4 * uAnytun is a tiny implementation of SATP. Unlike Anytun which is a full
5 * featured implementation uAnytun has no support for multiple connections
6 * or synchronisation. It is a small single threaded implementation intended
7 * to act as a client on small platforms.
8 * The secure anycast tunneling protocol (satp) defines a protocol used
9 * for communication between any combination of unicast and anycast
10 * tunnel endpoints. It has less protocol overhead than IPSec in Tunnel
11 * mode and allows tunneling of every ETHER TYPE protocol (e.g.
12 * ethernet, ip, arp ...). satp directly includes cryptography and
13 * message authentication based on the methodes used by SRTP. It is
14 * intended to deliver a generic, scaleable and secure solution for
15 * tunneling and relaying of packets of any protocol.
18 * Copyright (C) 2007-2008 Christian Pointner <equinox@anytun.org>
20 * This file is part of uAnytun.
22 * uAnytun is free software: you can redistribute it and/or modify
23 * it under the terms of the GNU General Public License as published by
24 * the Free Software Foundation, either version 3 of the License, or
27 * uAnytun is distributed in the hope that it will be useful,
28 * but WITHOUT ANY WARRANTY; without even the implied warranty of
29 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
30 * GNU General Public License for more details.
32 * You should have received a copy of the GNU General Public License
33 * along with uAnytun. If not, see <http://www.gnu.org/licenses/>.
36 #ifndef UANYTUN_key_derivation_h_INCLUDED
37 #define UANYTUN_key_derivation_h_INCLUDED
39 #ifndef USE_SSL_CRYPTO
42 #include <openssl/aes.h>
52 #define LABEL_LEFT_ENC 0x356A192B
53 #define LABEL_RIGHT_ENC 0xDA4B9237
54 #define LABEL_LEFT_SALT 0x77DE68DA
55 #define LABEL_RIGHT_SALT 0x1B645389
56 #define LABEL_LEFT_AUTH 0xAC3478D6
57 #define LABEL_RIGHT_AUTH 0xC1DFD96E
59 enum key_derivation_type_enum { kd_unknown, kd_null, kd_aes_ctr };
60 typedef enum key_derivation_type_enum key_derivation_type_t;
61 enum key_derivation_dir_enum { kd_inbound, kd_outbound };
62 typedef enum key_derivation_dir_enum key_derivation_dir_t;
64 struct key_derivation_struct {
65 key_derivation_type_t type_;
66 u_int16_t key_length_;
69 buffer_t master_salt_;
72 typedef struct key_derivation_struct key_derivation_t;
74 int key_derivation_init(key_derivation_t* kd, const char* type, role_t role, const char* passphrase, u_int8_t* key, u_int32_t key_len, u_int8_t* salt, u_int32_t salt_len);
76 int key_derivation_generate_master_key(key_derivation_t* kd, const char* passphrase, u_int16_t key_length);
77 int key_derivation_generate_master_salt(key_derivation_t* kd, const char* passphrase, u_int16_t salt_length);
79 void key_derivation_close(key_derivation_t* kd);
80 int key_derivation_generate(key_derivation_t* kd, key_derivation_dir_t dir, satp_prf_label_t label, seq_nr_t seq_nr, u_int8_t* key, u_int32_t len);
81 satp_prf_label_t convert_label(role_t role, key_derivation_dir_t dir, satp_prf_label_t label);
83 int key_derivation_null_generate(u_int8_t* key, u_int32_t len);
86 #define KD_AESCTR_DEFAULT_KEY_LENGTH 128
87 #define KD_AESCTR_CTR_LENGTH 16
88 #define KD_AESCTR_SALT_LENGTH 14
90 union __attribute__((__packed__)) key_derivation_aesctr_ctr_union {
91 u_int8_t buf_[KD_AESCTR_CTR_LENGTH];
92 struct __attribute__ ((__packed__)) {
93 u_int8_t buf_[KD_AESCTR_SALT_LENGTH];
96 struct __attribute__((__packed__)) {
97 u_int8_t fill_[KD_AESCTR_SALT_LENGTH - sizeof(satp_prf_label_t) - sizeof(seq_nr_t)];
98 satp_prf_label_t label_;
103 typedef union key_derivation_aesctr_ctr_union key_derivation_aesctr_ctr_t;
105 struct key_derivation_aesctr_param_struct {
106 #ifndef USE_SSL_CRYPTO
107 gcry_cipher_hd_t handle_;
110 u_int8_t ecount_buf_[AES_BLOCK_SIZE];
112 key_derivation_aesctr_ctr_t ctr_;
114 typedef struct key_derivation_aesctr_param_struct key_derivation_aesctr_param_t;
116 int key_derivation_aesctr_init(key_derivation_t* kd, const char* passphrase);
117 void key_derivation_aesctr_close(key_derivation_t* kd);
118 int key_derivation_aesctr_calc_ctr(key_derivation_t* kd, key_derivation_dir_t dir, satp_prf_label_t label, seq_nr_t seq_nr);
119 int key_derivation_aesctr_generate(key_derivation_t* kd, key_derivation_dir_t dir, satp_prf_label_t label, seq_nr_t seq_nr, u_int8_t* key, u_int32_t len);