Annotation of embedaddon/strongswan/src/libsimaka/simaka_crypto.h, revision 1.1.1.1

1.1       misho       1: /*
                      2:  * Copyright (C) 2009 Martin Willi
                      3:  * HSR Hochschule fuer Technik Rapperswil
                      4:  *
                      5:  * This program is free software; you can redistribute it and/or modify it
                      6:  * under the terms of the GNU General Public License as published by the
                      7:  * Free Software Foundation; either version 2 of the License, or (at your
                      8:  * option) any later version.  See <http://www.fsf.org/copyleft/gpl.txt>.
                      9:  *
                     10:  * This program is distributed in the hope that it will be useful, but
                     11:  * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
                     12:  * or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
                     13:  * for more details.
                     14:  */
                     15: 
                     16: /**
                     17:  * @defgroup simaka_crypto simaka_crypto
                     18:  * @{ @ingroup libsimaka
                     19:  */
                     20: 
                     21: #ifndef SIMAKA_CRYPTO_H_
                     22: #define SIMAKA_CRYPTO_H_
                     23: 
                     24: #include <library.h>
                     25: 
                     26: typedef struct simaka_crypto_t simaka_crypto_t;
                     27: 
                     28: /**
                     29:  * EAP-SIM/AKA crypto helper and key derivation class.
                     30:  */
                     31: struct simaka_crypto_t {
                     32: 
                     33:        /**
                     34:         * Get the signer to use for AT_MAC calculation/verification.
                     35:         *
                     36:         * @return              signer reference, NULL if no keys have been derived
                     37:         */
                     38:        signer_t* (*get_signer)(simaka_crypto_t *this);
                     39: 
                     40:        /**
                     41:         * Get the signer to use for AT_ENCR_DATA encryption/decryption.
                     42:         *
                     43:         * @return              crypter reference, NULL if no keys have been derived
                     44:         */
                     45:        crypter_t* (*get_crypter)(simaka_crypto_t *this);
                     46: 
                     47:        /**
                     48:         * Get the random number generator.
                     49:         *
                     50:         * @return              rng reference
                     51:         */
                     52:        rng_t* (*get_rng)(simaka_crypto_t *this);
                     53: 
                     54:        /**
                     55:         * Derive keys after full authentication.
                     56:         *
                     57:         * This methods derives the k_encr/k_auth keys and loads them into the
                     58:         * internal crypter/signer instances. The passed data is method specific:
                     59:         * For EAP-SIM, it is "n*Kc|NONCE_MT|Version List|Selected Version", for
                     60:         * EAP-AKA it is "IK|CK".
                     61:         *
                     62:         * @param id    peer identity
                     63:         * @param data  method specific data
                     64:         * @param mk    chunk receiving allocated master key MK
                     65:         * @param msk   chunk receiving allocated MSK
                     66:         * @return              TRUE if keys allocated and derived successfully
                     67:         */
                     68:        bool (*derive_keys_full)(simaka_crypto_t *this, identification_t *id,
                     69:                                                         chunk_t data, chunk_t *mk, chunk_t *msk);
                     70: 
                     71:        /**
                     72:         * Derive k_encr/k_auth keys from MK using fast reauthentication.
                     73:         *
                     74:         * This methods derives the k_encr/k_auth keys and loads them into the
                     75:         * internal crypter/signer instances.
                     76:         *
                     77:         * @param mk    master key
                     78:         * @return              TRUE if keys derived successfully
                     79:         */
                     80:        bool (*derive_keys_reauth)(simaka_crypto_t *this, chunk_t mk);
                     81: 
                     82:        /**
                     83:         * Derive MSK using fast reauthentication.
                     84:         *
                     85:         * @param id            fast reauthentication identity
                     86:         * @param counter       fast reauthentication counter value, network order
                     87:         * @param nonce_s       server generated NONCE_S value
                     88:         * @param mk            master key of last full authentication
                     89:         * @param msk           chunk receiving allocated MSK
                     90:         * @return                      TRUE if MSK allocated and derived successfully
                     91:         */
                     92:        bool (*derive_keys_reauth_msk)(simaka_crypto_t *this,
                     93:                                                                   identification_t *id, chunk_t counter,
                     94:                                                                   chunk_t nonce_s, chunk_t mk, chunk_t *msk);
                     95: 
                     96:        /**
                     97:         * Clear keys (partially) derived.
                     98:         */
                     99:        void (*clear_keys)(simaka_crypto_t *this);
                    100: 
                    101:        /**
                    102:         * Destroy a simaka_crypto_t.
                    103:         */
                    104:        void (*destroy)(simaka_crypto_t *this);
                    105: };
                    106: 
                    107: /**
                    108:  * Create a simaka_crypto instance.
                    109:  *
                    110:  * @return             EAP-SIM/AKA crypto instance, NULL if algorithms missing
                    111:  */
                    112: simaka_crypto_t *simaka_crypto_create();
                    113: 
                    114: #endif /** SIMAKA_CRYPTO_H_ @}*/

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>