1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
|
/*
* Copyright (C) 2009 Martin Willi
* Hochschule fuer Technik Rapperswil
*
* This program is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License as published by the
* Free Software Foundation; either version 2 of the License, or (at your
* option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* for more details.
*/
/**
* @defgroup simaka_crypto simaka_crypto
* @{ @ingroup libsimaka
*/
#ifndef SIMAKA_CRYPTO_H_
#define SIMAKA_CRYPTO_H_
#include <library.h>
typedef struct simaka_crypto_t simaka_crypto_t;
/**
* EAP-SIM/AKA crypto helper and key derivation class.
*/
struct simaka_crypto_t {
/**
* Get the signer to use for AT_MAC calculation/verification.
*
* @return signer reference, NULL if no keys have been derived
*/
signer_t* (*get_signer)(simaka_crypto_t *this);
/**
* Get the signer to use for AT_ENCR_DATA encryption/decryption.
*
* @return crypter reference, NULL if no keys have been derived
*/
crypter_t* (*get_crypter)(simaka_crypto_t *this);
/**
* Get the random number generator.
*
* @return rng reference
*/
rng_t* (*get_rng)(simaka_crypto_t *this);
/**
* Derive keys after full authentication.
*
* This methods derives the k_encr/k_auth keys and loads them into the
* internal crypter/signer instances. The passed data is method specific:
* For EAP-SIM, it is "n*Kc|NONCE_MT|Version List|Selected Version", for
* EAP-AKA it is "IK|CK".
*
* @param id peer identity
* @param data method specific data
* @param mk chunk receiving allocated master key MK
* @param msk chunk receiving allocated MSK
* @return TRUE if keys allocated and derived successfully
*/
bool (*derive_keys_full)(simaka_crypto_t *this, identification_t *id,
chunk_t data, chunk_t *mk, chunk_t *msk);
/**
* Derive k_encr/k_auth keys from MK using fast reauthentication.
*
* This methods derives the k_encr/k_auth keys and loads them into the
* internal crypter/signer instances.
*
* @param mk master key
* @return TRUE if keys derived successfully
*/
bool (*derive_keys_reauth)(simaka_crypto_t *this, chunk_t mk);
/**
* Derive MSK using fast reauthentication.
*
* @param id fast reauthentication identity
* @param counter fast reauthentication counter value, network order
* @param nonce_s server generated NONCE_S value
* @param mk master key of last full authentication
* @param msk chunk receiving allocated MSK
* @return TRUE if MSK allocated and derived successfully
*/
bool (*derive_keys_reauth_msk)(simaka_crypto_t *this,
identification_t *id, chunk_t counter,
chunk_t nonce_s, chunk_t mk, chunk_t *msk);
/**
* Clear keys (partially) derived.
*/
void (*clear_keys)(simaka_crypto_t *this);
/**
* Destroy a simaka_crypto_t.
*/
void (*destroy)(simaka_crypto_t *this);
};
/**
* Create a simaka_crypto instance.
*
* @return EAP-SIM/AKA crypto instance, NULL if algorithms missing
*/
simaka_crypto_t *simaka_crypto_create();
#endif /** SIMAKA_CRYPTO_H_ @}*/
|