        !            94:                                                                   chunk_t nonce_s, chunk_t mk, chunk_t *msk);
        !            95: 
        !            96:        /**
        !            97:         * Clear keys (partially) derived.
        !            98:         */
        !            99:        void (*clear_keys)(simaka_crypto_t *this);
        !           100: 
        !           101:        /**
        !           102:         * Destroy a simaka_crypto_t.
        !           103:         */
        !           104:        void (*destroy)(simaka_crypto_t *this);
        !           105: };
        !           106: 
        !           107: /**
        !           108:  * Create a simaka_crypto instance.
        !           109:  *
        !           110:  * @return             EAP-SIM/AKA crypto instance, NULL if algorithms missing
        !           111:  */
        !           112: simaka_crypto_t *simaka_crypto_create();
        !           113: 
        !           114: #endif /** SIMAKA_CRYPTO_H_ @}*/

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>