4 * The secure anycast tunneling protocol (satp) defines a protocol used
5 * for communication between any combination of unicast and anycast
6 * tunnel endpoints. It has less protocol overhead than IPSec in Tunnel
7 * mode and allows tunneling of every ETHER TYPE protocol (e.g.
8 * ethernet, ip, arp ...). satp directly includes cryptography and
9 * message authentication based on the methodes used by SRTP. It is
10 * intended to deliver a generic, scaleable and secure solution for
11 * tunneling and relaying of packets of any protocol.
14 * Copyright (C) 2007-2008 Othmar Gsenger, Erwin Nindl,
15 * Christian Pointner <satp@wirdorange.org>
17 * This file is part of Anytun.
19 * Anytun is free software: you can redistribute it and/or modify
20 * it under the terms of the GNU General Public License version 3 as
21 * published by the Free Software Foundation.
23 * Anytun is distributed in the hope that it will be useful,
24 * but WITHOUT ANY WARRANTY; without even the implied warranty of
25 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
26 * GNU General Public License for more details.
28 * You should have received a copy of the GNU General Public License
29 * along with anytun. If not, see <http://www.gnu.org/licenses/>.
32 #ifndef _KEYDERIVATION_H_
33 #define _KEYDERIVATION_H_
35 #include "datatypes.h"
37 #include "threadUtils.hpp"
38 #include "syncBuffer.h"
42 #ifndef USE_SSL_CRYPTO
45 #include <openssl/aes.h>
48 #include <boost/archive/text_oarchive.hpp>
49 #include <boost/archive/text_iarchive.hpp>
55 #define LABEL_LEFT_ENC 0x356A192B
56 #define LABEL_RIGHT_ENC 0xDA4B9237
57 #define LABEL_LEFT_SALT 0x77DE68DA
58 #define LABEL_RIGHT_SALT 0x1B645389
59 #define LABEL_LEFT_AUTH 0xAC3478D6
60 #define LABEL_RIGHT_AUTH 0xC1DFD96E
62 typedef enum { KD_INBOUND, KD_OUTBOUND } kd_dir_t;
67 KeyDerivation() : is_initialized_(false), role_(ROLE_LEFT), key_length_(0), master_salt_(0), master_key_(0) {};
68 KeyDerivation(u_int16_t key_length) : is_initialized_(false), role_(ROLE_LEFT), key_length_(key_length), master_salt_(0), master_key_(0) {};
69 virtual ~KeyDerivation() {};
71 void setRole(const role_t role);
73 virtual void init(Buffer key, Buffer salt, std::string passphrase = "") = 0;
74 virtual bool generate(kd_dir_t dir, satp_prf_label_t label, seq_nr_t seq_nr, Buffer& key) = 0;
76 virtual std::string printType() { return "GenericKeyDerivation"; };
78 satp_prf_label_t convertLabel(kd_dir_t dir, satp_prf_label_t label);
81 virtual void updateMasterKey() = 0;
84 void calcMasterKey(std::string passphrase, u_int16_t length);
85 void calcMasterSalt(std::string passphrase, u_int16_t length);
88 KeyDerivation(const KeyDerivation & src);
89 friend class boost::serialization::access;
90 template<class Archive>
91 void serialize(Archive & ar, const unsigned int version)
93 WritersLock lock(mutex_);
101 bool is_initialized_;
103 u_int16_t key_length_;
104 SyncBuffer master_salt_;
105 SyncBuffer master_key_;
110 #if BOOST_VERSION <= 103500
111 BOOST_IS_ABSTRACT(KeyDerivation);
113 BOOST_SERIALIZATION_ASSUME_ABSTRACT(KeyDerivation);
116 //****** NullKeyDerivation ******
118 class NullKeyDerivation : public KeyDerivation
121 NullKeyDerivation() {};
122 ~NullKeyDerivation() {};
124 void init(Buffer key, Buffer salt, std::string passphrase = "") {};
125 bool generate(kd_dir_t dir, satp_prf_label_t label, seq_nr_t seq_nr, Buffer& key);
127 std::string printType() { return "NullKeyDerivation"; };
130 void updateMasterKey() {};
132 friend class boost::serialization::access;
133 template<class Archive>
134 void serialize(Archive & ar, const unsigned int version)
136 ar & boost::serialization::base_object<KeyDerivation>(*this);
142 //****** AesIcmKeyDerivation ******
144 class AesIcmKeyDerivation : public KeyDerivation
147 AesIcmKeyDerivation();
148 AesIcmKeyDerivation(u_int16_t key_length);
149 ~AesIcmKeyDerivation();
151 static const u_int16_t DEFAULT_KEY_LENGTH = 128;
152 static const u_int16_t CTR_LENGTH = 16;
153 static const u_int16_t SALT_LENGTH = 14;
155 void init(Buffer key, Buffer salt, std::string passphrase = "");
156 bool generate(kd_dir_t dir, satp_prf_label_t label, seq_nr_t seq_nr, Buffer& key);
158 std::string printType();
161 void updateMasterKey();
163 bool calcCtr(kd_dir_t dir, satp_prf_label_t label, seq_nr_t seq_nr);
165 friend class boost::serialization::access;
166 template<class Archive>
167 void serialize(Archive & ar, const unsigned int version)
169 ar & boost::serialization::base_object<KeyDerivation>(*this);
172 #ifndef USE_SSL_CRYPTO
173 gcry_cipher_hd_t handle_[2];
176 u_int8_t ecount_buf_[2][AES_BLOCK_SIZE];
180 #pragma pack(push, 1)
182 union ATTR_PACKED key_derivation_aesctr_ctr_union {
183 u_int8_t buf_[CTR_LENGTH];
185 u_int8_t buf_[SALT_LENGTH];
189 u_int8_t fill_[SALT_LENGTH - sizeof(satp_prf_label_t) - sizeof(seq_nr_t)];
190 satp_prf_label_t label_;