aboutsummaryrefslogtreecommitdiffstats
path: root/src/libstrongswan/crypto/prfs/prf.h
blob: bf443e5f46577bddd186f844ab925817a10b64af (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
/*
 * Copyright (C) 2005-2006 Martin Willi
 * Copyright (C) 2005 Jan Hutter
 * Hochschule fuer Technik Rapperswil
 *
 * This program is free software; you can redistribute it and/or modify it
 * under the terms of the GNU General Public License as published by the
 * Free Software Foundation; either version 2 of the License, or (at your
 * option) any later version.  See <http://www.fsf.org/copyleft/gpl.txt>.
 *
 * This program is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
 * or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
 * for more details.
 */

/**
 * @defgroup prf prf
 * @{ @ingroup crypto
 */

#ifndef PRF_H_
#define PRF_H_

typedef enum pseudo_random_function_t pseudo_random_function_t;
typedef struct prf_t prf_t;

#include <library.h>

/**
 * Pseudo random function, as in IKEv2 RFC 3.3.2.
 *
 * PRF algorithms not defined in IKEv2 are allocated in "private use" space.
 */
enum pseudo_random_function_t {
	PRF_UNDEFINED = 1024,
	/** RFC2104 */
	PRF_HMAC_MD5 = 1,
	/** RFC2104 */
	PRF_HMAC_SHA1 = 2,
	/** RFC2104 */
	PRF_HMAC_TIGER = 3,
	/** RFC4434 */
	PRF_AES128_XCBC = 4,
	/** RFC4868 */
	PRF_HMAC_SHA2_256 = 5,
	/** RFC4868. */
	PRF_HMAC_SHA2_384 = 6,
	/** RFC4868 */
	PRF_HMAC_SHA2_512 = 7,
	/** RFC4615 */
	PRF_AES128_CMAC = 8,
	/** FIPS 186-2-change1 */
	PRF_FIPS_SHA1_160 = 1025,
	/** FIPS 186-2-change1, uses fixed output size of 160bit */
	PRF_FIPS_DES = 1026,
	/** Keyed hash algorithm using SHA1, used in EAP-AKA:
	 * This PRF uses SHA1, but XORs the key into the IV. No "Final()" operation
	 * is applied to the SHA1 state. */
	PRF_KEYED_SHA1 = 1027,
	/** draft-kanno-ipsecme-camellia-xcbc, not yet assigned by IANA */
	PRF_CAMELLIA128_XCBC = 1028,
};

/**
 * enum name for encryption_algorithm_t.
 */
extern enum_name_t *pseudo_random_function_names;

/**
 * Generic interface for pseudo-random-functions.
 */
struct prf_t {

	/**
	 * Generates pseudo random bytes and writes them in the buffer.
	 *
	 * @param seed		a chunk containing the seed for the next bytes
	 * @param buffer	pointer where the generated bytes will be written
	 * @return			TRUE if bytes generated successfully
	 */
	bool (*get_bytes)(prf_t *this, chunk_t seed,
					  uint8_t *buffer) __attribute__((warn_unused_result));

	/**
	 * Generates pseudo random bytes and allocate space for them.
	 *
	 * @param seed		a chunk containing the seed for the next bytes
	 * @param chunk		chunk which will hold generated bytes
	 * @return			TRUE if bytes allocated and generated successfully
	 */
	bool (*allocate_bytes)(prf_t *this, chunk_t seed,
						   chunk_t *chunk) __attribute__((warn_unused_result));

	/**
	 * Get the block size of this prf_t object.
	 *
	 * @return			block size in bytes
	 */
	size_t (*get_block_size)(prf_t *this);

	/**
	 * Get the key size of this prf_t object.
	 *
	 * This is a suggestion only, all implemented PRFs accept variable key
	 * length.
	 *
	 * @return			key size in bytes
	 */
	size_t (*get_key_size)(prf_t *this);

	/**
	 * Set the key for this prf_t object.
	 *
	 * @param key		key to set
	 * @return			TRUE if key set successfully
	 */
	bool (*set_key)(prf_t *this,
					chunk_t key) __attribute__((warn_unused_result));

	/**
	 * Destroys a prf object.
	 */
	void (*destroy)(prf_t *this);
};

#endif /** PRF_H_ @}*/